cfp22cb5-Dvd

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 1504

Message from the Chairperson

Greetings!

It is a dream come true as Mount Zion College of Engineering and


Technology convenes the 1st IEEE International Conference on Automation,
Computing and Renewable Systems from 13th to 15th December 2022 at
MZCET. The IEEE Student Branch of MZCET and the department of
Electronics and Communication Engineering have strived hard to conduct this
remarkable event. The theme of this conference encompasses the fields of
electronics, computer science and electrical engineering, which is praiseworthy.
It is a great pleasure to note that the resource persons for this conference hail
from overseas countries and reputed universities. Let me pray and wish the
conference a grand success and God's abundant blessings!

Mrs. Florence Jayabarathan,


Chairperson,
Mount Zion College of Engineering and Technology,
Pudukkottai, Tamil Nadu, India.
Message from the Director

Greetings!

On the eve of 2023, the IEEE Student Branch of MZCET & the
department of Electronics and Communication Engineering have convened the
1st IEEE International Conference in the MZCET campus. It is a memorable
milestone to cherish and opens the vistas of Automation, Computing and
Renewable Systems. I congratulate the conference team who have burnt their
midnight oil in arranging this great event at MZCET. It is remarkable to note
that resource persons from foreign countries and high-ranking universities are
our chief guests and guest of honour at this memorable conference.

I wish and pray that this conference proceeding would remain imprinted in the
minds of the delegates and let me wish the conference all the best!

Dr. Jayson K. Jayabarathan,


Director,
Mount Zion College of Engineering and Technology,
Pudukkottai, Tamil Nadu, India.
Message from the Academic Co-ordinator

Greetings!

Indeed, I am delighted to note that the IEEE Student Branch of MZCET


and the department of Electronics and Communication Engineering have
organized the 1st IEEE International Conference in MZCET. The conference
theme fits nicely to update the knowledge in the areas of automation, computing
and renewable systems. I am sure that this conference event would be an eye-
opener for the delegates to gather up-to-date knowledge and extend their vision
to greater heights. I wish the conference a grand success and God’s blessing.

Mrs. Vivian Rachel Jayson,


Academic Coordinator,
Mount Zion College of Engineering and Technology,
Pudukkottai, Tamil Nadu, India.
Message from the Conference Chair

Greetings!

I deem it a pleasure to pen a few lines wishing the 1 st IEEE International


Conference on Automation, Computing and Renewable Systems a grand
success. IEEE Student Branch of MZCET & the department of Electronics and
Communication Engineering, MZCET have taken great pains to convene this
memorable conference in a very grand manner. I congratulate them for their
efforts in organizing this international conference event. It is a great pleasure to
note that resource persons from overseas countries and professors of
international repute are delivering special lectures in this remarkable event.

Once again, let me wish the conference a grand success and this event will add
one more feather to the crown of MZCET.

Dr. Balamurugan P,
Principal,
Mount Zion College of Engineering and Technology,
Pudukkottai, Tamil Nadu, India.
International Conference on
Automation, Computing and Renewable Systems
ICACRS 2022
Table of Contents
S. No Paper Title/ Author Name Page. No
Optically Controlled Microwave Sensor for Biomedical Applications
1 1
Maryam Sami Majeed, Mesut ÇEVİK
Bandwidth and Power Cost Optimized Over Visible Light Communication
2 5
Karpagam. M, Sowmya. K
Analysis of RLC Network Connected to Steady Stimulating Source via Gupta
3 Transform 9
Rohit Gupta, Rahul Gupta, Loveneesh Talwar, Anamika, Dinesh Verma
Robotic Arm Aided Thermal Screening System
4 13
Usha Rani C M, K Shailaja, Raksha C, Harisha H L, Prashanth P
Recent Advancement and Comparative Turnouts of 1Ø Grid Tied Non-Isolated
5 Inverters Topologies 19
Rushikesh S. Shahakar, Kawita D. Thakur, Nutan S. Thakare
An Automated System for Arrhythmia Detection using ECG Records from
MITDB
6 26
Gilbert Roland, Dhana Sony. J, S. N. Padhi, S. Kayalvili, S Cloudin,
Ashok Kumar
A Multicore ECU-based Automotive Software Domain Combining Runnable
7 Sequencing and Task Scheduling 34
K. Suganyadevi, V. Nandhalal, N. Thiyagarajan, S. Dhanasekaran
Analysis of Coagulation Effect in Veins using MEMS Laminar Flow for Early
8 Heart Stroke Detection 39
T. Vasudeva Reddy, R. Anirudh Reddy, P. Kavitha Reddy, Anisha Reddy
Reviewing the Role of Fiber Bragg Grating Temperature Sensors in Smart
9 Factories: Opportunities and Challenges 45
Paul Stone Macheso, Mohssin Zekriti
IoT-based Intelligent Mobile Application for Shopping
10 M. Balamurugan, G. Prabhakar, G. Amsaveni, M. Karthikumar, J. Jasmin 50
Shifa, E. Sharmila
Noval Approach to Non-Invasive Blood Glucose Monitoring based on Visible
11 Laser Light 54
Joel T, Sakthipriya R, Reena J, A Poojha
A Survey on MQTT Bridges, Challenges and its Solutions
12 58
V. Thirupathi, K. Sagar
Dynamic Pagerank Frequent Subgraph Mining by GraphX in the Distributed
13 System 63
Sadhana Priyadarshini, Sireesha Rodda
Prediction of Solar Energy using Time Series Methods
14 72
Sakshi Shukla, Sarita Sheoran, Sumanta Pasari
A Novel MPPT Approach for a Grid Tied Wind Energy System
15 77
D. Ravi Kishore, B. Kavya Santhoshi, K. Sravani, Kalpaguri Maruthi
Design and Implemetation of Combinational Logic Circuits using Open Source
16 Tool 82
N. Divya, G. Ilakkiya, M. Dheeraj, R. Hinduja, M. Gokul Nathan, M. Harish
Architectural Designs and Performance Analysis of Adiabatic-based 6T, 9T,
17 and 12T SRAM Cells 88
Parvathi M
Design and Development of Neuro-Fuzzy based Multi-Level Inverter using
18 FPGA 93
Ameer Ahamed Z, Anuj Jain, V. K Sharma
Fuzzy Logic Controlled SEPIC with Coupled Inductor-based Converter for
High Voltage Applications
19 101
D. Kirubakaran, S. Gomathi, T. Kavitha, M. Sai Silvya, P. Rajeshwari,
T. D. Subha
Optimal Siting and Sizing of Dispersed Generation in Electrical Distribution
Network with PSO
20 108
Aishwarya M. Holi, Shubham B. Kattikar, Mihir V. Patel, Rudresh B.
Magadum, Santosh M. Nejakar
A Study of Genealogy and Tracking Systems for Automotive Manufacturing
21 Industries 112
Akhil Thomas, Arvind A R, Angelina Geetha
A Generic Algorithm for Controlling an Eyeball-based Cursor System
22 Praveena Narayanan, Sri Harsha. N, Sai Rupesh. G, Sunil Kumar Reddy, 117
Rupesh. S, Yeswanth. M
A Hybrid Optimizer based Nonlinear Model Predictive Control for Rotary
23 Inverted Pendulum 121
Supriya P. Diwan, Shraddha S. Deshpande
Interactive Performance Indicator Dashboard for Modern Enterprise
24 Vidya Dharani L, Manikanta K, Grace Anzel G, Sasi Kiran V, Srithar S, 128
Aravinth S S
Switching and Morphological Studies on Si 15 Te 80 Cu 5 Glass and Thin
25 Film 134
Diptoshi Roy, Chandasree Das
Performance Analysis of Slotted Microstrip Antenna with Variant Substrates
26 139
R Gayathri, T Perarasi, M Leeban Moses, P Ramya
Overview on Battery Management System and Energy Storage System of
27 Electric Vehicle 143
Sanitha Michail C, Chithra M, Nithara P V, Reshma P Eldho
Enhanced Vehicle Plate Identification using YOLO
28 Gayana M N, Alonie Jane Crasta, Shreenath Acharya, Carol Dsouza, Divya 148
Cheryl Moras, Karvender Singh
Exploratory Analysis on Geo-Locational Data
29 S. Ravi Kishan, Krishna Sahithi Kakunuri, Akshitha Raj Parasa, Vamsipriya 153
Patlolla, Prathap Gamini
Distance Estimation for Collision Avoidance of Micro Aerial Vehicles using
LiDAR Sensor
30 157
Hemanth Verma Pinnamaraju, Prashanth Reddy Kapu, Adi Narayana Juturu,
Anbarasu B
Low Power, Highly Stable and Enhanced Read Speed 7T SRAM
31 Deberjeet Usham, Malti Bansal 162
Simulation of Flight Trajectories of Quadrotor using MATLAB and Simulink
32 168
Akash S, B. Anbarasu
Effectual Home Automation using ESP32 NodeMCU
33 173
R. Niranjana, Arvind S, Vignesh M, Vishaal S
Design and Analysis of a Meta Material based Nested Circular Split Ring
34 Resonator for Terahertz Applications 178
Swathi Dasi, Swathi Dasi, G Manmadha Rao
Wheat Head Detection using YOLO: A Comparative Study
35 182
Neeraj S Kumar, Stephi S, Meenakshi R, Greeshma Sarath
Comparison between Symmetrical and Asymmetrical 13 Level MLI with
36 Minimal Switches 187
Sindhuja R, Padma S, Parimalasundar E, Suresh K
Development of Hardware Prototype and Testing of Short Transmission Line
37 V. Johsna, V Harshith Varma, Reddi Vivek Vardhan, Sailaja V, K Deepa, 192
Manitha PV
A Review of Dynamic Wireless Power Transfer System Technology used in
38 Solar Wireless Electric Vehicle Charging Stations 198
Vinoth Kumar K, Maruthi B, Rahul R, Santhosh Melvin D, Sathish S
Hardware Integration of Sensors for Automating Smart Homes
39 C. Lasya, N. Madhav Sai, N. Gunavardhan Reddy, N. Manoj Reddy, Lekshmi 202
S, Syama S
Analyzing the Effects of Electric Mobility Charging Harmonics on Power Grid
40 207
Nishant Sharma, Akshay Dhiman, O. P Rahi
Optimal Placement of Electric Vehicle Charging Station by Considering
41 Dynamic Loads in Radial Distribution Systems 212
Dandu Srinivas, M. Ramasekhara Reddy
Performance Enhancement of Kesterite Cu 2 ZnSn(S,Se) 4 Thin Film Solar
42 Cell 218
Satyendra Kumar, Swati Arora
EEG Signal -based Epileptic Seizure Detection
43 Gokul M, Jagasri L, Sindhuja M, Barkavi R, Pradeep Murugesan, Arun Prasath 223
T
Robustness Trend of Power Transmission and Transformation Monitoring
44 System based on Multidimensional Data Anomaly Detection Algorithm 229
Wei Zhang, Yubo Zhang, Chengwei Huang, Yubin Feng
Miniaturized Semi Hexagonal Aperture Shape Antenna with Elliptical Ground
45 for C – V2X Communication 233
Ramya Vasudevan, Nagaraju V
Smart Water Flow Monitoring and Theft Detection System using IoT
46 Varakumari Samudrala, Ajay Reddy Yeruva, Jayapal N, T. Vijayakumar, 239
M. Rajkumar, Shaik Razia
IoT based Solar Technology Monitoring and Cleaning System
47 246
H. Vidhya, U. Akshaya, M. G. Keerthana, T. Dhivyanandhini
Ensuring Safety for School Children using IoT
48 251
Daniel NareshKumar. M, Aneeshraj P B, Balaji A, Doguparthy Dhanush
IoT and Artificial Intelligence-based Low-Cost Smart Modules for Smart
Irrigation Systems
49 V. Anand Kumar, A. Renaldo Maximus, S. Vishnupriyan, K. Sheikdavood, 254
P. Gomathi
Designing and Implementation of Cellular Network based LPG Monitoring and
50 Alert System 261
S. Ramalingam, B. Sakthi Kumar, K. Prabhu, C P. Prashanth, E. Petersam
A Comparative Study on Machine Learning based Cross Layer Security in
51 Internet of Things (IoT) 267
K. Saranya, A. Valarmathi
Currency and Fake Currency Detection using Machine Learning and Image
52 Processing-An Application for Blind People using Android Studio 274
Vaishak B, Hoysala S, Pavankumar V H, Mohana
Recent Advancements of Internet of Medical Things (IoMT): Challenges and
Future Opportunities with Emerging Technologies
53 278
Divy Tushar Shah, Akash Patel, Aishwariya Budhrani,
Khushi Patel
Solar Tree based Smart City Street Light Control System using IoT BLYNK
Platform
54 284
S. Dhanasekaran, P. Gomathi, A. Renaldo Maximus, Thiyagarajan Krishnan,
B. Kannan
IoT and Image Processing based Smart Door Locking System
55 B Jayaram, D. Abdus Subhahan, Sakthivel B, T. A. Mohanaprakash, Sunita 291
Joshi, M Jogendra Kumar
Smart Blind Stick for Visually Impaired People using IoT
56 Rajanish Kumar Kaushal, K. Tamilarasi, P. Babu, T. A. Mohanaprakash, 296
S. E. Murthy, M Jogendra Kumar
Implementation of a Smart Garbage Monitoring System using GSM
57 301
B. Rubini, S. Pradeep Kumar, M. Suganiya
Android based Integrated Parking System for Real-Time Parking
58 Raji C.G, Adil Bin Aboobacker, Anfas Muhammad, Jamshidha K, Jishana 304
Shemeem
IoT-based Automatic Manhole Observant for Sewage Worker’s Safety
59 Rakesh Dronavalli, Kalpana Seelam, Parthive Maganti, Jasmitha Gowineni, 310
Sai Deepthi Challamalla
Municipality Water Management System using IoT
60 Perumal. B, Nagaraj. P, Esakki Raja. S, Jaya Sunthari. S, Keerthana. S, 317
Muthukumar. M. V
Random Forest , DT and SVM Machine Learning Classifiers for Seed with
61 Advanced WSN Sensor Node 321
Sachin D. Shingade, Rohini Prashant Mudhalwadkar, Komal M. Masal
Misbehaviour Detection based on Least Square Twin Support Vector Machine
62 in VANETs 327
H Summia Parveen, S. V. Evangelin Sonia
Issues and Future Challenges of Sentiment Analysis for Social Networks- A
63 Survey 332
R. Geethanjali, A. Valarmathi
Location based 5G Transmission for LEO Satellite Communication using
64 BPAM Technique 340
Sivasakthi T, Barath Narayanan R, Palani U, Vasanthi D, Preethi R, Pooja M
Detection of Selfish Nodes based on Node Energy in Mobile Adhoc Networks
– MANETs
65 346
R. Sarumathi, V. Jayalakshmi
A Review on Energy Efficient Cooperative Routing Algorithm for Wireless
66 Sensor Networks 351
Immanuvel Arokia James K, Manjula P, Mohana M, Arthi S
Impact of Power, Dıstance and Channel Condıtıons on the Throughput of
Infrastructure and Adhoc Wi-Fi Networks
67 359
ManasaPriya K, Chaitanya G, Mubeena Sk, Jahnavi K, Seetha Ramanjaneyulu
B, Gangaprasad G
Towards Internet of Things: Integration of Wireless Sensor Network to Cloud
Services for Data Collection and Sharing
68 363
Anil Kumar N, S. Vijayalakshmi, D. Baswaraj, Padmanayaki Selvarajan,
S. Chandramohan, Mohit Tiwari
Modified Aquila Optimization based Route Planning Model for Unmanned
Aerial Vehicles Networks
69 370
Sachin Vasant Chaudhari, Shahnawaz Ayoub, M. Siva, M. Dhipa, B Gayathri,
V. Banupriya
Performance Analysis M-PAPM WDM-PON System with ASE-Powered
Stealth Channels for Steganography Applications
70 376
A. Sagaya Selvaraj, Mathibalan. B, Sagadevan K,
Mohanraj S
Detection of Distributed Denial of Service Attack using Random Forest
Algorithm
71 382
Murukesh C, Kishore Kannan B, Thilak kumar A, Venkat B,
Haris kumar V
Digital Data Protection using Barcode & Steganographic Approach
72 387
Ayushi Chaudhary, Ashish Sharma, Neeraj Gupta
Blockchain based Healthcare Data Management
73 392
Karthigha M, Padmavathy C, V. S. Akshaya
Intruder Detection System for Digital Device using Computer Vision
74 Sugantha Mallika S. S, Priyadharsini. M, Venkat Kumar. I. S, Sudharsan. R, 397
Surya. M
Detection of Attacks using Attention-based Conv-LSTM and Bi-LSTM in
75 Industrial Internet of Things 402
Bebin Josey T, D. S. Misbha
Design of Hybrid Authentication Protocol for High Secure Applications in
76 Cloud Environments 408
Sai Srinivas Vellela, R. Balamanigandan
A Randomized Dot Pattern Character Encoding Scheme (R-DPCES) for
77 Steganography 415
Susmita Mahato
Usage of Classifier Ensemble for Security Enrichment in IDS
78 Ch. Phaneendra Varma, G. Ramesh Babu, Pokkuluri Kiran Sree, N. 420
Raghavendra Sai
Optimal Installation for Enhancing Power System Security using Integrated
79 BBO-PSO techniques 426
K. Kavitha
Comparative Stratification of Steganalysis Techniques to Interpret & Target
Anomalies
80 Dhiren Dommeti, Siva Ramakrishna Nallapati, Venkata Vara Prasad Padyala, 433
Venkata Naresh Mandhala
Implementation of Technology to Recognize Segmented and Non-Segmented
Text: A Survey
81 439
Sandhya Sharma, Sheifali Gupta, Avinash Sharma, Lipika Gupta, Shaminder
Kaur
Attribute based Encryption in Healthcare Application
82 443
Suresh Kumar S, Chidambaram G, S. Vijayalakshmi, Dhayanandh AT
Data Privatization and Security using Bit Plane Complexity Segmentation
83 451
Suresh Kumar S, Chidambaram G, S. Vijayalakshmi
Design and Security Analysis of Isoidentity based Isobeta Cryptosystem
84 Nilesh Bhosale, Rupesh Pohane, Siddhant Meshram, Akshaykumar Meshram, 459
Malabika Adak, K. T. V. Reddy
Privacy Preserving Encryption with Optimal Key Generation Technique on
Deduplication for Cloud Computing Environment
85 464
Sanjeeva Polepaka, Shahnawaz Ayoub, Yudhveer Singh Moudgil, B Gayathri,
Himanshu Sharma, S Kannan
A Comprehensive Survey on Cloud Security Mechanisms
86 471
Dhwani Hakani, Palvinder Singh Mann
SEHAT: Cloud-based User Sociable Health Care Assistant System
87 476
Sk. Arshiya Sultana, D. Igna Sree, Ch. Rupa, G. Sowmya Sree
Task Scheduling Algorithms in Fog Computing: A Comparison and Analysis
88 483
Tarun Jagadish, Onkar Apte, K. Pradeep
Identify Fake Data or Misinformation in Near Real-Time using Big Data and
89 Sentiment Analytics 489
Parth M Kansara, Kinjal U Adhvaryu
Effective Intrusion Detection and Classification using Fuzzy Rule based
Classifier in Cloud Environment
90 497
C. Veena, S. Ramalakshmi, V. Bhoopathy, Minakshi Dattatraya Bhosale,
C. G. Magadum, Abirami. S. K
A Comprehensive Review of Cloud based Multi-Authority Revocable CPABE
91 Schemes 503
Shobha Chawla, Neha Gupta
Mantaray Foraging Optimization based Makespan Enhancement in Cloud
based Scheduling Environment
92 508
Aswini. J, K. Johny Elma, P. John Augustine, N. Kopperundevi,
S. M. Chithra, T. Parasuraman
A Novel Deep Learning Mechanism for Workload Balancing in Fog
Computing
93 515
Maganti Venkatesh, S Naveen Kumar Polisetty, Srilakshmi.CH,
PraveenKumar. K, Rabinarayan Satpathy, P. Neelima
Qos-Aware Video Streaming based Admission Control and Scheduling for
94 Video Transcoding in Cloud Computing 520
Venkateswara Reddy B, Khader Basha Sk, Roja D
Soft Computing based Machine Learning Techniques for Optical
95 Communication Networks 526
P. Malini, A. Vasantharaj, S. Preethi, S. Karpakam, U. Sasikala, S. Irfan basha
Spot Fire: An Intelligent Forest Fire Detection System Design with Machine
96 Learning 532
K. Revathi, T. Tamilselvi, R. Arunkumar, T. Divya
PDF Malware Detection System based on Machine Learning Algorithm
97 538
Pruthvi Priya P M, Hemavathi P
A Deep Learning Approach to Analyze Diabetic Retinopathy Lesions using
Scant Data
98 543
Devendra Singh, Dinesh C. Dobhal, Saurabh Pargaien, Amrita Verma
Pargaien, Janmejay Pant, Himanshu Pant
Comparison of Machine Learning Algorithms for Pigment Epithelial
99 Detachment Classification using Shape and Curvature Features 550
T. M. Sheeba, S. Albert Antony Raj, M. Anand
Deep Learning Network for Object Detection Under the Poor Lighting
Condition
100 555
Chethan L S, S. Uma Maheswari, Seeram Srinivasa Rao, Naveen Mukkapati,
C. S. Sundar Ganesh, Ashok Kumar
ML based Parkinson’s Disease Identification using Gait Parameters
101 Lokaiah Pullagura, Nilofer Kittad, G. Diwakar, V. Sathiya, Ashok Kumar, 561
Mrutyunjaya S Yalawar
A Brief Analysis on Machine Learning Classifiers for Intrusion Detection to
Enhance Network Security
102 567
Spandana Mande, Nandhakumar Ramachandran, Chanumolu Kiran Kumar,
Ch Naga Priyanka
A Brief Review on Melanoma Diagnosis Models using Machine Learning
103 Techniques 574
Deepthi Rapeti, D Vivekananda Reddy
Equilibrium Optimizer with Deep Learning Model for Autism Spectral
Disorder Classification
104 582
A. Praveena, T. S. Karthik, Vijayakrishna Rapaka E, N. Senthamilarasi,
Abirami. S. K, Shyamali Das
Automated Intracranial Haemorrhage Detection and Classification using Rider
Optimization with Deep Learning Model
105 588
T. S. Karthik, N K Anushkannan, Vijayakrishna Rapaka E, Naziya Hussain,
Rajasekhar Pinnamaneni, Shyamali Das
Heart Disease Prediction and Classification using Machine Learning and
Transfer Learning Model
106 595
R Sivaprasad, M. Hema, Bharati N Ganar, Sunil D M, Vaishali Mehta,
Mochammad Fahlevi
Convolutional Neural Networks (CNN) based Marine Species Identification
107 Nanthini. N, Arul Siva Kumaran K, Ashiq A, Aakash V S, Bhuvaneshwaran M 602
J
Review of Machine Learning Algorithms for Autism Spectrum Disorder
108 Prediction 608
V. Kavitha, R. Siva
Detection of Traffic on the Network based on a Real Dataset for the IIM
109 Method and ML-TSDS Algorithm 614
Sugin S.V, M. Kanchana
A Machine Learning based Approach for Breast Cancer Prediction
110 623
Mayank Agrawal, Vinod Jain
Covid-19 Infection Segmentation using Deep Learning Techniques
111 627
Arya R, Deepak S
Machine Learning Techniques for Detecting DDoS Attacks in SDN
M. Kavitha, M. Suganthy, Aniket Biswas, R. Srinivsan, R. Kavitha,
112 634
A. Rathesh
Retinal Fundus Image Retrieval and Classification using Optimal Deep
113 Learning Model 639
S Syed Mahamood Shazuli, A. Saravanan
Social Distancing Monitoring and Alerting System using YOLO Deep
114 Learning Algorithm 646
P. Dharani Devi, M. Thirukumaran, B. Balaji
Breast Cancer Segmentation by K-Means and Classification by Machine
Learning
115 651
K. Priya, V. Senthilkumar, Samson Isaac. J, Sreekanth Kottu, V S
Ramakrishna, M Jogendra Kumar
An Examen of Oral Carcinoma using Machine Learning Approaches
116 657
Jenifer Blessy. J, Sornam.M
MiMi: Sinhala Language Speech Assistive Learning Bot to Support Children
with Stuttering
117 662
K. C. D Vithana, D. N. N Weerarathne, H. A. S Krishan, M. R. M Wijesiri,
Samantha Thelijjagoda, J. A. D. T Jayawickrama, Nethmini T. Weerawarna
An Extensive Review of Machine Learning Techniques for EEG Signal
118 Processing 669
Anita. M, A. Meena Kowshalya, B. Maheswari, A. Muthuram
Hybrid Machine Learning based False Data Injection Attack Detection and
Mitigation Model for Waste Water Treatment Plant
119 674
A. Parvathy, G. Leela Kasyap, D. Venkata Abhinav, A. N. V. Surya Sai,
R. Sriranjani, N. Hemavathi
Twitter Sentiment Analysis with Machine Learning
120 M. Jagadeesan, T. M. Saravanan, P. A. Selvaraj, U. Asif Ali, J. Arunsivaraj, S. 681
Balasubramanian
Hybrid Particle Swarm Optimization with Deep Learning Driven Sarcasm
Detection on Social Media
121 687
J. Anitha Josephine, Md. Abul Ala Walid, Mohammad Shabbir Alam, Santosh
Kumar Maharana, Thulasimani T, Mohit Tiwari
Design of Kernel Extreme Learning Machine based Intelligent Crop Yield
122 Prediction Model 694
Srilatha Toomula, Sudha Pelluri
Reliable Densely Connected Network with Machine Learning based Diabetic
Retinopathy Grading Approach
123 702
Srinivasulu Sirisala, Nihar Ranjan Behera, D. Amuthaguka, Sachin Vasant
Chaudhari, Jhakeshwar Prasad, Swetha Reddy A
Land Use Land Cover Classification using Machine Learning
124 708
Harsh Waghela, Saurin Patel, Pooja Sudesan, Soham Raorane, Rohan Borgalli
Deep Learning Aided Emotion Recognition from Music
125 R Raja Subramanian, Kokkirala Aditya Ram, Dola Lokesh Sai, K Venkatesh 712
Reddy, Kondeti Akarsh Chowdary, Kundu Dheeraj Datta Reddy
Estimation of Accuracy Level for Sentiment Analysis using Machine Learning
126 and Deep Learning Models 717
V. Vanthana, K. Kartheeban
Heart Disease Prediction Model using Machine Learning
127 723
Binju saju, V Asha, Arpana Prasad, Harish Kumar P, Rakesh V, A. P. Nirmala
Poaceae Family Leaf Disease Identification and Classification Applying
128 Machine Learning 730
Arpana Prasad, V Asha, Binju Saju, Likhitha S, Mayuri P
An Extensive Study on HAR Systems to Recognize Daily Activities using
129 Deep Learning Approaches 736
Gayathri Tippani, Veerraju Gampala
Deep Network Analysis and Prediction of Ophthalmic Disorders
130 M. Darshini, M. Hemamalini, Jeyasheela Rakkini, G. Bagyalakshmi, V. 743
Gomathi
Artificial Intelligence based System in Protein Folding using Alphafold
131 750
Pragya Srivastava, Shreyansh Suyash, N. Jayapandian
Online Voice based Smart Security and Automation System for Real Time
132 Application using Artificial Intelligence 756
M. Bhavani, R. Brinda, P. S. Manoharan, S. Ramalingam
Diagnosis of Neurodegenerative Diseases by Gait Analysis using Triblock
133 CNN and Deep RQA Techniques 762
Vajiha Begum S. A, Pushpa Rani M
Secured IoT Malware Detection Framework using AI based Fuzzy Logic
Systems
134 771
V. S. Saranya, G. Ramachandran,
S. Chakaravarthi
Corneal Ulcer Feature Extraction and Image Classification using a Deep
135 Convolutional Network and the VGG 16 Model 780
S. Janet Grace Susila, D. Kavitha
Intelligent Deep Residual Network based Brain Tumor Detection and
Classification
136 785
K. Kartheeban, Kapula Kalyani, Sai Krishna Bommavaram, Divya Rohatgi,
Mathur Nadarajan Kathiravan, S. Saravanan
A Systematic and Bibliometric Review on Face Recognition: Convolutional
137 Neural Network 791
Aakanksha, Gurpreet Singh, Jaspreet Singh, Deval Verma
Artificial Intelligence based Smart Cosmetics Suggestion System based on
Skin Condition
138 797
Kavyashree N, Rama Satish K V, Prasanna Rajaram Rasal, Rahul Jalindar
Jadhav, M. Saidireddy, K G Kharade
Indian Agriculture Supply Chain Management using Blockchain Technology
and CNN
139 802
D. N. V. S. L. S.Indira, M. Hema Reddy, G. Sri Jyothi, K. Rohith, K. Sravya,
G. Jahnavi
Real-Time Face Mask Detection from CCTV Video Frames using Deep Neural
Networks
140 809
V Anantha Natarajan, Putta Vishnu Vardhan, Nayakula Murahara Sai Priya,
Nunna Vineeth, Parthu V
An Intelligent Convolutional Neural Network based Potholes Detection using
141 Yolo-V7 813
Madarapu Sathvik, G. Saranya, S. Karpagaselvi
A Review of Generative Adversarial Networks(GANs) for Technology-
142 Assisted Learning : Solving Teaching and Learning Challenges 820
K. Dinesh Kumar, Sarot Srang, Dona Valy
A Survey on Quantization Methods for Optimization of Deep Neural Networks
Uday Kulkarni, Abhishek S Hosamani, Abhishek S Masur, Shashank Hegde,
143 827
Ganesh R Vernekar, K Siri Chandana
Analysis of CNN Model with Traditional Approach and Cloud AI based
144 Approach 835
Utkarsh Kushwaha, Puja Gupta, Sonu Airen, Megha Kuliha
Liver Tumor Grade Detection using CNN based LSTM Model with Correlated
145 Feature Set from CT Images 843
Venkateswarlu Gavini, G. R. Jothi Lakshmi
Image Error Concealment Method by Hiding a Copy of the Same Image in it in
146 Spatial and Wavelet Domain before Transmission 851
Ghouse Ahamed Z, Anuj Jain, V. K Sharma
SaRa: A Novel Activation Function with Application to Melanoma Image
147 Classification 854
Mohammad Naved Qureshi, Mohammad Sarosh Umar
DeepFake Detection Through Key Video Frame Extraction using GAN
148 859
Lalitha S, Kavitha Sooda
Image Inpainting for Fingerprint Analysis
149 864
Milind Bhilavade, K. S. Shivprakasha, Meenakshi R Patil, Lalita S Admuthe
An Interpretation on Brain Gate System Network and Technology- A Study
150 868
Sowmya K, Sushitha S
Air Compression Massage System for Chronic Vein Disorders
151 874
Deekshita R, Priscita K, Shruthi Ram R, Vigneshwari N, M. Anisha, Gokul M
Traffic Sign Detection using Hog and GLCM with Decision Tree and Random
152 Forest 879
Asha J, Giridhran R, Agalya K, Sathya R
Optimal Allocation of Distributed Generation using Modified Grey Wolf
Optimizer
153 884
Ibrahim Alkhaleel Altayara, Essam A. Al-Ammar, Ghazi A.Ghazi, Ahmed A.
AL Katheri
A Comparative Study of Feature Selection Methods for Activity Recognition
154 in the Smart Home Environment 890
John W. Kasubi, Manjaiah D. Huchaiah
Emotion Recognition from Telugu Speech using Probabilistic Support Vector
155 Machines 896
Ratna Kanth Nelapati, Saraswathi Selvarajan
Smart Cervical Band for Detection of Cervical Spondylosis using IOT
156 Technologies 900
M. Arunkumar, K. Pugalendhi, S. Agalya
Improvement of Safety in Road Environment by Designing an Advanced
Driver Assistance System
157 907
V. Gokula Krishnan, Pinagadi Venkateswara Rao, M. Navaneethakrishnan,
V. Prabhu, D. Parkavi, T. Tamilarasan
A Novel Fish Optimization Algorithm for Offshore Disease Detection in
158 Fishes using a Smartphone App 912
K. Sujatha, T. Kalpalatha Reddy, N. P. G. Bhavani
Identifying Patterns in Common Vulnerabilities and Exposures Databases with
159 Exploratory Data Analysis 919
Atul Kumar, Ishu Sharma
Fertilizer Spraying using Active Learning in Precision Agriculture to Improve
the Crop Yield
160 925
N. Rajeswari, D. Kavitha
A Comparative Review: Detection and Classification of Cervical Cancer from
161 Pap-Smear Images 932
Krishna Prasad Battula, Sai Chandana Bolem, Jonnadula Harikiran
Non-Sequential Indexing of Videos using Linguistic Computation
162 939
Sanjana Hukkeri, Ashish H, Ritu V. Malage, Preethi P, Mamatha H. R
Modeling of Chicken Swarm Optimization with Hybrid Networks for Visual
163 Places Recognition 946
S. Senthamizhselvi, A. Saravanan
Eye-Move, An Eye Gaze Typing Application with OpenCV and Dlib Library
164 952
Abhaya V, Akshay S, Chandan C Bagan, Dhanraj K, Shyamala G
A Survey on Application of Metaheuristics Techniques for Ensemble Feature
165 Selection (EFS) 958
S. Vijayalakshmi, V. Prasanna Venkatesan
SADGF: Surveillance based Anxiety Detection using Gender- based Facial
166 Emotion Recognition 966
Beulah Divya Kannan, Nithyakamal Ilamurugu
Data Extraction Approach using Natural Language Processing for Sentiment
Analysis
167 970
Shreyash Mishra, Siddhartha Choubey, Abha Choubey, Yogeesh N, J Durga
Prasad Rao, P. William
Android based Recommender System (ARS) to Detect Breast Abnormalities
168 M Kavitha, Venkata Krishna P, V Rama Krishna, Sreenivasulu Digavinti, 973
M Kalyani, Tiruluka V S Naga Divya
Chronic Kidney Disease Detection using AdaBoosting Ensemble Method and
169 K-Fold Cross Validation 979
N. Mohana Suganthi, Jemin V. M, P. Rama, E. Chandralekha
Experimental Setup of Apache Spark Application Execution in a Standalone
170 Cluster Environment using Default Scheduling Mode 984
M. Jayanthi, K. Ram Mohan Rao
Efficiency Enhancement using Least Significant Bits Method in Image
Steganography
171 989
P. Subhasri, S. Santhoshkumar, A. Sumathi, C. Balakrishnan, F. Kurus Malai
Selvi
Hand Gesture Recognition using DenseNet201-Mediapipe Hybrid Modelling
172 995
Prachetas Padhi, Mousumi Das
Analysis and Detection of Monkeypox using the GoogLeNet Model
173 1000
Upendra Singh, Lokendra Singh Songare
Contrast Enhancement of Lung CT Scan Images using Multi-Level Modified
174 Dualistic Sub-Image Histogram Equalization 1009
K. Ezhilraja, P. Shanmugavadivu
Measuring COVID-19 Opinion in the Online Debate using an Unsupervised
175 Model 1015
Priyadarsini K, Jeba Sonia J, Vijayalakshmi K, Anbazhagu U. V
ClassHotel: Application of Data Analytic Techniques for Online Hotel
Recommendation
176 1021
R Raja Subramanian, M Poojith Reddy, K Kousik, S Rupesh, S Rohith,
B V Sai Kumar
Design of Autonomous Obstacle Avoidance System for Automobiles based on
177 Machine Learning in the Context of Intelligent Transportation 1027
Wu Yangming
Design and Comparison of Collaborative Filtering Technology for Product
Suggestions in E-Commerce
178 1031
P. Rajasekar, B. Mohanraj, S. N. Padhi, N. Sivakumar, Lavanya J, Charles
Prabu. V
Prediction of YouTube View Count using Supervised and Ensemble Machine
179 Learning Techniques 1038
Manikandan P, Sharmila Rajam J, Manimuthu A, Sathya Narayana Sharma K
Production Planning in Process Industries using CEC 2021 Winning
180 Algorithms 1043
Remya Kommadath, Aman Kumar Saini, Prakash Kotecha
Performance Evaluation of Recently Proposed Metaheuristics Algorithms on
Solving Job Shop Scheduling Problem
181 1051
Remya Kommadath, Bibekananda Ramchandani, Makkitaya Swarna Nagraj,
Prakash Kotecha
Pre-Trained Xception Model-based COVID Detection using CXR Images
182 M. Gayathri Lakshmi, Komal Singh, R. Beaulah Jeyavathana, 1059
Venkatasubramanian, V. Satish Goud, A. Deepak
Facial Emotion Recognition using Deep Learning Approach
183 1064
Sowmiya R, Sivakamasundari G, Archana V
A Novel Object Detection Framework using Convolutional Neural Networks
184 (CNN) and RetinaNet 1070
Archana V, Kalaiselvi S, Thamaraiselvi D, Gomathi V, Sowmiya R
Machine Learning based Botnet Detection in Large-Scale Network
185 1075
Alan Shine Manuel, Esther Daniel, S. Durga, Beulah Rani I
A Smart Recommendation System for Medicine using Intelligent NLP
Techniques
186 1081
C. Srinivasa Kumar, Ranga Swamy Sirisati, Viswanath Gudditti, Kanusu
Srinivasa Rao, Ratna Kumari Challa
Design and Development of Automatic Tomato Sorting Intelligent System
using Image Processing
187 1085
Baluprithviraj. K. N, Dhanalakshmi. M, Dharanidharan. D, Gokulkrishnan. K,
Janarthanan. S, Madhan Mohan. M
Evaluation of Feature Selection and Multi-Class Prediction Methods for Metal
188 Stress 1091
Yash Rathod, Dinesh Vaghela
Deep Learning Approaches for Detecting Diabetic Retinopathy using CNN
Models
189 1096
M. Mukesh Krishnan, S. Thanga Ramya, K. Kirubanathavalli, S. Lalitha,
J. Diofrin, M. Vadivel
Construction of Malaria Disease Prediction System using Deep Learning
190 J Sivakumar, Sudhagar D, Vithya V T, Jaichandran R, K. Narasimha Raju and 1103
C. S. Sundar Ganesh
Colour based Object Classification using KNN Algorithm for Industrial
Applications
191 1110
N C Santosh Kumar, S Uma Maheswari, Vigneshwari. M, P V Pramila,
Rashmita Khilar, Ashok Kumar
Splicing Image Forgery Detection by Deploying Deep Learning Model
N Krishnamoorthy, C. Amuthadevi, M. K. Geedtha, Poli Lokeshwara Reddy,
192 1116
Anitha Rani K S, R. Gopinathan
DWT Algorithm for Macro & Micro Block based Multiple Histogram Shifting
for Video Data Hiding
193 1121
K. Venkata Ramana, Sowntharya C, Jithesh K, Poli Lokeshwara Reddy,
Apoorva M C, Ashok Kumar
Bio-Inspired Algorithm for Speed Control of Electric Vehicle
194 K. Rameshkumar, T. J. Catherine, M. Sudhakar, I. Kathir, S. Hemavathi, 1128
K. Balamurugan
Analysis of Crowd Features based on Deep Learning
195 1134
Puja Gupta, Varsha Sharma, Sunita Varma
Improving the Power Consumption of Sensor Networks using Optimization
Technique for Sleep Scheduling Mechanism
196 1140
G. Vinoth Rajkumar, M. Vargheese, A. Anna Lakshmi, K. Ramanan, D. David
Neels Ponkumar, S. P. Ramesh
Penalty based Sentimental Text Generation Framework using Generative
197 Adversarial Networks 1147
K. Chitra, G. Kavitha, P. Latchoumy
Text Localization and Recognition from Natural Scene Images using AI
198 D. Shekar Goud, Vigneshwari. M, Aparna P, Vijayasekaran G, Ajay Singh 1153
Yadav, Ashok Kumar
IDCSNet: Intrusion Detection and Classification System using Unified
199 Gradient-Boosted Decision Tree Classifier 1159
Kondru Mounika, P. Venkateswara Rao
Intelligent Document Finding using Optical Character Recognition and
200 Tagging 1165
A. Mohamed Abbas, M. Syed Shahul Hameed, S. Balakrishnan, K. S. Anandh
Oculus: A New Dimension to Virtual Reality
201 1169
Akshiv Nagta, Bhanu Sharma, Sheena, Avinash Sharma
An Automated Coronary Artery Disease Diagnosis System using Machine
202 Learning 1173
Kanwarpartap Singh Gill, Avinash Sharma, Vatsala Anand, Sheifali Gupta
An Efficient Fashion Recommendation System using a Deep CNN Model
203 1179
B Suvarna, Sivadi Balakrishna
Implementing BeagleBone Black as a Single Board Computer by Transferring
E-mail using SMTP
204 1184
Dharshini S, Haneesh T, Venugopal E, Rama Devi S, Sree Dhviya M, P.
Sivakumar
An Efficient and Robust Breast Cancer Detection in Mammogram Image using
205 Improved Threshold Extraction Method 1188
A. Hema Malini, Yashwanth G, Yellamrajujithendra, Venkataramana Y
Classification of WBC based on Deep Learning using Microscopic Images
206 1194
Rajalakshmi T, Senthilkumar C
Advanced Protection System for SCADA using Fog Computing
207 M. S.Sujatha, P. Shashank, Shahul Ahammad, R. Dharma Teja, Vijji K, A. R. 1202
Hithesh
Computer Vision- Hybrid Learning based on Multi Scale Dilated Convolution
208 Module Mechanism Implemented for Object Detection 1208
D. Kalpanadevi, K. Kartheeban, M. Mayilvaganan, P. Bamaruckmani
A Sentimental Analysis of Legal Documents using Deep Learning Approach
209 Shunmuga Lakshmi Priya. K,Thamarai Selvi. D, Kalaiselvi. S, Gomathi. V 1212
Optimal Trained Deep Maxout Model for Intrusion Detection in Cloud
210 1220
Meble Varghese, M. Victor Jose
Real Time Road Lane Detection using Computer Vision Techniques in Python
211 Salna Joy, Mamta B S, Tejas B Mukesh, Mohammed Muzammil Ahmed, Uday 1228
Kiran
A Review on Digital Farming using Machine Learning Techniques
212 1233
N. Yedukondalu, V. Bhuvana Kumar, A. Narayana Rao
A Unique Model for Detecting the Diseases using Decision Making Approach
213 (DMA) 1239
Shaik Nagul, Y Padma, Siyyadula VR Vara Prasad, Shail Jakeer Hussain
A Robust Framework for Glaucoma Detection and Segmentation of Real Time
Fundus Images using Hybrid ASCL Model
214 1244
G. Charulatha, Maheswaran U, Kalyan Kumar G, N. Sasirekha,
Meenakshisundaram. N
Examination on Fire Detection Methods using Computer Vision
215 1251
Sikhin V C, S Sankara Subramanian, Sreelekshmi R V
Detection and Classification of Breast Cancer from Microscopic Biopsy
216 Images using Modified Neural Network 1259
L. Vanitha, K. Jayamani, N. Sasirekha, Yogalakshmi.V, Sajiv G
Real-Time Sidewalk Crack Identification and Classification based on
Convolutional Neural Network using Thermal Images
217 1266
G. Karthikeyan, Dhaarani T G, R. Anusuya, Kalyan Kumar G, Joel T,
R. Thandaiah Prabu
A Machine Learning based Approach to Early Stage Diabetes Prediction
218 Yudheksha GK, Vijay Murugadoss, P Sanjana Reddy, Harshavardan T, 1275
Shivram Sriramulu
Optical Flow-based Tracking of Vehicles using Adaptive Particle Filter Target
Tracking Algorithm based for Accident Prevention
219 1281
Mohamed Dawood Shamout, R Sivaprasad, N Ramya, Sarang Pande,
Rishikaysh Kaakandikar, Mochammad Fahlevi
Intrusion Detection System for Cyber Attacks in Food and Beverage Industry
220 Beulah Rani I, G. Matthew Palmer, G. Jaspher W.Kathrine, S. E Vinodh 1287
Ewards
Dimensions of Automated ETL Management: A Contemporary Literature
221 Review 1292
G. Sunil Santhosh Kumar, M. Rudra Kumar
Renewable Energy based Security System for Isolator (Air Brake Switch)
using Fingerprint Sensor with Internet of Things
222 1298
Andril Alagusabai, Roossvelt Prabhu K A V, P. Jesu Jayarin, Vishnu Vardhan
Rao G, V Jaiganesh, R. Gopinathan
A Meta-Analysis of Efficient Countermeasures for Data Security
223 1303
Deepa.M, J. Dhiipan
DPMM: Data Privacy and Memory Management in Big Data Server using
224 Hybrid Hashing Method 1309
Manjula GS, T. Meyyappan
Smart Traffic Management System for Priority Vehicle Clearance using IoT
225 1317
A Arul Edwin Raj, Revanoori Bhargavi, S Meghana Anjali, A Teja
IoT based Patients Monitoring System in Healthcare Service
226 Sudheer Hanumanthakari, SVVSR Kumar Pullela, Shankar Nayak Bhukya, 1324
K. Vijayalakshmi, S Rehan Ahmad, Narendra Kumar
A Review of Remote Health Monitoring System for Patients using IoT
227 Vinoth Kumar K, Anil Hegde H, Abhishek, Dhruva S Srinivas, G Krishna 1330
Chaitanya
Knitting Machine Monitoring System using Arduino
228 T. Logeswaran, Bavya S, Jyothiprabha D, Karthika S, Suganeshwaran S. 1334
Ranjith Kumar R
IoT based Automated Coal Mine Detection and Immediate Rescue Robot
229 K. Thivyabrabha, Sharmila A, Dhivya Priya E L, K. R. Priyadharshini, 1338
J. S. Sujin
Smart Driving Assistant for Upclimbing Hill Slope Area
230 Madhan Mohan. M, Baluprithiviraj, Sridhar. S, Varsinishrilaya. P. K, Narendh. 1344
N, Kalavathi Devi T
A Review of Sequential Control & Monitoring of Distribution Lines in
Substations
231 1347
Manochitra G, Vinoth Kumar K, Shiva Shankara M, Yashvantha P, Sindhu P,
Binay Kumar Yadav
Multifunctional Unmanned Ground Vehicle
232 1351
R. Aadithya, M. Harish, P. S. Manoharan
Widened Thresholded Rider Optimization Algorithm for Optimal Switching
233 Loss Reduction in Three-Phase Voltage Source Inverter 1355
Rajeshkumar. G, P. Sujatha Therese
Enhancement of Yarn Quality by Controlling the Humidity and Temperature
234 1363
Baluprithviraj. K. N, Monesh. M. S, PraneshRaj. C, Varuna. S
Exploring the Statistical Properties and Developing a Non-Linear Activation
235 Function 1370
Ochin Sharma
Research on Robust Aircraft’s Trajectory Tracking using Adaptive Controller
236 Sarange Shreepad, S. Deena, Ramakrishnan Raman, Dhiresh S Shastri, Rajesh 1376
A S, S. K. Krishnakumar
Acquisition of CSTR’s Temperature Data in Mobile Phone using Wi-Fi
237 D. Shekar Goud, Parimala Prabhakar, K. Muthulakshmi, Roopa H, Kamal 1383
Alaskar, Amara S A L G Gopala Gupta
DFIG Powered Yaw Function for Wind Energy Network
238 Mallaiah Balaganur, Parimala V, Arunsrinivas T, Muthuraj B, Rutuja Hiware, 1392
Shradha Umathe
The Importance of Medical Robots in Improving Healthcare Services
239 Mohamed Alseddiqi, Budoor AlMannaei, Osama Najam, 1397
Anwar AL-Mofleh
Sensor Assisted Ghat Road Navigation and Accident Prevention
240 1402
G Ravindra, M. Venkateswara Rao, Venkatasivanagaraju. S
Simple Piezoelectric based MEMS Energy Harvester Design and Simulation
241 G Dinesh Ram, T Aravind, S Praveen Kumar, U Hariharan, G Jeyachandran, 1408
G Goutham
Comparative Analysis of Different MPPT Algorithms for Roof-Top Solar PV
242 System 1412
Arun Kumar Maurya, Anil Kumar Rai, Hemant Ahuja
Load Frequency Control by using Different Controllers in Multi-Area Power
System Networks
243 1418
Arun Kumar Maurya, Hera Khan, Anil Kumar Rai,
Hemant Ahuja
Components & Control Scheme used for Line of Sight Stabilization in Defence
Applications
244 1425
Arun Kumar Maurya, Yashdeep Tyagi, Tanu, Hera Khan, Deepak Narang,
Hemant Ahuja
Fuzzy based Pollution Severity Prediction In Polymer Insulator using
245 Harmonic Analyzer 1432
B. Sajeena Ponmani, R. V. Maheswari, B. Vigneshwaran
Indigenous Robot for Advanced Driver Assistance System
246 T. Thivya Tharshini, E. Jeevitha, S. Rayen Subhiksha, H. Jaya Dharshini, 1437
P. S. Manoharan
Performance Improvement of 16 Bus System using Hybrid Power Flow
Controller
247 1441
S. Hemalatha, S. Gomathi, S. Devikala, C. Naresh, M. Gnanaprakash, M.
Senthil Murugan
Evaluation of Quality of Transmission in Disaggregated Optical Network
248 1448
Vidhya J, Ramya G
Microstrip Patch Antenna Simulation for Cranial Implant
249 1454
K. Keerthiga, M. Najira Banu, K. Jayabharathy
Design and Analysis of an Adaptive QoS Aware Approach for supporting
Multiple Services using Meta Heuristic Enhanced Whale Optimization
250 1459
Algorithm over Hybrid Cloud Environment (EWOC)
Premnadh Katkam, P. Anbalagan, V. V. S. S. S. Balaram
Effectual Assessment of Machine Learning-based Heart Failure Prediction
251 Prototype 1467
B Nithya, Asha V, A P Nirmala, Binju Saju, Dobariya Parth, Jain Komal
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Optically Controlled Microwave Sensor for


Biomedical Applications
M aryam Sami M ajeed 1,2 M esut ÇEVİK 1
1 1
Electrical and Computer Engineering, Electrical and Computer Engineering,
Altinbas University, Turky Altinbas University, Turky
2
International Applied and Theoretical Research Center abdulahmarwah1983@gmail.com
(IATRC), Baghdad Quarter, Iraq
Maryamsami64@yahoo.com

Abstract: In this paper, a design of a microwave that has been used for more than decades [6]. Such
resonator is introduced for noninvasive blood glucose sensing technology is based on measuring changes in
biomedical sensing. The proposed sensor is constructed scattering parameters (S-parameters) in relation to a
from a printed transmission line of 50Ω characteristics
sample under test (SUT) introduction [7]. The
impedance. The transmission line is loaded with a
meander line of a sweep penny elegance chaos. The
sensing evaluation can be transferred via a given
structure is splitted into two symmetric parts that are algorithm to retrieve material characterizations at this
connected to each other through a light dependent step [8]. This can be quantized through field pen
resistor (LDR). The to maximize the field fringing ration as invasive or noninvasive technology.
through the sample under test, an interdigital capacitor Researchers involved metamaterials, closed-loop
is introduced in parallel to the meander line structure. resonators, and other transmission line-based
The proposed sensor is found to provide multiple miniature microwave resonators for biomedical
frequency resonances. However, the authors considered applications. The electromagnetic properties of these
the frequency resonance at 3.46GHz to ensure the
structures are affected by the frequency at which they
effective resonance of the detection with changing the
blood glucose level. Therefore, the proposed sensor is
operate and how the consistency factor varies with
fabricated and tested experimentally with 100 patients different fluid introductions. Consequently, many
to realize the effects of varying the blood glucose level researchers conducted their experimental studies to
up on the proposed sensor transmission loss spectra in design novel microwave sensors with high accuracy
terms is of S 11 magnitude. The proposed sensor for biomedical applications [6]. For example, in [7], a
performance is tested and optimized using circuit model design of a printed interdigital capacitor was
theory. Next, the design performance is validated proposed for water pollution detection at 1.65GHz
numerically using Computer S imulation Technology of based on antenna design. Another design was
Micro Wave S tudio (CS T MWS ) commercial software
proposed in [8] for blood grouse detection using a
package of finite integral technique algorithm. Finally,
the experimental and theoretical results are found in
printed circuit antenna at 0.6GHz. In that design, the
good agreement to each other. sensing technology was proposed based on touching
the antenna terminal directly. Liquid profiles can be
Key words: Light dependent resistor, meander, glucose discussed by calculating S-parameters and complex
sensor, microwave resonator. dielectric properties. Any variation in those
parameters can explain by a biological background.
I. INTRODUCTION Most microwave biosensors operate by installing
Recently, microwave sensors invented the top coupler thin tubes or slotted cylindrical tubes [9].
ranks in the field of delegated sensing technology [1]. However, such technology adds extra losses on the
This is due to the fact, microwave radiations can quality of monuments [10]. Nevertheless, due to the
penetrate through materials under test with excellent problem of penetration into the skin, this technology
accuracy [2]. Nevertheless, most current microwave has been found to be a very limited to many sensing
technologies lean on microstrip and printed processes [11].
circuitries; that can be embedded in highly compact
integrated electronic devices [3]. The microwave
sensors became attractive solutions for many
biomedical issues because they have no ionization II. LITERATURE REVIEW
effects on the human body [4]. Nonetheless, they can Over time, as wireless and mobile communication
operate at low energy conductions [5]. Microwave systems grow more quickly, it becomes increasingly
sensing is a proven tool for liquid characterization necessary to build filters that can use many cutoff

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 1


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

frequencies simultaneously. Stub-loaded resonator sensor is constructed from three main parts: The first
[4], quarter-wave stepped impedance resonator [5], part is based on a traditional transmission line that is
embedded resonator [6], meander split loop resonator loaded to a meander line with an interdigital
[7], and substrate-integrated waveguide resonator [8] capacitor. The meander is considered the second part;
are some of the approaches utilized for multi-band in which, the conductive trace is turned to shape a
filter design. The review that follows includes the sweep penny elegance chaos. The third part is
researchers' procedures and findings: introduced as an interdigital capacitor of five fingers.
• In 2007, Zhang and Xue [9] introduced a unique The main advantage of coupling these structures
dual-mode dual-band filter employing a coplanar- together is to enhance the quality factor by combing
waveguide-fed ring resonator, with independently multiple capacitor inductor branches [3]. Therefore,
regulated center frequencies and bandwidths. The to realize the effects of these parts, the authors
results were validated realistically. Dual-mode dual- proposed the transmission line model based on using
band responses were obtained us ing two microstrip an equivalent circuit model of lumped elements as
ring resonators. To easily manage the coupling seen in Fig. 1(b). The derived circuit model is
strength between the ring resonators and feeding basically describing the main three parts of the
lines, the ring resonators were fed concurrently using proposed sensor. The transmission line is modeled
a unique feeding mechanism. The center frequencies effective LT.L , CT.L , RT.L , and GT.L . In that
were 1.4 GHz and 2.15 GHz, with fractional representation, the transmission line losses are model
bandwidths of 10% and 3.3%, respectively. as conductor and dielectric loess from the conductive
• A dual-band bandpass filter with independent layers and the substrate layer [4]; to be given as RT.L ,
control of the center frequencies and wide stopband and GT.L , respectively. Next, the surface current
suppuration was expected by Xing et al. in 2017 [15]. motion on the conductive traces generates a magnetic
Utilizing a novel quintuple-mode resonator, this filter field that is perpendicular with respect to the current
was created (QMR). Five modes can be obtained, motion [9]; such magnetic field could be stored in the
according to the analysis of the frequencies that was inductive part (LT.L ) of the transmission line [7]. The
performed using the odd and even modes approaches. trapped electrical field between the patch and the
The lower passband was designed using the first two ground plane layer is described by the stored energy
modes, and the upper passband was created using the of the electrical field [8] in the substrate to be given
remaining three modes. The Rogers 4003C substrate, as CT.L .
which has a 0.508mm thickness and a 3.55 dielectric Next, the meander line effects are described by
constant, was used to create the filter. Tunable (CM, LM, RM) parallel branch. In this representation is
passbands and compact size were attained. The given by the effects of resonance energy storing
passband frequencies had fractional bandwidths of bandwidth [10]. Such stored energy is described by
27.7% and 23.4%, respectively, and were centered at maximizing the quality factor in the proposed
2.96 and 5.695 GHz. meander line due to the size reduction effects and
• A tri-wideband bandpass filter was presented by increasing the electrical path length in miniaturized
Xiong et al. in 2018 [17]. (TWB-BPF). The filter area [11]. This realizes the fact of reducing the
stood out for its small size, strong passband isolation, radiation losses which indeed increase the quality
and many transmission zeros (TZs ). The design was factors [12]. The radiation losses can be reduced
developed utilizing odd/even modes analysis and the significantly, when the used measurement process is
multiple-mode resonator (MMR) theory. To improve conducted noninvasively. However, such technique
band-to-band isolation and expand stopband induces inductive and capacitive effects which are
suppression, ten TZs were procured. The Rogers given by LM and CM, respectively. The effects of the
4003 substrate, which has a thickness of 0.508 mm radiation losses from the proposed meander line are
and a dielectric constant of 3.38, was used to create given by RM. The effects of adding the interdigital
the TWB-BPF. The operating frequencies had capacitor is given by (Cidc, Lidc, Ridc) parallel branch.
fractional bandwidths of 37.4%, 43.5%, and 40.4%, This branch is given by coupling the fingers together
respectively, and were centered at 1.07, 3.25, and that stores the electric filed inside and the current
8.32 GHz. The simulated and measured results motion on the conductive trace as Cidc and Lidc,
showed good agreement. respectively. The effects of coupling resistance are
described by Ridc value of the same branch. Such
coupling is due to the effects voltage gradient inside
III. SENSOR DESIGN AND DETAILS the air gap between the fingers [14]. Finally, the
In this section, the design details of the proposed coupling between the meander line and the
sensor are discussed with relative geometrical interdigital capacitor is described with CC to
dimensions. As shown in Fig. 1(a), the proposed maximize the load matching between the [6]. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 2


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

relative values of the proposed circuit model are


listed in Table I.

Fig. 2. The proposed circuit model of the proposed


sensor structure S12 results.

TABLE I
LUMPED ELEMENT VALUES OF THE EQUIVALENT
CIRCUIT M ODEL IN FIG. 2
Element Value
Resistance of the left hand (RLH ) 12.2 Ω
Resistance of the right hand (RRH ) 50 Ω
Conductance of the left hand (GLH ) 0.1 S
Conductance of the right hand (GRH ) 4S
Capacetance of the left hand (CLH ) 1.1pF
Capacetance of the right hand (CRH ) 3.1pF
Inductance of the left hand (LLH ) 3nH
Inductance of the right hand (LRH ) 2.2nH

IV. VALIDATION AND DISCUSSION


Fig. 1.The proposed sensor geometry: (a) full The proposed sensor performance is tested
structure, (b) IDC, and (c) back view. Note: all numerically as depicted in Fig. 3. The proposed
dimensions are in mm scale. sensor is fabricated using a wit chemical etching
process. The proposed sensor S11 and S21 spectra are
The proposed sensor design based on an equivalent evaluated before and after finger introduction on top
circuit model is derived analytically using an of the proposed sensor. The obtained results before
analogous circuit model based on the created RLC and after finger introduction are presented in Fig. 3.
network, which is generally constructed as an IDC in The load matching can be maximized by incising the
series connection with a CSI and the Hilbert fractal. LDR impedance. Therefore, such property can be
The proposed structure equivalent circuit model is used to detect the blood glucose during the
generated using the lumped elements Richard model measurements.
[10]. The proposed circuit model is created by To validate the effectiveness of such methods, the
connecting a 50Ω input impedance RF source in authors applied an experimental study to measure the
series with a (R-L-C) parallel branch, as shown in influence of glucose level variation on the sensor
Fig. 2. The main transmission line was distinguished performance at 3.46GHz as listed in Table II. The
by an inductive section LT and capacitive air gaps listed cases are considered according to the Blood
Cgap , which were previously depicted in Fig. 2. The color that is varied from normal case to sever
suggested circuit model S-parameters are examined dehydrated case. These cases are considered
and compared to those derived using CST MWS. according to the medical standers in [13]. It is found
According to the mentioned lumped parts, which are from listed results, that the proposed sensor is an
modelled in Advanced Devices Simulator (ADS). excellent candidate for glucose measurements and
The evaluated RLC components are listed in Table I. could be very promising for other biological fluids
characterizations. The proposed sensor shows
excellent accuracy in comparison to those published
in the literature. The variation is found to be
excellently changed with maximum error of about

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 3


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

15%. The range of detection is found to be varing circuit branch and compared to the obtained results
from -10dB to -30dB in terms of S12 . from the numerical results. Those results are
compared to the measured results to revel excellent
agreements.

REFERENCES
[1] Al-Behadili AA, Mocanu IA, Petrescu T M, Elwi T A.
Differential Microstrip Sensor for Complex Permittivity
Characterization of Organic Fluid Mixtures. Sensors. 2021;
21(23):7865.
[2] Marwah Haleem and T aha A. Elwi, “Circularly
Polarized Metamaterial Patch Antenna Circuitry for Mo dern
Applications”, International Journal of Emerging T echnology and
Advanced Engineering, Volume 12, Issue 12, December 2022.
[3] Abdulsattar RK, Elwi T A, Abdul Hassain ZA. A New
Microwave Sensor Based on the Moore Fractal Structure to Detect
Water Content in Crude Oil. Sensors. 2021; 21(21):7143.
[4] Elwi, T A. Metamaterial based a printed monopole
antenna for sensing applications. Int J RF Microw Comput Aided
Eng. 2018; 28:e21470.
[5] T aha A. Elwi Wisam J. Khudhayer , "A Passive
Wireless Gas Sensor Based on Microstrip Antenna with Copper
Nanorods," Progress In Electromagnetics Research B, Vol. 55,
347-364, 2013.
[6] Hardinata, S.; Deshours, F.; Alquié, G.; Kokabi, H.;
Koskas, F. Miniaturization of Microwave Biosensor for Non-
invasive Measurements of Materials and Biological T issues.
IPT EK J. Proc. Ser. 2018, 29, 90–93.
[7] Liu, W.; Sun, H.; Xu, L. A Microwave Method for
Dielectric Characterization Measurement of Small Liquids Using a
Fig. 3. Validation part: (a) S11 and (b) S21 spectra. Metamaterial-Based Sensor. Sensors 2018, 18, 1438.
[8] Hao, H.; Wang, D.; Wang, Z.; Yin, B.; Ruan, W.
TABLE II Design of a High Sensitivity Microwave Sensor for Liquid
Dielectric Constant Measurement. Sensors 2020, 20, 5598.
GLUCOSE INFLUENCE ON SENSOR PERFORMANCE [9] Wei, Z.; Huang, J.; Li, J.; Xu, G.; Ju, Z.; Liu, X.; Ni, X.
Glucose level/ mg/dl S 21 / dB A High-Sensitivity Microfluidic Sensor Based on a Substrate
150 -11.8 Integrated Waveguide Re-Entrant Cavity for Complex Permittivity
Measurement of Liquids. Sensors 2018, 18, 4005.
130 -13.2 [10] Liao, S.; Gao, B.; T ong, L.; Yang, X.; Li, Y.; Li, M.
210 -14.9 Measuring Complex Permittivity of Soils by Waveguide
T ransmission/Reflection Method. In Proceedings of the IGARSS
290 -17.5 2019—2019 IEEE International Geoscience and Remote Sensing
390 -20.1 Symposium, Yokohama, Japan, 28 July–2August2019;pp. 7144–
7147.
470 -24.8 [11] Oliveira, J.G.D.; Pinto, E.N.M.G.; Silva Neto, V.P.;
550 -27.7 D’Assunção, A.G. CSRR-Based Microwave Sensor for Dielectric
Materials Characterization Applied to Soil Water Content
Determination. Sensors 2020, 20, 255.
V. CO NCLUSIO N [12] M. G. Mayani, F. J. Herraiz-Martínez, J. M. Domingo
The proposed sensor is fabricated and tested with and R. Giannetti, "Resonator-Based Microwave Metamaterial
introduction of Blood as a material under test from 11 Sensors for Inst rumentation: Survey, Classification, and
patients. The operation method is basically developed Performance Comparison," in IEEE T ransactions on
Instrumentation and Measurement, vol. 70, pp. 1-14, 2021, Art no.
with a novel use of an LDR component that realizes a 9503414.
linear variation in the sensor performance with [13] A. L. Mckenzie and L. E. Armstrong, “Monitoring
glucose variations. Such changes are attributed to the Body Water Balance in Pregnant and Nursing Women: T he
change in the transparency of Blood under test, which Validity of Blood Color,” Annalas of Nutrition and Metabolism,
vol. 70 (suppl 1), no. Suppl. Pp. 18-22, 2017.
causes a change in frequency shift and S21 magnitude. [14] L. E. Armstrong, M. S. Ganio, J. F. Klau, E. C.
The authors discovered that the ration in the S 21 Johnson, D. J. Casa, and C. M. Maresh, “Novel hydration
magnitude is found to be very significant at 3.46GHz assessment techniques employing thirst and a water intake
with linear variation. Such property motived the challenge in healthy men,” Applied physiology, Nutrition, and
Metabolism, vol. 39, no. 2, pp. 138-144, 2013.
authors to consider such novel design is an excellent [15] Sasikala, D., and K. Venkatesh Sharma. "Augmentation
candidate for sensing due to the effects of linear for Blood Doping Discovery in Sports using Random Forest
variation. The proposed sensor circuit model is Ensembles with LightGBM." Journal of Ubiquitous Computing
applied to study the effects of introducing the and Communication T echnologies 4, no. 2 (2022): 115 -124.
proposed sensor parts. Each part is realized through a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 4


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Bandwidth and Power Cost Optimized Over


Visible Light Communication
Dr. Karpagam. M1 Sowmya.k2
Department of Electronics and Communication Department Of Electronics and Communication
Engineering Engineering,
Sri Krishna College of Engineering and Technology, Sri Krishna College of Engineering and Technology,
Coimbatore, India Coimbatore, India
E-mail Id: 1karpagam@skcet.ac.in E-mail Id: 220epae004@skcet.ac.in

ABSTRACT: while also delivering wireless knowledge


communications with inherent security [11, 12, 13].
LEDs were used for data transmission and photodiodes
were used as receivers in Visible Light Communication, II. RELATED WORK:
a new branch of Indoor OWC. LEDs can be easily
changed, allowing them to operate as both data In this paper we have a tendency to describe multiple
transmitters and light sources. Our indoor visible light user MIMO-OFDM for indoor VLC. To considering
communication simulation model was created using in indoor communication, the distances are totally
MATLAB. The user profiled the transmitter location as
well as the reflections at every block. In a VLC setting,
different of their temporal delays and multiple
the illumination LED acts as both lighting and a transmitter-receiver links are vary, leading to
communication device. advanced channel high gain and section is variations
once signal is reworked to the channel frequency
Keywords: Visible Light Communication, Media Access domain [5, 11]. The section is distinction can't
Control, Particle Swarm Optimization, Radio Frequency, overlook once the wide-band systems square measure
Optical Wireless Communication. assumed, particularly for the info matrix is to every
subcarrier in OFDM topologies to eliminate
multiuser interference within the channel. totally
I.INTRODUCTION: different from of the state-of- the-art schemes,
complicated advanced real- channel matrices is used
Radio frequency designs are linked to the rapid pre-coding calculation, that helps to reduces the
development of traffic on mobile communication channel correlation with a new degree of freedom
during the last two decades [3, 4, 5]. As RF waves and helps to improves the system performance [2-7].
interact with electrical devices and can pierce through
obstacles, potential clients' communications and data III. PROPOSED SYSTEM:
rates decline. Visible light, on the other hand, has no
effect on electronic devices. Because transmission PSO algorithm:
has nothing to do with the intended destination, Each particle is first randomly distributed over the
discreetly monitoring untrusted clients could search space. The particles then alter their search
compromise connection security[1]. RF confinements orientation based on the ideal positions of both the
are linked to increasing distribution of traffic on entire particle swarm and each individual particle.
mobile communication during the last two decades. After many searches, the particle swarm eventually
Because visible light cannot pass through barriers, finds the optimal location, or ideal solution.
VLC will provide needed coverage while also
providing inherent security. RF-based mobile CurrentPosition[n+1] = CurrentPosition[n] + V[n+1]
communication systems will be used to construct
high-capacity networks since visible light The steps in this algorithm's process are as follows:
communication runs inside the visible light range, Each particle is identified by two characteristics:
which enables for many THz of license-free position and velocity. There are several constraints in
bandwidth. Small cells of LED transmitters can be the search space of the problem.
produced with no inter-cell interference since actinic
Vn+1 = Vn + C1rand1() *(Pbest,n – CurrentPositionn)
radiation cannot penetrate through walls or objects.
This boosts the on-the-wireless channel's potential

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 5


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

difference between them. Figures 3 and fig 7 show


facility distribution graphs for a 4x4 MIMO system at
various irradiance angles, showing a variety of
lighting patterns with broad and limited coverage. A
vast coverage area is required for illumination,
whereas a smaller one is required for point-to-point
communication. Instead of enhancing quality, MIMO
systems suffer from sub-channel interference when
they cover a large region.

FIGURE 1 PROPROSED DIAGRAM

(i)TRANSMITTER:
The functionalities of a typical OFDM transmitter are
depicted in the diagram. A serial-to-parallel converter
transforms a serial data stream into a parallel stream,
which is then sent to a plotter for complex number
display [8-13]. There are several various types of
mappers available, including PSK, DPSK, and QAM.
The IFFT produces orthogonal sub-channel signals
when applied to a parallel stream of complex
numbers. To counteract the effects of ISI, a guard
interval is entered at the transmitter and eliminated at
the receiver [11-13]. After that, the orthogonal
signals are streamed, and the signal is up-converted
to the proper carrier frequency before being
delivered.
(ii)RECEIVER:
A photodetector is employed as a receiver. The
receiver is made up of a photodetector and a device
FIGURE 2: SISO 3D PLOT
for demodulating the information. Almost definitely,
it will be utilized to receive data from the led array
[12]. A good photo-detector should be perceptive to
light wavelength intervals while also being reliable
and price effective [13]. A photo-detector shouldn’t
be unaffected by temperature variations. Any
communication device with a camera can connect
with an image detector using visible light. However,
due to its low rate, it will only provide extraordinary
throughput in its current state. The throughput of
stationary photo-detectors, on the other hand, is
projected to be higher .

IV. POWER DISTRIBUTION WITHIN A


TYPICAL ROOM SCENARIO: FIGURE 3: SISO SYTEM

The power distribution of a typical area size


determines the indoor communication challenges.
Figures 2 and 6 depict a typical work area with LEDs
at the top and 1.75m and 0.55m, respectively [11-14],

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 6


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

FIGURE 7: MIMO SYSTEM


FIGURE 4 POWER CONSUMPTION

FIGURE 8: MIMO POWER CONSUMPTION

FIGURE 5: SISO BER

FIGURE 9: MIMO BER

FIGURE 6: MIMO 3D PLOT

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 7


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE 1: Practical Comparison of SISO and MIMO and Challenges," in IEEE Communications Surveys & Tutorials,
vol. 17, no. 4, Fourthquarter 2015, pp. 2047-2077.
SNR SISO MIMO [4] N. Bamiedakis et al., "Micro-LED-based guided-wave optical
BER
links for visible light communications," 2015 17th International
2 0.125 0.040 Conference on Transparent Optical Networks (ICTON), Budapest,
2015.
[5] J. Lian and M. Brandt-Pearce, "Multiuser multidetector indoor
4 0.066 0.0055
visible light communication system," 2015 OptoElectronics and
Communications Conference (OECC), Shanghai, 2015, pp. 1-3.
[6] M. Noshad and M. Brandt-Pearce, "Application of Expurgated
PPM to Indoor Visible Light Communications— Part II: Access
V. CONCLUSION
Networks," in Journal of Lightwave Technology, vol. 32, no. 5,
Various challenges and opportunities for visible light March1, 2014, pp. 883-890.
communication, as well as potential future uses, have [7] I-Cheng Lu, Yen-Liang Liu and Chih-Han Lai, "Highspeed 2×2
MIMO-OFDM visible light communication employing
been discussed. A quick simulation of power
phosphorescent LED," 2016 Eighth International Conference on
distribution was performed to demonstrate the
Ubiquitous and Future Networks (ICUFN), Vienna, 2016, pp. 222-
different illumination patterns that result in a trade- 224.
off between illumination and communication .Wide [8] A. Jovicic, J. Li and T. Richardson, "Visible light
coverage illumination suites have been switched off communication: opportunities, challenges and the path to market,"
when there is a lot of interference. Researchers in IEEE Communications Magazine, vol. 51, no. 12, December
devised a restricted coverage illumination pattern for 2013, pp. 26-32.
a light-emitting diode semi-angle to address the [9] Shakya, Subarna, and Lalitpur Nepal Pulchowk. "A novel bi-
problem, which is ideal for installed point-to-point velocity particle swarm optimization scheme for multicast routing
LOS indoor communications. problem." IRO J. Sustain. Wireless Syst 2 (2020): 50-58.
[10] Sivaganesan, D. "Optimized wireless sensor node
VI. REFERENCES multidimensional routing using fuzzy clustering and chaotic
gravitational search algorithm." IRO Journal on Sustainable
[1] D. C. O'Brien, "Visible Light Communications: Challenges and Wireless Systems 3, no. 1 (2021): 40-48.
potential," IEEE Photonic Society 24th Annual Meeting,
Arlington, VA, 2011, pp. 365-366. [11] M.Karpagam,” Reduction in information loss due to isolated
[2] D. C. O'Brien, L. Zeng, H. Le-Minh, G. Faulkner, J. W. and dumbv nodes using ant colony optimization for WSN”,
Walewski and S. Randel, "Visible light communications: Materials Today Proceedings 2020.
Challenges and possibilities," 2008 IEEE 19th International [12] M.Karpagam, “Advanced Hyperchoatic Image Encryption
Symposium on Personal, Indoor and Mobile Radio Technic with DNA Sequence” Journal of Physics Conference
Communications, Cannes, 2008, pp. Series, IOP Publishing, ICCCEBS 2021.
[3] P. H. Pathak, X. Feng, P. Hu and P. Mohapatra, "Visible Light [13] M.Karpagam, “ACO enhanced RILoD-IN scheme for WSN”,
Communication, Networking, and Sensing: A Survey, Potential 2020 International Conference on Smart Electronics and
Communication(ICOSEC).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 8


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Analysis of RLC Network Connected to Steady


Stimulating Source via Gupta Transform
Rohit Gupta Rahul Gupta Loveneesh Talwar
Lecturer (Physics), Dept. of Applied Lecturer, Dept. of Physics Asst. Prof., Dept. of Electrical Engg.
Sciences SDMP Public Hr. Sec. School, Yogananda College of Engg. & Tech.
Yogananda College of Engg. & Tech. Karwanda Balwal, J&K, India (YCET), J&K, India
(YCET), J&K, India guptara702@gmail.com loveneeshtalwar.ycet@gmail.com
guptarohit565@gmail.com ORCID: 0000-0002-9893-9141
ORCID: 0000-0002-9744-5131

Anamika Dinesh Verma


Asst. Prof., Dept. of Electrical Engg. Professor, Dept. of Mathematics,
Yogananda College of Engg. & Tech. NIILM University, Haryana, India.
(YCET), J&K, India drdinesh.maths@gmail.com
anamika18abc@gmail.com

Abstract- In the present paper, the Gupta transform (GT) [12]. The present paper submits the GT for the perusal of a
which is a contemporary integral transform has been employed series network of an inductor (L), a resistor (R), and a
for the anatomy of a series network of an inductor (L), a resistor capacitor (C) (i.e. a series LRϹ network) across which
(R), and a capacitor (C) (i.e. a series LRC network) across which coupled a steady stimulating source of voltage, and a parallel
coupled a steady stimulating source of voltage, and a parallel network of an inductor (L), a resistor (R), and a capacitor (C)
network of an inductor (L), a resistor (R), and a capacitor (C)
(i.e. a parallel LRϹ network) across which coupled a steady
(i.e. a parallel LRC network) across which coupled a steady
stimulating source of current. Such anatomy provides the stimulating source of current. The nature of current through a
nature of current through a series LRC network across which series LRC network across which coupled a steady
coupled a steady stimulating source of voltage and the nature of stimulating source of current and the nature of voltage across
voltage across a parallel LRC network across which coupled a a parallel LRC network across which coupled a steady
steady stimulating source of current. The nature of current stimulating source of current, are determined by the GT with
through a series LRC network across which coupled a steady simple computations which corroborate that the GT is a more
stimulating source of voltage and the nature of voltage across a puissant mathematical method than calculus method.
parallel LRC network across which coupled a steady The arrangement of the paper is given below:
stimulating source of current, are determined by the GT with
1. Section I provides a brief introduction to the GT.
simple computations which corroborate that the GT is a
puissant mathematical method for the anatomy of such series or 2. Section II expounds on the application of the GT to
parallel network than the other mathematical method or the network circuits coupled to steady excitation
approach like calculus method. The nature of current through a sources
series LRC network across which coupled a steady stimulating 3. Finally, the reviews and the outcomes are endowed.
source of voltage and the nature of voltage across a parallel LRC
network across which coupled a steady stimulating source of I. Gupta Transform
current, are found to depend on the values of resistance (R)
inductance (L) and Capacitance (C) of the elements: resistor, The process of operating the governing differential equation
inductor, and capacitor of the networks. of series or parallel network of inductor (L), resistor (R), and
capacitor (C) across which coupled a steady stimulating
Keywords: Gupta transform (GT); series or parallel network,
source of voltage or source of current by GT consists of three
inductor (L), resistor (R), and capacitor (C).
main steps:
I. The governing ordinary differential equation of
Introduction
series or parallel network of inductor (L),
A series and parallel networks of an inductor (L), a resistor resistor (R), and capacitor (C) across which
(R), and a capacitor (C) (i.e. series LRC network and parallel coupled a steady stimulating excitation source
LRϹ network) are customarily analyzed by the mathematical is renovated into an algebraic equation.
method or approach such as the calculus method [1]-[4]. II. The algebraic equation is operated totally by
Since the application of the calculus method needs algebraic practices.
complicated computations, therefore, there is a need to seek III. The operation in ‘II’ is transfigured or reversed
the help of integral transforms like Laplace transform [5]-[7], by inverse GT, resulting in the solution of the
Elzaki transform [8], [9], RT [10], etc. for the analysis or given governing ordinary differential equation
perusal of such series and parallel networks. The GT which of series or parallel networks across which
is a contemporary integral transform has been advanced by coupled a steady stimulating excitation source.
Rohit Gupta and Rahul Gupta recently in the year 2020 [11],

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 9


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The key motivation for applying GT for the perusal of a series


or parallel network of inductor (L), resistor (R), and capacitor II. Accomplishment Of GT To Network
(C) across which coupled a steady stimulating source of Circuits Coupled To Steady Stimulating
voltage or source of current is that the process of solving a
Excitation Sources
governing ordinary differential equation for such networks is
simplified to an algebraic problem. The GT has two main In the present study, the GT is taken on for the perusal of a
strong points over the calculus: series inductor, resistor, and capacitor network across which
i. Problems involving differential equations are coupled a steady stimulating source of voltage, and a parallel
operated more directly without first inductor (L), resistor (R), and capacitor (C) network across
ascertaining a universal solution. which coupled a steady stimulating source of current.
ii. A non-homogenous differential equation is
operated without first operating the A. Series Network of an inductor (L), a resistor (R),
corresponding homogeneous differential and a capacitor (C) With a Steady Stimulating
equation. Source of Voltage

The GT changes a function into a contemporary function by A series network of an inductor (L), a resistor (R), and a
the exercise of integration whose detail is as follows. capacitor (C) with a steady stimulating source of voltage
The GT of g(t), a function of variable t, t ≥ 0 is defined as supplying steady voltage 𝑉𝑜 is looked over by the following
1 ∞ equation [13]-[14]
[11 G(s) = 3 ∫0 e−st g(t)dt . Here, integral should be
s R 1
convergent and s is either real or complex. G(s) is the GT of Ï(t) + İ(t) + I(t) = 0 (1)
L LC
g(t). The GT is known to be an integral transform because it Here, I(t) is the current at any time t with I (0) = 0,
changes a function in one space to another space by the 𝑉
and İ(0) = 𝑜 .
L
exercise of integration. Here, k(s, t) = e−st is a kernel which
Taking the GT of (1), we get
is a function of the variables s and t in the two different 1 1 R 1 1
spaces. 𝑠 2 𝐼 (̅ s) – 2 𝐼(0) − 3 İ(0) + {s 𝐼 (̅ s)– 3 𝐼(0)} + 𝐼 (̅ s) =
𝑠 𝑠 L 𝑠 LϹ
The GT of some basic functions [12] is 0 (2)
n!
 Ṙ{t n } = n+4 , where n = 0,1,2,3 … Here, 𝐼 (̅ s) is the GT of I(t).
s 𝑉
1 On putting 𝐼(0) = 0 and İ(0) = 𝑜 , (2) becomes
 Ṙ{ect } = , s>c l
s3 (s−c) 1 𝑉𝑜 Ɍ 1
 Ṙ{sinct} =
c
, s>0 𝑠 2 𝐼 (̅ s) − 3 + 𝑠 𝐼 (̅ s) + 𝐼 (̅ s) = 0
s3 (s2 +c2 ) 𝑠 L L LϹ
1 Or
 Ṙ{cosct} = , s>0 Ɍ 1 1 V0
s2 (s2 +c2 )
𝐼 (̅ s) [𝑠 2 + 𝑠 + ] = 3
L LϹ 𝑠 Ł
The GT of the first derivative of 𝑔(𝑡) is given by Or
V 1 1
𝜕𝑔(𝑡) 1 ∞ 𝜕𝑔(𝑡) I(̅ s) = 0 [ 3 2 R 1 ] (3)
Ṙ{ } = 3 ∫ 𝑒 −𝑠𝑡 𝑑𝑡 L 𝑠 𝑠 + 𝑠+
𝜕𝑡 𝑠 0 𝜕𝑡 L LϹ
R 1
Solving the Integration and then applying limits, we get Let 2𝑏 = 𝑎𝑛𝑑 𝜔 = √ , then (3) becomes
𝜕𝑔(𝑡) 1 ∞ L LϹ
Ṙ{ } = 3 {−𝑔(0) − ∫0 −𝑠𝑒 −𝑠𝑡 𝑔(𝑡)𝑑𝑡} V0 1 1
𝜕𝑡 𝑠
𝜕𝑔(𝑡) 1 ∞ I(̅ s) = [ 3 2 ]
L 𝑠 𝑠 + 2 𝑏 𝑠 + 𝜔2
Ṙ{ } = 3 {−𝑔(0) + 𝑠 ∫ 𝑒 −𝑠𝑡 𝑔(𝑡)𝑑𝑡} 𝑂𝑟
𝜕𝑡 𝑠 0
𝜕𝑔(𝑡) 1 V0 1 1
Ṙ{ } = s𝐺(𝑠) − 3 𝑔(0) I(̅ s) = [ ]
𝜕𝑡 𝑠 L 𝑠 3 (𝑠 + 𝑏)2 − (√𝑏 2 − 𝜔 2 ) 2
𝜕𝑔(𝑡) 𝜕𝑔(𝑡) 𝜕2 𝑔(𝑡) 𝑂𝑟
Now, replacing 𝑔(𝑡) by and 𝑏𝑦 , we have
𝜕𝑡 𝜕𝑡 𝜕𝑡 2 V0 1 1
𝜕 2 𝑔(𝑡) 𝜕𝑔(𝑡) 1 ′ I(̅ s) = [ ] (4)
L 𝑠 3 (𝑠+𝑏+√𝑏 2 −𝜔2 ).(𝑠+𝑏−√𝑏 2 −𝜔2 )
Ṙ{ } = 𝑠Ṙ { } − 3 𝑔 (0)
𝜕𝑡 2 𝜕𝑡 𝑠 𝐿𝑒𝑡 𝑏 + √𝑏 2 − 𝜔 2 = 𝑐1 𝑎𝑛𝑑 𝑏 − √𝑏 2 − 𝜔 2 = 𝑐2
𝜕 2 𝑔(𝑡) 1 1 such that 𝑐1 −𝑐2 = 2√𝑏 2 − 𝜔 2 , then equation (4)
Ṙ{ 2
} = s {sṘ{𝑔(𝑡)} − 3 𝑔(0)} − 3 𝑔′ (0)
𝜕𝑡 𝑠 𝑠 becomes
𝜕 2 𝑔(𝑡) 1 1 V0 1 1
Ṙ{ } = 𝑠 2 Ṙ{𝑔(𝑡)} − 2 𝑔(0) − 3 𝑔′ (0) I(̅ s) = [ 3 ]
𝜕𝑡 2 𝑠 𝑠 L 𝑠 (𝑠 + 𝑐1 ). (𝑏 + 𝑐2 )
𝜕 2 𝑔(𝑡) 1 1 This equation can be rewritten as
Ṙ{ } = 𝑠 2 𝐺(𝑠) − 2 𝑔(0) − 3 𝑔′ (0) V
I(̅ s) = 0 [ 3
1 1 1
− 3
1
] (5)
𝜕𝑡 2 𝑠 𝑠 L 𝑠 )
(𝑐2 −𝑐1 ).(𝑠+𝑐1 ) 𝑠 (𝑐2 −𝑐1 ).(𝑠+𝑐2
and so on. Taking the inverse GT of (5), we can write
V0 𝑒 −𝑐1 𝑡 𝑒 −𝑐2𝑡
Hence the GT of some derivatives of the g(t) is given by I(̅ t) = [ − ]
L 𝑐2 − 𝑐1 𝑐2 − 𝑐1
1
Ṙ{g ′ (t)} = sG(s) − 3 g(0), Or
s
1 1
Ṙ{g ′′ (t)} = s 2 G(s) − g(0) − g ′ (0) and so on.
s2 s3

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 10


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V0 [𝑒 −𝑐1 𝑡 − 𝑒 −𝑐2 𝑡 ] Let


I(𝑡) =
L 𝑐2 − 𝑐1 𝑑 + √𝑑 2 − 𝜔 ′ 2 = 𝑑1 𝑎𝑛𝑑 𝑑 − √𝑑 2 − 𝜔 ′ 2 = 𝑑2
Or
2 2 2 2
such that 𝑑1 −𝑑2 = 2√𝑑 2 − 𝜔 ′ 2 , then (10) becomes
V0 −𝑏 𝑡 [𝑒 −√𝑏 −𝜔 𝑡 − 𝑒 √𝑏 −𝜔 𝑡 ] Io 1 1
I(𝑡) = 𝑒 𝑉̅ (s) = [ 3
L −2√𝑏 2 − 𝜔 2 C 𝑠 (𝑠 + 𝑑1 (𝑠 + 𝑑2 )
).
Or Or
V0 −𝑏 𝑡 [𝑒 √𝑏
2 −𝜔2 𝑡
− 𝑒 −√𝑏
2 −𝜔2 𝑡
] Io 1 1 1 1
I(𝑡) = 𝑒 𝑉̅ (s) = [ − ]
L C 𝑠 3 (𝑠 + 𝑑1 )(𝑑2 − 𝑑1 ) 𝑠 3 (𝑑2 − 𝑑1 )(𝑠 + 𝑑2 )
2√𝑏 2 − 𝜔2 Taking the inverse GT this equation, we can write
Or
2 1 2 1 Io 𝑒 −𝑑1 𝑡 𝑒 −𝑑2 𝑡
√ R √ R
R {exp( (2L) −LϹ 𝑡)−exp(− (2L) −LϹ 𝑡)} V(t) = [ − ]
V0 − t C 𝑑2 − 𝑑1 𝑑2 − 𝑑1
I(t) = 𝑒 2L (6)
L R 2 1 Or
2√( ) −
2L LϹ
Io [𝑒 −𝑑1 𝑡 − 𝑒 −𝑑2𝑡 ]
This equation determines the current flowing through a series V(t) =
RLϹ network with a steady stimulating source of voltage. It C 𝑑2 − 𝑑1
is clear that the nature of current turns on the Or
2 √𝑑 2 −𝜔′ 2 𝑡 √𝑑 2 −𝜔′ 2 𝑡
quantity √( R ) − 1
. The value of the Io −𝑑 𝑡 [𝑒 − − 𝑒 ]
2L ŁϹ V(t) = 𝑒
C −2√𝑑 2 − 𝜔 ′ 2
R 2 1
quantity √( ) − , in turn, turns on the values of L, R, and Or
2L LϹ
C. √𝑑 2 −𝜔′ 2 𝑡 √𝑑 2 −𝜔′ 2 𝑡
Io −𝑑 𝑡 [𝑒 − 𝑒− ]
V(t) = 𝑒
B. Parallel Network of an inductor (L), a resistor (R), C 2√ 𝑑 2 − 𝜔 ′2
and a capacitor (C) With a Steady Stimulating Or
Source of Current 1 2 1 1 2 1
1 {exp( √( ) − 𝑡)−exp (−√( ) − 𝑡) }
Io − t 2RϹ LϹ 2RϹ LϹ
V(t) = 𝑒 2RϹ
2
(11)
A parallel network of an inductor (L), a resistor (R), and a C 1 1
2√( ) −
2RϹ LϹ
capacitor (C) with a steady stimulating source of current
This equation (11) determines the voltage across a parallel
supplying steady current Io is looked over by the following
RLϹ network with a steady stimulating source of current. It
equation [15]-[17]
1 1 is clear that the nature of voltage turns on the
V̈(t) + V̇(t) + V(t) = 0 (7) 2
RϹ LϹ 1 1
Here, V(t) is the voltage at any time t with 𝑉 (0) = 0 quantity √( ) − . The value of the
2RϹ LϹ
I
and V̇(0) = o . 1 2 1
Ϲ quantity√( ) − , in turn, turns on the values of L R,
Taking the GT of (7), we get 2RϹ LϹ
1 1 1 1 and C.
𝑠 2 𝑉̅ (s) – 2 𝑉(0) − 3 V̇(0) + {𝑠 𝑉̅ (s)– 2 𝑉(0)} +
𝑠 𝑠 RϹ 𝑠
1
𝑉̅ (s) = 0 (8) III. DISCUSSION

Here, 𝑉̅ (s) is the GT of V(t).
I The nature of current through a series network of an inductor
On putting 𝑉(0) = 0 and V̇(0) = o , (8) becomes (L), a resistor (R), and a capacitor (C) across which coupled
C
2 ̅ (s)
1 Io 1 1 a steady stimulating source of voltage and the nature of
𝑠 𝑉 − 3 + ̅
𝑠𝑉 (s) + 𝑉̅ (s) = 0
𝑠 C RϹ LϹ voltage across a parallel network of an inductor (L), a resistor
𝑂𝑟 (R), and a capacitor (C) across which coupled a steady
1 1 1 Io stimulating source of current are determined by the GT with
𝑉̅ (s) [𝑠 2 + 𝑠+ ] = 3
RϹ LϹ 𝑠 C simple computations and the results established are the same
𝑂𝑟 as found via the other mathematical method or approach like
Io 1 1 ordinary calculus method. This provides corroboration that
𝑉̅ (s) = [ ] (9)
C 𝑠 3 𝑠 2 + 1 𝑠+ 1 the GT is a more puissant mathematical method for the
RϹ LϹ
1 1
analysis of such series or parallel networks than the ordinary
Let 2𝑑 = 𝑎𝑛𝑑 𝜔′ = √ , then (9) becomes calculus method.
RϹ LϹ
Io 1 1
𝑉̅ (s) = [ ] IV. CONCLUSION
C 𝑠3 𝑠2 + 2 𝑑 𝑠 + 𝜔′2
𝑂𝑟
In the present paper, GT has been flourishingly handed down
Io 1 1
𝑉̅ (s) = [ 2]
for the exploration of a series network of an inductor (L), a
C 𝑠3
(𝑠 + 𝑑)2 − (√𝑑 2 − 𝜔 ′ 2 ) resistor (R), and a capacitor (C) across which coupled a
steady stimulating source of voltage, and a parallel network
𝑂𝑟
Io 1 1 of an inductor (L), a resistor (R), and a capacitor (C) across
𝑉̅ (s) = (10) which coupled a steady stimulating source of current.
C 𝑠3
(𝑠+𝑑+√𝑑 2 −𝜔 ′2 ).(𝑠+𝑑−√𝑑 2 −𝜔′ )
2

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 11


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ACKNOWLEDGMENT
The authors are deeply indebted to Prof. Dinesh Verma and
Prof. Mukesh Kumar Rana for their assistance.
REFERENCES

[1] A Sudhakar & Shyammohan S Palli. Circuits and Networks, Analysis


and Synthesis. McGraw-Hill Education India Pvt, Ltd, 2010.
[2] M. E. Van Valkenburg. Network Analysis. Pub: Pearson Education,
2015.
[3] J. S. Chitode, R.M. Jalnekar. Network Analysis and Synthesis. Pub:
Technical Publications, 2007.
[4] A.V. Bakshi, U. A. Bakshi. Network Analysis and Synthesis. Pub:
Technical Publications, 2005
[5] Murray R. Spiegel, Theory and Problems of Laplace Transforms.
Publisher: Schaum's outline series, McGraw Hill.
[6] Shenkman, A. L. Transient analysis using Laplace transform techniques.
Springer, Boston, MA, 1998.
[7] Franklin F. Kuo, Network Analysis and Synthesis. Pub: Wiley, 1966.
[8] Tarig M. Elzaki, Salih M. Elzaki and Elsayed Elnour. On the new integral
transform Elzaki transform fundamental properties investigations and
applications, global journal of mathematical sciences: Theory and
Practical, 4(1), (2012).
[9] Sunil Shrivastava, Introduction of Laplace transform and Elzaki
transform with application (Electrical circuits), International Research
Journal of Engineering and Technology, 5 (2), 2018, pp. 675-681.
[10] Rohit Gupta et al 2022 J. Phys.: Conf. Ser. 2325 012036.
Doi: 10.1088/1742-6596/2325/1/012036
[11] Rahul Gupta, Rohit Gupta, Dinesh Verma. Propounding a New Integral
Transform: Gupta Transform with Applications in Science and
Engineering, International Journal of Scientific Research in
Multidisciplinary Studies, 6(3), pp. 14-19, 2020.
[12] Rohit Gupta, Shivam Sharma, Rahul Gupta, Study of Laminar Flow
between Parallel Plates via Gupta Integral Transform, International
Journal for Research in Applied Science & Engineering Technology
(IJRASET), 10(6), pp. 385-389, 2022.
[13] Gomez, F., Rosales, J. RLC electrical circuit of non-integer order.
Cent. Eur. J. Phys., 2013, 1361-1365.
[14] V. Del. Toro. Electrical Engineering Fundamentals. Pub: Prentice Hall,
1986.
[15] B. L. Theraja & A. K. Theraja. A Textbook of Electrical Technology. S
Chand & Company Ltd, (2008).
[16] Anuradha S. Deshpande. Transient Analysis of R-L-C Series Circuit to
Step voltage by Engineering Method, International Journal of
Computational and Applied Mathematics, 9(2), 2014, pp. 63-70
[17] Erwin Kreyszig. Advanced Engineering Mathematics. Ed. 10th Pub:
John Wiley and Sons, Inc., 2008.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 12


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Robotic Arm Aided Thermal Screening System


Mrs. Usha Rani C M Dr. K Shailaja
Department of EIE Department of EIE
JSSSTU, SJCE JSSSTU, SJCE
Mysuru, India Mysuru, India
usharanicm.16@gmail.com kshaila_15@sjce.ac.in

Raksha C Harisha H L Prashanth P


Department of EIE Department of EIE Department of EIE
JSSSTU, SJCE JSSSTU, SJCE JSSSTU, SJCE
Mysuru, India Mysuru, India Mysuru, India
rakshacr20@gmail.com hlharish884@gmail.com prashanthp6655@gmail.com

Abstract - With the onset of the Covid-19 pandemic, the health of Covid-19 may symptoms vary, the centres for Disease Control
people has become more of a concern. With this, temperature and Prevention (CDC) states that about 83-99% of the people
measurement has gained even more significance. Non-contact with coronavirus infection will experience a fever. Therefore,
thermometers give the advantage of being used in extreme this makes temperature screening one of the most crucial
infectious environments, lightweight, repeatability, and many
more. Thermal screening helps in identifying people with a high
measures needed to identify people at risk of developing
body temperature who are potentially at risk. This research work Covid-19 or people infected with Covid-19 to slow the spread
focuses on the non-contact human body temperature of the virus.
measurement with the assistance of a robotic arm. The robotic
arm is used to dispense the power of mobility to the system. The Traditionally, body temperature was measured using
robotic arm, interfaced with Raspberry PI, is used to dispense the thermometers which required contact with the target and a
power of mobility to the system. Non-contact infrared health care worker to administer the measurement. The
temperature sensor, MLX90614, is interfaced with Arduino Nano thermometers that were used earlier had to be in contact with
and is used to measure human body temperature. The
mucosal layers or armpits and required a long contact time.
temperature obtained from the thermal gun is fed to the serial
monitor app in the mobile that is connected through the USB They are cheap and reliable yet poses many shortcomings
cable to Arduino Nano. The temperature sensor’s data is which led to the development of non-contact or infrared
displayed on a mobile phone in Celsius unit. The format in which thermometers. The infrared thermometer, non-contact
the sensor data is displayed is programmed using Arduino IDE. thermometer, distinctly offers a clear-cut advantage over
contact measurement of human body temperature due to its
Keywords - Raspberry PI, Arduino Nano, MLX90614- Temperature capability to determine precisely the temperature of the target
Sensor, IR sensor, Robotic arm, Temperature, Degree of freedom object even in the absence of any physical contact. Several
(DOF). industrial practices or applications gain advantage from this
technology owing to their non-contact temperature
I. INTRODUCTION measurement nature. Infrared temperature measurements
present with the potential to keep track of temperature in
People usually overestimate their health and doing so can have situations where the object maybe out of reach or moving,
a negative impact on their immediate environment. The where the object may be contaminated or marred by a contact
introduction of a thermal screening system, to prevent at-risk sensor, where contact is impractical or unfeasible due to
individuals from risking other people, could have a real and exceedingly high temperatures, or maybe where the object is
positive impact on public health. With Covid-19 cases electrically active.
fluctuating across the world and businesses, the education
sector, hospitality industries etcetera striving to reopen, Robots are the new trending facet in the medical sector. They
temperature screening has become predominant for everybody. are possibly the next-generation rescuers or saviors in the
Different industries from healthcare to hospitality, business, healthcare industry. This is because they can perform mind-
and schools have taken added precautions to try to prevent numbing or mundane human tasks precisely, accurately, and
more virus outbreaks. Fever is one of the main and many initial efficiently. Robots are custom built to respond to a specific
symptoms of not only Covid-19 but many other diseases like environment i.e., they are programmed to perform efficiently
influenza, pneumonia, hyperpyrexia etcetera. While initial in monotonous tasks. Robots are not used explicitly in the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 13


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
operating
DVDroom but also
Part Number: in clinical scenery
CFP22CB5-DVD: to assist healthcare
ISBN: 978-1-6654-6083-5 Design and implementation of a 5 DOF robotic arm using
workers and strengthen and upgrade patient care. For example, aluminum due to its lightweight, rough use, less cost, and easy
hospitals and clinics are bringing robots into play for a much machining. This model is implemented using MATLAB. The
broader spectrum of activities to aid reduce vulnerability to intellectual capacity of the robot system lies in Arduino
pathogens during the COVID-19 pandemic. The use of Mega2560 and force sensors are used at the gripper to
robotics and automation also expands to research centers. A determine the force put in to the object, and potentiometers are
robotic arm can be used for the measurement of body made use of at the positions to detect the location of the motor
parameters, for assembling medical kits, and many more. shaft. The user gives commands through a graphical user
interface which is received by Arduino and regulates the
The thermal screening robotic arm is developed with the position of the motor shaft which in turn regulate or controls
intention to provide the first line of safety to front-line workers the movement of the joints [5].
such as doctors, medical personnel or anyone who is required For medical diagnostic applications, the system gives out an
to take temperature measurements. It is designed to measure inexpensive thermal imaging system. Implementing a basic
the body temperature of patients from a distance i.e., remotely. thermal array which is used to make out or perceive the
Previously temperature measurement required the temperature infrared radiations from the human body and then it is
sensor (or a thermometer) to be in contact with the subject and converted into an electronic signal. The temperature is then
it is necessary to disinfect the thermometer after every single calculated and a pseudo color image is developed with the
use. In order to overcome this limitation, a non-contact assistance of a microcontroller [6].
temperature sensor is used to measure human body temperature A robot is a system which integrates several subsystems that
without worrying about contamination and does not require communicate among themselves as well as with the
regular disinfection since it is non-contact measurement. It environment in which the robot is put to work. In robotics, end
measures the human body temperature of the patient and relays effectors are the devices at the tip of a robotic arm, designed to
it to a display device. interact with the environment. Gripper is an end effector or a
The main objective of the model is to measure human body tool to latch on to any physical object that may be a human
temperature. The advantage of mobility is given to the system hand or any entity. The gripper can execute the basic functions
using a robotic arm and the sensor data is displayed on a like picking, holding and clasping of objects by way of a DC
computer or a mobile device. This system will be helpful in motor and it layouts the mechanism for spot welding [7].
cases where regular thermal screening is necessary with
minimal human presence. III. METHODOLOGY
The developed system mainly consists of a Raspberry Pi3, 4
II. LITERATURE SURVEY L293D motor drivers, power supply, MLX90614 temperature
sensor, and Arduino Nano.
Implement an automatic temperature screening device for
outdoor temperature measurement. The bots are equipped with The schematic or the block diagram of the Robotic Arm Aided
cameras, a voice broadcast system, GUI, high accuracy system is presented in the figure1. The whole system can be
thermometer, and an ultrasonic sensor [1]. divided into two parts:
The system uses applied robotics to reduce person-to-person ● Temperature sensing part
contact for temperature measurement. The system uses an ● Moving part
infrared sensor for measuring body temperature and a mobile
device shows and accumulates or stores the data collected. The
robotic arm is 3D printed and is made of low-cost electronic
circuitry [2].
The system uses the infrared temperature measurement
technique. The heart of the system is the STC12C5A60S2
microcontroller. The infrared sensor continuously measures the
human body temperature and communicates with the
microcontroller. Upon triggering the extended keys, the
microcontroller reads the sensor data, performs digital
smoothing filtering and displays the data on an LCD display
module, and broadcasts the data through the voice broadcast
module [3].
A Raspberry Pi controlled 5 DOF robotic arm-aided
temperature measurement system is implemented. The robotic
arm is controlled using an application called Blue dot. The
Figure1: Block diagram of the Robotic Arm Aided system.
system is interfaced with an infrared temperature sensor and
pulse sensor. The sensor data is forwarded to the Raspberry Pi
MLX90614: It is a non-contact infrared temperature sensor
module which then notifies the operator with an SMS. The
which measures the temperature of an article in the range -70 to
authors also state that the robot can be used to deliver essentials
+382.2°C. It is a smart sensor since it measures object
like medicines, food etcetera to the patients [4].
temperature and also performs some digital signal processing.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 14


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
The MLX90614 temperature
DVD Part Number: sensor is
CFP22CB5-DVD: shown
ISBN: in figure2. The
978-1-6654-6083-5 processor and needs 3.3V to power the processor and +5V for
sensor uses infrared or IR rays to measure the object the general purpose I/O pins. In the developed system, it is
temperature even without any physical contact and used to control three motor drivers (L293D) which in turn
communicates to the microcontroller using the Inter-Integrated controls two motors each. Raspberry Pi is programmed using
Circuit (I2C) protocol. It is I2C supported, therefore it is Python programming. A robotic arm connects the temperature
interfaced with the I2C bus of Arduino Nano. sensing part and the mobile part.
The non-contact measurement of temperature is possible
because of Stefan-Boltzmann Law. This law states that “the The robotic arm: A robotic arm is a kind of a mechanical arm
total energy emitted per unit surface area of a blackbody that is analogous to the human arm. It has various fragments
across all wavelengths per unit time is directly proportional to which bears a resemblance to the wrist, an elbow, and shoulder
the fourth power of the black body’s thermodynamic of a human. It can be programmed according to the needs and
temperature” i.e., can be administered to perform diverse functions just like a
u/A = σT4 human arm. The robotic arm is made up of Spur gears, Worm
where σ is Stefan’s constant = 5.67 × 10-8 W/m2 k4. gear, Fibre grippers and DC motors.
A body that is not a black body absorbs and emits less radiation • Spur gears present a simple design of straight and
than a black body and the equation is given by parallel teeth placed around the circumference of a
u = e σ AT4 cylinder body with a central bore that fits over a shaft.
where e is emissivity and lies between 0 and 1. • A worm gear is a gear comprising of a shaft with a
spiral thread that engages with and drives a toothed
wheel. It modifies the rotational movement by 90
degrees, and the plane of movement is also changed
due to the position of the worm on the worm wheel.
• Robot grippers are the physical association between a
robot arm and the work piece.
• The DC motor can easily be governed with the help of
a DPDT switch or with the help of any
microcontroller along with the L293D motor driver
module.

The end effectors, in robotics, are an instrument at the tail end


Figure2: MLX90614 temperature sensor of a robotic arm, intended to communicate to interact with the
surrounding environment. A gripper is an end effector or tool
Arduino Nano: The Arduino Nano is a small Arduino board to clasp any physical object that may be a human hand or any
formulated on the ATmega328P or ATmega628 article. The robotic arm axis is operated by DC motors and
microcontroller. The Nano board is described as a sustainable, each DC motor has a potentiometer linked to the gear axis so
reliable, flexible, consistent, and small microcontroller board. It that the potentiometer will rotate as the engine rotates. The
is half the size of the Arduino UNO board. The Arduino Nano potentiometer gives a certain voltage value as feedback that is
is complete with the Arduino (IDE), which can run on various used to make out or detect the position of the particular motor.
platforms. Arduino is a micro-controller used as the brain of The gripper module is the state of art robotic arm which can be
the robot. It can be programmed to control the way buttons, utilized in various pick and place kinds of robots. It works on a
motors, switches, lights, and other electronic parts to work DC motor (9-12 volts DC). Change in the rotation direction of
together. In this developed Robotic arm aided system, it reads the DC motor generates jaw open and close action. Here we
the sensor data and displays it on a mobile device. use the Raspberry Pi 3B model to control the robotic arm. It is
programmed using Raspberry Pi. Raspberry Pi is used to guide
the movement of the robot i.e., it controls the motor drivers and
Raspberry Pi 3: Raspberry PI 3 is a development board in the the motors. There are three L293D motor drivers controlling a
PI series. It can be considered as a single-board computer that total of six motors- four of them are the wheels of the robot and
works on the Linux operating system. The board has abundant two of them control the robotic arm. The Robotic Arm is
features and extraordinary processing speed, making it suitable shown in figure3.
for advanced applications. It is an open-source platform.
Raspberry Pi OS is a free operating system based on Debian,
optimized for the Raspberry Pi hardware, and is the suggested
OS for regular and common use on a Raspberry Pi. This
operating system is provided with over 35,000 packages, and
precompiled software bundled in a nice design for easy
installation on Raspberry Pi.

Raspberry is a low cost mini-computer used in a wide range of


applications. It consists of Broadcom BCM2837 quad core

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 15


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure3: Robotic Arm


Figure 5: Switch configuration of H-bridge
IR Sensor: Infrared (IR) sensor is an electronic device that
A DC motor rotates either clockwise or anti-clockwise based
effuses light in order to sense some object of the surroundings.
on the connection of switches of the H-bridge. There are two
An IR sensor can gauge or measure the heat of an object as
situations:
well as detect the motion. Generally, in the infrared spectrum,
• If switches S1 and S4 are closed then the right lead of the
every object emits some form of thermal radiation. These kinds
motor will be latched to the ground, while the left lead is
of radiation are invisible to our eyes, but infrared sensors can
latched to the power supply. Current starts flowing through the
detect these radiations. The figure4 shows the IR sensor. The
motor which energizes the motor in one direction, say
infrared transmitter will transmit infrared radiation which hits
clockwise.
the obstacle (human being) in front of it, and the reflected
radiation is received by the infrared receiver or photodiode. • If switches S2 and S3 are closed then the right lead of the
Based on the intensity of the received radiation, the sensor motor will be latched to the power supply, while the left lead is
output will be defined. If the body temperature is high then latched to the ground. The motor is energized in the reverse
more radiation is reflected back, by the human body to the direction i.e., anti-clockwise.
receiver, thus increasing the sensor output and this will indicate
that the person has a high body temperature. In a bridge, switches S1, S2 or S3, S4 should not be turned on
at the same time. If they are then a low-resistance path is
created between power and ground, effectually short-circuiting
the power supply. This state is called ‘shoot-through’ and is an
almost guaranteed way to rapidly destroy the bridge, or
something else in the circuit.

The MLX90614 sensor is made up of two units - a thermopile


detector and a signal processing unit. The MLX90614 sensor’s
temperature signal that is output by the infrared thermopile
sensor goes through the process as given below:
1. The analog signal is intensified or amplified by the
internal low-noise, low-offset operational amplifier
2. The analog signal is translated into a 17-bit digital
signal by the A/D converter.
3. To further reduce the bandwidth of the signal, to attain
Figure4: IR Sensor
the desired noise performance and refresh rate,
programmable FIR and IIR low pass digital filters,
L293D (H-Bridge): The L293D is a well accepted 16-Pin DSP unit, are used.
Motor Driver IC. It is mainly used to drive motors and hence it 4. After processing the output, the output result is kept in
is called as motor driver. A single L293D IC has the capacity to its internal RAM storage unit.
run two DC motors at the same time and also, the direction of
the two motors can be controlled independently. The Switch When the python program is uploaded to the Raspberry Pi, the
configuration of H-bridge is shown in figure4. entire system starts its operation. The working of the developed
system is described below.

● The robot moves forward and stops for a second.


● The temperature measurement of the target subject is
taken for 5 seconds.
● The robot moves in the backward position, to its

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 16


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
original
DVD position,
Part Number: and stops for
CFP22CB5-DVD: 5 seconds.
ISBN: 978-1-6654-6083-5
● This process is repeated after the 5-second delay.

The temperature that is obtained from the thermal gun is fed to


the serial monitor app in the mobile by connecting the mobile
to Arduino Nano using a USB cable. In order to stop this
process, the python program should be terminated within the 5-
second delay after the robot moves back to its original position.
If the program is terminated during the process, then the
Raspberry Pi or some other component might get destroyed.

IV. ALGORITHM Side View


The algorithm for the temperature measurement part using
Arduino Nano and MLX90614 sensor is given below,
1. Power the Arduino Nano board.
2. Establish serial communication between Arduino Nano and
the infrared temperature sensor, MLX90614.
3. MLX90614 temperature sensor measures the target’s
temperature.
4. Arduino Nano reads the MLX90614 sensor data.
5. The sensor data is displayed on a mobile phone which is
connected to Arduino Nano using a USB cable.

The algorithm for the developed system is given below:


1. The entire system is first powered on.
2. The python program is uploaded onto the Raspberry Pi
Backside View
using the Raspberry Pi operating system.
3. The robot moves in the forward direction and a delay of 1
second is given for it to become stable.
4. MLX90614 temperature sensor measures the human body
temperature for 5 seconds and this sensor data is displayed on a
mobile phone.
5. The robot moves in the backward direction i.e., to its
original position and a delay of 1 second is given for it to
become stable.
6. The entire process is then repeated infinitely otherwise go to
step 7.
7. If the process has to be stopped, then after the robot moves
in the backward direction a delay of 5 seconds is given. The
python program has to be terminated within the 5-second
delay. Once the program is terminated the process stops.
Front View
V. RESULTS Figure 6: The developed Robotic Arm system.
The developed Robotic Arm system is shown in Figure 6. It
shows the side view of the developed project. Two wheels are The temperature sensor’s data is displayed on a mobile phone
placed on each side of the robot and hence there are a total of in Celsius unit. The format in which the sensor data is
four wheels used to provide movement to the system. The displayed is programmed using Arduino IDE. In the developed
Raspberry Pi, motor drivers, and power supply is mounted on system, it is programmed to display the sensor data in the
the chassis. The temperature sensing part and the chassis are format given below:
connected through a base assembly. The base assemble is <Temperature>: <Measurement value> Celsius>.
placed towards the front of the system. The sensing part,
consisting of MLX90614 sensor and Arduino Nano, is placed The readings from the MLX90614 sensor are read by Arduino
at the front of the system so that it can point to the subject Nano and are displayed on a mobile device. This is shown in
whose measurement is to be taken. Figure 7. The temperature obtained from the thermal gun is fed
to the serial monitor app in the mobile that is connected
through the USB cable to Arduino Nano.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 17


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
[4] Amrutha R, Dama Manasa, Modiyam Chavva Radhika,
Monisha M Y, Thilagavathy R, “Patient Monitoring and Assistance using
Robotic Arm,” International Journal of Engineering Research & Technology
(IJERT) NCCDS – 2021 (Volume 09 – Issue 12).

[5] Kruthika, K & B M, Kiran & Lakshminarayanan, Sanjay “Design and


development of a robotic arm,” 1-4, 10.1109/CIMCA.2016.8053274, October,
2016.

[6] S. Sruthi and M. Sasikala, “A Low Cost Thermal Imaging System for
Medical Diagnostic Applications,” 2015 International Conference on Smart
Technologies and Management for Computing, Communication, Controls,
Energy and Materials (ICSTM), ECE Dept Anna University, Chennai, Tamil
Nadu, India, May 06-08, 2015.

[7] Puran Singh, Anil Kumar, and Mahesh Vashisth. (2013). Design of a
Robotic Arm with Gripper & End Effector for Spot Welding: Universal Journal
of Mechanical Engineering, 1(3). DOI 10.13189/ujme.2013.010303.
Figure 7: Temperature data displayed on a mobile. [8] Ranganathan, G. "An Economical Robotic ArmPlaying Chess Using Visual
Servoing " Journal of Innovative Image Processing (JIIP) 2, no. 03 (2020):
VI. CONCLUSION AND FUTURE SCOPE 141-146.
[9] Vijayakumar, T. "Flexible Robotic Electronic Skin with High Sensitivity
Sensor Arrays " Journal of Electronics 1, no. 01 (2019): 43-51.
Temperature measurement has become pivotal everywhere
around the world. With the utilization of the developed
temperature measurement system the burden on health staff, or
anyone who has to monitor people’s temperature, can be
reduced.
With the latest applications and features, healthcare robots are
anticipated to enhance the operational efficiencies, quality,
accuracy, and safety in healthcare service delivery. Robots
work explicitly within the parameters of time and work
delegated to them which is a vital advantage of medical robots.
Additional usefulness of medical robots include flawless
performance, proper monitoring services of patients, does not
waste time, reduced risk of infection, and many more.
The infrared temperature sensor, MLX90614, provides
accurate human body temperature readings. This accurate
measurement becomes crucial in some situations. Robotics
greatly influences the medical industry and along with accurate
temperature measurements, it can greatly simplify human
workload.

The project put forward can be further enhanced and some of


the ideas are listed below:
● Additional sensors, like pulse sensors, blood pressure
sensors, and motion sensors, can be interfaced in order
to measure additional psychological parameters.
● A Raspberry Pi Camera Module can be interfaced
with Raspberry Pi to monitor real-time measurements.
● The sensor data can be sent to a cloud platform so that
the health staff can monitor the patient anywhere,
anytime.

REFERENCES

[1] Zhao Gong, Songwen Jiang, Qizhi Meng, Yanlei Ye, Peng Li, Fugui Xie,
Huichan Zhao, Chunzhe Lv, Xiaojie Wang and Xinjun Liu “SHUYU Robot:
An Automatic Rapid Temperature Screening System (springeropen.com),”
2020.

[2] Andrés Moreira, Paul Criollo, Belén Ruales, “Body Temperature Control
Using a Robotic Arm,” March 25, 2021.

[3] Zipeng Guo, Jinxia Chu, “Design and Implementation of Infrared


Temperature Measurement System,” April, 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 18


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Recent Advancement and Comparative Turnouts of
1Ø Grid Tied Non-Isolated Inverters Topologies
Rushikesh S. Shahakar Dr. Kawita D. Thakur Nutan S. Thakare
Department of Electrical Engineering Department of Electrical Engineering Department of Electronics Engineering
Government College of Engineering Government College of Engineering Government College of Engineering
Amravati, India Yawatmal, India Amravati, India
rsshahakar@gmail.com kawitadthakur@gmail.com nutan551992@gmail.com

Abstract— Renewable Energy (RE) is environmentally Inverter Filter Grid


friendly, abundant, economically feasible and has become a
prime interest as well as a potential substitute to conventional
fossil fuels. One of the fastest growing RE source is Photo- PV Cdc
Array
Voltaic (PV) has gained a lot of momentum these days which can
be hooked to the grid distribution network. Power electronics CPV
interface plays a vital role in power generation. Converter
topologies have quite a substantial impact on the efficiency of a IL
generation system. This research examines the current Fig. 1. Single stage conversion
advancements in non-isolated Grid-connected PV (GPV)
inverter systems along with their historical overview. Several The key problem in attaining higher efficiency while
transformerless inverters have been presented using various feeding electricity to the grid in a 1Ø GPV system is the
ways such as decoupling the DC from the AC side and/or number of stages that the power conditioning module
clamping the common mode or using common ground employs [3]. Two-stage conversion system that not only
configurations. In addition, various trailblazing inverter affects efficiency but also makes the system big and
topologies are elaborated in a systematic manner with the expensive. In contrast, as shown in Fig. 1 a single stage
foreseeable major hurdles in developing a smart and efficient
conversion system does not use high frequency boost
system. Furthermore, different performance metrics are
appropriately analyzed and reported in a table. This paper aims
converter and low frequency transformer. It does, however
to comprehensively review and classify various transformerless have the disadvantage of not supplying electricity when the
inverters with detailed analytical comparisons in order to offer PV voltage declines underneath the peak level of the grid
a clear understanding on the development of optimal voltage. Before being linked to the utility grid, the DC power
transformerless inverters for the rising generation GPV from the PV array is converted into AC power with the
systems. requisite voltage magnitude, frequency, and phase in a GPV
system. With this, a DC-to-AC converter, also referred as an
Keywords— Transformerless inverter, Photovoltaic system, inverter, will be necessitated. As a result, the inverter is the
Leakage current, Efficiency
most vital part in GPV systems [4]. The maximum power
extraction from PV modules, minimum Leakage Current
(𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 ), stable Common Mode Voltage (CMV), output
I. INTRODUCTION
variations, the effect on power quality, voltage and current
Energy is an essential driver and precondition for societal harmonics, mismatch between PV output and grid
progress, as well as a critical component of long-term specifications are the issues in 1Ø GPV systems. The ultimate
sustainability. According to the International Energy Agency's goal in constructing a GPV generation system is to achieve
Global Energy Outlook 2021 [1] renewable electricity maximum power transmission, minimum 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 and the
generation is predicted to increase further by 8% in 2021 and
best possible inverter topology.
are already on track to push boundaries in 2022. Solar PV, as
the most widely used RE source, can be considered for future This paper examines previously proposed
electrical power generation, since it offers ongoing cost topologies and contrivances for implementing 1Ø
reductions, a robust system and rapid technological transformerless PV inverters, with an emphasis on appealing
advancement [2]. PV schemes are classified into two major features such as CMV applied to PV panels, 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 ,
classes, one as stand-alone systems that produce power semiconductor devices used in each topology, reliability and
without being linked to the grid, and other as GPV generating efficiency. The portions of the paper are as follows: The
systems that produce power that being connected to the grid. classification of transformerless inverter topologies based on
The current cost of setting up a stand-alone PV system is DC link voltage equal to 2𝑉𝑃𝑉 and 𝑉𝑃𝑉 is covered in section
considerable, with an extra drawback of output power II also this section examines various topological
fluctuation because of the intermittent nature of solar configurations, as well as their benefits and drawbacks.
irradiation and temperature [2]. As a result, the GPV system Section III delves into the principles of 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 and CMV in
is performing admirably as a used electrical supply resource. addition with a comparative examination of topologies
It is also gaining traction as a result of supplementary services
depending on a variety of parameters, before concluding in
and lower transmission losses. A robust power conditioning
Section IV.
unit is not only required to boost generation by incorporating
RE sources into microgrids but also to link system
components with grid without endangering safety [3].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 19


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. LITERATURE SURVEY have an impact on the overall system. T type topology
provided a promising approach with bidirectional switches
To enhance competitive advantage and reliability of GPV, a
positioned between the midpoints of DC link capacitors. It has
number of 1Ø transformerless topologies have been
a high conversion efficiency and lowers conduction loss. The
suggested and built. Despite the fact that several topologies DC link voltage required for such topologies, on the other
for transformerless PV grid-connected inverters have been hand, is significantly larger (more than twice the grid voltage
proposed in the literature, only a few topologies were used in peak value). Furthermore, the switches must be capable of
industrial applications thus far. Fig. 2 depicts the division of withstanding the high DC link voltage stress. As a response,
a few fascinating topologies into two primary subgroups single input voltage topologies gained popularity.
depending on the DC link voltage requirement. Half bridge
inverters, for instance the normal half bridge, NP clamped, B. Single Input Voltage Type 1Ø Grid Tied Transformerless
and T type [4,5], which necessitate a substantial high input Inverter Topologies
voltage from the PV panels, are representative The modulation approach used, as well as the CMV across
transformerless inverters with 𝑉𝑃𝑉 = 2𝑉𝐷𝐶 . To achieve the the PV panel’s parasitic capacitance, have a significant
voltage modulation requirement, one 𝑉𝑃𝑉 = 𝑉𝐷𝐶 uses extra influence on performance and applicability of a typical full-
active circuits as well as passive devices, such as common bridge inverter. Constant CMV and removal of Common
ground type and H bridge type. Mode Current ( 𝑖𝑐𝑚 ) are two notable advantages of such
topologies. To suppress 𝑖𝑐𝑚 many different topologies for 1Ø
A. Double Input Voltage Type 1Ø Grid Tied transformerless PV inverters have been designed. These
Transformerless Inverter Topologies schemes, which include DC-decoupling, AC-decoupling, and
This section delves into a few key topologies. The half Neutral point clamped (NPC) type 1Ø transformerless
bridge inverter [4] is the most common conversion topology inverters architecture which minimize 𝑖𝑐𝑚 by isolating the PV
utilized in PV applications. It is comprised of two switches, a array from the grid or by incorporating an auxiliary clamp
filter inductor, and an input side capacitor divider with its circuit to ensure stable CMV.
midway tied directly to the grid's neutral terminal, which 1) Common Ground Type Topology
keeps CMV constant. As a response, the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is quite
modest. To avoid a DC link voltage short, the gate directives A Common Ground (CG) configuration [6-9] is one in
used to turn on and off the switching devices must be which the negative polarity of the PV panel is
complementary. To simplify the control system and enhance straightforwardly connected to the grid. Fig. 3 to Fig. 6
efficiency, a new topology known as neutral point clamped [5] shown below are CG type topologies. Table I explores the
was adopted. It saves money and space, but has DC link topology configuration along with their advantages and
balanced and unbalanced conduction losses, which ultimately associated shortcomings.

1Ø Grid Tied Transformerless Inverter Topolgies

DC Link Voltage = 2 Vpv DC Link Voltage = Vpv

Half Bridge
H Bridge Type
Common Ground Type
NP Clamped
Decoupling Mid Point Clamping

T Type
Karschny's
Flying Inductor AC
AC DC DC

Flying H6-AC
Capacitor SMA's H5 i/O-H5 iHERIC

Four Switch Sunway's


Active
CG HERIC H6-DC H5-D
HERIC

H6-DC NPC / NIIFBC


oH5-2/
Ingeteams H6
Fig. 2 Classification of 1Ø grid tied transformerless inverter topology

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 20


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

2) H-Bridge Type At zero state, these topologies not only decouple PV array and
grid, but also connect short-circuited inverter output terminals
A traditional Full Bridge (FB) inverter topology to the DC bus's midpoint. As a result, CMV is stabilized, and
described in [10] with a unipolar switching pattern and the capacitor voltage follows the grid voltage with no high
with bipolar switching. For ensuring constant CMV and frequency content. These topologies are made up of switch
low 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , an FB inverter with a bipolar arrangement junction capacitors, which have an unanticipated effect on
was used. Switching losses on the other hand are higher, 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 performance. The CMV is clamped to half of the DC
hence lowering the efficiency. As a result, a unipolar link voltage during the freewheeling phase in this manner, and
modulation method is used to solve the efficiency the inverters are further characterized as AC/DC decoupling
problem [10]. inverters as illustrated in Fig.11 to Fig. 14.
i. Decoupling Type
III. COMMON MODE VOLTAGE (CMV) AND LEAKAGE
All of the other topologies [11-20] discussed in this CURRENT(𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 )
section can be implemented by providing a bypass path
on the DC or AC side. Bypassing helps not only grid and GPV systems require specific attention to suppress CMV and
PV isolation, but also avoids reactive power exchange to eliminate the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 . This section focuses on the
during freewheeling mode (zero voltage state). As a fundamental common mode resonant circuit. Since a single
result, the inverter's efficiency can be improved. stage conversion system lacks a transformer (galvanic
isolation), 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 gains the closed conduit between PV and
1. DC-Decoupling Type grid. 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is generated by the average value of voltages
An extra circuit at the DC bus is used for DC-decoupling between the inverter outputs and a common reference. This
transformerless single-phase inverters, which decouples 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 compromises worker safety, creates electromagnetic
the PV panels from the AC side during the freewheeling interference, increases losses and induces current ripples [12].
period as shown in Fig. 7 and Fig. 8. A low THD output voltage is preferred; nevertheless, more
2. AC-Decoupling Type circuitry is required, which complicates the regulating
technique [13].
AC-decoupling transformerless inverters use a decoupling
circuit on the AC side to achieve low Total Harmonic AC bypass topologies have reduced conduction loss
Distortion (THD) based output voltage and current, low when compared to DC bypass topologies. In spite this, using
bypass for galvanic isolation does not completely avoid
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , and a balanced system as depicted in Fig. 9 and
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 due to the consequences of stray capacitances and
Fig. 10.
parasitic components. The inverter architecture and
The dc link is isolated from the grid during decoupling in modulation method must be considered carefully in hopes of
freewheeling mode. Due to decoupling the voltages at two avoiding 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 by creating CMV. Table II enlists
points are floating in relation to the DC connection, the CMV comparison of different topologies on basis of CMV, 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 ,
oscillates and causes 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 . Only galvanic isolation is THD, efficiency and device count which have all already been
insufficient to eliminate the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 completely. To entirely addressed. CMV and 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 have varying values depending
eliminate 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , use CMV clamping in conjunction with on topology architecture. 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is approximately zero when
galvanic isolation via bypass. CMV is constant. As a result, it is suggested that an
ii. Midpoint Clamped Type Topologies architecture be devised that keeps CMV constant.
TABLE I : EXPLORING DIFFERENT TOPOLOGIES CONFIGURATION ALONG WITH ADVANTAGES AND ASSOCIATED SHORTCOMINGS

Name of Topology Topology Configuration Inference Problems Associated

Half Bridge ✓ CMV constant ✓ Shoot through


+
✓ 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is negligible ✓ The DC link voltage requirement is
C1 S1 L1 considerably higher

A
PV Vgrid
Array
B
C2
S2 0
-
Fig. 3. Half bridge inverter
Flying + ✓ Fewer active and passive ✓ Voltage stress across all the
S3 component switches is not uniform
Capacitor L1
✓ Low cost
S1
S4
PV
Array C C0 Vgrid
CF
S2 D

-
0

Fig. 4. Flying capacitor topology

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 21


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Karschny’s P ✓ Removing any voltage ✓ Low efficiency


fluctuations between the
Flying Inductor D1 L2 PV array and the ground ✓ Higher cost
S1 S3
Topology ✓ Removing any ground ✓ Size of inductor
PV
Cdc L1 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 ✓ Higher losses
Array
D2

S4 C1 Vg
N S2 S5

Fig. 5. Karschny's flying inductor topology


Four-Switch ipv i1 ig v0 ✓ It employs the active power ✓ Possibility of shoot through
P L1 decoupling approach
Single-Phase S3 •
L2 ✓ Film capacitors are utilized
S4
Common instead of bulky electrolytic
PV
C1 capacitors, increasing
Ground PV Array A C2 Vg
B
system dependability and
Inverter lifetime
S1 S2
N

Fig. 6. Four switch single phase CG inverter


Full Bridge A single sinusoidal reference is used for one group of ✓ CMV constant. ✓ The inductor current ripple and
(Bipolar diagonal switches in the bipolar modulation approach, while ✓ Reduces the amount of switching losses in the devices are
modulation complementary signals are used for the other group current that leaks through higher
strategy) the earth ✓ Lowering of efficiency
✓ Additional power loss due to
reactive power flow within the
inverter

Full Bridge To modulate each phase leg, the unipolar modulation ✓ Ripple reduction ✓ At the switching frequency, the
(Unipolar technique uses two sinusoidal references that are 180̊ out of ✓ No internal reactive-power CMV will oscillate
modulation phase flow ✓ Produces a large amount of 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
strategy)

SMA’s H5 ✓ During the zero voltage state ✓ During the active state, it induces a
P decouples the PV array from high frequency component in the
S5
the grid 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
LA ✓ 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is minimum ✓ High conduction losses
S1 S2
PV
Cdc Vg
Array
LB
N S3 S4
Fig. 7. H5 inverter
H6 DC ✓ Employs two symmetrical ✓ Increase in conduction losses
P blocking switches ✓ Induces 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒
S5 ✓ Switches shares the
S1 S2 L1 switching losses
A
PV
Cdc Vg
Array B
S6 L2
S3 S4
N

Fig. 8. H6 DC

H6 AC P LA Lg ✓ Low AC current distortion at ✓ Higher conduction losses


S1 S2 the output ✓ Issues with diode reverse-
✓ Dead time requirement is recovery
Cf Vg
eliminated ✓ Reduces the entire system's
D1 D2
PV
Array
Cdc1 S3 S4 ✓ There is no need for massive efficiency
LB
capacitors in a split DC link

S5 S6
N
Fig. 9. H6 AC inverter

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 22


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Sunway’s HERIC LA ✓ CMV does not change ✓ In the 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 , there will be a high
✓ The amount of the ground frequency component
P
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 is insignificant ✓ Due to the usage of a cascaded
✓ Decoupling prevents DC-DC converter, efficiency is
S1 S2 S5
𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 from flowing in the low at low PV voltage
PV
Vg zero state
Array
Cdc

S3 S4 S6
N
LB
Fig. 10. HERIC AC inverter
iH5/oH5 ✓ CMV is stabilized ✓ Ground current is more than H6
+ ✓ The capacitor voltage ✓ CM characteristics is worse than
S5
follows the grid voltage H6
C1 S1 S2 containing no high
S6 L1
frequency content
A
PV
Array
C0 Vgrid
B
C2 L2
S3 S4 0

-
Fig. 11. iH5 topology
H5-D + ✓ Constant CMV ✓ Using the same electrical
✓ Favored CM current characteristics and power
C1 suppression switches, the CM current is only
S1 S2 L1 around one-third of what it is in
A the H5 topology
PV
Array
D1 C0 Vgrid ✓ The THD is quite high
B
L2
C2 0
S3 S4
-
S5
Fig. 12. H5 D topology
Ingeteam’s H6 ✓ Reducing the switching ✓ Higher conduction losses
P losses ✓ Low efficiency at low PV voltage
S5
Cdc1 D1 LA ✓ Higher efficiency due to use of cascaded DC-DC
S1 S2
✓ CMV is stabilized converter
PV Vg
Array

D2 LB
Cdc2
N S3 S4

S6
Fig. 13. Ingeteam's H6 topology
iHERIC + ✓ CMV is stabilized ✓ Sacrificing the supremacy of RMS
✓ The capacitor voltage is and peak 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 value
S1 S2
governed by the grid
L1
A
voltage, which has no high
C1
frequency content
S7 S6
PV
Array
C0 Vgrid

S5
C2
B
L2 0
S3 S4
-
Fig. 14. iHERIC topology
HERIC Active By modifying and increasing the arrangement of ✓ 𝑖𝑐𝑚 is constant and low ✓ Short through issue
1/2/3 semiconductor devices ✓ Dead time requirement

Superjunction P
S4
✓ The high EU and peak ✓ Bulky coupled inductors are used
MOSFET-based D9 efficiencies ✓ Inductor loss per unit volume is
L2
NIIFBC Cpv1 Cdc1
A ✓ At grid voltage zero high
Cf Vg
D8 B crossings, no dead time is ✓ Temperature rise in core is
PV F required concerned
Array S1 D7 S6
S2 ✓ No reverse recovery
L1
C S5
Cpv2 Cdc2 D
E
S3 D10
N Leakage current
measureing point

Fig. 14. NIIFBC inverter

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 23


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II : SUMMARY OF PERFORMANCE COMPARISON OF SINGLE PHASE TRANSFORMERLESS INVERTER

Topology Semiconductor No No 𝒊𝒄𝒎 CMV Passive Filter o/p Reported Reported Cost Reported
Name Devices of of (mA) (V) Level PF THD Efficiency
No. of No. of C L No.of No. of (%) ƞ (%)
IGBT Diode C L
Half Bridge 4 2 3 0 ≈0 Constant 1 1 3 0.8 2.1 ++ 97.2@0.5kVA
[4]
Karschny’s 5 2 2 1 ≈0 Constant 1 1 3 Unity N/A ++++ N/A
[7]
Flying 4 1 2 0 ≈0 Constant 1 1 3 0.85 <2 ++ 99.25@1kVA
Capacitor[8]
Bipolar Full 4 0 1 0 ≤ 55 199 to 201 1 2 2 Unity NA + 95.2 @ 5kVA
Bridge[9]
Unipolar Full 4 0 1 0 ≤ 1800 200 to 400 1 2 3 Unity NA + 98.0 @ 3 kVA
Bridge[9]
H5 [10] 5 0 1 0 ≤ 200 159 to 235 1 2 3 Unity N/A ++ 98.5@ 0.5 kVA
H5-D [11] 5 1 2 0 ≤ 50 185to 195 1 2 3 Unity 4.888 ++ 95@650 VA
HERIC [12] 6 0 1 0 ≤ 200 165 to 235 1 2 3 Unity N/A ++ 97.1 @ 2 kVA
HERIC AC 6 2 1 0 ≤ 200 165 to 236 1 2 3 Unity N/A +++ N/A
based [12]
HERIC 7 2 2 0 ≤ 25 199.93 to 1 2 3 N/A N/A ++++ N/A
Active 1 [12] 200
HERIC 7 0 2 0 ≤ 25 199.96 to 1 2 3 N/A 1.7 ++++ 97 @ 2 kVA
Active 2 [12] 200
HERIC 6 4 2 0 ≤ 25 199.91 to 1 2 3 Unity N/A ++++ N/A
Active 3 [12] 200
H6 [13] 6 2 1 0 ≤ 25 150-250 1 2 3 0.95 4.6 ++ 97.31@3.68kVA
iH5/oH5 6 0 2 0 ≤ 20 199.89 to 1 2 3 Unity N/A ++ 96.9 @ 1 kVA
[17] 200
Ingeteam’s 6 2 2 0 ≤ 25 150 to 265 1 2 3 Unity <3 ++ 97.6@5kVA
H6 [19]
The higher the cost, the more "+" there is: + low, ++ medium, +++ high, and ++++ extremely high. "C" stands for Capacitor,
"L" for Inductor, "PF" for Power Factor, and "THD" for Total Harmonic Distortion in the table above.
TABLE III : SUMMARY REPRESENTING RECOMMENDED TOPOLOGY AMONG MAJOR CATEGORIES OF 1Ø TRANSFORMERLESS INVERTER TOPOLOGIES

1Ø Grid Tied Features Downsides Size of the Efficiency Recommended


Transformerless Inverter Topology
Inverter Topologies
Common Ground Type ▪ There is no CM impact ▪ Controlling a flying Small Very high Four Switch
Topologies ▪ There are fewer semiconductor capacitor / inductor, Common Ground
devices in use switching capacitor is
▪ Requires a small filter challenging

Mid-Point Clamping ▪ Constant CMV ▪ Increased complexity Large Medium HERIC Active 2
▪ Low 𝑖𝑐𝑚 ▪ More semiconductor
devices
AC-Decoupling ▪ Conduction losses are minimal ▪ Extra switches are needed Medium High HERIC
▪ The antiparallel diodes of F-B do not ▪ 𝐼𝐿𝑒𝑎𝑘𝑎𝑔𝑒 in the residual line
allow output current to pas frequency
▪ Lower THD
DC-Decoupling ▪ A DC bypass switch is used to isolate ▪ Conduction losses are high Medium Medium H5
PV from the grid ▪ Unbalanced switching
▪ Additional equipment
required

IV. CONCLUSION conclusion to this review, Table III explores the several
major 1Ø transformerless inverter categories with their
A brief overview of 1Ø grid tied PV features and downsides, as well as suggesting the optimum
transformerless inverter system is offered, as well as the topology for each category.
main challenges that transformerless inverters confront. The
benefits and drawbacks of different GPV transformerless Only PV parasitic capacitance is taken into account
topologies are discussed. The properties of topologies are while assessing the leakage current mechanism of grid-
contrasted and described explicitly. Since of its low connected topologies. Further investigation can be
cost/weight and high efficiency when compared to 1Ø conducted by taking into account the effect of parasitic
inverters with galvanic separation, 1Ø transformerless PV capacitance value along with stray capacitance of the PV
inverters have received a lot of attention. The final system. In addition to switching and conduction losses for
optimized strategy must be able to construct an elegant and switching devices, passive component losses can be
cohesive grid tied PV system as per the metrics included.
customization of individual system components. As a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 24


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
[1] IEA (2021), Global Energy Review 2021, IEA, Paris
https://www.iea.org/reports/global-energy-review-2021
[2] Dr. Chetansingh Solanki, “Solar Photovoltaic’s Fundamentals
Technologies and Application” 2nd edition, 2011
[3] Karuppusamy, P. "Design of Inverter Voltage Mode Controller by
Backstepping Technique for Nonlinear Power System Model."
Journal of Electrical Engineering and Automation 3, no. 4 (2021):
265-276
[4] S. L. Kuo, "Half-bridge transistor inverter for DC power
conversion," IEEE Trans. Ind. Electron. Control Instrum., no. 4, pp.
249-253, 1974.
[5] A. Nabae, I. Takahashi, and H. Akagi, "A new neutral-point-
clamped PWM inverter," IEEE Trans. Ind. Appl., no. 5, pp. 518-
523, Sept.-Oct.1981.
[6] Y. P. Siwakoti and F. Blaabjerg, "Common-Ground-Type
Transformerless Inverters for Single-Phase Solar Photovoltaic
Systems," IEEE Trans. Ind. Electron., vol. 65, no. 3, pp. 2100-2111,
Mar. 2018.
[7] D. Karschny, “Flying inductor topology,” German Patent DE 19 642
522C1, April, 1998
[8] Y. P. Siwakoti and F. Blaabjerg, "A novel flying capacitor
transformerless inverter for single-phase grid connected solar
photovoltaic system," 7th IEEE Int. Symposium on Power
Electronics for Distributed Generation Systems (PEDG), Aug. 2016
pp. 1-6.
[9] X. Xu, M. Su, Y. Sun, B. Guo, H. Wang and G. Xu, "Four-Switch
Single-Phase Common-Ground PV Inverter with Active Power
Decoupling," in IEEE Transactions on Industrial Electronics, pp. 1-
5, 10 March 2021.
[10] A. Algaddafi, K. Elnaddab, A. Al Ma'mari and A. N. Esgiar,
"Comparing the Performance of Bipolar and Unipolar Switching
Frequency to Drive DC-AC Inverter," International Renewable and
Sustainable Energy Conference (IRSEC), pp. 680-685, 2016
[11] “SMA Sunny Boy 5000TL - Datasheet,” http://www.sma-america-
.com , accessed: Jan 02, 2020.
[12] B. Yang, W. Li, Y. Gu, W. Cui and X. He, "Improved
Transformerless Inverter With Common-Mode Leakage Current
Elimination for a Photovoltaic Grid-Connected Power System," in
IEEE Transactions on Power Electronics, vol. 27, no. 2, pp. 752-
762, Feb. 2012
[13] Kayalvizhi, S., K. Senthil Kumar, M. Sindu, and S. Muminthaj.
"Hybrid Cascaded Inverter-Based Integrated Hybrid Power Supply
Using Nonconventional Energy Sources." Journal of Electrical
Engineering and Automation 4, no. 3 (2022): 129-143
[14] L. Zhang, K. Sun, Y. Xing and M. Xing, "H6 Transformerless Full-
Bridge PV Grid-Tied Inverters," in IEEE Transactions on Power
Electronics, vol. 29, no. 3, pp. 1229-1238, March 2014
[15] Yu, W., Lai, J. J., Qian, H. and Hutchens, ‘High efficiency MOSFET
inverter with H6-type configuration for photovoltaic nonisolated AC
module applications’, IEEE Trans. Power Electron., 2011, 4, (26),
pp. 1253–1260
[16] San, G., Qi, H., Wu, J. and Guo, X.: ‘A new three-level six-switch
topology for transformerless photovoltaic systems’, Proc. IPEM ’
7th onf., pp. 163-166, 2012
[17] B. Gu, J. Dominic, J. Lai, C. Chen, T. LaBella and B. Chen, "High
Reliability and Efficiency Single-Phase Transformerless Inverter for
Grid-Connected Photovoltaic Systems," in IEEE Transactions on
Power Electronics, vol. 28, no. 5, pp. 2235-2245, May 2013
[18] H. Xiao, S. Xie, Y. Chen, and R. Huang, “An Optimized
Transformerless Photovoltaic Grid-Connected Inverter,” IEEE
Trans. on Ind. Electron., vol. 58, no. 5, pp. 1887–1895, May 2011
[19] H. Xiao and S. Xie, “Leakage Current Analytical Model and
Application in Single Phase Transformerless Photovoltaic Grid-
Connected Inverter,” IEEE Trans. on Electromagn. Compat., vol.
52, no. 4, pp. 902–913, Nov 2010
[20] C. Anandababu and B. G. Fernandes, "Neutral Point Clamped
MOSFET Inverter With Full-Bridge Configuration for Nonisolated
Grid-Tied Photovoltaic System," in IEEE Journal of Emerging and
Selected Topics in Power Electronics, vol. 5, no. 1, pp. 445-457,
March 2017

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 25


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

An Automated System for Arrhythmia Detection


using ECG records from MITDB
Gilbert Roland1 , Dhana Sony. J2, S.N.Padhi3,S.Kayalvili4,S Cloudin5,Ashok Kumar6

1
Department of Health Studies, Astria Learning Consortium of Universities, 100 S. Ashley Drive Suite 600, Tampa, FL
33602, USA, gilbert@astrialearning.org
2
Department of Biomedical Engineering,Vel Tech RangarajanDr.Sagunthala R&D Institute of Science and Technology
(formerly known as VeltechDr.RR& Dr.SR University), Chennai-62,Tamilnadu,India,Dhanasonyj@veltech.edu.in
3
Department of Mechanical Engineering,KoneruLakshmaiah Education Foundation,Vaddeswaram 522302, Andhra
Pradesh, India,snpadhi333@gmail.com
4
Department of Computer Science and Engineering,Velalar College of Engineering and Technology, Erode – 638012,
Tamil Nadu,India,kayalvilis@gmail.co m
5
Department of Information Technology,KCG College of Technology Karapakkam, Chennai, Tamil Nadu 600097,
India,scloudin@kcgcollege.com
6
Department of Computer Science,BanasthaliVidyapith, Banasthali-304022,Rajasthan, India,kuashok@banasthali.in

Abstract—Electrocardiogram (ECG) is a common non-invasive


diagnostic technique used to detect cardiac disease. S everal
cardiac abnormalities can be uncovered by analysing the
heart's electrical impulses or the combination of action impulse
waveforms generated by several types of speciali zed cardiac
tissues. Recently, cardiovascular disease has become the most
prevalent disease and demands more healthcare professional to
evaluate the ECG data. This has led to the widespread adoption
of Machine Learning (ML)-based methods for detecting the
ECG features. This research study has collected and cleaned the
ECG signal data obtained from the MIT-BIH Arrhythmia
database (MITB). In this work, a range of processing steps such
as augmentation using S MOTE, normalization, denoising, and
feature extraction using Local Binary Pattern (LBP) are used.
The ML techniques employed in this study include S upport
Vector Machine (S VM), Linear Discriminant Analysis (LDA),
and Neural Network (NN). Further, the experimental findings
are utilized to establish the best model. The NN approach has
been demonstrated to detect arrhythmias more accurately
(92.01%) than the other three examined methods. Even when
prior knowledge is inadequate, the NN approach can aid in the
diagnosis of arrhythmia.

Keywords— Electrocardiogram, SMOTE, Normalize,


Fig. 1. ECG signal [1]
Denoise, Feature, Classification, Metrics

I. INT RODUCT ION Since the prevalence of cardiovascular disease,


people of all ages, but particularly those in their middle and
The heart is a very essential organ. It is the engine older years are at high risk. A large number of persons are
that provides oxygenated blood to several circulatory impacted, and both disability and death rates are high. The
systems. The heart continuously pumps oxygen and nutrients world's population is aging, which is becoming a concern
into the body while removing waste materials 100,000 times right now. The fast deterioration of cardiovascular disease is
every day. An ECG is a measurement of electrical impulses one of the most important challenges in public health today
in the heart induced by the heartbeat on the body's surface. [2]. ECG analysis is a reliable method for assessing heart
Electrodes put on the skin capture electrical activity and health. As a result, understanding how to recog nize and
disclose how each chamber performs in the form of PQRST categorize ECG signals is critical for those suffering from
waves as seen in Figure 1. cardiovascular disease. Aside from saving lives, early
detection is critical for effective treatment. It is critical to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 26


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
investigate the categorization of connected ECG signals memory (LSTM) network. Because it combines LSTM with
[3].Thus, the structure of the ECG signal can be utilized to several traditional features, the second model can reliably
infer heart activity and behaviour. Through an investigation identify anomalous categories. Bagging is employed to train
of the heart's behaviour, the ECG signal communicates exact such DL techniques, which are later integrated by a merger
information about it. As a result, cardiac arrhythmia is classifier to generate a single robust model. On the MIT-BIH
identified when an ECG reveals rhythm irregularities, such database, the suggested model has been assessed and found
as unusually fast or slow waves. Arrhythmia is the most to be significantly more accurate than the present state-of-
prevalent cause of death, and it can have both short- and the-art approaches.
long-term consequences for a patient (for example, in the
cases of ventricular fibrillation and tachycardia). The article [7] proposes running research on the
subject to discover if they have arrhythmias. Following the
An ECG is a graphical time series that documents interaction of dataset selection, pre-processing is performed
the electrical activity of the heart through every cardiac cycle to address some constant and missing attributes. The dataset
and is now commonly used to assess a person's heart rate. of ECG signal arrhythmias will be categorized into normal
Because this detection method does not include any invasive and pathological cases using AI methods such as support
procedures, it is commonly utilized to aid in pathology vector machines, ad boosting, and DL algorithms such as
investigation. The level of skill of a physician is now the artificial NN. Then, popular computation approaches such as
most critical element in determining the presence or absence VF15, closest neighbour, and Naive Bayes are compared to
of cardiovascular disease. Because of the large range of heart the precise implementation. The author [8] investigates ECG
diseases, false positives are typical in long-term manual signal representation learning for cardiac arrhythmia
detection. A new problem is determining how to quickly and categorization. To represent five separate cardiac rhythms,
precisely analyse certain diseases. Furthermore, because the dataset was built utilizing data from the CPSC, CPSC-
ECG signals are non-synchronous, low-frequency, and Extra, and Georgia 12-lead ECG Challenge databases. They
susceptible, the diagnosis results are inconsistent. Using utilize a cutting-edge DL strategy that combines a
Artificial Intelligence (AI)for automated recognition and Convolutional Auto-Encoder (CAE) and LSTM network to
categorization of ECG signals is now the de facto norm for learn representations and categorize data. CAE was used to
boosting ECG diagnosis speed and precision. With the compress the signal given into the LSTM classifier. To
development of AI technology, a multitude of ML guarantee a balanced distribution of data, researchers
algorithms are presently employed in ECG signal feature additionally utilized a CAE-based data augmentation
recognition, to ease the difficulties of manually processing technique. Above 90% accuracy in classification results
the huge volumes of data that comprise ECG signal shows that the sophisticated DL approach is appropriate for
characteristics. Recent studies are discussed in greater detail dealing with the problem.
below.
The research tries to solve the issues in speed
The authors of the paper [4] offer a novel method control of BLDC employed in EV with the help of the
for using ML to categorize ECG signals as one of sixteen above-mentioned journals (Part I). The mathematical model
distinct arrhythmia categories . The proposed approach is of BLDC is identified using the first principal method (Part
trained on 279 cardiac arrhythmia variables from the UCI II), The tuning techniques and their working are studied (Part
ML Repository dataset. By using Principal Component III), Evaluation parameters are detailed with mathematical
Analysis for dimensionality reduction and the Bag of Visual formula (Part IV), and the BLDC performance on various
Words methodology for clustering, the method assesses PID tuning is discussed (Part V) and finally conclude which
diverse classification methods and selects the best accurate PID tuning is optimal for BLDC speed control.
algorithm, Support Vector Machine. The author [5] develops
three robust deep convolutional neural networks (DCNN) II. M ET HODOLOGY
architectures to enhance the extraction of features for the An Automated System for arrhythmia detection
identification of arrhythmia and, as a result, significantly using ECG records is detailed in this section. The whole
increase performance measures: a simple CNN and two system is composed of three divisions, namely, data, pre-
Multi-Scale Fusion (MSF)-CNN structures (A and B). On process, and classification. In data division, the data
the publicly available MIT-BIH arrhythmia dataset, five collection is discussed and the splitting of data details is also
distinct signal categories are employed to train and evaluate shared. Next, in pre-process division, several techniques like
the proposed models. Six kinds of combustion procedures augmentation, normalizing, denoising, and feature extraction
are conducted to evaluate the models' accuracy. MSF-CNN are discussed. This helps to improve the signal quality and
structure A surpasses the simple CNN model. The study [6] enhance classification accuracy. Then, in the classification
developed a novel Deep Learning (DL) technique for ECG division, three different algorithms are discussed SVM,
signal categorization. Employing two suggested DL LDA, and NN. Finally, the best model with good accuracy is
techniques, the heartbeats are categorized into many identified. The workflow of arrhythmia detection using ECG
arrhythmia kinds. The first model derives information from records depicts in figure 2.
the ECG by combining a CNN and a long short-term

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 27


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 2. Workflow of arrhythmia detection using ECG records

3 RBBB 1651
A. Data
For this study, we investigated genuine ECG signals
from the MITDB [9]. The MITB contains roughly 48 hours
of records. Each file consists of the two-channel
ECG recordings of 47 individuals. Data is captured
automatically at a rate of 360 samples per second per
channel. Originally, this dataset was annotated with 16
unique rhythm categories. A total of five types of cardiac
4 PAC 2116
rhythms are chosen for investigation in this paper: Normal,
Left Bundle Branch Block (LBBB), Right Bundle Branch
Block (RBBB), Atrial Premature Beats (AP), and Premature
Ventricular Beats (PVC). The MITDB sample signal count,
signal type, and signal count are all listed in Table 1. In the
proportion of 7:2:1, the complete dataset is separated into
three parts: train, validate, and test.
5 PVC 3418
T able 1.ECG data details

Sl. Data ECG Count


No type
1 Normal 37528

B. Pre-process
The original ECG signal undergoes pre-processing.
2 LBBB 4126 After the Pre-Processing step is completed, the true features
of the ECG signals are computed. The steps followed before
the analysis of this study are detailed in greater detail below.

We used the first lead of each record across all


datasets to normalize the ECG signal into 0 and 1. This
technique moves the signal's amplitude's minimum (a) and
maximum (b) values to the range of your choice without
altering the signal's general pattern or structure [10]. The
data for this study were collected in the pre-process with the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 28


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
minimum limit set to zero and the maximum limit set to one. LBP have seen widespread use in 2D. The 1D-LBP
The arithmetic function of normalization for min-max developed by Chatlani et al. [12] is modified such that it can
normalization is as follows: be applied to the ECG. The central principle is represented
by micro-patterns, which are utilized to indicate the signal's
[1]
underlying texture. The signal structures are then calculated
where is the normalized signal, a and b are the by quantizing the 1xP neighbours surrounding the core spot
minimum and maximum limits, and and are the c. For every signal point, the resulting binary pattern is
data set's highest and lowest values. transformed into a decimal number. The fractional values are
then used to produce a histogram.
Almost all previous investigations have shown that
baseline elimination and high-frequency noise filtering are
used. Raw ECG data is processed with baseline removal to C. Classification
produce pre-processed ECG data. To determine the
underlying properties of the raw ECG signal, median filters For ECG classification three different algorithms
are used and their working is detailed in this section. An
are employed successively. The pure ECG is obtained by
SVM is a popular way to classify things in the field of
taking the raw ECG signal and removing the baseline noise.
supervised ML [13]. In approach, the SVM technique
classifies data by constructing a dividing hyper-plane in an
An example of data imbalance is the n-dimensional area (n - input features) that separates class
overrepresentation of one class in the training set relative to labels by maximizing the margin among the input
other classes. The larger group is referred to as the "majority sample mapped in a higher-dimensional area and
class," while the smaller group is referred to as the "minority reducing the observational misclassification rate.
class." Most data sets have skewed distributions in practice. SVM utilizes kernel functions to figure out. However,
The fraction of N-type heartbeats in the MITB is imbalanced, selecting a dependable kernel function remains problematic.
as seen in Table 1. The cost of incorrectly misidentifying the Assume we have training of N samples
minority (i.e., abnormal data) in clinical condition, which , where is the ith example's n-dimensional
would prolong the appropriate therapeutic time, is much feature, is the matching class label, and is the
greater than the cost of incorrectly misidentifying the y-coordinate of the jth feature. The decision function
majority categories (i.e., normal data). Moreover, the learned from the training sample may accurately predict the
majority of ML methods are based on the premise that the class label when applied to new data. The kernel is used to
training dataset is distributed uniformly. The SMOTE is the create the following decision function:
principal tool for resolving the investigation's inequitable
results. Chawla developed this well-known oversampling
approach in 2002 [11]. This method develops brand new (∑ )
synthetic minority samples rather than copying existing
minority samples. To generate simulated data, use the The purpose of linear discriminant analysis (LDA)
following equation. is to combine existing predictors to create a new variable. To
[2] accomplish this, we will widen the gaps between our newly
As an example, suppose we have an instance of the established categories. The idea is to add the predictor values
minority class represented by and an instance of the together to create a new composite value, the discriminant
score. To put it another way, the p-dimensional classifiers
majority class denoted by , and 's K-nearest neighbors
are combined into a line, resulting in an example of
are all chosen at random. Each vector element is a random
number in the range [0, 1], and it is used to build a synthetic excessive data dimension reduction. The final results should
indicate a normal distribution of discriminant scores within
instance based on two real-world examples, and , which
each class, with the greatest possible difference between the
are the primary and secondary reference instances,
means of the classes. In practice, the technique's
respectively. The creation of synthetic, which happens along
effectiveness can be determined by examining how much the
this line, is determined by the direction of the connecting line
distributions of the discriminant scores overlap. The form of
between and . Furthermore, it lowers the possibility of
a discriminant function computes discriminant scores.
overfitting.
[4]
It has previously been possible to use texture A discriminant score is thus a linear
information to categorize images and segment targets. mixture of the predictors, each with its weight. As a function
Because our signals are unidimensional, can either recover of the anticipated weights, the differences in mean
texture-based patterns from time signals or add frequency- discriminant scores between classes are maximized.
related data to such features to improve the classification Predictors with considerable variations in class means have
accuracy of arrhythmias. In the evaluation of temporal higher weights, while those with equal class means have
signals, we employ the 1D LBP feature extraction technique. lower weights [14].
To optimize the input signals, we leverage the second ECG NN are computer systems made up of a significant
lead, which has been experimentally demonstrated to provide number of simple, highly interconnected processing units
extra details on the heartbeat type that the selected that are intended to simulate the structure and function of the
classification can utilize to improve its performance. Because nervous system in humans (called nodes or artificial
of their strength and stability, texture descriptors based on neurons).The training methods used to teach NNs are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 29


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
thought to have been influenced by biological systems' collected from MITDB is not equally distributed, so the
learning rules. MLPNN will be used to create classification SMOTE is applied. The performance of the ML algorithm
algorithms in this research. An MLPNN's structure can have with and without augmentation technique is compared. Table
two or more layers. A two-layer ANN's only components are 2 details the performance of the LDA algorithm on
the input layer, which stores the problem's input variables, unbalanced and balanced ECG data. The accuracy of LDA
and the output layer, which saves the solution. This type of on unbalanced and balanced ECG data is 84.74% and
network is a decent approximation for linear issues. To deal 85.21%. Next to accuracy, specificity and sensitivity are
with the nonlinearity and complexity of the problem, extra taken. The result of specificity and sensitivity on unbalanced
intermediate (hidden) processing layers are used for ECG data is78.36% and 88.97%. And for balanced ECG
approximating nonlinear systems [15]. The complexity of the data, the values attained by LDA are 78.85% and 89.40%.
modelled function or process, on the other hand, can dictate The precision values of 86.12% and 86.52% are achieved by
how many hidden layers are required to map the target LDA on unbalanced and balanced ECG data. Last, the
function with any desired degree of precision. F1score is calculated and the value done is 87.52% and
87.94%. Next, the values are plotted using a line graph. The
LDA performance value on balanced ECG data is plotted in
III. M ODELEVALUAT ION orange and unbalanced in blue which is illustrated in figure
To design the best model for Arrhythmia Detection 3. The orange graph overhead the blue graph. This shows
using ECG records this research is carried on. First, the data that the SMOTE technique enhances the performance of the
is gathered, processed, and finally classified. The data ML model.
T able 2. LDA performance of arrhythmia detection

METRICS ACCURACY SPECIFICITY SENSITIVITY PRECISION F1-SCORE

UNBALANCED DATA + LDA 84.7461 78.3659 88.9721 86.12850082 87.5272

BALANCED DATA + LDA 85.217 78.8551 89.4058 86.52645416 87.9426

Fig. 3. LDA performance in Arrhythmia Detection

To compare how well the SVM algorithm does with achieves scores of 84.75% and 94.79% for normal ECG data.
balanced and unbalanced ECG data, see table 3. SVM's SVM can obtain precision values of 89.31% and 90.92%
accuracy is 88.34% on imbalanced ECG data and 90.95% on when applied to imbalanced and balanced ECG data,
balanced data. Accuracy is followed by a focus on specificity respectively. The final step is to determine the F1score,
and sensitivity. Precision and accuracy on imbalanced ECG which in this case yields a figure between 90.59% and
data are 82.75 % and 91.91%, respectively. SVM also 92.82%. Finally, a line graph is used to display the data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 30


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Figure 4 displays the SVM performance value for The yellow plot is located above the orange one. Evidence
unbalanced ECG data in orange and balanced data in yellow. that the SMOTE method improves ML model efficiency.

T able 3. SVM performance of arrhythmia detection

METRICS ACCURACY SPECIFICITY SENSITIVITY PRECISION F1-SCORE


UNBALANCED DATA + SVM 88.3497 82.755 91.9182 89.31247964 90.5966
BALANCED DATA + SVM 90.95 84.7594 94.791 90.92934437 92.82

Fig. 4. SVM performance on Arrhythmia Detection

In Table 4, we can see the differences in the NN data, respectively. The F1-score, which can be calculated
algorithm's performance on balanced and unbalanced ECG from steps two and three, is in the range of 92.15–93.81%. A
data. NN achieves 90% accuracy on skewed ECG data and line graph is then used to display the data. The NN
92.01% accuracy on normalized data. Specificity and performance value for the two types of ECG data is shown in
sensitivity are now prioritized over accuracy. Precision and red and cement, respectively, in Figure 5. The cement graph
accuracy on imbalanced ECG data are 84.84% and 93.02%, is superimposed on the red one. Support for the claim that
respectively. NN gets between 87.87% and 94.32% accuracy ML model efficiency is enhanced by employing the SMOTE
with normal ECG data. NN can reach 91.30% and 93.31% methodology.
accuracy when applied to imbalanced and balanced ECG

T able 4. NN performance of arrhythmia detection

METRICS ACCURACY SPECIFICITY SENSITIVITY PRECISION F1-SCORE


UNBALANCED DATA + NN 90.0082 84.8418 93.0263 91.30850048 92.1594
BALANCED DATA + NN 92.0147 87.8788 94.3222 93.31019249 93.8135

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 31


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 5. NN performance on Arrhythmia Detection

Then the analysis helps to know the importance of T echniques. J. Clin. Med. 2021, 10, 5450. https://doi.org/10.3390 /
jcm10225450
data balancing in accuracy enhancement. From the result, we
[2]. McNamara, K., Alzubaidi, H., and Jackson, J. K. (2019).
found that the balanced data metrics value will be high for Cardiovascular disease as a leading cause of death: how are
arrhythmia detection. Next, the best model is identified by pharmacists getting involved? Integr. Pharm. Res. Pract. 8:1. doi:
comparing all three algorithms. The NN model with data 10.2147/IPRP.S133088
[3]. Yin, W., Yang, X., Zhang, L., and Oki, E. (2016). ECG monitoring
after SMOTE gives the highest accuracy. system integrated with IR-UWB radar based on CNN. IEEE Access
4, 6344–6351. doi: 10.1109/ACCESS.2016.2608777
[4]. P. Shimpi, S. Shah, M. Shroff and A. Godbole, "A machine learning
IV. CONCLUSION approach for the classification of cardiac arrhythmia," 2017
International Conference on Computing Methodologies and
Major global health concerns include cardiovascular Communication (ICCMC), 2017, pp. 603-607, doi:
disease. The ECG is indispensable in the early detection of 10.1109/ICCMC.2017.8282537.
cardiac arrhythmia. Manually diagnosing arrhythmias, which [5]. H. Dang, Y. Yue, D. Xiong, X. Zhou, X. Xu and X. T ao, "A Deep
Biometric Recognition and Diagnosis Network With Residual
are abnormal changes of the normal heart rhythm, take a lot Learning for Arrhythmia Screening Using Electrocardiogram
of time and relies on the expertise of clinicians. Visually Recordings," in IEEE Access, vol. 8, pp. 153436-153454, 2020, doi:
identifying the ECG signal is difficult and time-consuming 10.1109/ACCESS.2020.3016938.
[6]. E. Essa and X. Xie, "Multi-model Deep Learning Ensemble for ECG
because experts in the medical field are so scarce. Detection Heartbeat Arrhythmia Classification," 2020 28th European Signal
of arrhythmias using ML is performed to address this issue. Processing Conference (EUSIPCO), 2021, pp. 1085 -1089, doi:
We have processed the ECG data we obtained from MITB to 10.23919/Eusipco47968.2020.9287520.
remove noise. First, the signal is balanced using the SMOTE [7]. V. V. Priya, M. Santhiya, P. Subadharshini and S. P. M. Vasini,
"Classification of Arrhythmia Disease using Machine Learning
processing technique, then the signal is normalized and
T echniques," 2022 6th International Conference on Computing
denoised to remove noise, then LBP feature extraction is Methodologies and Communication (ICCMC), 2022, pp. 1042-1046,
applied to retrieve relevant features, then a classification doi: 10.1109/ICCMC53470.2022.9753718.
model is used to detect arrhythmias from an ECG, and [8]. M. Barišić and A. Jović, "Cardiac Arrhythmia Classification from 12-
finally, the model is validated so that the most effective lead Electrocardiogram Using a Combination of Deep Learning
Approaches," 2022 45th Jubilee International Convention on
method can be selected. As can be seen from the results, the Information, Communication and Electronic Technology (MIPRO),
NN model trained on SMOTE data produces superior results, 2022, pp. 1489-1494, doi: 10.23919/MIPRO55190.2022.9803539.
with an accuracy of 92.01%, a specificity of 87.87%, a [9]. Moody, G.B.; Mark, R.G. MIT -BIH Arrhythmia Database. 1992.
Available online: https://physionet.org/content/mitdb/1.0.0/ (accessed
sensitivity of 94.32%, and a precision of 93.32%, and an F1- on 5 February 2020).
score of 93.81%. [10]. Yang, Meixue& Liu, Bin & Zhao, Miaomiao& Li, Fan & Wang,
Guoqing& Zhou, Fengfeng. “ Normalizing Electrocardiograms of
REFERENCES Both Healthy Persons and Cardiovascular Disease Patients for
[1]. Sraitih, M.; Jabrane, Y.; Hajjam El Hassani, A. An Automated Biometric Authentication”. PloS one, vol. 8, pp. e71523, doi:
System for ECG Arrhythmia Detection Using Machine Learning 10.1371/journal.pone.0071523.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 32


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
[11]. Chawla, Nitesh & Bowyer, Kevin & Hall, Lawrence &Kegelmeyer,
W, “ SMOT E: Synthetic Minority Over-sampling T echnique,” J.
Artif. Intell. Res. (JAIR), vol. 16, pp. 321-357, 2002, doi:
10.1613/jair.953.
[12]. N. Chatlani and J. Soraghan, “Local binary patterns for 1 -D signal
processing,” in Signal Processing Conference, 2010 , pp. 95-99
[13]. Kumari, C.U.; Murthy, A.S.D.; Prasanna, B.L.; Reddy, M.P.P.;
Panigrahy, A.K. “ An automated detection of heart arrhythmias using
machine learning technique: SVM”. Mater Today Proc, vol. 45, 2020,
pp. 1393–1398
[14]. Fielding, A. H. “ Cluster and classification techniques for the
biosciences”, 2007, Cambridge, UK: Cambridge University Pres, doi:
10.1017/cbo9780511607493
[15]. Basheer, Imad&Hajmeer, M.N, “ Artificial Neural Networks:
Fundamentals, Computing, Design, and Application”. Journal of
microbiological methods, vol. 43, pp. 3-31, 2001, 10.1016/S0167-
7012(00)00201-3.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 33


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Multicore ECU-Based Automotive Software Domain


Combining Runnable Sequencing and Task Scheduling
K.Suganyadevi Dr.V.Nandhalal N.Thiyagarajan S.Dhanasekaran
Assistant Professor(Sl.Gr), Professor, Research Scholar, Assistant Professor(Sl.Gr) ,
Department of Electronics and Department of Electronics and Department of Electronics and Department of Electronics and
Communication Engineering communication Engineering Communication Engineering Communication Engineering
Sri Eshwar College of Sri Krishna College of Sri Eshwar College of Sri Eshwar College of
Engineering Engineering and Technology, Engineering Engineering
Coimbatore, Tamilnadu, IN. Coimbatore, Tamilnadu, IN Coimbatore, Tamilnadu, IN. Coimbatore, Tamilnadu, IN.
sugan.er.sd@gmail.com . nandakct@gmail.com thiyaguec@gmail.com dhanasekaran.s@sece.ac.in

Abstract
Research on multicore architecture for automotive The Introduction of multi-core architecture has
safety applications is the aim of the ECU group in order to
given this issue contemporary significance. The most
adhere to strict speed and reliability requirements for real-
time embedded systems. The architectural methodology used common metrics used to compare various scheduling
by the automobile industry to create car electronics systems strategies are the make span, processor utilization, cache
has to be changed. by incorporating more functionalities into a quality, energy usage, load balance, planning constraints,
smaller number of ECUs (Electronic Control Unit). In and transition price. [1]. Some of its primary advantages
Software applications, the design, improvement, and over competing technologies include electrical isolation of
substantiation are more complex due to these new inputs and outputs, multiple Controller Area Network (CAN)
characteristics. As a result, producers in the automotive sector buses, two CAN buses, a serial port, outputs with current
need effective tools and design approaches to meet their feedback, and a cheaper total cost. Validation tests were run
objectives in a variety of areas. With the intention of uniformly
to ensure that all functionality was present. To evaluate the
distribute the CPU burden with respect to time, the challenge
of sequencing an unlimited number of runnables on a finite ECU's performance in a real-world working environment, an
number of different cores are addressed in this work. electric car simulator was also created [9]. The black box
Additionally, for both synchronous and asynchronous technology improves the development of longer-lasting,
workloads, runnables offset will be calculated issued on each safer vehicle transportation, which boosts the care given to
core using the Engine RPM. Furthermore, it effectively collision victims. With the use of a car black box system, the
exploiting Intertask communication between many Multicore fatality rate can be decreased. The system logs the vehicle's
ECUs to speed up the many runnables execution. In order to primary driving information and uses LabView software to
overcome timing constraints on run time, the TIMMO-2- evaluate the incident. This allows for a quick and accurate
USE (TIMing MOdel - TOols, Languages, Algorithms, USE
Cases, and Methodology) project is really putting its actual
analysis of the accident following a collision [2]. Long time
research on time modeling and analysis for embedded shutting down the vehicles creates unsophisticated
automotive systems to use. environment inside the vehicle for drivers [18]. The actual
Index terms: Automotive, Scheduling, software update is included in a delta file, which is used in
Runnables, TIMMO2-USE (TIMing MOdel - TOols, the proposed design. The software modules that require
languages, algorithms, USE cases, and methodology), updating are launched from this delta file, which is stored in
Load matching. the expanded RAM. The module is updated in the current
programme after being successfully executed from the delta
I. INTRODUCTION file. The suggested ECU design enables owners to enjoy
significant car functions while updating their ECUs [6].
In the automotive industry, the usage of Major tasks in the automotive industry include improving
multisource software on a single electronic control unit security features and upgrading the ECU software. The time
(ECU) is becoming more and more common. This required to update the ECUs increases as the number of
circumstance is one of the main reasons why automakers improvements rises. The amount of the data update affects
aim to decrease the scores of ECUs, which augments to how long it takes to update the programme. This document
about 70 for advanced model in automobiles. A significant provides an overview of ECU reprogramming, as well as
area of research in high speed computing is multiprocessor information on various reprogramming techniques, the delta
job scheduling. It is an NP-Complete issue to determine the reprogramming method and its benefits, and ECU
best way to distribute a collection of real-time jobs that may communication [3].The "Each ECU performs single
be given to processors without going over the allotted time. function" representation to more centralized architectural

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 34


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

designs will be made possible by the Architecture II. AUTOMOTIVE PLANNING AND
(AUTOSAR) programme and, in particular, its operating ALLOCATION
system (OS)[5]. Another significant problem facing the
automotive sector is that chip manufacturers are no longer in 2.1 Mechanism for Scheduling
a position to cost-effectively match the rising performance High performance computing main research focus
demands through frequency scaling alone. This circumstance is multiprocessor task scheduling. A set of software
is one of the factors influencing the gradual use of Multicore modules called as runnable should be distributed and
ECUs in the automobile industry. By running on several assigned on each processor at run time in order to steadiness
cores where the software formerly ran on multiple ECUs, the workload on the CPU without exceeding the deadlines.
Multicore architectures' greater degree of performance may To prevent run-time issues, runnables are assigned
contribute to the simplification of in-vehicle systems. explicitly (i.e., by dividing up) on each separate core.
Automobile manufacturers may exploit this potential shift
toward more centralized designs as an opportunity to reduce 2.2 Priority-Based Fixed Scheduling
the scores of network associations and buses. Therefore, A task's priority is specified once and never altered
some of the complexity that was formerly a part of the while utilizing fixed-priority scheduling. For scheduling
electrical/electronic architecture will be incorporated into the systems with recurring workloads on comparable
ECUs [4]. However, a functionally accessible ECU may multiprocessors, a novel fixed-priority method is suggested.
easily add new features thanks to fixed priority preemptive On processors with m units of capacity, this computation
scheduling. In reality, generalist auto manufacturers' markable use is (m+1)/2. Because no fixed-priority
widespread usage of ECUs and accessible sub networks technique for scheduling periodic task systems on
makes it difficult to make necessary architectural changes. In comparable multiprocessors can have an actual utilization
order to accomplish effective product development in greater than (m+1)/2, this approach is the best one that can
software firms, a hybrid ant colony optimization model for be devised in terms of achievable utilization [8].
dependable software automation is needed.[14].
Conventional cars produce greenhouse gas emissions and 2.3 Preemptive scheduling with preset priorities
contribute to environmental pollution in the transportation Resources are distributed among parties making
sector [20]. The renewable energy allocation vector is concurrent and asynchronous requests for them using
obtained via the best time constraint method, which lowers algorithms employed in scheduling fields. Scheduling
energy costs for each BS during each time slot [21]. algorithms are mainly made to avoid resource shortages
The combinatorial issue of selecting offsets has a and to guarantee impartiality among the parties using the
substantially smaller search space according to the sources. Scheduling helps to overcome the challenges of
Audsley's priority assignment [16]. Integer linear calculating the appropriate demand for their resource.
programming (ILP) is used to solve lesser issues of the NP- The automotive industry uses a wide range of scheduling
complete optimum memory mapping problem, while algorithms. In this case, fixed priority preemptive
heuristics are used to practically solve larger ones. Our flash scheduling is used. Every method has a defined priority
memory mapping approaches cut runtime by up to 8.73% rank determined by the operating system, and the
when caches are deactivated and by up to 2.76% when scheduler prioritizes the processes before adding them to
caches are enabled, according to tests on dual-core ECU the ready queue. Lower priority processes that are
hardware. In addition, the advantage of using the ILP arriving are halted after higher priority processes. Both
method for RAM is 50.48% more than using global RAM to overhead and its importance are present. FPPS does not
store all the variables [12]. The real outcomes of the typically outperform FIFO scheduling in terms of
TIMMO-2-USE project, a temporal modeling and analysis throughput. Any runnables waiting and response times
effort for embedded automotive systems. One outcome is are based on the process's priority. Waiting and response
the Timing Augmented Description Language (TADL2), times are acceptable for higher priority operations. The
which has the ability to represent symbolic time preemptive process scheduling algorithm is called Round
expressions, provide probabilistic timing data, and apply Robin. Each process is given a set amount of time to do
timing restrictions to mode definitions [13]. The project's its work, known as a quantum. Once a process has run for
primary objectives, namely the development of novel a predetermined amount of time, it is preempted and
languages, algorithms, tools, and a methodology for the another process runs for the remainder of that time. State-
development of automotive embedded systems that is saving for preempted processes is accomplished by
supported by use cases, are encapsulated in the acronym context switching.
TIMMO-2-USE, which expands TIMing MOdel - TOols, The focus of this study is on fixed priority
languages, algorithms, USE cases, and methodology. By proactive scheduling tasks in real-time systems with strict
offering suitable protective mechanisms, the Automotive constraints. We focus more on offset-free tasks where the
Open System gives better performance. The round robin scheduling protocol can choose the offset. A task
scheduling as part of an integrated task scheduling and SPM assignment with number of occurrences n, equal to T1,
partitioning strategy to speed up the execution of embedded T2,... Tn, defines the system model. Every Ti requests,
programmes [19]. referred to as instances, have relative deadlines Di and Ci

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 35


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for their execution. Which together make up the quadruple and operating systems. Many people now consider the
(Ci.Ti,Di,Oi) that characterises a periodic task T1. Two OSEK/VDX operating system to be the open standard. This
consecutive instances of Ti are separated by Ti time units standard was created primarily to prevent incompatibility
(hence Ti is the task's duration in time.). At time Oi, Ti issues between the application code and the hardware and
appears for the first time (the task offset in the following). If divorce the application code (algorithm) from network
every instance completes before its deadline, the system is management responsibilities. The use of OSEK/VDX
said to be schedulable. It follows that the system can be should make software more portable, reused, and capable of
planned in all asynchronous circumstances if it can be conventional system performance. It is projected that the
scheduled in synchronous circumstances and decides on a OSEK operating system will soon be used in the automobile
practical offset from the engine's rpm [7]. To properly load sector.
balance a system, this is usually done.
3.2 TIMMO-2-USE
Functionality timing restrictions cannot be
adequately defined by deterministic timing constraints. To
provide the ability to express and test probabilistic temporal
restrictions, this use case aims to enhance the TIMMO-2-
Fig 1. The Runnables' model. USE language, methodology, and tool environment with
An instance of a runnable must be used up after it fixed priority proactive scheduling. It must be feasible, in
has been released in order for the subsequent instance to particular, to characterize the probabilistic temporal
be released (i.e., the timeframe is the deadline.) are characteristics of events and event chains. For instance,
shown in the figure 1. An algorithm for scheduling must 99% of the time, an event chain’s end-to-end latency must
be able to multitask (run many processes at once) and be less than 10 ms [13]. Of course, existing techniques and
multiplex (transmit numerous flows simultaneously) with tools for temporal constraint analysis need to be modified.
a discernible success rate [7]. For instance, the schedulability test can’t only give a result
of true or false. The response should be probability of the
III. ALGORITHM FOR ALLOCATING RUNNABLES schedulability.
3.1 Algorithm Intricacy
The increasing complexity of car electronic
systems has had a considerable influence on the speed
demands and peripheral connectivity of automotive
embedded systems. The outputs of several actuators are
controlled by algorithms, which manage the inputs from
numerous sensors and communications networks. An OS
operation called process scheduling arranges processes in
various stages, such as ready, waiting, and operating are
shown in the figure 2. An OS can assign a period of time for
each process’s CPU execution through process scheduling.
The fact that a process scheduling mechanism keeps the
CPU active at all times is another crucial benefit. You may
do this to get programmes to respond as quickly as possible. Fig 3. The Run Time Behavior
The application layer is separated from the core
programme by the Runtime Environment (RTE). It
implements the data interchange and manages the
application layer’s runtime behavior and prevent runtime
issues. Individual software components are used to
implement the automation framework of the ECU in the
application layer and are shown in the figure 3. The six jobs
that make up the TIMMO-2-USE Generic Method Pattern.
There are “Define Timing Requirements,” “Develop
Solution,” “Transform Timing Requirements,” “Find,”
“Analyze,” “Verify and Validate,” and “Timing Properties”
are all steps in the process. These tasks are generally carried
out at every level of abstraction. EAST- ADL. Each level of
abstraction is handled at the Analysis, Design,
Implementation, and Vehicle Administrative Levels since
Fig 2. The Scheduler Processes.
the TIMMO-ADL and the EAST-ADL. To define every
The majority of operating systems are developed
internally by application experts, however the industry is degree of abstraction by a step in usage. Actually, there are
swiftly moving toward standardized network architecture just two: The vehicle’s first start-up is the first exception.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 36


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

“Timing Requirements” is a formal, phased-in work product 4.2 Scheduling ECU performances for automobiles
that is inaccessible. The “Specify Timing” work during the Reaching the schedulability bound in both
operating phase Conditions at the completion of the second harmonic and non-harmonic instances is the goal. We
exception “is. No matter what process is presently running, measure the algorithm’s success rate precisely at load levels
the vital processes are permitted to access CPU when they to guarantee that it will work in harmonic circumstances as
enter the ready queue, making preemptive scheduling a well. The performances of algorithms are shown in the table
highly adaptable in TIMMO-2-USE algorithm as well. 1 and 2.
Typically, it maintains the ready queue and changes the
process’s ready status to running state and vice versa. PERFORMANCE OF ALGORITHM:
Preemptive scheduling is preferable to non-preemptive Table.1 Scheduling Performance
scheduling, and its effectiveness depends on how well CPU Hit rate of Processor
usage and average waiting times for processes are managed WCET=600µs
Algorithm Load in %
during scheduling. In order to forecast and assess risk, this
research suggested the DCNN-HAO (Deep Convolutional Hit rate % of LL 89 14
Neural Network-Hybrid Aquila Optimizer) technique [17]. Hit rate % of LP 92 14
Hit rate % of LPσ 93 12
IV. RESULTS Hit rate % of LC 96 11
Hit rate of
4.1 Performance Matching 98 9
TIMMO-2-USE
In this work, we assess how well the TIMMO-2-
USE algorithm for uniformizing CPU load function over
time, consistently providing the simplest answer even under Table.2 Time Modeling Response
extremely demanding load conditions and time response Time TIMMO-
from other algorithms like Least Loaded(LL), Least (µs) LL LP LPσ LC 2-USE
Peak(LP),. Least Peak sigma(LPσ) and Least Crowded(LC) T1 4.5 4.3 4.1 3.7 3.6
are shown in the figure 4 and 5 respectively.
T2 4.6 4.5 4.25 3.4 3.3
T3 5 4.6 4.1 3.2 2.8
Distribution of the load percentage with T4 5 4.4 4 2.8 2
Cores
15 CPU load in V.CONCLUSION
Load Percentage

10 %
Comparatively a single CPU that is constantly
5 Cores being developed faster, multicore CPUs provide higher
advances in computational capability. In order to achieve
0 this, we integrate more functions onto a single processor,
resulting in an effective sharing of Runnables throughout
the CPU during run time. Reducing the digit of ECUs gives
Algorithms us many more technical and financial advantages when
manufacturing new fashionable cars. The mission creates a
multicore ECU with high-performance that is capable of
Fig.4 Load Percentage with Cores carrying out multiple operations simultaneously without
encountering any conflicts between synchronized and non-
6 synchronized processes or offset issues.
Time Modeling Response
References
Response

4 LL
LP [1] ”A Survey on Real Time Task Scheduling” European Journal of
Scientific Research ISSN 1450- 216X Vol.69 No.1 (2012),
LPσ
2 pp.33-41 © EuroJournals Publishing, Inc. 2012 by G. Umarani
LC SrikanthA. P. Shanthi ,V. Uma Maheswari ,Arul Siromoney .
TIMMO-2-USE [2] “Design of Electronic Control Unit with Black Box for Ground
0 Vehicles”, Manojkumar Palanisamy; Dheepanchakkravarthy.
Azhagesan; Balaji Varadharaian; Sathish Kumar, 4th Biennial
T1 T2 T3 T4 International Conference on Nascent Technologies in Engineering
Time in µs (ICNTE),2021.
[3] “Automotive Electronic Control Unit Reprogramming Using
Delta Method-A Review“,Adithi Prasad; P. Shanthi,by Asian
Conference on Innovation in Technology (ASIANCON),2022.
Fig.5 Time Modeling Response [4] “Multisource Software on Multicore Automotive ECUs—

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 37


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Combining Runnable Sequencing With Task Scheduling” Authors Biographies


Aurélien Monot, Nicolas Navet, Bernard Bavoux, and Françoise
Simonot-Lion, 3934 IEEE TRANSACTIONS ON INDUSTRIAL
ELECTRONICS, VOL. 59, NO. 10, OCTOBER 2012.
[5] Multi-source and Multicore automotive ECUs – OS protection
mechanisms and scheduling” by Nicolas Navet, Aurélien Monot,
Bernard Bavou, Françoise Simonot-Lion ,ISIE2010. K. Suganyadevi Presently working as an Assistant
[6] “Network of ECUs Software Update in Future vehicles Professor in Electronics and Communication Engineering
“,Muhammad Hamza Sarwar; Munam Ali Shah; Muhammad
Umair; Syad Hassnain Faraz, 25th International Conference on department at Sri Eshwar College of Engineering, Coimbatore,
Automation and Computing (ICAC),2019. Tamilnadu, INDIA. Initially graduating in ECE department from
[7] “An Automotive Software Domain-Combining Runnables Maharaja Prithvi Engineering College, Coimbatore, Tamilnadu,
Sequencing with Task Scheduling on Multicore ECU’s”,
K.Suganyadevi , P.Mariaglenny,IJETT 2014.
INDIA and then M.E from Karpagam University, Coimbatore, and
[8] “Optimal utilization bounds for the fixed-priority scheduling of Tamilnadu, INDIA. Currently, Pursuing PhD in the area of
periodic task systems on identical multiprocessors” This paper wireless networks and communications under Anna University,
appears in:Computers, IEEE Transactions on June 2004,by Chennai, Tamilnadu, INDIA. Besides, 20 B.E projects supervised,
Baruah, S.K. Dept. of Comput. Sci., North Carolina Univ.,
Chapel Hill, NC, USA Volume: 53 , Issue: 6. Published 20 papers in reputed International Journals, 02 in
[9] “Arduino based Open Source Electronic Control Unit for Electric National Conference, attended 15 Workshops conducted by
Utility Vehicles“,Alexandre Francisco; Nuno Vieira Lopes; Luís various Institutes. Other responsibilities i.e. she acts as a Deputy
Conde Bento; Carlos Ferreira, XXIX International Scientific
Conference Electronics (ET),2020. IQAC head, Department Coordinator of NBA, NAAC and
[10] “Automatic generation of tests for Inter-ECU communication for Governing Council of SECE.
automotive systems”, Ognjen,Veljko,Velibor Bogdan
Pavkovic, 2019 27th Telecommunications Forum (TELFOR).
[11] “Constructing ECU Software Architecture Based on OSEK”,
Shourong Lu, Qichun Jin, 2019 4th International Conference on
Mechanical, Control and Computer Engineering (ICMCCE). Dr. V. Nandalal is currently working as Professor in
[12] “Techniques for Memory Mapping on Multi-Core Automotive Department of Electronics and Communication Engineering, Sri
Embedded Systems”, by Rakshith Amarnath on 8 th june Krishna College of Engineering and Technology, Coimbatore. He
2020. received his B.E. degree in Electronics and Communication
[13] The TIMMO-2-USE project: Time modeling and analysis to use Engineering in University of Madras, Chennai, India and M.E.
M-A Peraldi-Frati, D. Karlsson, A. Hamann, S. Kuntz, J. degree in Anna University, Chennai, India and PhD degree in
Nordlander, https://www.researchgate.net/publication/266524600. Anna University, Chennai, India. His current research interests
[14] Shakya, Subarna, and S. Smys. “Reliable Automated Software
Testing Through Hybrid Optimization Algorithm.” Journal of
include Wireless Communication, Antenna and Wave Propagation,
Ubiquitous Computing and Communication Technologies Advanced Microwave Circuit and Systems. He is having 16 years
(UCCT) 2, no. 03 (2020): 126-135. of experience in teaching and published 63 papers in the reputed
[15] Manoharan, Samuel. “Image detection classification and Journals, He is Recipient of “Raj Ramachadra Award” He is a
recognition for leak detection in automobiles.” Journal of Professional member of IEEE, IEICE.
Innovative Image Processing (JIIP) 1, no. 02 (2019): 61-70.
[16] “Near-optimal fixed priority preemptive scheduling of offset free
systems by Mathieu grenier,joel goossens,Nicolas navet,Loria
Inria campus scientific B9239 54506 Vandoenvre-les-nancy-
france. N.Thiyagarajan is Full Time Ph.D research scholar in
[17] “Risk prediction model and classification of various hazards in
the ECE Department of Sri Eshwar College Of Engineering,
automobile industry using HAO based deep CNN”, Anbarasu
Jaganathan* And Karthikeyan Mathesan, Indian Academy of
Coimbatore. He has 11 years of experience in the Teaching field as
Sciences,2022. Assistant professor in various reputed institutions. He has
[18] “Embedded Monitoring of covellar carbon monoxide detection published 5 papers in reputed journals.
and air freshening in air trained
automotives”,S.Karpagam,C.Selvarj,PK Shyam
sundar,N.Balaganesh,K.Soundarya,U.Ramani.,ICCESS 2022. Dr. S. Dhanasekaran received his BE degree in
[19] “An Efficient Heuristic to Task Scheduling and Memory Electronics and Communication Engineering in 2008
Partitioning for Multiprocessor System-on-Chip”, K.Suganyadevi, from Sri Balaji Chock lingam Engineering College,
Mariaglenny P International Journal of Engineering Science and Arani, Tamil Nadu, India. He completed his ME in
Innovative Technology (IJESIT) Volume 3, Issue 2, March 2014. Communication Systems in 2010 from PSG College of
[20] “Design and Implementation of Hybrid PV/Battery-Based Technology, Coimbatore, Tamil Nadu, and India. He completed
Improved Single-Ended Primary-Inductor Converter-Fed Hybrid
his PhD in the year 2022 from Anna University Chennai in the
Electric Vehicle”, Aljafari, B., Devarajan, G., Arumugam, S.,
Vairavasundaram, I., (2022) International Transactions on area of Communication systems, MIMO, OFDM, etc., He is
Electrical Energy Systems, 2022, art. no. 2934167, currently working as a Assistant Professor in the department of
[21] “On reducing energy cost consumption in heterogeneous cellular Electronics and Communication Engineering, Sri Eshwar College
networks using optimal time constraint algorithm, Kalpana, V., of Engineering, Coimbatore. He has around 12 years of teaching
Mishra, D.K., Chanthirasekaran, K., Haldorai, A., Nath, S.S., experience. He is a life time member of ISTE.
Saraswat, B.K., (2022) Optik, 270, art. no. 170008,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 38


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Analysis of Coagulation Effect in Veins using MEMS


Laminar Flow for Early Heart Stroke Detection
T.Vasudeva Reddy1 R.Anirudh Reddy2 P.Kavitha Reddy3 Anisha Reddy4
B V Raju Institute of Technology B V Raju Institute of Technology B V Raju Institute of Technology B V Raju Institute of Technology
Narsapur,Medak dt,Telangana Narsapur,Medak dt,Telangana Narsapur,Medak dt,Telangana Narsapur,Medak dt,Telangana
vasu.tatiparthi@bvrit.ac.in anirudhreddy.r@bvrit.ac.in kavithareddy.p@bvrit.ac.in aneesha.c@bvrit.ac.in

Abstract—In the recent past researchers are working on sensor by the functionality. Performance of the design depends
different designs of biomedical equipment to measure various on the accuracy of the inputs applied to laminar flow. The
health parameters. People are more stressed due to their routine concept of coagulations is measured by MEMS module at the
lives due to their work environments. Therefore, they suffered second stage of heart attack by placing MEMS with stent. As the
with health issue such as heart stroke and so on. This research size of stent is also in millimetres[3-4]. it is feasible to attach the
article designated in the article is to design an electronic model to MEMS sensor with the stent.
measure health parameters. Pressure and velocity across the veins
are treated as inputs and their respective results as outputs. While II. DESIGN OF VEINS BASED MODEL
veins are expanding and contrasting when pressure and velocity of
the blood is varied, this is due to stress and exercise etc. The major a. Laminar flow in veins analysis:
parameters in detecting the laminar flow are pressure and The detailed description of flow analysis is explained for a
velocity. The primary objective is to model a veins in different single vein in laminar flow in fig 1 with the straight veins
shapes. Second objective is to analysis of flow measurements structure. At inlet (position1) pressure is more comparatively
pressure and velocity of blood cross it. The third objective is to than the outlet (position 2). pressure applied at the inlet 1 is 0.09
detect blockages of artery due to fatty and cholesterol containing
Pascal’s and this pressure goes on decreasing to -5.48 x 10-3
deposits build up over time. The final objective of the design is to
Pascal’s at outlet.
describe the working principal of digital stethoscope and wrist
band to measure the health parameter of heart through blood
pressure. Digital Stethoscope principle depends on piezoelectric
effect, generates electrical signal when pressure is applied from
veins of the body. Accuracy, functionality, and Performance of the
design can be analyzed using COMSOL Multiphysics. MEMS is
used in real time applications to alert heart stroke, Bionic eye and
automotive electronics etc.

Keywords— Laminar flow, coagulation. MEMS, Piezoelectric


effect, IDT. Fig.1 Pressure measurements

I. INTRODUCTION
Most of the environments now a days are highly pressurized
to get the most effective throughput. Due to this, many young
working professionals are ill-health in their early stages, which
leads to heart stroke in the long run. Micro electromechanical
system (MEMS) is a miniaturized device with a combination of
electronic features inbuilt on a mechanical structure. The
primary functionality of MEMS can act as a switch and can also
perform as a transducer. The MEMS sensor consists of a mass
suspended between two capacitive plates, where the suspended
mass makes a difference within the electric potential. The size
of MEMS ranges from micro to millimetres [1]. The advantage
of MEMS sensor model is tiny in size and applicable for all types Fig.2 Velocity measurements
of portable and consumable applications. Some of the other
applications that includes flow measurement, heartbeat, blood
pressure etc. The values across the veins operated under different
degrees from the designed model. Simulation and verified under
laminar flow and analysis of the design being done useful alert
in case of heart stroke[2]. Pressure and velocity of veins are
analysed by incorporating valves across the veins. Laminar flow
of blood in veins are captured by MEMS-based piezoelectric

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 39


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 2 describes the blood pressure across the vein. Under Partially open path:
high pressure, velocity is more at centre than the outer surface a. L-Type veins analysis -Fully open in L-Shape:An L-
of walls of the vein. Fig 3 indicates the velocity measurement shaped Vein is taken for analysis, changes in pressure for 50%
of internal view of blood inside the veins.
open state. The changes that happen when blockages occurs are
shown below.

Fig.3 Velocity view at inlet

Fig. 6 L-type velocity analysis

Fig.4 L – type pressure analysis


Velocity at different places are indicated in the above Fig 3.
Velocity is more at the center than at the boundaries of the
model. For the pressure applied the velocity is 0.07m/s at the
center of the model and 0.01m/s at the boundaries as a least Fig.7 Two blockages pressure measurement
value.
III. LAMINAR FLOW IN DIFFERENT VEINS Velocity of simulation results showed in fig 5. Where the
velocity remains more at center and less at the boundaries. As
The geometric models have been used at different places
it is a laminar flow the velocity is same after the cross section
with different open stages like 50% open and fully open.
Pressure and velocity of the blood in veins change, when any also.
cholesterol formed [5].
b. analysis
The Pressure changes can be clearly seen in Fig 4 at the bending
point. At that point the pressure can be observed as 0.05108
Pascal’s, which is less than the pressure applied at the inlet. The
L-shaped pipe with two blockages has been show and the change
in colour indicates that there is change in the pressure or velocity
as showed in simulation results showed in fig 5. Where the
velocity remains more at centre and less at the boundaries. As it
is a laminar flow the velocity is same after the cross section also.

Fig. 5 velocity analysis at different positions

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 40


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

When a path changes due to change in type, the pressure will At the boundaries the velocity is less, than at the center and it
also get affected [6].The velocity increases when a blockage could change only when any coagulation occurs in middle of
comes in the middle of laminar flow of blood inside the vein. the flow.
The changes that happened when a vein is fifty percent closed is
clearly visible in the Fig 7. Red marked colour indicates in Basic design of U-typed veins with two blockages in the path.
increased velocity. The above design is the view before mesh analysis and it’s the
view after the geometry has got finished. The pressure applied
was 0.09 Pascal’s at the inlet but when a coagulation makes a
disturbance to the flow, the pressure decreases as showed in
Fig.10

Fig.8 fully open path pressure measurements


b. U-type analysis in laminar flow: Fully open
In u-typed vein the pressure gets decreased at the bending side
and becomes more at the outlet. This shows that the pressure
can be analyzed even when there is change in shape of vein also. Fig.11 Velocity measurements in u-type

Fig.9 Velocity measurements u-typed vein

Fig.12 Divisional flow pressure measurements

As both velocity and pressure are inversely proportional [7]. So,


when Fig10 and Fig 11 are compared, we get to know that at
the blockage point the pressure is decreasing but whereas
velocity is increasing a little bit at the blockage point.
Design of one inlet two outlet pipe:
The division point makes the pressure reduced, so at both the
outlets the pressure gets decreased to 0.0557 Pascal’s.

Fig.10 Pressure measurements in U-type

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 41


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

reversed. These electrical signals are used to detect the


conditions orabnormality of patients when he suffers with the
heart stroke. The above analysis is totally related to the
workingprincipal of the wristband and a digital stethoscope [13-
14]

Fig.13 Divisional flow of blood velocity

The Velocity in the Fig 13 is more at the center of the inlet but
when a division of the path happened the velocity got reduced.
The main reason for the velocity to reduce is breakage of flow
due to division in path.

IV. PIEZOELECTRIC EFFECT


The functionality of the piezo electric transducer is convert the
pressure into electrical energy. The capacity of certain materials
to create an electric charge in response to mechanical stress is
known as the Piezoelectric Effect [8-9]. The piezoelectric effect Fig.16 Wrist Band
is reversible, which means that materials that exhibit the direct
piezoelectric effect [10]. Opposite piezoelectric effect is also
possible i.e. generation of stress or achostistics when an electric
field is applied. We can create devices that generate and
produce acoustic sound waves by using the inverse piezoelectric
effect [11].

Fig.17 Wrist Band and as sensing element


Fig 17. Describes the wrist watch consists of piezo electric
sensor which absorbs the pressure from the veins, due to the
coagulation effect. The description of the coagulation effect is
Fig.14 pressure applied on piezoelectric material
as showed in the analysis of veins design [15]. The final
The pressure from the veins are applied as input to the MEMS
electrical response is obtained from the piezo sensor
piezoelectric sensor [12].
When a piezoelectric materialis subjected to mechanical stress,
the positive and negativecharge centers in the material change,
resulting in an external electrical field. An outside electrical
field stretchesor compresses the piezoelectric material when it is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 42


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

pressure Open Min


Pressure pressure Open Max
100%

50%

0%
Free path L U T

-50%
Fig.20 Velocity at open-end veins.
Fig.18 Electric potential (V) Principal stress
TABLE 2. VELOCITY OF BLOOD PRESSURE

Velocity
open Half close
Veins
Model Min Max Min Max
Free Path 0 0.35 0 0.012
L 0 0.004 0 0.009
U 0 0.0025 0 0.003
T 0 0.0012 0 0.001
Fig 20 describes the pressure measurement at open state
Fig.19 Diastole and Systole for checking inflation values of minimum and maximum for different shapes of the
nerve. Each model is evaluated using comsol Multiphysics.
V. Results & Analysis COMSOL is a Multiphysics simulation tool that is used to
TABLE 1. BLOOD PRESSURE AT DIFFERENT SHAPES OF VEINS evaluate the performance of the design. There is a maximum
pressure at the output node and especially in free path and T-
Pressure shaped model, when compared with other type’s paths.
Open Half close Coagulation effect of veins can be easily identified by blood
Veins velocity, when the shape of the veins are straight and T-shaped
Model Min Max Min Max with laminar its flow detection.
Free path 0.36 19.56 -0.022 19.56 CONCLUSION
L 0.00106 0.09609 -0.0067 0.09609
The Variation in the colours indicates that there is change
U 0.00153 0.09577 0.000404 0.09577 in the pressure and velocity values. These parameters
T 0.00098 0.095706 0.000981 0.00846 provide scope to analyse blockages in veins. The results
gained by simulating different models of the veins are very
close to the real time applications. This research work gives
an advantage in making the real-time analysis of heart and
blood pressure using MEMS. MEMS is an
electromechanical system which has a Gel that protects it
from liquid damages. The piezoelectric effect principal that
has been proved using COMSOL Multiphysics will help in
making a digital stethoscope and a wristband, which is
different from the regular reflecting stethoscope.
REFERENCES
[1] Neeraj, Meenakshi Nawal, Mahesh Bundele, “Pressure and Velocity
Measure in the Pipeline for Leak Detection using COMSOL
Multiphysics”, International Journal of Recent Technology and
Engineering,Volume-9 Issue-1, May 2020
[2] M.A. van Iersel,” Analysis of flow patterns and interface behavior
in simulations of immiscible liquid-liquid two phase-flow in micro
Fig.19 pressure at open-end veins

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 43


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

channels using the conservative level set method”, Delft University


of Technology Faculty of Applied Sciences, June 2019
[3] Hoai Nguyen, Thang Hoang, “Numerical Simulation of Laminar
Flow Through a Pipe using COMSOL Multiphysics” International
Journal of Scientific & Engineering Research, Volume 8, Issue 6,
June-2017.
[4] S. Zhuang, CAEaid, Inc., Austin, TX, USA, “Modeling and
Simulation of Control Valves via COMSOL Multiphysics”,
Proceedings of the COMSOL Conference in Boston 2017.
[5] S. S. Raza, “analysis of a fully developed laminar flow b/w two
parallel plates separated by a distance by using comsol
Multiphysics” department of metallurgy and materials engineering,
ceet, University of the Punjab, Lahore, Pakistan, January 2017.
[6] Metin Bilgehan Turgay,” Numerical simulation of fluid flow and
heat transfer in a trapezoidal microchannel with COMSOL
Multiphysics”. An International Journal of Computation and
Methodology, ISSN: 1040-7782, December 2017.
[7] R. Sugunakar Reddy, Gupta Payal, Pugalenthi,” Pressure and Flow
Variation in Gas Distribution Pipeline for Leak Detection”, Energy
Research Institute Nanyang Technological University Singapore,
2016.
[8] Kwon, Hyun J., “Use of COMSOL Simulation for Undergraduate
Fluid Dynamics Course” American Society for Engineering
Education, 2012.
[9] Johann F. Osma, Alba Avila, “Velocity and Pressure analysis for
micro channel networks” Universidad de los Andes (CMUA)
Bogotá, Colombia, 2010.
[10] Sharean, TM Angelin Monisha, and G. Johncy. "Deep learning
models on Heart Disease Estimation-A review." Journal of Artificial
Intelligence 4, no. 2 (2022):122-130.
[11] Venkata ranganathan, A. V., R. J. Hariharan, and M. Roopa. "A
Non-invasive Diagnosis of Early Stage Diseases through human nail
using Neural Networks." ournal of Artificial Intelligence 4, no. 1
(2022): 80-86.
[12] Nashif, S., Raihan, Md.R., Islam, Md.R. and Imam, M.H. (2018)
Heart Disease Detection by Using Machine Learning Algorithms
and a Real-Time Cardiovascular Health Monitoring System. World
Journal of Engineering and Technology, 6, 854-873.
[13] Shaidakov EV, Rosukhovsky DA, Grigoryan AG, Bulatov VL,
Ilyukhin EA. [Antegrade diastolic blood flow and classic reflux in
varicose dilatation of the intersaphenous vein]. Angiol Sosud Khir.
2016;22(2):101-8. Russian. PMID: 27336341.
[14] S. Fournier1and E. Chappel, Modeling of a Piezoelectric MEMS
Micropump Dedicated to Insulin Delivery and Experimental
Validation Using Integrated Pressure Sensors: Application to Partial
Occlusion Management,ISSN - 1687-725X.
[15] Richards, Haley; Closson, Andrew; and Zhang, John XJ, "Design
and Analysis of a Piezoelectric Pulse Wave Velocity Sensor"
(2020).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 44


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Reviewing the Role of Fiber Bragg Grating


Temperature Sensors in Smart
Factories:Opportunities and Challenges

Paul Stone Macheso1,2∗ , Mohssin Zekriti1


1
Euromed Research Center, Euro-Mediterranean University of Fes, Fes, Morocco
2
Department of Physics, University of Malawi, Zomba, Malawi.

email: p.macheso@ueuromed.org

Abstract—In this paper, we review the role of Fiber Bragg alteration in the fiber’s physical characteristics, such as tem-
Grating (FBG) sensors for temperature monitoring and their perature or strain, alters the grating’s pitch or fiber index,
application in the smart factories. In the first instance, we which alters the Bragg wavelength [7]. A more deduction
present the historical context and fundamental principle of FBG
based sensors. Then, we review of recent development in FBG about the sensing parameters by figuring out the grating’s peak
temperature sensors. We explore the use of FBG sensors in reflectivity wavelength. Another Use of fiber bragg gratings
industry 4.0, specifically in smart factories, and offer a few ideas as wavelength reflectors is a significant application for lasers
that might possibly open up a lot of doors for the development made of fiber [8].
of fiber Bragg grating sensors.
A promising measurement method for upcoming sensor
Index Terms—Fiber Bragg Grating, Optical Sensors, Temper-
ature, Wavelength. system applications in industrial 4.0 and smart factories in
particular is the fiber bragg grating (FBG). The FBG sensor
integration in smart factories has received little attention,
I. I NTRODUCTION
although it is crucial that the FBG is integrated into a typical
The discovery of photosensitivity fiber optics [1] has had smart factory due to its inherent advantages of immunity
a significant impact on the development of telecommunica- to electromagnetic and electrostatic interference,being non
tions and sensor systems technologies, with the effect being corrosive and also not requiring electric power.
leveraged to produce devices for a wide range of applications.
The photosensitivity property of silica fiber doped with ger- II. L ITERATURE S URVEY
manium is commonly used to produce a Fiber Bragg grating
(FBG). The term ”photosensitivity” refers to the increase in The migration of traditional factories to smart factories
the refractive index of certain doped glasses after exposure requires physical parameter monitors. Indeed, it requires the
to ultraviolet (UV) light. As a result, when exposed to UV development of novel sensors for physical parameters mon-
radiation, the fiber’s refractive index of the core changes itoring in hard-to- access locations. In this regard, over the
permanently, depending on the pattern and features of the UV last 10 years, numerous optical sensors based on optical
exposure beam [2-3]. fibers or integrated optical waveguides have been developed
FBG’s have gained popularity in recent years due to their and fabricated. As a potent tool for real-time monitoring of
use in a large wavelength-selective range, allowing them to physical parameters like temperature, pressure, strain, and
be employed in a number of applications. Dispersion cor- humidity, Fiber Bragg Grating (FBG) based sensors have
rection and wavelength-selective devices such as filters for attracted a lot of attention. The key reason for using FBG
wavelength-division multiplexing have been the most promis- sensors in smart factories are immunity to electromagnetic
ing uses in telecommunications. FBG’s have also become interference and radio frequency; compact in size and offer
popular as sensing devices for a variety of applications, multiple sensing to different physical parameters; and ability
including monitoring structures and sensing chemicals [4]. The to be installed at difficult location to reach.
refractive index of the core or the grating pitch changes with Because of essential features like as electromagnetic immu-
any variation in fiber properties, such as strain or temperature, nity, FBGs have garnered a lot of interest for strain,pressure
shifting the Bragg wavelength [5]. and temperature physical parameter monitoring. For example,
FBGs are now widely used as sensing tools for almost in [5] a unique and simple temperature FBG based sensor with
everything from chemical to structural monitoring [6]. Any controlled and improved sensitivity is presented.The suggested
method relies on the application of two metal strips with
African Scientific Research and Innovation Council (ASRIC) various thermal expansion coefficients. It was demonstrated

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 45


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

that when diverse sensing channels are required for multi- III. F UNDAMENTAL P RINCIPLES OF F IBER B RAGG
plexed temperature sensors, the bimetallic architecture has the G RATING T EMPERATURE S ENSORS
potential for a variety of applications.
The underlying idea behind FBG sensors is that measuring
Despite the fact that FBGs frequently refer to permanent
factors like strain, temperature, and force affect how much
refractive index modulation in the fiber core, [6] demonstrated
the Bragg signal wavelength shifts. The sensor sensitivity in-
that the refractive index modulation commonly bleaches when
creases as the grating pitch and core’s refractive index become
exposed to high temperatures. This was done by using FBG
more sensitive to minute changes in the measurand[10]. When
to monitor the temperature in harsh situations. As discussed in
a Bragg grating is present in an optical fiber, the transmission
the previous references, it is evident that optical fiber tempera-
spectra of light with the Bragg wavelength at its center may
ture sensors utilizing FBG are a suitable intelligent distributed
reflect a relatively tiny bandwidth of light. The wavelength
temperature sensor for in-the-moment temperature monitoring.
reflected depends on the period of the Bragg grating and the
Further in [6], a report of high- temperature resistance FBGs
guiding characteristics of the fiber.
produced utilizing hydrogen loaded conventional FBGs for
The physical operation of an FBG sensor is depicted in
developing a simple temperature sensor that can stabilize at
Figure 1. It is based on the Fresnel Reflection principle, which
high temperatures. The proposed approach was not deployed
calls for some incident light to be reflected between various
in a smart factory.
refractive indices, as shown in Equation 1.
In [7], it was showed that FBG can play a crucial role in
measurement of physical parameters for future sensor systems.
Moreover in [7] they prototyped an experimental pass-through
type FBG temperature sensor that is incorporated in a standard
thermocouple housing but was not deployed in a smart factory
setting. It’s worth noting that FBG sensor housing has received
little attention in the literature, even its critical importance in
the energy consumption when its integrated in a conventional
electrical sensor housing.
Ref [8]argues the case for a temperature monitoring system
for glass production that is based on Fiber Bragg Grating
(FBG). Opti-System simulation was used to implement this
proposed system. FBG was chosen because it reflects light at
a wavelength that changes in response to temperature changes.
FBG sensors are typically simple to install, have higher preci-
sion, longer stability, are tiny, are immune to electromagnetic
interference (EMI), and can measure extremely fast events. Fig. 1. Structure of Fiber Bragg Grating [7]
Tungsten DiSulfide (WS2) has a higher sensitivity than
Silica, Poly Methyl Methacrylate (PMMA), and Lead Sul- The initial order Bragg condition is represented by Equation
fide, according to the simulation results in [8]. The findings 1.The partial reflection of light caused by the passage of
also demonstrated that wavelength shifting is influenced by electromagnetic waves through the core of the FBG, which
the materials’ thermo-optic coefficient and thermal expansion contains two or more materials with various refractive indices.
coefficient (PbS). A significant flaw in the work was that the The index difference and incidence angle affect this Fresnel
proposed solution was not incorporated into a smart industrial reflection.
environment.
λB = 2nef f Λ (1)
In [9], the research aims to provide a thorough review of the
most recent developments in metric capacity unit techniques As follows from the equation, the effective refractive in-
commonly used to Predictive maintenance for good producing dex mode (nef f ) and grating period (Λ) affect the Bragg
in smart factories by categorizing the analysis in accordance wavelength (λB ) . Changes in ambient temperature, applied
with metric capacity unit algorithms, machine learning (ML) strain, or pressure have a considerable impact on the Bragg
class, machinery and instrumentation used device employed in wavelength [10],[11].Equation 2 uses partial derivatives with
information acquisition, classification of knowledge size and respect to the variable length, temperature, and wavelength to
kind, and highlighting the key contributions of this work. more precisely illustrate this effect.
For the purpose of predicting the breakdown of many man-  
ufacturing industry machines, the proposed study constructed δnef f δΛ
∆λB = 2 Λ + nef f ∆L
a Random Forest model. In order to show the Decision Tree δL δL
 
(DT) method’s advantage in accuracy and precision, it was δnef f δΛ
+2 Λ + nef f ∆T (2)
compared to the prediction outcome. The disadvantages in [9] δT δT
stemmed from the system’s use of FBG-based sensors, which
 
δnef f δΛ
are superior and have more inherent benefits. +2 Λ + nef f ∆λ
δλ δλ

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 46


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

where ∆L is the change in the grating’s physical length


brought on by the temperature applied, ∆T is the Temperature
change and ∆λ is wavelength change. In optical sensors based
FBG, the variation of the surrounding medium temperature
influences the grating period by thermal expansion or contrac-
tion. Consequently, the temperature lead to a shift in the Bragg
wavelength, λB . As a result, the Bragg wavelength variation
for a specific temperature change is expressed as follows:

∆λB = λB (ξ + α) ∆T (3)

The thermo-optic coefficient for germanium-doped silica core,


ξ is 8.6X10−6◦ C −1 and the coefficient of thermal expansion,
Fig. 2. Reflectivity Spectrum of FBG Sensor
α is 0.55X10−6◦ C −1

IV. R EFLECTIVITY OF FBG S ENSORS A. Configuration of FBG Temperature Sensors


The Bragg reflection theory serves as the foundation for The basic configuaration has an optical bradband source of
FBGs. Erdogen’s coupled mode theory (CMT) estimates the light e.g. laser which illuminates to the circulator (coupler)
reflectivity obtained in FBG at each grating inside the fiber. and to the FBG sensing probe where pertubation due to
Consider an optical fiber with an average refractive index temperature effect occurs [14].The transmitted, reflected signal
(n0 ) that has been fashioned into a uniform Bragg grating. are interrogated by the Optical Spectrum Analyzer which
The expression for refractive index profile can be denoted as demodulates the signal after channeling through the filter and
a photodetector.The direct method for testing an FBG sensor
2πz
n(z) = n0 + ∆n cos (4) is an optical spectrum analyzer (OSA), which takes a direct
Λ measurement of the FBG’s reflection spectrum and may be
where ∆n is the length of the fiber’s longitudinal axis, z is utilized between -200°C and 350°C and has a high sensitivity.
the distance, and is the magnitude of the induced refractive FBG temperature sensors can be used, for instance, in steel
index perturbation. For a constant modulation amplitude and molds, chemical reactors, and energy storage facilities, to
time, the reflectivity of a grating-based CMT is given by: monitor, regulate, and optimize process conditions.
Ω2 sin g 2 (sL)
R(L, λ) = (5)
∆k 2 sinh2 (sL) + s2 cosh2 (sL)
where R(L, λ) is the Reflectivity (with functions of grating
length L and wavelength λ).The coupling coefficient is de-
noted as Ω, ∆k = k − π/λ is the detuning wave vector , the
propagation constant is k = (2πn0 )/λ and s2 = Ω2 − ∆k 2 .
The coupling coefficient, Ω, is expressed as the index
perturbation’s sinusoidal variation along the fiber axis.
π∆n
Ω= Mp (6)
λ
where Mp is the fiber mode power’s percent. There is no
wavevector detuning at the middle wavelength of the Bragg
grating, and ∆k = 0. As a result, Eq. 7 provides the expression
for the reflectivity of FBG.

R(L, λ) = tanh2 (ΩL) (7) Fig. 3. Configuration of Fiber Bragg Grating Sensor

The length of the grating and the induced index of refraction


both rise along with the reflectivity of FBG. V. FBG T EMPERATURE S ENSOR A PPLICATIONS IN S MART
As illustrated in Figure 2 for a 1 cm long homogeneous FACTORIES
FBG, a pass-band reflected amplitude spectrum is produced FBGS offer a turn-key solution that is customized to meet
by the homogeneous FBG acting as a dielectric mirror in the specific needs of each application, whether it is utilized
the wavelength region surrounding the Bragg wavelength.The in casting facilities, industrial processes, or structural health
spectrum has a Bragg Wavelength λB of 1.5455 µm of monitoring. Since temperature directly affects the qualities of
producing a reflection band flanked by sidelobes. materials and the quality of products, it is one of the most

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 47


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

crucial parameters in industry 4.0, and more especially smart also vulnerable to changes in the transmission characteristics
factories, must be measured and regulated to ensure high of optical fiber cables [17].
performance industrial processes. A temperature sensor is a Also, in some application, the sensor should be sensitive
gadget that can turn temperature-related data from a source to the measurand and less sensitive (or not sensitive) to any
into a quantifiable output[13]. other parameter in such a way the measurement be accurate
FBG based sensors offer a real opportunity to real time and significant. In this regards, further development of the
measurement of temperature variation with high sensitivity and performance of FBG sensors is required. In order to overcome
precision. In order to make manufacturing more intelligent, a this limitation self-referenced FBG sensors can be used where
lot of work has been done to improve the application of FBG two or more reflected peak wavelength at different resonance
temperature sensors in industry 4.0. wavelength can be used. Generally, reference modes are used
FBG temperature sensors in the automobile smart factories in surface plasmon resonance-based sensors and a good result
sector, are often employed to detect the intake and coolant have been obtained.
temperatures [14]. In addition, several studies have been
conducted to demonstrate the efficiency of the application of VII. C ONCLUSION AND F UTURE S COPE
FBG in electrical power systems. Temperature sensors can de- This paper has discussed the review of Fiber Bragg temper-
tect issues including overheating, overloading, and insufficient ature sensors in smart factories embarking from the historical
cooling by detecting motor heat. context of FBG’s to an extensive review of literature of the
Manufacturers can presumably minimize unforeseen down- FBG based temperature sensors. The theory behind fiber Bragg
time and save money by restricting maintenance checks and gratings optical sensors and the optical response of FBG
repairs to when they’re actually needed by detecting problems temperature sensors is also discussed. The use cases of FBG
early. The features of FBGs, such as their high thermal resistiv- temperature sensors in harsh environments and role adoption
ity and the ability to rins or write with 800 nm femtoseconds, is smart factories with its corresponding challenges of being
will open up many prospects in smart industries with severe too costly to implement and having to utilize sophisticated
harsh environments, such as power plants, turbines, combus- equipment like Optical Spectrum analyzers and interrogators.
tion, cold rooms and space for monitoring temperature and The future scope of the work will involve the factoring in
humidity permanently [15]. of strain in the temperature measurement and the design of
Increasing the sensitivity of the sensor by putting forth the FBG temperature sensors in ANSYS FDTD Lumerical
novel designs and strategies has been the main emphasis of software and fabrications using phase mask technology of
researchers in the field of fiber Bragg grating sensing over the FBG temperature sensors and deploying them in smart factory
past few years. However, increasing the dynamic range and environments to collect real-time sensor data and aid in
improved networking aspect are of paramount importance. It decision making.
should be stressed again at this point that the sensor chip is
a generic platform which can be applied to the detection of ACKNOWLEDGMENT
several physical parameters.
The research study was made possible with assistance from
VI. C HALLENGES OF FBG T EMPERATURE S ENSORS the Euro-Mediterranean University of Fes (UEMF) and the
Industrial sensing applications offer a once-in-a-lifetime African Scientific, Research and Innovation Council (ASRIC)
opportunity for the fiber Bragg temperature sensors sector, and the authors are much grateful for this support.
which has previously been confined to niche applications
R EFERENCES
where higher technological costs were justified by Fiber Optic
sensors particular benefits[16]. Smart factory devices that [1] Hill, K.O., Fujii, Y., Johnson, D.C., and Kawasaki, B.S. Photosensitivity
in optical fiber waveguides: Application to reflection filter fabrication.
incorporate FBG based temperature sensors, on the other hand, Appl. Phys. Lett. 1978, 32, 647–649.
could lead to tremendous growth for this technology. It is now [2] Othonos, A., and Kalli, K. Fiber Bragg Gratings-Fundamentals and Ap-
possible to develop cost-effective disposable FBG temperature plications in Telecommunications and Sensing, Artech House, Boston,
MA, 1999.
sensors for industrial environments but the burden lies to the
[3] Kashyap, R. Fiber Bragg Gratings, Academic Press, 2009
cost resulting to the unsuccessful penetration of FBG sensors [4] Rao, Y. J., Webb, D. J., Jackson, D. A., Zhang, L., and Bennion, I.
in the telecommunication industry [16]. (1997). Infiber Bragg-grating temperature sensor system for medical
FBG temperature sensors are made up of fragile optical fiber applications. Journal of Lightwave Technology, 15(5), 779-785.
[5] Jung, J., Nam, H., Lee, B., Byun, J. O., and Kim, N. S. (1999). Fiber
cables that are incompatible with process conditions, making Bragg grating temperature sensor with controllable sensitivity. Applied
them challenging to install in smart factory environments. In optics, 38(13), 2752-2754.
addition to these obstacles, complicated industrial equipment, [6] B. Zhang and M. Kahrizi, ”High-Temperature Resistance Fiber Bragg
Grating Temperature Sensor Fabrication,” in IEEE Sensors Journal, vol.
such as optical spectrum and oscilloscopes, is required, which 7, no. 4, pp. 586-591, April 2007
is costly and requires a high level of skill to deploy [17]. Due [7] Mihailov, Stephen J. ”Fiber Bragg grating sensors for harsh environ-
to changes in detector sensitivity and light source efficiency ments.” Sensors 12.2 (2012): 1898-1918.
[8] Ponmalar, Dr S. ”Tungsten DiSulphide FBG Sensor for Temperature
with temperature, as well as the difficulty of demodulating the Monitoring in Float Glass Manufacturing.” Journal of Information
wavelength shift, the sensitivity of FBG temperature sensors is Technology and Digital World 2.4 (2020): 191-200.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 48


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[9] Karuppusamy, P. ”Machine Learning Approach to Predictive Mainte-


nance in Manufacturing Industry-A Comparative Study.” Journal of Soft
Computing Paradigm (JSCP) 2.04 (2020): 246-255.
[10] Daud, S., and Ali, J. (2018). Fibre Bragg Grating and No-Core Fibre
Sensors. New York: Springer.
[11] Daud, Suzairi, Muhammad Safwan Abd Aziz, Kashif Tufail Chaudhary,
Mahdi Bahadoran, and Jalil Ali. ”Sensitivity measurement of fibre Bragg
grating sensor.”Jurnal Teknologi 78, no. 3 (2016).
[12] Zhang, D., Wang, J., Wang, Y., and Dai, X. (2014). A fast response
temperature sensor based on fiber Bragg grating. Measurement Science
and Technology, 25(7), 075105
[13] Pinet, E., and Hamel, C. (2007, July). True challenges of disposable op-
tical fiber sensors for clinical environment. In Third European Workshop
on Optical Fibre Sensors (Vol. 6619, p. 66191Q). International Society
for Optics and Photonics.
[14] Liao, C. R., and Wang, D. N. (2013). Review of femtosecond laser
fabricated fiber Bragg gratings for high temperature sensing. Photonic
Sensors, 3(2), 97-101.
[15] Lee, C. H., Lee, J., Kim, M. K., and Kim, K. T. (2011). Characteristics
of a fiber Bragg grating temperature sensor using the thermal strain of
an external tube
[16] Patrick, H. J., Williams, G. M., Kersey, A. D., Pedrazzani, J. R., and
Vengsarkar, A. M. (1996). Hybrid fiber Bragg grating/long period fiber
grating sensor for strain/temperature discrimination. IEEE Photonics
Technology Letters, 8(9), 1223-1225.
[17] Bowei, Z., and Mojtaba, K. (2005). Characteristics of Fiber Bragg
Grating Temperature Sensor at Elevated Temperatures. In Proceedings
of the 2005 International Conference on MEMS, NANO and Smart
Systems (ICMENS’05).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 49


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IoT-based Intelligent Mobile Application for


Shopping
M. Balamurugan∗, G. Prabhakar†, G. Amsaveni∗, M. Karthikumar†, J.Jasmin Shifa*,E.Sharmila∗
∗Department of ECE,
Erode Sengunthar Engineering College, Erode
†Department of ECE,
Thiagarajar College of Engineering, Madurai

Email: balaer2013@gmail.com (M. Balamurugan)


Email: gpece@tce.edu (G. Prabhakar)
Email: amsavenigesec@esec.ac.in (G. Amsaveni)
Email: mail2mkkumar@gmail.com (M. Karthikumar)
Email: jasaayisha@gmail.com (J.Jasmin Shifa)
Email: sharmiesec2022@gmail.com (E.Sharmila)
Corresponding author: M. Balamurugan

Abstract— Shopping is an essential part of human life. B. Proposed System:


Nowadays, when we want to buy something from a store, it's
critical for us because we have to wait for two reasons. The first We propose a system for three purposes. One is to generate
step is to inspect the purchased item. The second step is to make the bill once a customer adds the product to the cart. Second
the payment. Nowadays, shopping is essential, and it becomes the cart has inbuilt transmitter to send the bill generated to the
even more complicated during festival seasons. People find it
difficult to shop physically because all of the stores are customer mobile app and also to the computer available in the
overcrowded, and also people have to wait in line for a long time shop. Third is to alert the customer when an expired product
to verify the items purchased and pay bills. This research study is added to the cart.
proposes a novel system to easily handle these complexities. IoT Hence to include all features in a single system becomes
connects the system to the user's mobile device and a computer
complicated. In our proposed system we suggested a single
available in the shop. All the details are updated in both the
mobile application and server once an item is added in the cart system that includes bill generation, payment, and stock
with the price and total amount. The payment link is added once related information and makes alert for when an expired
they complete shopping, so user can pay with ease and there will product is added.
be no waiting time in the queue to verify the amount and the Whenever we want to purchase an item from a shop
list of items purchased.
nowadays it’s crucial for us because after purchasing, we have
Keywords: Internet of Things (IoT), Mobile App, Shopping, Crowd to wait for two purposes. One is to check the item purchased.
Computing Second is to make the payment. In Automated vending
machines these problems are rectified. We choose the item we
I. INTRODUCTION need and after the payment, the machine itself delivers the
things automatically.
A. Existing System: This is done with the help of product RFID tag. As all the
products are available with this tag the stock information can
The available IoT based shopping systems are investigated be checked daily before shop is opened. By checking RFID
here to make the proposed system an efficient one. tag, we can check the stock available and also the expiry date
of the product. The date of expiry is also made available to the
•• One of the systems suggests the shortest path to customer once the RFID is added to the cart. Once the list is
customers to reach a particular item. approved by the shop manager customer can make the
•• The availability of products is listed to customer to payment through the mobile application itself. So the
save the searching time of a particular product. proposed system is the modification of an automated vending
•• The bill generation of purchase items is discussed. The machine.
payment can be made via chatbot type
With the proposed system inventory management also be-
• •
Inventory management using cloud computing and
comes easier with the buzzer alert which alerts manager if
IOT is explained.
added product in the cart is expired. Customers and they
cashier can check the details of items purchased and the total
So, all the existing system offers certain feature like bill
generation, inventory management. None of the system amount in the user app and server respectively. The proposed
describes inventory management and bill payment through a system eradicates all the difficulties faced by the traditional
single mobile app. No data about the expiry date of the product billing system as it leads to make the inventory management
is discussed when one such item is purchased.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 50
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and the shopping automated by using the concept novelty and be generated and the same given to the customer.
IoT. With the generated bill customers can the pay the amount
As all the shops are very crowded, we find it to difficult and they can check out. With this system human error can
to shop and also we have to wait in the queue for long time happen and also it will take long time to check all the
to verify the items we purchased and for bill payment. Here products. The drawbacks of existing system are efficiency and
we propose a system that manages these complexities with long time for billing. If a product is put on the trolley, RFID
ease. The system is connected to user mobile and a centralized reader reads the item’s RFID tag to check the item price. This
computer in the shop through IoT. Trolley is equipped with is repeated again and again whenever an item gets added to
RFID reader which scans the RFID tag attached to the product the cart. Once the customer finished shopping, they have to
when an item is put into it. An LCD displays the price of item press the finish button to indicate the cart the shopping is
and item name. This is done repeatedly many times until the completed.
customers press the finish button in the trolley. Once the After this the cart does two important things. It will send
customer finishes the shopping, they have to press the finish the shopping list which contains price of purchased products
button. and total price for the shopped items to the computer in the
After this the transmitter in the trolley send the list of shop and the same list can be viewed in the android
purchase products with their individual amount to the system application developed for the same shop. The same detail can
available in the shop and the same can be viewed in the also be viewed in the shops website by authorized manager
customer phone application. Once they reach the cash counter which helps them to increase their business beyond
it’s very easy to check the amount with the item purchased. boundaries. So, the proposed system saves time in waiting in
The system also enables the customer to pay the amount billing. It makes shopping easier and smarter using IoT.
through the link provided in the app after successful
verification done by cashier. Cashier has to enable the online Arduino is selected because it offers low power requirement
link for payment then only customer can pay the amount after and also it offers serial communication, USB connection for
shopping. The system also alerts the shopping keeper once an debugging. Compared to other processors the price is cheaper
expiry product is added to the cart. which makes it economical for reducing the system
To make the system implemented all the products in the implementation. The planned structure has the following
shop must be given with RFID tag. So that the reader available important com- ponents. They are RFID reader, buzzer, LCD
in the trolley can read once they are added. If the customer and Arduino processor. All the items are tagged with RFID.
wants to remove the product, he has to show the added product When an item is added to the cart, the item name and its price
RFID tag once again to the reader. The processor available in are automatically read by cart with the help of RFID reader. If
the trolley is programmed to remove the product from the a particular item is not available in the shop it will alert the
list if a particular product is shown more than one time. If shopkeeper to load them. The same detail can also be
a customer wants to add a particular product more than one viewed in the shop’s website by authorized manager. The
time, they have to press time repeat button in the trolley. system will send message to shopkeeper if an expired item is
The developed android application facilitates the user to added to the cart. The item availability and their quantity can
make the payment and also to check the quantities purchased. also be checked in the application of the shop by manager
The system can be implemented with minor changes for all which help the shop people to reload the items quickly and
types of shops with minimum cost. also to interest of customers which will in turn increase the
business. The proposed system can be used for shopping
II. SYSTEM IMPLEMENTATION malls and Departmental store.
A. Description of the proposed system:
B. Transmitter:
Nowadays all items in a supermarket are labeled by a
The function of the transmitter is shown in Fig.2.1. The
barcode. When a customer picks an item before billing that
transmitter sends the list of purchased product list with their
barcode is scanned by cashier to find the price. It’s done for all
individual amount, and also the total amount once the
items to generate the bill. After the generation of the bill,
consumer finished the shopping after they press the finish
payment can be made by customer easily. This becomes
button available in the cart. It also passes the stock information
difficult and also increases manpower and also leads to error
and expiry date of the product which makes the inventory
some times while calculating the bill.
management easier. The same information about shopping can
The drawbacks of the existing system, we propose a system
be viewed in the customer mobile application after successful
in which the bills for all shopped items are generated in the
log in using cart id.
cart. We send the generated bill to computer in the shop for
verification. By this way the time needed for bill generation is
drastically reduced. They also can pay the payment by using
the option in the android application.
Currently all the items in the shop are available with bar
code scanner. Customer can take all the products they want
and get added to the shopping basket. A bar code reader with
system will be available with the cashier. So. once they
reached the counter all the barcode of the products is read.
978-1-6654-6084-2/22/$31.00
With the help of a barcode reader and a computer the bill will ©2022 IEEE Fig. 2.1 Transmitter 51
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

C. Receiver:
The receiver receives the list of items
purchased items and the total price of all purchased
commodities. The cashier/ store keeper can check the list
with the purchased items. After this cashier can approve
the payment option. Once this is done customer can pay
the amount for shopped items. The functional details are
given in Fig.3.2

Fig.2.2 Receiver

Fig.2.3 Hardware Image Fig.3.1 System Flow

III. IMPLEMENTATION B. Result obtained:


In this system we developed an android application to
A. APP Details:
enhance shopping experience of customers. In the application
We develop an android application which allows the
customers can view the items purchased with bill. Each
consumer to check the purchased items. The shopkeepers
shopping cart is equipped with an id. Customers can log in to
also can also check the stock related information of all
the app with that id and OTP received through mobile. Once
commodities in the shop. Here payment option is also given
for the customer for seamless shopping. For every cart used they log in they will be able to see the items purchased. The
by customers they have to use their mobile no and they can bill can also be viewed by cashier and upon approval payment
log in using OTP received in their mobile phone. The flow link will get enabled. After this customer can pay the bill by
of the proposed system is shown in Fig.4.1. The working of using link. Hence proposed system improves and save the time
the whole system can be explained with the following steps. in waiting que for checking and payment of the bill. The
developed prototype application screenshots are shown in
• Customer can purchase any product of their wish. Fig.3.2,3.3,3.4.
• When one item is added is to cart the RFID reader
adds the name and the price of the product to the
bill.
• The above step is repeated until customer press the
finish button.
• If the customer wants to add a particular item
again, he has to press the add key so that the item
is added twice. If customer wants to add more than
one time they have to repeat this step again.
• Once the customer press the finish button the
processor calculates the bill and it send to the
cashier for approval.
• Once approval is done customer can pay the bill
the amount online by using the app. Fig.3.2 Home Page
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 52
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

when the system meets real time needs. For payment of the bill,
we must need appropriate permission from UPI or from the
commercial bank for successful implementation.

V. REFERENCES

[1] Anitta D; SahanaSiddappaGuddad; Anusha S; KarthikYanamala; Sahithi


S,”Smart Shopping Cart using IOT and robotic arm”,IEEE digital explorer.
[2] Ruinian Li,, Tianyi Song,, Nicholas Capurso,Jiguo Yu, Jason Couture, and
Xiuzhen Cheng,”IoT applications on Secure Smart Shopping
System”,Internet of Things Journal,2327-4662,2017.
[3] Bourg, L., Chatzidimitris, T., Chatzigiannakis, hancing shopping experiences
in smart retailing. J Ambient Intell Human Comput
(2021).https://doi.org/10.1007/s12652-020-02774-6
[4] S. Mekruksavanich, "Supermarket Shopping System using RFID as the IoT
Application," 2020 Joint International Conference on Digital Arts, Media and
Technology with ECTI Northern Section Conference on Electrical,
Electronics, Computer and Telecommunications Engineering (ECTI DAMT
& NCON), 2020, pp. 83-86, doi:
Fig.3.3 Payment Link 10.1109/ECTIDAMTNCON48261.2020.9090714
[5] Akihiro Ogino, Taketo Kobayashi, Yusuke Iida,”Smart Store Understanding
Consumer’s Preference through Behavior Logs Internationalization,
Design and Global Development, 2011, Volume 6775
[6] Carlos Flavián, Raquel Gurrea, Carlos Orús,"Combining channels to
make smart purchases: The role of webrooming and showrooming",Journal
of Retailing and Consumer Services,Volume 52, 2020,101923,ISSN 0969-
6989 https://doi.org/10.1016/j.jretconser.2019.1019
[7] U. S. Oruthota, "IOT Based Smart Shopping System," 2021 10th International
Conference on Information and Automation for Sustainability (ICIAfS),
2021, pp. 225-229, doi: 10.1109/ICIAfS52090.2021.9606124.
[8] I. S. Siva Rao, M. Ashutosh Rao, M. S. Teja, N. Teja Sai Pavan, B. S. Krishna
and D. Raviteja, "Shop GO : An IoT based solution for smart shopping,"
2020 International Conference on Computer Science, Engineering and
Applications (ICCSEA), 2020, pp. 1-6, doi:
10.1109/ICCSEA49143.2020.9132889.
[9] A. Sutagundar, M. Ettinamani and A. Attar, "Iot Based Smart Shopping
Mall," 2018 Second International Conference on Green Computing and
Internet of Things (ICGCIoT), 2018, pp. 355-360, doi:
Fig.3.4 Payment Confirmation
10.1109/ICGCIoT.2018.8752971
[10] S. Kowshika, S. S. Madhu mitha, G. Madhu Varshini, V. Megha and K.
IV. CONCLUSION Lakshmi, "IoT based Smart Shopping Trolley with Mobile Cart Application,"
2021 7th International Conference on Advanced Computing and
Communication Systems (ICACCS), 2021, pp. 1186-1189, doi:
The suggested system has connectivity to computer in
10.1109/ICACCS51430.2021.9441866
the shop, to the customer mobile application and also to the [11] A. Khanna and R. Tomar, "IoT based interactive shopping ecosystem," 2016
shop keeper. It devours lots of merits but it also needs certain 2nd International Conference on Next Generation Computing Technologies
modifications according to the need of different shops. The (NGCT), 2016, pp. 40-45, doi: 10.1109/NGCT.2016.7877387
[12] G. SUCIU, C. BALANEAN, A. PASAT, C. ISTRATE, H. IJAZ and R.
system leads to reduction of waiting time at the cash counter for
MATEI, "A new concept of smart shopping platform based on IoT
payment of bill and also checking the items purchased. The bill solutions," 2020 12th International Conference on Electronics, Computers
also generated automatically and the same is made available to and Artificial Intelligence (ECAI), 2020, pp. 1-4, doi:
the cashier. We also integrate payment option in the mobile 10.1109/ECAI50035.2020.9223198.
[13] M. Shahroz, M. F. Mushtaq, M. Ahmad, S. Ullah, A. Mehmood and G. S.
application to reduce the waiting time at the cash counter. In
Choi, "IoT-Based Smart Shopping Cart Using Radio Frequency
future the system can be implemented in real time that enhances Identification," in IEEE Access, vol. 8, pp. 68426-68438, 2020, doi:
the shopping experience that leads to atomization of shopping 10.1109/ACCESS.2020.2986681
experience. By using the suggested prototype, shopping turn [14] SrinidhiKarjol, Anusha K. Holla, C. B. Abhilash, P. V. Amrutha& Y. V.
Manohar,”Correction to: An IOT Based Smart Shopping Cart for Smart
into exceptionally easier. We developed a prototype model that
Shopping”,CCIS,volume 801,2021.
implements automated bill generation and also payment of the [15] Chen, CC., Huang, TC., Park, J.J. et al. A smart assistanttoward product-
same. In future the proposed system has to be implemented with awareness shopping. Pers Ubiquit Comput 18, 339–349 (2014).
certain modifications for real time which might be complicated https://doi.org/10.1007/s00779-013-0649

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 53


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Novel Approach to Non-Invasive Blood Glucose


Monitoring Based on Visible Laser Light
Joel T Sakthipriya R* Reena J A Poojha
ECE Department, ECE Department, ECE Department, ECE Department,
R.M.K. Engineering College, R.M.K. Engineering College, R.M.K. Engineering College, R.M.K. Engineering College,
Kavaraipettai, Chennai, India Kavaraipettai, Chennai, India Kavaraipettai, Chennai, India Kavaraipettai, Chennai, India
sakt18335.ec@rmkec.ac.in

Abstract:- Diabetes is a metabolic pathological circumstance of comfy regarding blood sugar testing. LED non-invasive blood
worry, which impacts crucial organs if no longer recognized and glucose device is employed to display the blood glucose
dealt with punctual. S teady tracking of blood sugar is necessary content , if any irregularity happens the alert is sent to mobile.
to keep away from diabetes. Regularly used glucose measuring This info is unendingly uploaded in mobile via IOT.
techniques are invasive which typically entails finger puncturing.
These techniques are aching and common piercing causes A. SYSTEM DESCRIPTION
calluses at the pores and skin and feature chance of distributing
transferrable diseases. Therefore, there may be a want to
The project is divided into two halves. The two major divisions
broaden a non-invasive tracking device that may detect blood are hardware and software. This project is an efficient
glucose constantly without much problematic. The current effort combination of computer programming and cost-effective
is centered on improvement of benign blood glucose sensor device hardware. This section discusses both these aspects in detail.
that uses of Near-infrared (NIR) method. Initially in-vitro SOFTWARE COMPONENTS
glucose measuring model is evolved from usage of unceasing
wave from NIR LED to test the understanding of the device for 1. KEIL IDE
precise blood sugar concentrations. Afterwards a sensor patch
was calculated for the usage of photodiode and LED to look at 2. EMBEDDED C
diffused reflectivity ranges of blood from the human forearm. HARDWARE REQUIRED
Diffused reflectivity ranges of the topics received with this
method become additionally as associated with commercially 1. PIC16F877A Microcontroller
accessible invasive finger tip glucose-meter. The effects are
promising and display the capability of NIR for blood sugar 2. LCD Display
measurement. In the current work model for non-invasive 3. Blood Glucose sensor
glucose quantities the usage of Near-infrared LED is primarily
sensor is established. In-vitro and In-vivo experiments are 4. ADC
executed using the model and the effects received as output signal 5. UART
of model is similar with commercially obtainable glucose meter.
The end outcome suggests the feasibility of the improvement of 6. IOT
non-invasive blood sugar device which is primarily based on
diffused reflectance via forearm. 7. Buzzer
B.HARDWARE DESCRIPTION
I. INT RODUCT ION
1. PIC16F877A MICROCONTROLLER
Diabetes is an disease that occurs when your blood glucose,
also called blood sugar, is too tall. The main supply of energy PIC16F877A microcontroller is extremely suitable to use, the
ie Blood glucose comes from the food you eat. Insulin, an software design of this controller is simple. one in all the most
internal secretion created by the pancreas, helps glu cose from benefits is that it is write-remove many times ,as a result of it
food get into your cells to be used for energy. Diabetes is a uses flash memory knowledge. It has a complete range of forty
metabolic pathologic condition of worry, which touches pins and there are thirty three pins for input and outpu t.
important structures of body if not identified and treated PIC6F877A has a lot of application in digital physics circuits.
immediately on time. Steady monitoring of blood glucose is
significant to avoid problem of diabetes. Normally used
glucose measuring methods are invasive finger puncturing. 2. LCD DISPLAY
These methods are sore and common pricking cause calluses
The term LCD stands for liquid crystal display. This section
on the skin and have risk of scattering communicable diseases.
describes the operation modes of LCDs, then describes the
II. PROPOSED DESIGN way to program and interface an LCD to PIC Microcontroller.
It is an electronic display module employed in an intensive
In the projected system, the new non invasive methodology is
vary of applications like numerous circuits and devices like
offered. Here sensor is to observe the glucose level of the
mobile phones, calculators, computers, TV sets etc These
subject. The benefit of this method is measurement of sugar
displays are given importance for multi-segment light-emitting
level in blood using non-invasive way . The outcome is
observed within the mobile phone. Tall rise of sugar level diodes and 7 segments. Steps to interface LCD with PIC
might result in coronary failure or any issue situations. Non - Microcontroller.
invasive glucose observance make individuals a lot relaxed and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 54


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Identify: Determine which kind of LCD is needed. AN LCD


may additionally be Back lit.
Connect: Most of the LCD follow the typical Hitachi Pin out
that is Vss for ground, Vdd for power supply, r/w for read and
write, E for modify and pins D0 to D7 for information pins.
Interface: Connect pins D0-D7, E, RW, RS, to pins on the
small controller . if we connect information bus on port A and
the E, RW, RE on port B and for grounding the RW line (
continually in write mode ) . we can observe the graphics on
the liquid crystal display. AN Intelligent LCD would require
few instructions and information to operate Instruction Set for
the LCD.
3. BLOOD GLUCOSE SENSOR
Blood glucose meters are one of the oldest and most normal
Fig 1: Proposed Block Diagram
approaches for measuring glucose. These sensor utilizes
enzyme-coated sample strips which are made with a prescribed
quantity of enzymes that can react with blood sample. The
strips are for single use and cannot be used again. After The diagram describing the planned system and its
interconnection together with the stages concerned is as
receiving a blood sample, the test strip is inserted and measures
delineated above.
the quantity of glucose in the blood and shows the output.
CGM is expensive when compared to strip. The heartbeat generator generates pulses. IR light-emitting
diode emits lightweight within the infrared vary of
4. ADC
electromagnetic radiation spectrum.. Photo transistor detect
The use of A/D converters in a data system is to convert analog light pulses and convert them into digital electrical signals. The
signals to digital data so that it can be processed for display, RC Filter filters signal by blocking certain frequencies and
storage, and analysis. passing others. ADC converts analog signal to digital signal.
Input is given into the microcontroller where the program is
5. UART executed. The output is given in IOT and LCD Display. When
It is expanded as universal asynchronous receiver transmitter .It the value is abnormal, it gives a beep sound in buzzer.
is a protocol which is bidirectional, asynchronous and supports B. HEALTH ANALYSIS
serial data transmission. It has only three signals Tx, Rx, and
ground.It is used mainly for communication over computer When the glucose sensor is kept at the tip of the index finger,
by near infrared (NIR) technique, the blood glucose level will
6. IOT be measured using the visible light. The blood glucose level
Internet of Things (IoT) is a nearby wherein substances, will be displayed in the LCD screen and also the result will be
animals or human beings are furnished with precise identifiers given to the connected smart phone. When the glucose level is
and the cappotential to switch statistics over a community too high, alert will be sent to the smart phone connected.
Therefore, the doctor will be aware of the patient’s condition
without necessitating human being-to-human being or human
even when he is far from the patient who requires continuous
being -to-pc interaction. IoT board presented with SIM900
monitoring.
GPRS modem to prompt net connection additionally ready
with a controller to procedure all enter UART statistics to C. TECHNIQUE USED
GPRS primarily based totally on-line statistics. Data can be up
Near infrared technique (NIR)
to date to a selected web website online or a social community
through which the person can capable of get entry to the D. CIRCUIT DIAGRAM
statistics. The capabilities of IOT are electricity supply: DC
Hardware components are connected in this prototype
+12v 1AMP, vehicle mobile statistics updating: 30sec, Digital
output port pins: +5v DC which is supplied with three
hyperlinks statistics updating to a selected internet site, tool
controlling internet site and statistics updating to a social
community. The packages are on-line site visitors tracking,
on-line fitness tracking, actual time delivery and logistics
tracking and each day lifestyles and domestics.
7. BUZZER
The main purpose of buzzer is to alter the audio signal into
sound. It is powered by DC voltage and used in timers, alarms,
computers, alarms, printers, etc. based on different designs, it
can make different sounds like siren, music, bell and alarm.
B. BLOCK DIAGRAM

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 55


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 2: Proposed Circuit Diagram

III. RESULT S
This session provides the achieved goals in this project.
Hardware picture is attached for more information.
Fig 3: Proposed Hardware Implementation for Normal Value
a. HARDWARE IMPLEMENTATION
1) A step down transformer is used to reduce the normal 230v
AC input to 12v AC output. When the value is abnormal

2) A bridge rectifier is used to convert12v AC to 12v DC


output.
3) This 12v DC output is sent to voltage regulator 7805 which
converts to approximately 5v DC.
4) Capacitors are used for filtering purpose and a LED is built
so that when it glows, it indicates there is no error in the power
supply circuit.
5) PIC16AF877A is the microcontroller used which has 5
ports and 30 pins.
6) Glucose sensor senses the glucose level when the finger is
placed between IR led and photo transistor and then the value
is sent to microcontroller.
7) Crystal oscillator gives a trigger pulse to the controller. Pin Fig 4: Proposed Hardware Implementation for Abormal Value
13, 14 of PIC16AF877A is connected to crystal oscillator.
8) The program loaded in the microcontroller gets input from
glucose sensor and then the program runs. b. SOFTWARE IMPLEMENTATION

9) The blood glucose value is displayed on LCD display and We have done in embedded C language .
when the value is in out of range, the “abnormal” message is
displayed and the buzzer gives a sound.
10) The value is also sent to IOT module using UART protocol.
11) The mobile phone or a laptop connected with the 107
module gets the data. Via cloud.
12) All the patients data is given to cloud using IOT module
and can be viewed in the device connected wherever and
whenever needed.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 56


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[8] Ajjan, R.; Slattery, D.; Wright, E. Continuous Glucose Monitoring: A


Brief Review for Primary Care Practitioners. Adv. Ther. 2019, 36, 579–
596. [CrossRef]
[9] Li, K.; Daniels, J.; Liu, C.; Herrero, P.; Georgiou, P. Convolutional
Recurrent Neural Networks for Glucose Prediction. IEEE J. Biomed.
Health Inform. 2020, 24, 603–613. [CrossRef]
[10] Jernelv, I.L.; Milenko, K.; Fuglerud, S.S.; Hjelme, D.R.; Ellingsen, R.;
Aksnes, A. A review of optical methods for continuous glucose
monitoring. Appl. Spectrosc. Rev. 2019, 54, 543 –572. [CrossRef]
[11] Shokrekhodaei, M.; Quinones, S. Review of non -invasive glucose
sensing techniques: Optical, electrical and breath acetone. Sensors
2020, 20, 1251. [CrossRef] [PubMed]
[12] Zhang, R.; Liu, S.; Jin, H.; Luo, Y.; Zheng, Z.; Gao, F.; Zheng, Y.
Noninvasive Electromagnetic Wave Sensing of Glucose. Sensors 2019,
Fig 5: Software Implementation 19, 1151. [CrossRef] [PubMed]
[13] Delbeck, S.; Vahlsing, T .; Leonhardt, S.; Steiner, G.; Heise, H.M. Non-
invasive monitoring of blood glucose using optical methods for skin
spectroscopy—Opportunities and recent advances. Anal. Bioanal.
IV. CONCLUSION Chem. 2019, 411, 63–77. [CrossRef]
[14] Rachim, V.P.; Chung, W.Y. Wearable-band type visible-near infrared
This system has been tested to demonstrate its feasibility and optical biosensor for non-invasive blood glucose monitoring. Sens.
effectiveness. It includes the necessary inexpensive hardware Actuators B Chem. 2019, 286, 173–180. [CrossRef]
[15] Joshi, A.M.; Jain, P.; Mohanty, S.P.; Agrawal, N. IGLU 2.0: A New
and software operations. Hardware implementation involves Wearable for Accurate Non-Invasive Continuous Serum Glucose
using a glucose sensor, microcontroller, and power supply, Measurement in IoMT Framework. IEEE T rans. Consum. Electron.
and software implementation involves uploading values to 2020, 66, 327–335. [CrossRef]
cloud-based storage and retrieving those values on a connected [16] Kumar, D.A.; Jayanthy, T . Review on Non-Invasive Blood Glucose
Measurement T echniques. In Proceedings of the 2020 IEEE
device. International Conference on Communication and Signal Processing,
ICCSP 2020, Chennai, India, 28–30 July 2020; pp. 981–986.
[17] Kang, J.W.; Park, Y.S.; Chang, H.; Lee, W.; Singh, S.P.; Choi, W.;
Advantages of Proposed System Galindo, L.H.; Dasari, R.R.; Nam, S.H.; Park, J.; et al. Direct
observation of glucose fingerprint using in vivo Raman spectroscopy.
1. Easy manner to display blood glucose without taking blood. Sci. Adv. 2020, 6, eaay5206. [CrossRef]
[18] D’Arco, A.; Di Fabrizio, M.; Dolci, V.; Petrarca, M.; Lupi, S. T Hz
2. most economical method. Pulsed Imaging in Biomedical Applications. Condens. Matter 2020, 5,
25. [CrossRef]
3. distinctive method. [19] Gusev, S.I.; Soboleva, V.Y.; Kublanova, I.L.; Khodzitsky, M.K.
Glucose level sensor based on metasurface in T Hz frequency range.
V. FUT URE SCOPE AIP Conf. Proc. 2019, 2098, 020008. [CrossRef]
[20] Anand, P.K.; Shin, D.R.; Memon, M.L. Adaptive Boosting Based
Glucose monitoring has already reached an advance level in Personalized Glucose Monitoring System (PGMS) for NonInvasive
terms of cost effectiveness, accuracy and convenience. This Blood Glucose Prediction with Improved Accuracy. Diagnostics 2020,
10, 285. [CrossRef]
can be used in the scenarios like considering current pandemic [21] Bakker, G.J.; Vanbellinghen, M.C.; Scheithauer, T.P.; Verchere, C.B.;
doctors need not visit every patient for measuring, it updates Stroes, E.S.; T immers, N.K.L.M.; Herrema, H.; Nieuwdorp, M.;
on time. Verberne, H.J.; van Raalte, D.H. Pancreatic 18F-FDG uptake is
increased in type 2 diabetes patients compared to non-diabetic controls.
REFERENCES PLoS ONE 2019, 14, e0213202. [CrossRef]
[22] Reddy, N.; Verma, N.; Dungan, K. Monitoring T echnologies-
[1] Alsunaidi,B.; Althobaiti,M.;Tamal,M.;Albaker,W.;Al-Naib,I.A Review Continuous Glucose Monitoring, Mobile T echnology, Biomarkers of
of Non-invasive optical systems for continuous Blood Glucose Glycemic Control. Endotext 2020. Available online:
Monitoring, published 14 th october 2021. https://www.ncbi.nlm.nih.gov/sites/books/NBK279046/ (accessed on
[2] Implementation of wearable glucose sensor node with energy 10 October 2021).
harvesting for wireless Body Area Network Mahammad Firose,M. [23] Gusev, M.; Poposka, L.; Spasevski, G.; Kostoska, M.; Koteska, B.;
Monica Subashini,2019. Simjanoska, M.; Ackovska, N.; Stojmenski, A.; T asic, J.; T rontelj, J.
[3] Estimation of blood glucose by non-invasive method using Noninvasive Glucose Measurement Using Machine Learning and
photoplethysmography, Shraddha Habbu, Manisha Dale and Rajesh Neural Network Methods and Correlation with Heart Rate Variability.
Ghongade, published online 6 th May 2019. J. Sens. 2020, 2020, 9628281. [CrossRef]
[4] Non-Invasive Blood Glucose Monitoring T echnology: A Review Liu [24] Eversense Continuous Glucose Monitoring System—
T ang, Shwu Jen Chang, Ching-Jung Chen, Jen- T sai Liu, published P160048/S006|FDA.Available online:
online 4 th December 2020. https://www.fda.gov/medicaldevices/recently-approved-
[5] Davis, B. What Is the Pathophysiology of Diabetes Mellitus? Available devices/eversense-continuous-glucose-monitoring-system-
online: https://www.mvorganizing.org/what-is-thepathophysiology-of- p160048s006 (accessed on 13 July 2021).
diabetes-mellitus/ (accessed on 6 October 2021).
[6] Gonzales, W.V.; Mobashsher, A.T .; Abbosh, A. T he progress of
glucose monitoring—A review of invasive to minimally and non-
invasive techniques, devices and sensors. Sensors 2019, 19, 800.
[CrossRef]
[7] Saeedi, P.; Petersohn, I.; Salpea, P.; Malanda, B.; Karuranga, S.;
Unwin, N.; Colagiuri, S.; Guariguata, L.; Motala, A.A.; Ogurtsova, K.;
et al. Global and regional diabetes prevalence estimates for 2019 an d
projections for 2030 and 2045: Results from the International Diabetes
Federation Diabetes Atlas, 9th edition. Diabetes Res. Clin. Pract. 2019,
157, 107843. [CrossRef] [PubMed]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 57


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Survey on MQTT Bridges, Challenges and its


Solutions

V. Thirupathi Dr. K. Sagar


Research Scholar, Dept of CSE Professor, Dept of CSE,
Osmania University, Hyderabad, India Chaitanya Bharathi Institute of Technology
Assistant Professor, Dept of CS& AI Hyderabad, India
SR University, Warangal, India ksagar_cse@cbit.ac.in
v.thirupathi@sru.edu.in*

Abstract— MQTT is an Internet of Things (IoT) protocol devices. IoT [5] devices have less memory and processing
designed to enable machine-to-machine communication. speed, so they require lightweight protocols like MQTT.
MQTT's publish/subscribe message transport mechanism is MQTT uses a middle where architecture called a broker.
extremely lightweight. This protocol is useful to establish MQTT follows publish/subscribe communication model.
remote communication when data transfer rates are limited. MQTT broker creates topics. The clients who would like to
With these characteristics, it can be used in a variety of receive messages, they need to subscribe to a particular topic.
scenarios, from temporary to permanent contexts, making it These clients are calling as subscribers. The clients who need
ideal for machine-to-machine and IoT communications. This to send the messages, they need to write on to a particular
research study reviews the state-of-the-art MQTT bridges,
topic. These are calling publishers. Fig 1 explains the
message format, and configuration. Finally, the study
architecture of MQTT protocol. MQTT protocol is an
concluded by stating the current challenges, solutions and
future research directions.
asynchronous protocol, so publisher and subscriber need not
be online at the same time.
Keywords—Internet of Things, Message Queue Telemetry Message queue telemetry transport provides reliable
Transport, Broker, Topic, bridge, Software Defined Networking communication because it uses transmission control protocol
I. INTRODUCTION (TCP) as communication protocol. MQTT supports three
levels of quality of service (QoS) to transfer messages. They
MQTT is the abbreviation for Message Queuing are QoS 0, QoS 1 and QoS 2. QoS 0 sends message only
Telemetry Transport [1]. The publish/subscribe mechanism once. There is no guarantee that whether the message is
in which we may send and receive messages as clients. This received by destination or not. No acknowledgement shared
facilitates interaction between a wide range of electronic between sender and receiver. QoS 0 does not allow for
gadgets. It is a basic communications protocol developed for sending messages duplicate. QoS 1 send messages at least
devices with limited memory and bandwidth, making it an once. Sender will wait for acknowledgement from the
ideal choice for IoT based Applications. receiver after sending messages, if no proper
Few other protocols match the MQTT's combination of acknowledgement received form receiver, sends keep on
flexibility and efficiency. The following are some of the sending messages until receives an acknowledgement. Once
characteristics of a MQTT: the acknowledgement received broker notifies the sender.
QoS 2 send messages only once. It forwards the messages
a) Specifically, it is a protocol that allows slowly as compared other QoS levels. QoS 2 receives
machines to communicate with one another. acknowledgement in all the steps.
b) Intended for usage as a lightweight and
straightforward messaging protocol, it relies on
a publish/subscribe model for two-way data
transmission between the client and server.
c) A simultaneous connection between client and
server is not necessary.
d) Much to how WhatsApp and other messaging
services expedite deliveries, so does this one
speed up the transfer of data. It's a protocol for
instantaneous communication.
e) Customers may choose from a curated list of
topics and sign up for updates just on those that Fig 1. MQTT Architecture
interest them.
Fig 2. Shows us the message format. Each command in
Message Queue Telemetry Transport is a lightweight MQTT[1] is accompanied by an acknowledgement in the
message communication protocol being used in the IoT form of a command acknowledgment, as per the protocol's

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 58


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

standardised structure. As can be seen in the image above, all


three of these commands—connect, subscribe, and publish—
receive confirmations. The TCP protocol's handshaking
technique is a good analogy for this approach.

Fig 2. MQTT Message Format


The below fig 3 tells us MQTT packet structure. Every Fig 4. MQTT Bridge
MQTT packet has a fixed 2-byte header that describes the A. Software Defined Networking (SDN)
contents of the packet. The second section is a heading that
may or may not be included. Another optional element is the
payload. The information being sent is stored in this field, Software-defined networking's rapid rise to popularity in
known as the "payload." The payload is not the obligatory today's large data centres, wide area networks (WANs),
field we may assume it to be. The payload field is ignored by branch offices, campuses, data centre networks, and telecom
certain commands like the disconnect message. Whenever a networks is due in large part to its ability to boost network
publisher publishes a message on a specific topic, but no one efficiency. SDN is becoming an increasingly important
has to subscribed to that particular topic then the message component of contemporary networks due to its ability to
will be simply discarded. But still the publisher insists the dynamically assign resources, hence lowering maintenance
broker to retain the last message on the topic by setting the costs and simplifying operational complexity.
flag called retained message. With the help of retained Emerging architecture like software-defined networking
message flag users understand the status of the topic. Every (SDN)[2, 7] is perfect for the high-bandwidth, ever-changing
topic is allowed to have only one retained message. If we try necessities of current applications because it is flexible,
to push a new message that will replace the existing one. controllable, cost-effective, and dynamic. This design splits
the actions of network management and forwarding, making
network organization easily programmable and the set-up
components abstracted for use by networks and applications.

Fig 3. MQTT Packet Structure


Let us consider that X and Y would like to know each
other's location updates while they have connected to their
corresponding MQTT brokers at home. If X interested to
share his/her location details, X must subscribe to one of the
topics of Y’s broker in the same way Y would like to send
his/her location updates, Y must subscribe to a topic on X
broker. The topics of one broker are not visible to other
brokers, so we cannot communicate topics of different
brokers. To achieve it we require a group of various MQTT
brokers need to be connected with each other, this is nothing
but bridge of MQTT brokers. When we create a bridge of
brokers communication is established easily. This paper Fig 5. SDN Architecture
helps to understand required literature in making bridge of
brokers. Fig 4. Shows the MQTT brodge SDN [6] architecture has three components, application
layer, infrastructure layer and control layer. Application layer
is responsible for running all service requests. Control layer
controls the flow of the packets according to flow rules. It is
the brain of the SDN architecture. Infrastructure layer consist
of all the network devices like routers and switches. In order
to make communication between these layers SDN uses
north bound and south bound APIs (Application
Programming Interfaces). North bound API can be used to
make interface between application and control layers,
whereas south bound API is an mediator between control and
infrastructure layers. API’s allows applications to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 59


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

communicate with each other using predefined data II. RELATED WORK
structures and functions. Mosquitto is the broker software which is being used as a
MQTT broker. Mosquitto support for bridging two or more
North Bound API MQTT brokers. To create a bridge, we must enable bridge
In order to determine what resources are available, property of a MQTT configuration file.
applications using an SDN must depend on the controller to
report the current state of the network infrastructure. The
SDN [6] controller may also make sure that application
traffic is routed according to predefined rules. Through
northbound APIs, applications may communicate with the
control layer and inform it of their resource requirements and
final destinations. To ensure that applications make efficient
use of the network's resources, the control layer coordinates
their deployment. It then employs its shrewdness to choose
the best route, taking into account the application's latency
and security requirements. Typically, RESTful APIs are used
for northbound communication. Orchestrations are now fully
automated and not set by hand.
HTTP GET: used when we want to retrieve information.
HTTP POST/PUT: used when we want to upload or
update information.
Fig. 6 MQTT bridge configuration
It's very much like surfing the web, except that instead of
requesting a website or image, you're asking the SDN Above figure shows MQTT bridge [17] with two
controller for something specific, like a list of all the VLANs different brokers broker0 and broker1. Broker1 has enabled
on the network. as a bridge and broker0 is acting as client for broker1.
The SDN controller will respond to the HTTP GET
request with the desired data in an HTTP GET response. The
data is sent in a standard format. Most often encountered data
formats are:
JSON (JavaScript Object Notation)
XML (eXtensible Markup Language)

South Bound API


The SDN[7] controller uses southbound APIs to talk to
network devices like routers and switches. The controller
then instructs the underlying network infrastructure as to the The above lines explain broker1 configuration file where
optimal route that the application data should follow. The we mention the client machine’s name, address with
controller can make real-time adjustments to the data-transfer connection and address properties and topic name. When we
protocols used by the routers and switches. No longer do would like establish a connection with a particular topic, we
devices and routing tables decide the destination of the data. must indicate, whether that connection can be used for
Instead, smart judgments are made by the controller to direct receiving (in) messages, sending (out) messages or both
data in the most efficient way possible. OpenFlow, and Cisco (both) receiving and sending. If a network has a greater
OPFlex are few examples for south bound API. number of MQTT brokers with more number of topics this
process would become cumbersome.
SDN Controllers
VernMQ [17] is another broker which can be used as a
An SDN controller is a piece of software that monitors
MQTT broker. It can also support for bridging of two or
and manages the network as a whole. The controller is used
more brokers similar to mosquito. The procedure of creating
by network managers to set policies for the forwarding layer
bridge as similar as mosquito.
of the underlying infrastructure. Policies that govern the
operation of the network are also enforced through the To guarantee the availability of network data, Schmitt et
controller. Policies are established by network administrators al. [11] focus on exchanging information between groups of
and implemented consistently across all network nodes. vehicles equipped with IoT using the Message Queue
Traffic on a network might have different levels of access, Telemetry Transport (MQTT) protocol and their hot
resource allocations, and priority settings determined by connection. They provide a novel paradigm of dynamic
rules called "network policies." Simpler, more consistent connection that is static for IoT. With this strategy, we can
network administration is possible with a centralised view of save a lot of messages while just slightly increasing our
the network and the rules in place. transmission expenses. Our concept, which borrows heavily
from the study of multi-agent systems, involves the dispersal
of brainpower across a collection of inanimate objects.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 60


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

However, it pays little attention to the client While it approach solves the availability and scalability issues by
comes to improving data transfers in the Internet of Things making data accessible at every broker in the network. As a
(IoT) when working with limited resources and potentially result, a new technique for controlling data flow is
unstable networks, Chen et al. [12] developed a novel introduced in this work to deal with customers connected to a
publish-subscribe message routing approach. The proposed failed broker.
method utilises a rerouting strategy to adapt to the ever-
A software defined network (SDN) controller manages
evolving network architecture of IoT devices. Furthermore,
we demonstrate how to leverage MQTT's rerouting feature to the brokers in an IoT-based dispersed network. In order to
have a controller take over topic-based session flows in the identify a crashed broker in a network, the controller and the
event of a failed broker. In addition, it has the ability to brokers in the network have been exchanging periodic
messages. After a certain period of time without a
redirect the client under certain essential limits, making it
unfit for a widespread IoT infrastructure.t-broker interaction communication from a broker, the SDN [7] assumes the
in the absence of an online presence. broker has crashed. After determining whether alternative
brokers are functional, the controller may reroute the
Using a lightweight container orchestration framework customers who were previously connected to the failed
and a collection of single-board computers, Thean et al. [13] broker. Aspects of performance include CPU speed, RAM
show how to build a cluster of MQTT brokers at the memory, the number of customers connected to the broker,
network's periphery. The primary goal is to provide an and processing capacity. By rerouting the client's IP address
inexpensive, scalable, and lightweight messaging system for to the communication port of another active broker in the
Internet of Things (IoT) devices in underdeveloped countries network, the SDN distributes customers around the network
with spotty Internet access. Currently, a cluster server in accordance with the performance of those brokers.
intermediate layer is being developed to supplement and aid Therefore, the suggested technique can deal with the clients
the collective processing of dispersed MQTT brokers. associated with the crashed MQTT [1] brokers in a scalable
Message throughput, execution time and end-to-end latency manner and solve the scalability problem in dispersed IoT
performance evaluations of the MQTT broker cluster are also networks [16-19].
provided. There must be a large number of intermediate
cluster nodes, however, between the customer and the When it comes to managing the infrastructure of a
massive dispersed IoT network, an SDN controller is used at
broker.
the network control layer. In an SDN, each switch operates
In [14], Longo, et al. propose MQTT-ST, a protocol for on its own data plane, while the SDN controller manages
constructing a distributed architecture of brokers using packet traffic. For data to reach the MQTT broker after being
spanning trees. Since a centralised approach cannot handle published, packets from the client must travel via the
the anticipated influx of IoT devices, distributed solutions network's switches. When an SDN switch receives data, it
including a number of collaborating brokers are required. notifies the SDN controller of this fact by sending a
Relocating distributed brokers from the cloud to the network PACKET_IN message to the controller. The controller
might significantly reduce latency. The described protocol subsequently sends a PACKET_OUT message to the data
sends its control messages using in-band signalling. But the plane of the switch to acknowledge the input packets. The
whole communication is now there in every broker. PACKET_OUT message from the controller is sent to the
switch, and the switch then delivers it to the MQTT broker.
Literature review reveals that [11] doesn't focus on
dealing with clients with an offline broker; [12] reroutes the
client under specific important limits, which isn't ideal for a
large-scale IoT network; [13] necessitates several extra
cluster nodes between the client and broker; [14], [15] use
broadcasting of messages to all brokers in the network,
which impacts the memory capacity of brokers. For effective
data transport, it is crucial to address these problems in the
MQTT protocol.
III METHODOLOGY
In the publish/subscribe architecture utilised by MQTT,
one of the most popular IoT protocols, several clients
communicate with a central hub, or broker. In the same way,
a dispersed network of brokers is connected by a bridging
mechanism. However, anytime the publisher and subscriber
are linked to separate brokers in the network, it has issues
with availability and scalability, which is why this study
proposes a robust data exchange availability approach to deal
with the issue on the subscriber client side. To do this, each
broker in the network creates a topic set table containing a
collection of topics, the ID of the broker where the subject
was published, and the ID of the publisher client for that
topic. Data published by a customer in a broker is shared
with other brokers in the network. The topic set table is used
to publish information to a subscriber when a client Fig. 7 Block diagram
subscribes to a topic with a different broker. The described

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 61


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. CONCLUSION Wireless Networking Opportunities and Challenges for Internet of


Things: A Review,” DOI 10.1109/JIOT.2015.2480421, IEEE Internet
From the solutions suggested by different of Things Journal.
researchers, the challenges occur during the design and [7] M. Gupta, J. Sommers, P. Barfors, “Fast, Accurate Simulation for
development of different MQTT brokers are extensively SDN Prototyping,” Proceedings of the ACM SIGCOMM Workshop
on Hot Topics on Software Defined Networks 2013 (HotSDN13,
studied. There is no solution to establish communication China, pp. 21-36, 2013.
with all the topics, which consists of different MQTT
brokers. There is no optimal solution for identifying [8] Kothandaraman, D., Sheshikala, M., Seena Naik, K., Chanti, Y., &
failure broker. If any of the broker has failed, there is no Vijaykumar, B. (2019). Design of an optimized multicast routing
solution for adjusting the clients connected with that algorithm for internet of things. International Journal of Recent
Technology and Engineering (IJRTE), 8(2), 4048-4053.
failure broker. Hence, a proper routing mechanism
[9] Thirupathi, V., & Sagar, K. (2020, December). Web of Things an
should be established. intelligent approach to solve interoperability issues of Internet of
Things communication protocols. In IOP Conference Series:
This study finally suggested a novel approach to Materials Science and Engineering (Vol. 981, No. 3, p. 032094). IOP
make a bridge with high number of MQTT brokers, Publishing.
which can effectively identify the failed broker at the [10] Thirupathi, V., Thallapalli, R., Sandeep, C. H., Chandhar, K., Kumar,
P. P., & Pradeep, C. H. (2022, May). Web services a novel approach
same time adjusting the clients to some other broker for solving interoperability issues in internet of things. In AIP
which is online. It can be done with the help of software Conference Proceedings (Vol. 2418, No. 1, p. 020080). AIP
defined networking. It is highly required to suggest a Publishing LLC.
solution to bridge different MQTT brokers provided by [11] Schmitt, Alexandre, Florent Carlier, and Valerie Renault. "Data
exchange with the MQTT protocol: Dynamic bridge approach." 2019
different vendors. This is called interoperability. IEEE 89th Vehicular Technology Conference (VTC2019-Spring).
Security plays a major role while working with bridges IEEE, 2019.
of different brokers. This can be implemented as a future [12] Chen, F., Liu, P., Zhu, J., Gao, S., Zhang, Y., Duan, M., ... & Hwang,
work. K. (2020). Improving Topic-Based Data Exchanges among IoT
Devices. Security and Communication Networks, 2020.
V. REFERENCES [13] Thean, Zhong Ying, Vooi Voon Yap, and Peh Chiong Teh.
"Container-based MQTT broker cluster for edge computing." 2019
[1] V. Thirupathi, K. Sagar, “Implementation of Home Automation
4th International Conference and Workshops on Recent Advances and
System using MQTT Protocol and ESP32” International Journal of
Innovations in Engineering (ICRAIE). IEEE, 2019.
Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958,
Volume-8, Issue-2C2, December 2018 [14] Park, Jun-Hong, Hyeong-Su Kim, and Won-Tae Kim. "Dm-mqtt: An
efficient mqtt based on sdn multicast for massive iot
[2] Sandeep, C. H., Naresh Kumar, S., & Pramod Kumar, P. (2020).
communications." Sensors 18.9 (2018): 3071.
Significant Role of Security in IOT Development and IOT
Architecture. Journal of Mechanics of Continua and Mathematical [15] Longo, E., Redondi, A. E., Cesana, M., Arcia-Moret, A., & Manzoni,
Sciences, 15(6), 174-184. P. (2020, June). Mqtt-st: a spanning tree protocol for distributed mqtt
brokers. In ICC 2020-2020 IEEE International Conference on
[3] Thirupathi, V., Sandeep, C. H., Kumar, S. N., & Kumar, P. P. (2019).
Communications (ICC) (pp. 1-6). IEEE.
A comprehensive review on sdn architecture, applications and major
benifits of SDN. International Journal of Advanced Science and [16] https://medium.com/jungletronics/mosquitto-bridge-5b44e9687fb3
Technology, 28(20), 607-614. [17] https://docs.vernemq.com/configuring-vernemq/bridge
[4] Sandeep, C. H., Pradeep, C. H., & Sivalenka, V. (2020, December). [18] Prathik, A., S. Ahiraj, Y. Harsha, and Kevin Prince. "IoT based Smart
Key business drivers for IoT development and security principles. In power Extender with Timer Feature Controlled through a Mobile
IOP Conference Series: Materials Science and Engineering (Vol. 981, App." Journal of Information Technology 4, no. 2 (2022): 61-73
NoDr. D. Kothandaraman, Dr. C. Chellappan, Human [19] Bhatt, Pramod Kumar. "Smart Wires and Modular FACTS
[5] Dr. D. Kothandaraman, Dr. C. Chellappan, Human Activity Detection Controllers for Smart Grid Applications: A." Journal of Electrical
System Using Internet Of Things, International Journal on Computer Engineering 3, no. 4 (2021): 286.
Science and Engineering (IJCSE), Vol. 9 No.11 Nov2017, e-ISSN :
0975-3397 p-ISSN : 2229-5631. 4, p. 042001). IOP Publishing.
[6] Keshav Sood, Student Member, IEEE, Shui Yu, Senior Member,
IEEE and Yong Xiang, Senior Member, IEEE. “Software Defined

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 62


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Dynamic Pagerank Frequent Subgraph Mining


by GraphX in the Distributed System
Sadhana Priyadarshini Sireesha Rodda
Department of CSE, GIT, GITAM Department of CSE, GIT, GITAM
Gandhi Nagar, Rushikonda, Gandhi Nagar, Rushikonda,
Visakhapatnam-530045, Andhra Pradesh, INDIA. Visakhapatnam-530045, Andhra Pradesh, INDIA.
sadhana.priyadarshini00@gmail.com sireesharodda@gmail.com

Abstract subgraph extraction which is a subpart of Data


Mining has been known to have been started since
Graph Mining has been the most demanding research its inception in this year 1994 to deal with graphical
area for the last few decades in different fields, such as data structure [1].
biological networks, the world wide web, mobile The methodologies designed for extracting
applications, sensors, online, social networks, etc. subgraphs based on the identification and generation
Frequent Subgraph Mining (FSM) plays a vital role in of patterns fully depend on both compositional and
Graph Mining to exercise, study and generate topological structured information either from node
interesting patterns from graph data. Basically, FSM or link. For local patterns, MinnerLSD uses the
techniques are classified into two types such as an COMODO model to optimize the primary
apriori-based method, and a pattern growth-based estimation for its local modularity [2].
method. This technique faces the problems such as the There are two techniques used for subgraph
generation of the duplicate frequent subgraph, having isomorphism: the filtration and verification
no proper technique to rank during candidate approach is used for feature indexing and the branch
generation, and how to map the threshold values. In and bound approach is used for candidate vertex
this proposed system, a Dynamic PageRank GraphX- verification. The Hybrid Graph (HyGraph)
based Frequent Subgraph Mining (DPRGFSM) model algorithm combines both approaches to identify
that is able to extract interesting patterns from the subgraph isomorphism. The need to extract
distributed system by eliminating duplicates by interesting patterns within a huge graph dataset
ranking them to the proper level. In addition, we also requires high computational isomorphism testing
use load balancing, pre-punning, and optimization [3].
techniques to improve its performance in both memory When we deal with distributed graph
requirements and time complexity. The potency of datasets, there are various challenges such as
methods defined in this paper is evaluated rigorously memory resource availability, and the number of
with different threshold values and comparative CPUs for calculation of the frequency of subgraphs.
studies with different parameters with existing Spark- Cloud computing, Giraph, and MapReduce
based Single Graph Mining (SSIGRAM) and A framework have enough features to sort out these
Ranked Frequent pattern Growth Framework (A- issues [4]. Wenqing et al. developed a filter-and-
RAFF) and found drastic improvement with all four refinement algorithm to extract recurrent subgraphs
datasets. The proposed methodology is 1.6 times faster that is well for parallel execution with the
than the Spark-based Single Graph Mining MapReduce framework. They minimize the
(SSIGRAM) model and 50 times faster than the A computational cost at individual worker nodes with
Ranked Frequent pattern Growth Framework (A-
a top-down as well as a bottom-up approach [5].
Wilfried Yves Hamilton et.al proposed a DPHV
RAFF) for recurrent subgraph extraction.
algorithm to solve the NP-complete problem which
Keywords: PageRank; subgraph; threshold value; occurs during occurred due during k-partitioning of
frequent subgraph mining; a large graph database for balancing individual
division weights and preserving the graph topology
I. INTRODUCTION in a distributed graph system. This algorithm relies
on master-slave architecture for k-partition in
scattered databases [6].
The association among various entities in different
applications such as web data mining,
bioinformatics, text extraction, etc., is represented in
graphical format. The research work on recurrent

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 63


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. BACKGROUND AND RELATED and when the big graph dataset changes. Graph
WORK databases are more flexible than Relational Database
Management Systems (RDBMS) in various criteria
The pattern of frequency calculation is initially done [15-17].
by sampling subgraphs (Kasthan et al. 2004) that A new version of the Ullmann algorithm
have better computational time. In 2010, Silva and developed by Shang et al., called Quick SI, and has
Riberio designed a g-tries algorithm that effective pruning and processing cost. Based on
restructured the associated method and data edge-weighted, a minimum span tree is created in
structure for both directed weighted and unweighted the database [18].WengingLin et al. developed a
graph databases [7]. HitalSlan et al., developed the two-step filter-refined algorithm implemented on
Physarum algorithm to search the smallest path for MapReduce for interesting pattern generation. To
a single graph as a hybrid of Dijkstra’s and BFS gain low estimation cost, they examine the algorithm
methods. It solves many problems that arise in with both top-down and bottom-up methods at
computers, social and road networks, etc. The individual worker nodes [7]. Saif Ur Rehman et.al
method is a two-state combination approach to fast developed, A Ranked Frequent pattern framework
computation in directed weighted and unweighted (A-RAFF), which uses FSR-rank measures to
graphs [8]. minimize the duplicate and enormous recurrent
patterns. The algorithm consists of three layers i.e.
David Robin and Chris Scogings proposed pre-pruning, graph-pattern mining, and analytical
a generic algorithm that can reduce overlapping layer. Each layer has a different objective but works
contested subgraphs by testing at different levels to together in a framework [14].
verify patterns in the context of threshold value [8].
The graph partition uses either the vertex-cut or III. PROBLEM DEFINITION
edge-cut method. Wenfei fan et al. designed
incrementalization in the graph partition with added In today’s era, we are surrounded by big data
features of load-balancing, smallest cut-size, and generation, where data can be of any type and our
lowest theta changes [10]. Jingbo Xu et al. proposed main objective is to extract needful information in a
GRAPE, a parallel Graph query engine that faster way despite computational complexity,
overcomes issues in previous approaches. The networking, and data storage. Hence researchers
programming is very simple, and semi-structured emphasize not only recurrent subgraph generation
which enables the optimization of sequential from big data but also ranking them at the proper
algorithms and graphs by simultaneous computation level on the basis of a given threshold value so that
on vertex-based systems such as GraphLab, and the computation time is less. In this paper, we develop a
Giraph framework [11]. Dynamic PageRank GraphX-based Frequent
Subgraph Mining (DPRGFSM) algorithm that uses
Miguel E Coimbra et.al proposes the dynamic page ranking in MapReduce Geometric
VeiGraph algorithm which is a faster, improved Multi-way Advanced Optimized Frequent Subgraph
computation method for stream-based graph Mining (MGMAOFSM) to generate frequent
datasets. It achieves the result with exactness above subgraphs with less execution time [19].
95 on a scale of a hundred. The algorithm uses
architecture and model to make proper coordination IV. PROPOSED METHODOLOGY
between user-appropriate processing methodologies
Apache Spark, which is based on Scale language, is
and make a correct selection between them [12].
developed for a faster clustering platform in AMP
Deep learning can be used in matching context
features for user messages and photos. The Lab. NameNode and DataNode architecture are used
researcher developed a design space by combining in HDFS to execute the distributed file system to
attention summarization on RNN and text achieve better performance. HDFS allows faster
embedding [13]. transfer of data among nodes. The features of HDFS
are fault tolerances, high availability, scalability,
Frequent subgraph mining can be achieved reliability, distributed storage, replications, etc.
in graph transactions based on a single graph base or High fault tolerance is achieved in HDFS by
a set of small-size graphs. In the case of the first one, dividing data into a number of blocks. If any system
the transaction consists of a set of tiny size or in a cluster is out of the performance, then the client
medium size graphs as input whereas in, the second is able to retrieve required data from another system.
one, a huge graph database is used. The main
The copy of data is distributed to all the clusters. At
objective of FSM is to extract a subgraph whose
any moment, if any failure occurs, a client can be
value is greater than the user-given threshold value
[1]. able to access it from other nodes as a replica of data
To make model functionality more flexible, is present. Data replication improves the availability
it should be capable of handling complex queries as of data in HDFS. Due to a distributed storage
system, each replica of data can be available in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 64


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

various clusters. It supports both horizontal and If data in memory is disoriented, then with the help
vertical scalability.In the case of Hadoop, data is of a resilient feature it can be regenerated in RDD.
distributed on different sites, and performs all However, fault tolerance is achieved through a
computations there. But it requires a Hadoop signal of lineage. Spark keeps track of all series of
Distributed File System (HDFS) for the whole operations of the corresponding data set. Whenever
output of individual maps and reduces jobs to be a portion of an RDD is disoriented, it has sufficient
materialized into the local file. This leads to information to rebuild it from other RDD [20]. To
decreased system performance due to fault tolerance reduce the communication and memory
mechanisms. In the case of Spark, this issue was requirement, the GraphX Resilient Distributed
resolved by putting the information in distributed Graph (RDG), uses the records with nodes and links
memory format and lessening the expensive shuffles in the graph to generate horizontally division sets.
The process depends on vertex-cut division to
which take place at the time of data processing as
encode the graph as shown in Fig 3.
shown in Fig1.
Data
Spark Task

RDD

HDFS Steps RAM Steps RAM Steps

Transformation

Fig. 1. Task flowchart of Spark framework

The Resilient Distributed Datasets (RDD) is the RDD


basic programming abstraction of Spark, a memory
data format that allows the privileged user to hold
data into cluster memory and frequently send a
Action
query. The RDD abstraction allows programmers
during in executing pipelines into memory across
clusters to be materialize. During multiple iterations,
the same data need not be reloaded and recalculated. Value
Hence it saves time. Due to the immutable data
format in RDD, the even data in a distributed system
Fig. 2. Flow chart of Resilient Distributed Datasets
is unchanged. In the case of Spark, the division task
is done automatically, but the program may decide Sample Graph
how many partitions are needed for an RDD. Like
Hadoop, a key-value pair for an individual element B C
of RDD is required to generate the pair RDD [19].
A. Operations for Spark F
A
There are basically two operations performed by
Spark.
E D
a) Transformation
b) Action
Edged Table
The process of developing new Resilient Distributed
Datasets to fit a prediction is called transformation Partition 1 Partition 2
(e.g. filtration). Spark transformation is a method
that generates an updated new version RDD from
old one by taking immutable RDD and creates any
number of modified RDD. The process of generating
a result based on existing RDD and returning the
corresponding result to either the driver program or
saved at an external storage system is called action
(e.g. HDFS) as shown in Fig. 2.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 65


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Vertex Data
A B
A
Partition 1 Partition 2

D
C

Fig. 5. Sample Graph

Let’s take an example shown in Fig.5 and calculate


Vertex Maps the rank of a webpage in the website. In this case,
Partition 1 Partition 2 we have four web pages i.e. A, B, C, and D. We can
A 1 A 1 map these into a graph. In fig.5, A is pointing to B
A 2 means the website A has a link to B. The webpage
A 2
D 2 of a given site in the next iteration is the page rank
B 1
E 2 of a given site of the previous iteration, generally,
C 1 F 2 we have to concentrate only on the pages pointing to
a given site. Then we have to divide it into the
Fig.3. Resilient Distributed Graph (RDG) representation of number of outgoing links as shown in equation (1).
Graphs in GraphX
𝑃𝑅𝑖(𝑃𝑖)
PR i+1(Pi) = ∑𝑃𝑖 (1)
At the top of Apache Spark, the GraphX framework 𝐶(𝑃𝑖)
is presented for processing distributed graph datasets
as shown in Fig.4.There are two API available in In equation 1, PR i+1(Pi) is the PageRank value at
GraphX i.e. Pregel abstraction and MapReduce. i+1 th iteration with respect to the previous iteration,
Pregel is well suited for large-scale graph databases C(Pi) is the total count of probability value at ith
due to its programming easiness, and limited iteration . In iteration 0, we initialize the system. In
our implementation, we initialize the PageRank for
memory resources as space complexity. However,
every single webpage site to be equal to 1/n, where
MapReduce has super steps concepts to efficiently
n is the total number of the webpage on the website.
handle graph problems.
In this example, the total number of web pages is 4.
A. Page Rank Algorithm in GraphX for Hence all nodes are initialized with a ¼ rank value.
recurrent subgraph mining. In iteration1, for node A, only B is pointing to it, so
PRIi+1 (A)=PR i(B)/1=1/4=3/12. Similarly, we can
The PageRank algorithm is used to generate calculate for B, C, and D as 4/12,1/12,4/12
important pages from websites. The same concept respectively. Now we can observe that the sum of
we can apply for extraction of the relative each webpage in each iteration is 1 as shown in
importance of a subgraph in a graph dataset. In this Table 1.
paper, we calculate a vertex's significant value in the
graph by the assumption that there is an association
between vertices with this vertex.

Programming PYTHON JAVA R SCLALA


Language

Libraries SPARK SQL MLIB GRAPHX TREAMMING

Engine SPARK CORE

Cluster HADOOP YARN APCHE MESOS SPARK SCHEDULER


Management

Fig.4. Overview of Spark GraphX framework.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 66


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

transformation used RDD which is immutable in


TABLE I PAGERANK VLAUE AT EACH ITERATION
nature
Iteration 0 Iteration 1 Iteration 2 PageRank
Empirical setup:.
A ¼ 3/12 4/12 4
B ¼ 4/12 5/12 5 For empirical analysis, we use laptop-UHNIA59G
C ¼ 1/12 1/12 1 with64-bit operating system, x64-based processor,
D ¼ 4/12 2/12 2 Windows 11 Home Single Language, and 8GB
RAM. In this paper, we take four datasets: Google
database, Neural network, Twitter graph datasets,
In GraphX, there are two methods available to and Amazon networks. We implement the proposed
implement PageRank algorithm in Google datasets to extract the rank of a
• Static method where there is a website which are frequented more often by
predetermined number of iterations is to customers. Using this algorithm, we can also find
follow to get the desired PageRank value of
out the number of followers of a specific person on
nodes in the Graph database.
Twitter. However, it is easy to generate a PageRank
• Dynamic method, PageRank algorithm
performs iterations until a specific of neurons from the neural network that has been
threshold value is not reached. found to correlate with its relative finding rate. Our
In our paper, we implement a dynamic PageRank DPRGFSM algorithm was used to determine the
algorithm as the user has to enter a threshold value order that a product appears to the user from a search
and according to that frequent subgraph generate on in case of the Amazon website.
a distributed platform. As the real world is large-
scale with dynamic changing, we prefer the dynamic The particulars of datasets are CSV format that used
changes, hence our focus moves to the incremental in the experimental analysis (Table 2):
PageRank algorithm which can be achieved by ▪ Google database: This dataset is loaded from
either Partition and Aggregation algorithm or Monte
www.stnadford.edu. The webpage and the
Carlo-based algorithm. Due to the presence of
hyperlinks between them are denoted by
accumulative error in the Partition and Aggregation
algorithm, we focus on Monte Carlo-based vertices and edges respectively. The total
algorithms. The optimization technique, numerical number of vertices and edges are 875432 and
integration methods, and generating draws from 5109049 subsequently. The sum of vertices in
a probability distribution are different methods of biggest Weakly Connected
existing Monte Carlo algorithms. Existing Monte Components(WCC), links in biggest Weakly
Carlo-based algorithms are able to perform well in Connected Components(WCC), vertices in
certain cases such as where nodes are fixed (no biggest Strongly Connected Components
insertion or deletion possible), and there should not (SCC), and links in biggest Strongly Connected
be any random movement that re-traverses a node. Components(SCC) are as follows: 8532490
Our proposed Dynamic PageRank GraphX-based (0.978),506743(0,876),424918(0.567),332753
frequent subgraph mining (DPRGFSM) model can 21(0.876) respectively.
be performed with the insertion and deletion of
▪ Neural network: This dataset is a classification
vertices at any moment. The main problem with the
of artificial neural networks that can be
existing algorithm is finding out the exact number of
random movement segments, adjusting perfectly to processed in a graphical database. We consider
the affected segment by random movement, and Graph auto-encoder networks that are able to
managing all random movement segments. reconstruct the input graph using a decoder. The
dataset consists of vertices, edges, features, and
classes 28540, and 1265437 respectively.
V. EXPERIMENTAL OUTCOMES ▪ Twitter graph datasets: This dataset is
AND ANALYSIS downloaded from Stanford Large Network
In this section, we elaborate on the experimental Dataset Collection. The data is collected
comparative study of our proposed Dynamic between 01/06/2009 to 31/12/2009 for 20
PageRank GraphX-based frequent subgraph mining million users and 467 million tweets posted.
(DPRGFSM) model with the existing Spark-based Each public tweet consists of the author’s name,
Single Graph Mining (SSIGRAM) and A Ranked time of tweet, and messages. We consider the
Frequent pattern Growth Framework (A-RAFF) dataset with 28,996,071 number of users,
algorithms. In this research work, we use Cedar file 4165,344,674 number of tweets, 18,789,423
system that supports caching and duplication total unit of URLs used, 49,293,684 hashtags
techniques to reduce space requirements. Spark and 71,835,017 number of retweets.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 67


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

▪ Amazon networks: This dataset is downloaded conclusion that our proposed algorithm is 1.6 times
from https://snap.stanford.edu/data. The faster than the Spark-based Single Graph Mining
customers are denoted by vertices and (SSIGRAM) model and 50 times faster than the A
purchasing items are represented by links. In Ranked Frequent pattern Growth Framework (A-
this paper, we collected a portion of the whole RAFF). The scalability of our proposed model is
database consisting of 334863 vertices and empirical analysis with different ranges (i.e. 0,10,
925872 links. In the largest WCC, there are 20,..,100) percentage of dynamic links added and
334863(1.0) vertices, and 925872(1.0) links mean out degree ranging from 1 to 2048. Fig.8
available. Similarly, in the largest SCC reflects that our proposed one is large-scalable graph
334863(1.0) vertices, 92587(1.0) links are network. The accuracy for insertion remain the same
present. o 10 10 % and 60 to 100%, only varying ranges for
of 0.4 to 0.6. The mean modify time is inversely
TABLE II. EXPERIMENTAL DTATSETS DETAILS proportional to the mean out degree.
Datasets Google Neural Twitter Amazon Neural network Twitter graph datasets
database network graph networks Amazon networks
datasets 2
Static 845908 645908 445908 245908 1.8
vertices 1.6
Dynamic 94868990 74868990 54868990 34568720 1.4
vertices

Accuracy
1.2
Static 997989761 907959967 9079525958 879605958 1
edges
0.8
Dynamic 10245631223 9823987458 98237654098 887654098
0.6
edges
0.4
0.2
0
In Fig. 6 (a), Amazon networks have more accuracy 10 20 30 40 50 60 70 80 90 100
than the other three datasets with dynamic insertion Percentage of dynamic edges inserted

of edges with our proposed model. Google database,


Neural network, and Twitter graph datasets have a) Percentage of dynamic links added (%)
more average accuracy than Amazon networks. The
neural network has constant accuracy growth with
Google database Neural network
an increase in the addition of edges. When dynamic
Twitter graph datasets Amazon networks
edges are deleted, the accuracy is quite improved for 2.5

Amazon networks and approximately the same


2
remaining database is almost constant as shown in
Accuracy

Fig 6. (b). The efficiency of the proposed model 1.5


evaluation is done by average upgrading time for
1
adding and removing links with existing models as
shown in Fig 7. In the case of random insertion 0.5
edges, the accuracy of Spark-based Single Graph
0
Mining (SSIGRAM), A Ranked Frequent pattern 10 20 30 40 50 60 70 80 90 100
Growth Framework (A-RAFF and our proposed Percentage of dynamic links deleted
Dynamic PageRank GraphX-based frequent
subgraph mining (DPRGFSM) model In the case of b) Percentage of dynamic links deleted (%)
Fig. 6. Accuracy of the proposed model in four real-datasets
random deletion links, the accuracy of SSIGRAM,
A-RAFF, and the proposed DPRGFSM model are
ranging from 2 to 2,8, 1.2 to 2.2, and 0.5 to 0.6
respectively. Hence, we conclude that in both
insertion and deletion dynamically our proposed
model has constant accuracy are ranging from 0.6 to
1.4, 0.7 to 1.5 and 0.5 to 0.8 respectively. In both
cases of insertion and deletion, the accuracy of our
proposed model varies very less compared with the
other two models with respect to changing
percentages of insertion edges. For the insertion of
dynamic edges, it is almost constant with an
increasing percentage. From Table 3, we got the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 68


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Google database Neural network


Twitter graph datasets Amazon networks
100%
90%
80%
70%

mean modify time


60%
50%
40%
30%
20%
10%
0%
10 20 30 40 50 60 70 80 90 100
mean outdegree

b) out-degree vs modify link of dynamic edges inserted

Fig.8. Evaluation of proposed algorithm with other parameters


with four datasets

Google database
50
45
40
35
Threshold values
30
25
20
15
10
0 20000 40000 60000 80000 100000 120000 140000
subgraph geneartion
Proposed DPRGFSM Model A-RAFF SSIGRAM
Fig.7. Accuracy analysis with existing Spark-based Single Graph
Mining (SSIGRAM) and A Ranked Frequent pattern Growth
Framework (A-RAFF)

TABLE III. THE AVERAGE MODIFY TIME IN Neural network


MILLISECONDS FOR ADDING AND REMOVING FOR
50
INDIVIDUAL EDGE
45
Datasets Proposed DPRGFSM SSIGRAM A-RAFF 40
Threshold value

Addition subtraction Addition subtraction Addition subtraction 35


Google 10.20 17.67 69.34 45.56 20.45 35.56 30
database 25
Neural 16.21 17.34 75.23 56.71 34.89 34.21
network 20
Twitter 25.12 22.45 85.25 61.45 52.32 42.78 15
graph 10
datasets
Amazon 72.15 10.67 78.45 75.45 34.84 20.33 0 20000 40000 60000 80000 100000 120000
networks Subgraph generation
A-RAFF SSIGRAM Proposed DPRGFSM Model

Amazon networks Twitter graph datasets


Twitter graph datasets
Neural network Google database 50
1000 45
40
Threshold value

800 35
30
Mean outdegre

600 25
20
400 15
10
200
0 20000 40000 60000 80000
0
10 20 30 40 50 60 70 80 90 100
Subgraph generation
Proposed DPRGFSM Model A-RAFF SSIGRAM
Percenatge of dynamic links added

a) Mean out degree vs percentage

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 69


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Amazon Networks Using Spark”, Special Issue Socio-Cognitive and


Affective Computing), February 2018.
50 [2] Martin Atzmueller, Henry Soldano, Guillaume
45 Santini & Dominique Bouthinon “MinerLSD:
40
efficient mining of local patterns on attributed
Threshold value

35
networks”, Applied Network Science, Emerging
Sources Citation Index (ESCI) of Web of Science.
30
January 2019.
25
[3] Yangyang, Li, Wang Yajun, and Zhang Miyuan. "POI
20
Recommendation System using Hypergraph
15 Embedding and Logical Matrix Factorization."
10 Journal of Artificial Intelligence and Capsule
0 20000 40000 60000 80000 100000 120000 Networks 4, no. 1 (2022): 37-53.
Subgraph generation [4] Merve Asiler, Adnan Yazıcı & Roy
Proposed DPRGFSM Model A-RAFF SSIGRAM
George,”HyGraph: a subgraph isomorphism
algorithm for efficiently querying big graph
Fig.9. Comparison of the proposed algorithm with SSIGRAM databases”, Journal of Big Data , Science Citation
and A-RAFF methods for frequent subgraph generation in Index Expanded (SCIE).
different datasets. [5] Wenqing Lin, Xiaokui Xiao,” Large-scale frequent
subgraph mining in MapReduce’, Conference: 2014
IEEE 30th International
The number of subgraph generations in recurrent
Conference on Data Engineering (ICDE).
subgraph extraction is inversely proportional to a [6] Wilfried Yves Hamilton Adonil, Tarik Nahhal1, Moez
user-given threshold value. In Fig. 9 we make a Krichen, Abdeltif El byed and Ismail Assayad
“DHPV: a distributed algorithm for large-scale graph
comparative analysis with existing algorithms with partitioning”, Adoni et al. J Big Data (2020) 7:76
four different datasets and get more subgraphs https://doi.org/10.1186/s40537-020-00357-y.
compared with the other two by adding missing [7] Pedro Ribeiro , Fernando Silva ,” G-Tries: a data
structure for storing and finding subgraphs”,
subgraphs due to improper ranking. Springer, Data Mining and Knowledge Discovery,
Published: 12 February 2013,28, pages337–377
VI. CONCLUSION AND FUTURE (2014).
WORK [8] Hilal ARSLAN1, Murat MANGUOĞLU2,” A
hybrid single-source shortest path algorithm”, Turkish
Journal of Electrical Engineering & Computer
In this research work, defined the dynamic Sciences, (2019) 27: 2636 – 2647 © TÜBİTAK
PageRank algorithm in the GraphX system to doi:10.3906/elk-1901-23.
[9] David Robinson, Chris Scogings,” The detection of
generate the frequent subgraph in a distributed criminal groups in real-world fused data: using the
system to cut down communication value and graph-mining algorithm “GraphExtract”, Springer
warehouse overhead. The study performs a vertex- Robinson and Scogings Secur Inform (2018) 7:2
cut method for graph division horizontally which https://doi.org/ 10. 1186/s13388-018-003.
[10] Wenfei Fan, Muyang Liu, Chao Tian, Ruiqi Xu,
leads to less-value fault tolerance. As the use of Jingren Zhou,” Incrementalization of Graph
GraphX with dynamic page ranking, the indices Partitioning Algorithms”, Proceedings of the VLDB
across the graphs and view of collections’ number of Endowment, Online ISSN: 2150-8097.
super steps reduce. Hence, system performance is [11] Wenfei Fan, Jingbo Xu, Yinghui Wu , Wenyuan Yu ,
Jiaxin Jiang,” GRAPE: Parallelizing Sequential Graph
improved. Computations”,Proceedings of the VLDB
Endowment, Vol. 10, No. 12 Copyright 2017 VLDB
The research work also make a Endowment 2150-8097/17/08.
[12] Miguel E. Coimbra, Sérgio Esteves, Alexandre P.
comparative analysis with existing Spark-based Francisco , Luís Veiga ,” VeilGraph: incremental
Single Graph Mining (SSIGRAM) and A Ranked graph stream processing”, Journal of Big
Frequent pattern Growth Framework (A-RAFF) Data,Science Citation Index Expanded (SCIE). June
algorithm by adding and removing edges. The 2022.
[13] MHD Samy Alnaimy , Mohammad Said Desouki ,”
accuracy of the proposed Dynamic PageRank Expanded graph embedding for joint network
GraphX-based Frequent Subgraph Mining alignment and link prediction”, Journal of Big Data,
(DPRGFSM) model is speedy and successful with Science Citation Index Expanded (SCIE). June 2022.
four graph databases. In the future, the proposed [14] Saif Ur Rehman, Kexing Liu, Tariq Ali, Asif
Nawaz & Simon James Fong “A Graph Mining
system will expand this model to other frameworks Approach for Ranking and Discovering the Interesting
and improve the overall performance of frequent Frequent Subgraph Patterns”, International Journal of
subgraph mining in the distributed system. Computational Intelligence Systems. Published: 04
August 2021.
[15] U. Kang, C. E. Tsourakakis, A. P. Appel, C. Faloutsos,
REFERENCES and J. Leskovec. Hadi: Mining radii of large graphs.
TKDD, 5(2):8, 2011.
[16] U. Kang, C. E. Tsourakakis, and C. Faloutsos.
Pegasus: A peta-scale graph mining system. In ICDM,
[1] Fengcai Qiao, Xin Zhang,Pei Li, Zhaoyun Ding, pages 229–238, 2009.
Shanshan Jia, Hui Wang,”A Parallel Approach for [17] H. Kettani. On the conversion between number
Frequent Subgraph Mining in a Single Large Graph systems. In MSV/AMCS, pages 317–320, 2004. [16]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 70


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

M. Kuramochi and G. Karypis. Frequent subgraph


discovery. In ICDM, pages 313–320, 2001.
[18] J. Huan, W. Wang, and J. Prins. Efficient mining of
frequent subgraphs in the presence of isomorphism. In
ICDM, pages 549–552, 2003.
[19] Matei Zaharia, Mosharaf Chowdhury, Tathagata Das,
Ankur Dave, Justin Ma, Murphy McCauley, Michael
J. Franklin, Scott Shenker, Ion Stoica, “Resilient
Distributed Datasets: A Fault-Tolerant Abstraction for
In-Memory Cluster Computing”, Technical Report
No.UCB/EECS-2011-82
http://www.eecs.berkeley.edu/Pubs/TechRpts/2011/E
ECS-2011-82.html July 19, 2011.
[20] Michael S. Malak and Robin East, “Spark GraphX in
Action “, June 2016, ISBN 9781617292521 280
pages.
[21] Joseph E. Gonzalez, Reynold S. Xin, Ankur Dav,
Daniel Crankshaw Michael J. Franklin , Ion Stoica,
“GraphX: Graph Processing in a Distributed Dataflow
Framework”,https://amplab.cs.berkeley.edu , 014/09.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 71


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Prediction of Solar Energy using Time


Series Methods
Sakshi Shukla Sarita Sheoran
Department of Mathematics Department of Mathematics
Birla Institute of Technology and Science Birla Institute of Technology and Science
Pilani, India Pilani, India
p20200443@pilani.bits-pilani.ac.in p20180439@pilani.bits-pilani.ac.in

Sumanta Pasari
Department of Mathematics
Birla Institute of Technology and Science
Pilani, India
sumanta.pasari@pilani.bits-pilani.ac.in

Abstract—The utilization of solar energy as a including the greenhouse effect, glacial melting,
source of electricity is increasing day by day, raising and acid rain [1]. As a result, renewable energy
interest in prediction of solar irradiation. A successful has received increasing attention around the
integration of solar energy sources with existing
grid system is the biggest challenge due to volatile world because the resources are abundant and
and unpredictable behaviour of solar energy. To inexhaustible, and it is clean, green and reduces the
date, several approaches are proposed to analyse emission of greenhouse gases. Although renewable
and predict solar irradiation as well as to improve energy is an effective alternative to fossil fuels,
forecast accuracy. The present study concentrates on it brings unpredictability and uncertainty, affecting
hourly to monthly forecasting of solar irradiation
through various statistical methods, namely AR, MA, the energy system’s reliability and stability. The
ARMA, ARIMA, and Holt Winter’s technique. From abundant energy from Sun is renewable and capable
the decomposition of time series data, we found of generating large amounts of power [2]. Apart
that the dataset exhibits seasonality and randomness. from India, many other countries including United
The adequacy of the models is assessed from the States and China have adopted regulatory measures,
Root Mean Square Error (RMSE). We note that
the model performance improves with the increase rewards and subsidies to promote the use of
of time horizon (from hourly to monthly), probably renewable energy [3].
due to enhanced clarity in seasonality. In case of Reliable forecasting of renewable energy helps
ARIMA, the RMSE value turns out to be 124.21 in
hourly forecasting, whereas this value reduces to 15.66
in planning and estimating the energy output on
in monthly forecasting. A similar change has been a short term to a long term basis. Short term
observed for other models as well. (up to hourly) prediction of solar irradiance values
Index Terms—Renewable Energy, Time Series, can be used for rapid and immediate planning.
Solar Irradiance, Forecasting. Medium-term forecasting helps deciding the days
with higher irradiance for high energy production,
I. I NTRODUCTION whereas long-term forecasting is used for long term
As one of the crucial components in the scheduling and energy planning.
industrialization and urbanization processes, energy For accurate solar energy prediction, various
plays a crucial role in economic and technical methods are available in the literature. These
advancement. Moreover, a significant increase in methods can be broadly divided into three
population has led to a large exacerbation of the parts: physical methods, statistical methods, and
energy crisis. So far, the fossil fuels are the main computational approach. Hybrid techniques are also
cause of concern, which continue to be the most used for forecasting of solar irradiation. In 2012,
dominant source of energy production across the Dazhi et al. [4] applied the ARIMA model using
globe. At the same time, fossil fuel combustion three different approaches on variables affecting
has resulted in a number of environmental issues, the solar energy. The model is applied on GHI
value, DHI and DNI values, and cloud cover values,
respectively. The result shows that the performance

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 72


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of the ARIMA model is better in terms of goodness the MA part is used for modeling the error term
of fit value for cloud cover. In 2019, Alsharif et occurring at various times in the past. The model is
al. [5] have reviewed statistical ARIMA method for usually referred to ARMA (p, q), as defined below
forecasting of daily and monthly solar energy data. [12]
Cheng et al. [6] in 2021 provide daily to weekly p q
solar energy forecasting using convolutional long Xt = ∑ ψi Xt−i + ∑ θj ωt−j
short term memory. In 2020, Belhmandi et al. [7] i=1 j=1
provide one month ahead forecasting using time D. Autoregressive Integrated Moving Average
series model. Lu [8] presents heuristic time series (ARIMA)
method for renewable energy forecasting in Taiwan.
Similarly, Cheng [9] presents hybrid solar irradiance It is a generalization of ARMA model. An
short-term forecasting by fusing Kalman filter and ARIMA model is applied where data shows some
regressor. evidence of non-stationarity in sense of mean (not
The layout of the remaining paper is given below. in variance). Predictions are based on regressing the
Section 2 provides an overview of time series variable on its own lagged, regression error, and
methods whereas Section 3 presents the summary of the differencing values. It is generally denoted by
methodology and dataset description. The outcomes ARIMA (p, d, q) and is formulated as follows [13]
of the implemented models are discussed in Section
p q
4, whereas the concluding summary is presented in
(1 − ∑ ψi Li )(1 − L)d Xt = (1 + ∑ θi Li )ϵt
Section 5. j=1 j=1

II. OVERVIEW OF T IME S ERIES M ETHODS AND Where, ωt denotes white noise;
E RROR M ETRIC ψ = (ψ1 , ψ2 , .., ψp ) and θ = (θ1 , θ2 , .., θq ) are
In this section, a brief overview of time series the model coefficients of AR and MA model
methods and RMSE (error metric) along with their respectively; d refers to the degree of differencing;
mathematical formulations is provided. p and q respectively denote the order of AR and
MA models; Xt represents the predicted value of
A. Autoregressive (AR) time series at time instance t.
An autoregressive is a random process which is E. Root Mean Square Error (RMSE)
used to predict future outcomes of a sequence from
previously observed outcomes of the sequence. It The root mean square error (RMSE) is a fre-
takes into account that the output variable depends quently used measure to quantify the discrepancies
linearly on its own previous value and a random between values predicted by a model or estimator
component (the unpredictable term). An AR (p) and the actually observed values. The RMSE value
model is given by [10] is a square root of average of squared error.
The mathematical formulation of RMSE value is
expressed as follows
¿
p
Xt = ∑ ψi Xt−i + ωt = ψ1 Xt−1 + ... + ψp Xt−p + ωt
Á ∑n (X − X̂ )2
Á
À j=1 i
RM SE =
i=1 i
B. Moving Average (MA) n
It is also known as moving-average process, Where, Xi is the actual and X̂t is the predicted
a common process for modeling univariate time value of time series.
series. The Moving Average (MA) process specifies
that the output variable depends on numerous III. DATA S ET AND M ETHODOLOGY
random terms of present and past values. The MA This section presents the data and methodology of
(q) process is as follows [11] time series model used for solar energy forecasting.
Solar irradiance data used in this study is obtained
q
from the National Solar Radiation Database
Xt = ∑ θj ωt−j +ωt = θ1 ωt−1 +θ2 ωt−2 +...+θq ωt−q +ωt
j=1
(NSRDB; https://maps.nrel.gov/nsrdb-viewer), hav-
ing spatial resolution of 10×10 km and temporal
C. Autoregressive Moving Average (ARMA) resolution of 1 hour. The data set is recorded
An ARMA model provides a concise explanation at a location in Gujarat, India. The dataset
of a stochastic process in terms of two polynomials, contains several atmospheric variables, namely, GHI
one for the autoregression (AR) and other for (Global Horizontal Irradiance), DNI (Direct Normal
the moving average (MA). The AR part involves Irradiance), DHI (Direct Horizontal Irradiance),
regressing the variables on its own past values while Relative Humidity, Pressure, Solar Zenith Angle.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 73


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 1: Additive time series decomposition of daily (upper left panel), weekly (upper right panel), and
monthly (lower panel) data

The GHI value is most appropriate parameter Table I: Hourly forecasting


used in solar irradiance prediction. The proposed Technique RMSE Best Parameters
AR 342.23 p=9
methodology is classified into three categories, the MA 226.27 q=7
first of which is to do an exploratory data analysis. ARMA 147.43 (p,q)=(3,7)
ARIMA 124.21 (p,d,q)=(6,0,4)
It consists of visualising solar energy data and Holt Winter’s 109.61 Trend=“add”, seasonal=“add”, seasonal periods=110
executing an additive time series decomposition
to look for any seasonality or trends. From
decomposition plot in Figure 1, we can observe Table II: Daily forecasting
that daily and weekly data fail to show seasonal Technique RMSE Best Parameters
AR 60.32 p=5
pattern through decomposition due of large data MA 62.49 q=9
points. However, monthly data confirms seasonality. ARMA 57.10 (p,q)=(8,3)
ARIMA 56.99 (p,d,q)= (4,1,6)
In the second step, we resample the hourly data Holt Winter’s 75.47 Trend=“add”, seasonal=“add”, seasonal periods=334
into an daily, weekly and monthly manner for
the purpose of training the models. The next step
is to implement the time series models, namely Table III: Weekly forecasting
AR, MA, ARMA, ARIMA and Holt Winter’s Technique RMSE Best Parameters
AR 36.94 p=2
technique. Hourly, daily, weekly and monthly MA 45.11 q=3
data are forecasted and compared to their actual ARMA 36.14 (p,q)=(1,1)
ARIMA 35.28 (p,d,q)=(0,1,1)
values. For the accuracy measure, the Root Mean Holt Winter’s 33.07 Trend=“add”, seasonal=“add”, seasonal periods=52
Square Error (RMSE) values are calculated. The
training, testing and model evaluation is done using
pmdarima, sklearn and statmodels library on Jupyter Table IV: Monthly forecasting
notebook. Technique RMSE Best Parameters
AR 26.12 p=1
MA 40.33 q=1
ARMA 15.66 (p,q)=(6,6)
ARIMA 15.66 (p,d,q)=(6,0,6)
Holt Winter’s 15.90 trend=”add”, seasonal=”add”, seasonal periods=12
IV. R ESULTS
V. S UMMARY AND C ONCLUSION
The comparison of models on different horizon The findings of this study are as follows:
of GHI dataset is shown by the time series plots in 1. Due to the higher order of seasonality in
Figures 2, 3, and 4. Tables I, II, III and IV present hourly data set, conventional time series models
the results of GHI forecasting of the implemented have not provided satisfactory results for hourly
models for hourly, daily, weekly, and monthly forecasting. However, as compared to others in
predictions, respectively. The model parameters’ terms of accuracy measures, the ARIMA(6,0,4) and
optimal values are also included here. Holt Winter’s model provides satisfactory results

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 74


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 2: GHI data in Gujarat from 2000–2014.

Figure 3: Performance of models on daily GHI data.

Figure 4: Performance of models on weekly GHI data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 75


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 5: Performance of models on monthly GHI data.

with their associated RMSE values 124.21 and [5] M. H. Alsharif, M. K. Younes, J. Kim, ”Time series
109.61 respectively. ARIMA model for prediction of daily and monthly average
global solar radiation: The case study of Seoul, South
2. For daily forecasting, ARMA(8,3) and Korea”, Symmetry, 11(2), pp. 1-17, 2019.
ARIMA(4,1,6) provide the best performances, [6] H. Y. Cheng, C. C. Yu, C. L. Lin, ”Day-ahead to week-
whereas Holt Winter’s technique provides best ahead solar irradiance prediction using convolutional long
short-term memory networks”, Renewable Energy, 179, pp.
outcomes for weekly forecasting. 2300-2308, 2021.
3. The accuracy of the ARMA and ARIMA [7] B. Belmahdi, M. Louzazni, A. E. Bouardi, ”One month-
ahead forecasting of mean daily global solar radiation using
models are acceptable for monthly forecasting. The time series models”, Optik, 219, pp. 1-9, 2020.
RMSE values fall as the time horizon expands; [8] S-Li. Lu, ”Integrated heuristic time series with modified
model’s complexity reduces as well. grey forecasting for renewable energy in Taiwan”,
Renewable Energy, 133, pp. 1436-1444, 2018.
4. The dataset is stationary with respect to [9] H. Y. Cheng, ”Hybrid solar irradiance now-casting by
standard deviation but not with respect to mean. fusing Kalman filter and regressor”, Renewable Energy, 91,
The mean value changes with time. The ARMA pp. 434-441, 2016.
[10] J. Moon, Md. B. Hossain, Ki. H. Chon, ”AR and
and ARIMA models provide approximately similar ARMA model order selection for time-series modeling with
results for daily, weekly and monthly dataset. ImageNet classification”, Signal Processing, 183, pp. 1-11,
5. Holt’s Winter model does not outperform 2021.
[11] X. Li, Y. Liu, L. Fan, S. Shi,T. Zhang, M. Qi, ”Research
other models because the dataset doesn’t have trend on the prediction of dangerous goods accidents during
component as observed from the decomposition highway transportation based on the ARMA model”,
plot. Journal of Loss Prevention in the Process Industries, 72,
pp. 1-8, 2021.
In summary, the present research provides a [12] T. Chen, G. Chen, W. Chen, S. Houd, Y. Zheng, H.
comprehensive evaluation of time series models for He, ”Application of decoupled ARMA model to modal
identification of linear time-varying system based on
solar energy forecasting over a desired time horizon. the ICA and assumption of short-time linearly varying”,
The proposed methodology and the related results Journal of Sound and Vibration, 499, pp. 1-21, 2021.
are useful to enhance energy sector’s planning and [13] D. Yongganga, W. Huan, W. Mingqiang, T. Linjianga,
Y. Tao, ”Application of ARIMA-RTS optimal smoothing
management. algorithm in gas well production prediction”, Petroleum,
pp. 1-8, 2021.
R EFERENCES [14] S. Shukla, R. Ramaprasad, S. Pasari, S. Sheoran, ”Statisti-
cal Analysis and Forecasting of Wind Speed”, International
Conference on Energy, Power and Environment (ICEPE),
[1] H. Wang, Z. Lei, X. Zhang, B. Zhou, J. Peng, ”A review
pp 1-6, 2022.
of deep learning for renewable energy forecasting”, Energy
Conservation and Management, 198, pp. 1-14, 2019.
[2] P. Kumari, D. Toshniwal, ”Long short term memory-
convolutional neural network based deep hybrid approach
for solar irradiance forecasting”, Applied Energy, 295, pp.
1-20, 2021.
[3] Z. Yongning, Y. lin, L. Zhi, S. Xuri, L. Yansheng, J. Su, ”A
novel bidirectional mechanism based on time series model
for wind power forecasting”, Applied Energy, 177, pp. 793-
803, 2016.
[4] Y. Dazhi, P. Jirutitijaroen, W.M. Walsh, ”Hourly solar
irradiance time series forecasting using cloud cover index”,
Solar Energy, 86, pp. 3531-3543, 2012.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 76


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Novel MPPT Approach for a Grid Tied


Wind Energy System
Dr. D.RaviKishore 1 , Dr. B. Kavya Santhoshi2 , K. Sravani3 , Kalpaguri Maruthi4
Department of Electrical and Electronics Engineering, Godavari Institute of Engineering and
Technology (Autonomous), Affiliated to JNTUK, Kakinada, Rajahmundry, A.P, India. 1,2,3
Dr.Samuel George Institute of Engineering (JNTUK), AP, India4 .
dravikishore@gmail.com1 , kavyabe2010@gmail.co m2 , emandisravani8@gmail.com3 ,
maruthi.kalpa@gmail.co m4
* Corresponding Author Email ID: kavyabe2010@gmail.co m

Abstract. As the number of distributed power systems and facilitates the extraction of maximum power from
that use non-linear loads has increased, improving the PV panel. The DFIG-based WECS utilises a
power quality has become a top priority for PWM rectifier, which is in turn controlled by a PI
academics. In this work, we look at how the controller, to complete the AC-DC conversion.
harmonics in a distributed power system may be Reference current generation is essential for
reduced with the use of a device called a Distribution harmonic removal, and this is achieved by the
S tatic S ynchronous Compensator (D-S TATCOM). Hysteresis Current Controller. MATLAB is used to
When compared to other FACTS devices, D- simulate the complete regulated process, and the
S TATCOM has more reliable voltage stability results show that the suggested method provides
because to its built-in voltage regulator. As a result of higher power quality with less distortion than other
its high voltage-gain ratio, LUO converter is methods.
employed. Using an ANFIS -based MPPT (Maximum Keywords: maximum power point tracking, PV
Power Point Tracking) guarantees regulated output system, power quality,Point of Common Coupling

I INTRODUCTION reactive power on a cycle-by-cycle basis. It is not


preferred for industrial power systems owing to the
The word "power quality" is used to
high cost of switching devices [3]. By regulating
indicate the current, voltage, and frequency
the impedance of the transmission line, the
variations in the power system. As a result of the
Thyristor Controlled Series Capacitor (TCSC),
addition of a significant number of electronic
which is a fixed capacitor linked in parallel with
components to the distributed power system, power
the Thyristor Controlled Reactor (TCR), keeps the
quality issues have become one of the most crucial
power flowing, increases system stability, and
problems faced by customers and electric utilities.
boosts power transfer efficiency. Modeling TCSC,
The non-linear loads like diode bridge rectifier, RL
with its nonlinear switching properties, is difficult
load, variable speed drives , etc. employed in
[4, 5]. Typical distance protection is ineffective
distributed power system create several power
because of the TCSC's fluctuating impedance, as
quality issues such as voltage swell, voltage sag,
measured by the distance relay [6]. Connected
harmonics, impulses, transients, etc. The power
between a battery and the electrical grid, the
quality issues if not resolved properly leads to
Voltage Source Converter (VSC) in a Static
equipment dysfunction which in turn disrupt the Synchronous Compensator (STATCOM) does
entire distributed power system causing severe
reactive power correction [7].
economic loss [1, 2]. These power quality issues
are rectified with the help of different Flexible AC In recent years, the use of renewable
Transmission systems (FACTS) devices like energy sources for electricity generation has gained
TCSC, SVC, STATCOM, etc. widespread attention. The need for a clean, cheap,
and reliable power source is universal, and
The Static Var Compensator (SVC) is
renewable energy sources provide just that. When
mainly employed to carry out voltage regulation,
compared to other renewable energy sources, solar
flicker minimization, and power factor adjustment.
power has the most promising future. Solar cells
The SVC facilitates voltage regulation and
are combined with power electronic converters,
improves power quality by offering switched

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 77


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

storage batteries, tracking systems, power Because it avoids problems seen by other
conditioning circuits, and other components to compensating devices, the D-STATCOM is used in
deliver electricity into the utility grid in a solar PV this setup to keep power disturbances to a
system. When exposed to sunlight, photovoltaic minimum. Power quality problems, such as voltage
cells that are built of semiconductors create direct sag and voltage swell, impact the source voltage
electric current. The amount of solar radiation that and introduce harmonics into the source current
falls on the photovoltaic panel's surface influence when three-phase AC electricity is delivered to a
the amount of electric power it generates [8-11]. nonlinear load. The voltage sag and swell can be
effectively minimised using STATCOM, but the
II PROPOSED SYSTEMDESCRIPTION
source current harmonics cannot. In Figure 1, we
see a block representation of the suggested system.
When it comes to power quality concerns
like voltage sag, swell, harmonics, etc., FACTS
controllers have shown to be indispensable.

Figure 1: Block diagram of proposed system.

The Luo converter is improved using the the source voltage and source current to
ANFIS-based MPPT approach so that it can follow generate the reference current by using the
the MPP voltage of the PV system. Combining DQ theory. To regulate the inverter's functioning,
features of ANN and FLC, the ANFIS based MPPT the Hysteresis Current Controller (HCC) generates
approach is regarded as a powerful artificial PWM pulses by contrasting the latter with a
intelligence tool. An inverter uses a PWM rectifier reference current. There is an LC filter between the
to convert the alternating current (ac) electricity inverter and the Point of Common Coupling (PCC),
produced by the Wind Energy Conversion System which regulates the current flow. The inverter
(WECS) into direct current (dc). The pulses from current isinjected in to the distribution line with
the PWM generator regulate the PWM rectifier's particular phase angle and magnitude so as to
output. The PI controller compares the reference regulatesource current at the rated sinusoidal
voltage and actual voltage so as to waveform and in phase with the source voltage.
produce an error signal which initiates the PWM
generator to produce PWM pulses. The output of III PROPOSED MPPT
PWM rectifier is stored in the capacitor bank. The
constant DC voltage thus obtained from both the An ANFIS based MPPT controller which
PV system and WECS is fed to the inverter in order has the properties of both fuzzy logic controller and
to make its output constant. To reduce the source neural network gives excellent tracking accuracy
current harmonics, it is necessary to find the and quick convergence speed in comparison with
reference current from the source current. other artificial intelligence MPPT methods . It
RNN based reference current generation compares possesses improved fuzzy membership functions

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 78


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

having identical neural trained data. The back maximum power point without introducing any
propagation approach is used to train the fuzzy oscillation (MPP). When establishing fuzzy rules, it
membership functions so as to obtain tuned is recommended to do so only after a thorough
membership parameters. A fuzzy logic controller is analysis of the system's behaviour. The process
used to convert linguistic variables to numerical flow for the proposed MPPT approach is shown in
values. Unlike conventional MPPT algorithms, Figure 2.
ANFIS-based MPPT reliably pinpoints the

Figure 2: Flow chart of ANFIS based MPPT controller

IV RESULTS AND DISCUSSIONS STATCOM based power quality enhancement


The enhancement of power quality using D- scheme is carried out using MATLAB. Table 1
STATCOM for a hybrid energy system that gives the parameter specification for PV panel
encompasses PV system with ANFIS MPPT in along with LUO converter.
addition to DFIG based WECS is discussed in this
work. The simulation for the proposed D-

(a) (b)
Figure 3: (a) Voltage input waveform and (b) current input waveform
The voltage and current input of the LUO converter is not stable. The current is at a high value of 550A
is seen in Figure 3. A voltage of 68V is fed to the at 0.08sec and from 0.15sec, current of 420A is
converter, however the current fed to the converter supplied to the LUO converter.

(b)
(a)
Figure 4: Waveforms of converter (a) Output voltage and (b) Output current
The output voltage and current waveform stable voltage 600V and 38A is obtained from the
of the LUO converter is shown in Figure 4. A converter at 0.14sec and 0.15sec respectively.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 79


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 5: DFIG output voltage waveform


The DFIG based WECS is one of the most voltage of 500V is acquired in the beginning,
predominantly used techniques for generation of which steadily increases and stabilizes around
power through transformation of wind energy. A 600V from 0.1s as illustrated in Figure 5.

(a)
(b)
Figure 6: Waveforms representing (a) Grid voltage and (b) Grid current
Voltage and current waveforms in the grid are voltage or grid current. It has been measured that
shown in Figure 7(a) and 7(b), respectively. There 330V and 10A are the maximum voltage and
are no hiccups or fluctuations in either the grid current, respectively.

(b)
(a)
Figure 7: (a) Real Power and (b) Reactive Power Waveforms
The value of real and reactive power, as illustrated DC link voltage is included in Figure 8(a) and 8(b)
in Figure 7 is 5500W and -50VAR respectively. respectively.
The waveforms that represent the power factor and

(a) (b)
Figure 8: Waveforms of (a) Power factor and (b) DC link voltage
The proposed technique of DSTATCOM based
hybrid renewable energy system is highly V CONCLUSION
successful in maintaining a unity power factor. A
steady DC link voltage with a magnitude of 600V The booming integration of many
is maintained from a quick time of 0.14s. renewable energy sources and sensitive loads to the
distribution energy system has sparked concerns
about maintaining the power quality. The ceaseless
supply of power to the dis tribution energy system is
provided from a hybrid energy system, which

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 80


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

combines DFIG based WECS and PV. A stable


power from the PV of desired voltage level is
acquired using a highly efficient LUO converter
and ANFIS MPPT. From the simulation results
obtained using MATLAB, it is concluded that the
proposed technique is successful in maintaining the
reliability and stability of the distributed energy
system.

REFERENCES

1. W. E. Reid, "Power quality issues-standards and


guidelines," in IEEE Transactions on Industry
Applications, vol. 32, no. 3, pp. 625-632,1996.
2. M. Kezunovic and Y. Liao, "A novel software
implementation concept for power quality study," in IEEE
T ransactions on Power Delivery, vol. 17, no. 2, pp. 544-
549, 2002.
3. T . L. Baldwin, T . Hogans, S. D. Henry, F. Renovich and P.
T . Latkovic, "Reactive-power compensation for voltage
control at resistance welders," in IEEE Transactions on
Industry Applications, vol. 41, no. 6, pp. 1485-1492, 2005.
4. K. Li, J. Zhao, C. Zhang and W. Lee, "Dynamic Simulator
for T hyristor-Controlled Series Capacitor," in IEEE
Transactions on Industry Applications, vol. 46, no. 3, pp.
1096-1102, 2010.
5. B. K. Perkins and M. R. Iravani, "Dynamic modeling of a
T CSC with application to SSR analysis," in IEEE
Transactions on Power Systems, vol. 12, no. 4, pp. 1619-
1625, 1997.
6. A. A. R. Mohamed, H. M. Sharaf and D. K. Ibrahim,
"Enhancing Distance Protection of Long T ransmission
Lines Compensated With T CSC and Connected With
Wind Power," in IEEE Access, vol. 9, pp. 46717-46730,
2021.
7. P. Rao, M. L. Crow and Z. Yang, "ST ATCOM control for
power system voltage control applications," in IEEE
Transactions on Power Delivery, vol. 15, no. 4, pp. 1311-
1317, 2000.
8. K. Sarita et al., "Power Enhancement With Grid
Stabilization of Renewable Energy-Based Generation
System Using UPQC-FLC-EVA T echnique," in IEEE
Access, vol. 8, pp. 207443-207464, 2020.
9. S. Pradhan, B. Singh and B. K. Panigrahi, "A Digital
Disturbance Estimator (DDE) for Multiobjective Grid
Connected Solar PV Based Distributed Generating
System," in IEEE Transactions on Industry Applications,
vol. 54, no. 5, pp. 5318-5330, 2018.
10. Shakya, Subarna. "Performance analysis of wind turbine
monitoring mechanism using integrated classification and
optimization techniques." Journal of Artificial Intelligence
2, no. 01 (2020): 31-41.
11. Chang, Jia-bao, Fang-linNiu, and Tao Chen. "An Overall
Improved Ant Colony Optimization algorithm trained
BPNN for PV MPPT." Journal of Electrical Engineering 3,
no. 4 (2021): 322-339.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 81


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Design and Implemetation of Combinational Logic
Circuits using Open Source Tool
N. Divya, *G. Ilakkiya, M. Dheeraj, R. Hinduja, M. Gokul Nathan, M. Harish
Department of Electrical and Electronics Engineering, Sri Ramakrishna Engineering College, Coimbatore, Tamilnadu, India
*ilakkiya.2103036@srec.ac.in, divya.n@srec.ac.in

Abstract— Digital Systems plays an important role in


today’s modern technology. The practical implementation of II. TINKERCAD
digital circuits in laboratories leads to a complex wired circuits Tinkercad is a CAD programme that supports
and testing finds difficult. The damage of ICs, breadboards due people and companies in the manufacturing and advertising
to complexity needs replacement. This paper disseminates the sectors. The medical and architectural industries also profit
virtual use of all the components using an open source tool. from it. Copying preexisting designs and editing files is
Digital circuits are of combinational logic circuits and made easier by freeware. Older 2D and 3D blueprints can
sequential circuits. Implementation of combinational circuits also be updated and changed by designers. Tinkercad
using logic gates in virtual mode is described. Autodesk enables you to redesign garments by modifying its designs
Tinkercad is an open-source software tool for the development and parts. After that, you can stack blocks, add movements,
of system. The design of combinational circuits such as Adder, and mix forms in Tinkercad. These processes can be used to
Subtractor, Encoder, Decoder, Code converters are create the 3D designs needed for prototypes. The modifiable
implemented with ICs using Tinkercad tool. traces and shapes in Tinkercad can also be used to build
circuits [10-11]. The code blocks can then be used to create
Keywords— Digital system, Combinational circuits, GIF-based advertising campaigns. Tinkercad consists of
Tinkercad interface presets that will help you get began out with the
software [13-15].
I. INTRODUCTION
The development of Integrated Circuits (IC) III. COMBINATIONAL CIRCUITS
evolves from the invention of semiconductor technology. Combinational circuits works on the logic behind
The IC technology leads to the development of all the real time situation or a problem statement. The logic is
electronic products like mobile phones, laptops and so on. applied on set of inputs and depending on the logic outputs
are obtained. To design any combinational circuit the
Digital circuits plays a major role in this technology
following steps are essential:
development. Digital circuits are the broadly categorized 1. Problem statement or logical situation.
into combinational circuits and sequential circuits. The 2. Declaration of input and output parameters.
design and development of circuits using breadboards and 3. The parameters or literals are designated using
ICs during laboratories leads to a complex circuitry alphabets.
systems. The use of online open source tools for circuit 4. From the logic and input – output declaration Truth
design will bring the virtual form of circuit without any table is obtained.
5. Truth table enables to logic expression by means of
complexity and it also brings economic viability. In
K-map simplification.
combinational circuits the output corresponds to the logical 6. From K-map logic expression for each output is
representation of inputs depending on the real time obtained.
situations as shown in fig.1. Some examples of 7. Using the logic expression and with the help of
combinational circuits are Adders, Subtractors, Encoders, logic gates, Logic diagram is drawn.
Decoders, Parity circuits, code converters. The design of
IV. CIRCUIT DESIGN USING AUTODESK TINKERCAD
any combinational circuit has to follow the design
procedure. First, from the logical situation truth table has to AUTODESK Tinkercad is an open source software
tool. This tool is intended for code blocks, 3D designs and
be defined. Second, from the truth table Karnaugh map (K-
circuits. The basic fundamental units of arithmetic circuits
map) for logical function is obtained. From Logical are Half (2-bit) adder, Full (3-bit) adder, Half (2-bit)
function the implementation of circuit in virtual mode or subtractor, Full (3-bit) subtractor.
hardware is obtained.
A. 2 – BIT ADDITION : HALF ADDER
Half adder consists of two inputs as A, B and two
outputs as Sum (S) and Carry (C). Fig.2 represents the block
diagram of Half adder circuit.

Fig.1 Block diagram of combinational circuits


Fig.2 Block schematic of Half adder

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 82


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The design part of half adder circuit consists of Truth table, B. FULL ADDER
k-map simplification and logic diagram.
Full adder circuit employs on three inputs A,B,Cin
Table 1. Truth Table for Half Adder and two outputs Sum(S) and Carry (Cout) [1-2]. Fig.6
represents the block diagram of Full adder circuit.

Fig.6 Block schematic of Full adder


From the truth table given in Table 1, k-map simplification
is performed and logical function is obtained as in Fig.3. The truth table of full adder is as follows:

Table 2. Truth Table for Full Adder

Fig.3 K-map simplification for Half Adder

From the truth table given in Table 2, k-map


simplification is performed and logical function is obtained
as in Fig 7.

Fig.4 Logic diagram for Half Adder


For implementation of the hardware circuit as in
Fig.4 the requirement is two input AND gate IC – 7408, two
input XOR gate IC. The hardware implementation is done
virtually using AUTODESK Tinkercad considering inputs
as slide switches and outputs as Indicators- LED [5-9]. The
combinations of various inputs are verified using the Fig.5.
The virtual implementation looks exactly as the hardware
real time implementation of the circuits.

Fig.7 K-map simplification for Half Adder

Fig.5 Implementation of Half adder circuit using Tinkercad

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 83


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

From the truth table given in Table 3, k-map simplification


is performed and logical function is obtained as in Fig.11.

Fig.11 K-map simplification for Half subtractor


Fig.8 Logic diagram for Full Adder
For implementation of the hardware circuit as in Fig 8,
the requirement is two input EXOR gate IC – 7486, two
input AND gate IC – 7408, two input OR gate IC-7432. The
combinations of various inputs are verified using the Fig.9

Fig.12 Logic diagram for Half subtractor

For implementation of the hardware circuit as in Fig.12,


the requirement is two input AND gate IC – 7408, two input
XOR gate IC – 7486 and two input NOT gate IC - 7404.
.The combinations of various inputs are verified using the
Fig.13

Fig.9 Implementation of Full adder circuit using Tinkercad


C. HALF SUBTRACTOR
Half subtractor consists of two inputs as A, B and
two outputs as Difference (D) and Borrow (B0). Fig.10
represents the block diagram of Half subtractor circuit.

Fig.13 Implementation of Half subtractor circuit using


Tinkercad
Fig.10 Block schematic of Half subtractor
The design part of half subtractor circuit consists of Truth D. FULL SUBTRACTOR
table, k-map simplification and logic diagram. Full Subtractor circuit employs on three inputs A,Bin,C
and two outputs Difference (D) and Borrow (B0) [12].Fig.10
Table 3. Truth Table for Half subtractor represents the block diagram of Full subtractor circuit.

Fig.14 Block schematic of Full Subtractor

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 84


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The truth table of full adder is as follows: input AND gate IC – 7408, two input OR gate IC-7432
Table 4. Truth Table for Full Subtractor AND not GATE. The combinations of various inputs are
verified using the Fig.17

From the truth table given in Table 4, k-map


simplification is performed and logical function is obtained
Fig.17 Implementation of Full Subtractor circuit using
as in Fig.15.
Tinkercad
E. ENCODER
Encoders are digital circuits that do the opposite of what
decoders do. As a result, the alternative to secret writing is
referred to as encoding. A logical circuit that converts a live
signal into a coded output signal is known as an encoder [3-
4]. It has one input line and m output lines, only one of
which is active at any given time. It encodes one of the
active inputs into an m-bit binary output. In an encoder, the
number of outputs is less than the number of inputs.
Consider a four to two encoder, which has four inputs for
each four digits and two outputs that generate the binary
number. The following output Boolean functions are
implemented using Tinkercad as shown in Fig.18:

Fig.15 K-map simplification for Full Subtractor

Fig.18 Implementation of 4:2 Encoder circuit using


Tinkercad
F. DECODER
Most virtual devices require register interpretation. A
simple circuit that converts an n-bit binary input code into 2n
output lines, each of which can be enabled for the simplest
possible input combinations A 2 to 4 decoder has two A and
Fig.16 Logic diagram for Full Subtractor B inputs and four outputs (D0-D3). Based on the two inputs,
For implementation of the hardware circuit as in Fig 16, one of the four outputs is chosen.
the requirement is two input EXOR gate IC – 7486, two

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 85


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The logical expression for the outputs can be written as


follows and implemented using Tinkercad as shown in
fig.19.

Fig.20 Logic Diagram for BCD to Excess – 3 code converter


Fig.19 Implementation of 2:4 Decoder circuit using This logic diagram is the complex circuit to implement in
Tinkercad real hardware part. If any hardwire goes wrong have to re-
G. CODE CONVERTERS circuit everything which is a tedious process. This can be
implemented in a robust manner using Tinkercad as in
Binary codes are classified into weighted codes, non- Fig.21.
weighted codes, BCD codes, alphanumeric codes and Error
codes. Excess 3 code is an example of weighted code. Any
binary code can be converted to any other binary code. For
example we have binary to excess 3 code, binary to gray
code, BCD to excess 3 code and so on. The design of code
converter circuit for BCD to Excess 3 circuit is done. BCD
varies from 0 to 9. The truth table is given in Table 5.

Table 5. Truth Table for BCD to Excess – 3 code converter

Fig.21 Implementation of BCD to Excess – 3 code converter


circuit using Tinkercad
V. COMAPRISON WITH OTHER OPENSOURCE
TOOLS
There are several advantages to using the
Tinkercad platform over other circuit simulation tools. An
excellent circuit design and simulation interface, open
source software that does not require installation on the
computer, no licensing is required, and features for
monitoring students' work are all included.
Survey has been taken among a set of students
To design any combinational circuit k map is essential. under various criteria to compare the ease work of
From the k map simplification, logic diagram is drawn as Tinkercad among other platforms.
shown in Fig.20.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 86


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

1. Which one is useful among the online platforms CONCLUSION


for a self-learner and without any assistance?
Design and Implementation of any electric circuits in
hardware mode brings complexity in installation. As a trial to
build the circuits open source tools provides a software
platform for design and implementation. Among the other
open source tools for circuits Tinkercad provides the
flexibility, hands on experience, easy way of learning,
knowledge acquirement, individual exposure and so on. This
paper described the design and implementation of digital
circuits in a smarter way using Tinkercad, which
demonstrates the virtual laboratory experience.

2. Which platform helps the students to engage REFERENCES


more and involve in circuit design activities? [1] N. Raghav, M. Bansal, “Analytical Study of Full Adder Circuit using
Modified Glitch Free Cascadable Adiabatic Logic”, International
Conference on Advanced Production and Industrial Engineering
(ICAPIE-2017), 2017.
[2] D. Ruhela, M. Bansal, “Vedic Multiplier with Chinese Abacus Adder
Design using Reversible Logic Gates”, 2nd International Conference
on VLSI, Communication and Networks (VCAN-2015), pp. 9-12,
2015.
[3] Bansal, Malti, Harmandeep Singh, and Gaurav Sharma. "A
Taxonomical Review of Multiplexer Designs for Electronic Circuits
& Devices." Journal of Electronics vol 3, no. 02, 77-88, 2021
[4] Madhura, S. "A Review on Low Power VLSI Design Models in
Various Circuits." Journal of Electronics 4, no. 2, 74-81, 2022
[5] Yadav, A.K., Shrivatava, B.P., Dadoriya, A.K.: Low power high
speed 1-bit full adder circuit design at 45nm CMOS technology. Int.
Conf. Recent Innov. Signal Proc. Emb. Sys. (RISE), 427–432, 2017
3. Which platform offers circuit design sharing? [6] M. Aguirre-Hernandez and M. Linares-Aranda, "CMOS full-adders
for energy-efficient arithmetic applications", IEEE Transaction Very
ie., one can work on others circuit easily by link Large ScaleIntegration (VLSI) Syst., vol. 19, no. 4, pp. 718-721, Apr.
sharing. 2011.
[7] Deepa Sampath and V Kumar, "Analysis of Low Power 1-bit Adder
Cells usingdifferent XOR-XNOR gates", IEEE International
Conference on Computational Intelligence & Communication
Technology, 2015.
[8] Arvind Nigam and Raghvendra Singh, "Comparative Analysis of 28T
Full adder with 14T Full adder using 180nm", International Journal of
Engineering Science Advance Research, vol. 2, no. 1, pp. 27-32,
March 2016.
[9] Partha Bhattacharyya, Bijoy Kundu, Sovan Ghosh and Vinay Kumar,
"Performance Analysis of a Low-Power High-Speed Hybrid I-bit Full
Adder Circuit", IEEE Transactions on Very Large scale Integration
(VLSI) Systems, vol. 24, no. 11, Nov 2015.
[10] Prabhat K. Patnaik, Peddiniti Ajay, M.Manoj Varma “A New
Approach for Implementation and Simulation Study Of Digital
Circuits using CEDAR Logic”, International Journal of Smart Sensors
and Ad Hoc Networks, vol 3, no.1, 2012.
4. Which Platform helps the Teachers to guide and [11] G. Thrishala, K.Ragini “Design and Implementation of Ternary Logic
Circuits for VLSI Applications”, International Journal of Innovative
monitor the students’ performance individually? Technology and Exploring Engineering, vol 9, no 4, 2020
[12] Manoj Kumar, Sandeep K. Arya, Sujata Pandey “Single bit full adder
design using 8 transistors with novel 3 transistors XNOR gate”,
International Journal of VLSI design & Communication Systems,
vol.2, no 4, 2011.
[13] Manuel E. Macias, Israel Mendez, “eLab - Remote electronics lab in
real time”, Frontiers in Education (FIE) Conference,2008
[14] E. Guimaraes, A. Maffeis, R. Pinto, C. Miglinski, E. Cardozo, M.
Bergerman, et al., "REAL - A Virtual Laboratory Built from Software
Components", Proceedings of the IEEE, vol. 91, no. 3, pp. 440-448,
March 2003.
[15] N. Ertugrul, "Towards Virtual Laboratories: a Survey of LabVIEW-
based Teaching/Learning Tools and Future Trends" in The
International Journal of Engineering Education, TEMPUS
Publications, vol. 16, no. 3, pp. 171-180, 2000.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 87


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Architectural Designs and Performance Analysis of


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Adiabatic-based 6T, 9T, and 12T SRAM Cells


Parvathi M
Department of Electronics and
Communication Engineering
BVRIT HYDERABAD College of
Engineering for Women
Hyderabad, Telangana, India
parvathibendalam@gmail.com

Abstract—Many applications use SRAM as the core area, and delay. This over-head disability will become
memory architecture, which necessitates the development of severe in higher-range memory capacities. As an
various SRAM cell architectures. A few design methods of alternative, low-power designs have emerged using wider
SRAM cells use various low-power techniques, but adiabatic technologies, reversible logic is one amongst the best. The
logic, such as reversible gates, proves its performance logic that retains the information without loss of energy is
improvement by providing zero heat dissipation. In this called reversible logic. The literature [9, 10] suggests that
paper, the design of each 6T, 9T, and 12T SRAM cell using the loss of energy in irreversible computations in the form
Feynman and Toffoli gates is presented. While comparing the of heat will be an amount of KT × ln2 Joules for every bit,
results of both Feynman and contemporary CMOS based
where K is Boltzmann's constant and T is temperature in
SRAM designs, it is observed that the critical path delay is
reduced and speed improvement is raised by 62.7%, 82.3%,
kelvins. Due to the tremendous rise in memory usage in
and 69.2%, respectively. It is also observed from the results applications, the need for low-power memory designs has
that the maximum operating current Imax is less in Toffoli become essential in recent years. However, the
based SRAM designs, and the reduction advantage is 99.5% computations that take place in conventional memory are
and 40% in 9T and 12T cells, respectively. Furthermore, the irreversible. In general, heat dissipation occurs in the
area reduction advantage is observed in Feynman-based memory cells during the write operation of data because the
SRAMs at 17%, 63.5%, and 10.8%, respectively, and is much existing data is re-placed with the new data. Sometimes
more comparable to CMOS-based SRAMs. false operations due to presence of errors also leads to
energy distribution [11]. These causes an irreversible
Keywords— Reversible logic, Static RAM cells, low power, operations. The same advantage is brought into SRAM cell
area reduction, adiabatic logic design with reversible circuit design [12]. The main
challenge in reversible logic designs is to reduce the number
I. INTRODUCTION of garbage outputs and unused inputs as well. The
The fundamental problem that is always prone to design competent SRAM cell design for 6T, 9T, and 12T is
upgradation in SRAM is data instability due to its write and showcased in this paper with minimised garbage outputs
read line architectures. The major influencing parameters and with minimised quantum delay and quantum cost. The
for data stability in SRAM cells are identified as supply following sections are arranged as follows: Section II
voltage, threshold voltages, static noise margin, leakage explains the literature review. Section-III focused on the
current sources, etc. In a 6T SRAM cell, the essential proposed reversible SRAM cell. Section-IV illustrates the
parameter static noise margin (SNM) [1, 2, 3] is a measure results and analysis, followed by Section-V conclusions.
of read and write margin violation. This causes an increase
in the delay while performing read and write operations [4]. II. REVIEW ON RELATED LITERATURE:
Another parameter is scaling [5]. As the technology goes A. Existing SRAM Designs and Limitations
down to the marginal level, it will have a significant impact
on SRAM cells, causing random fluctuations in behavioral A contemporary memory cell using a number of six
characteristics. This in turn causes variations in transistor transistors is shown in Fig.1. The basic functionality of
threshold voltage and leakage current levels [6]. As a SRAM relies on write and read operations. In a write
consequence, the reading and writing margins have violated operation, the cell stores the corresponding bit value. For
their parametric ratings. As a result, the SRAM cell this, the value to be written has to be placed on bit lines and
becomes unsteady under low power supply operations. In then the logic line WL has to be asserted. By observing
addition to that, huge static power results due to large nodes Q(QB), one can understand the core cell's stored
leakage current that is caused by the low threshold voltage value. If Q(QB) is held at logic high, it indicates a ‘1’(0) is
and thin gate oxide [7, 8]. This makes it difficult to attain stored, else a ‘0’(1) is stored. While in the read operation,
applications at lower technology nodes. Given the read ‘1’ needs precharge of both bit lines in prior to asserting
instability of SRAM 6T due to decreased SNM and the write logic line. This allows Q(QB) value to be
increased write and read delays, literature has suggested transferred through access transistors towards bit lines
using separate read and write lines to ensure that the SRAM BL(BLB). If BL (BLB) is observed with ‘1’(0) indicates
cell operates without delay. This led to the evolution of the read value is ‘1’(0). whereas reading ‘0’ needs a simple
higher designs for SRAM cells. Hence, in 9T, which uses a assertion of the WL line. The size of the bit line and driver
separate reading line, and in 12T, which uses separate transistors plays an important role in the read operation,
reading as well as writing lines. This results in an upgrade since voltage division influences the read stability. In the
of stability in the core cell. Despite the read/write stability similar way, the write operation causes an instability on an
of SRAM using a larger number of lines, it is prone to unselected column when the word line is activated. Indeed
suffering from performance overhead in terms of power, the essential influencing parameters on read stability are
scaling on supply voltage, cell ratio and temperature [13].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 88


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The majority of the literature has focused on read and write


stabilities using the SNM parameter, which is a measure of
SRAM cell stability used to identify the amount of node In the case of a 12T SRAM cell, the operation of bit lines
voltage present in the cell required to flip the cell value [14]. and write logic remains the same as SRAM 6T cell
Further, the key issues related to read and write instability operation. In contrast to the 9T SRAM cell, the 12T cell has
in 6T cells are rectified by using two or more transistors for 3 more new transistors added as shown in Fig 3. It is almost
separating the read and write operations. As a result, the 9T similar to a double cell model using a 6T cell. We have
and 12T have been developed [15], as represented in Fig 2 analysed the performance of CMOS based SRAM 6T to 12T
and 3. cells considering the parameters like power dissipation,
maximum operating current, area, and delay.
We have observed the limitations when the design goes
ahead from 6T to 12T SRAM architectures are i) a
decrement in the speed by 36.4%; ii) an increment in the
area by 59.7%; iii) an increment in the power dissipation by
55.8%; and iv) an increment in the current by 49.1%. Few
of the important influencing parameters considered under
unrealistic worst-case scenarios are leakage currents, bias
temperature instability (BTI), hot carrier injections (HCI),
and device threshold voltage affects circuit behavior in
Fig. 1. Traditional 6T SRAM cell weird manner that causes subtle performance degradation.
This parametric performance degradation greatly affects the
A standard 6T bit cell along with three extra transistors higher range of multicellular memory architectures.
were employed in the 9T SRAM cell as shown in Fig 2. The B. Review on Reversible logic Designs
core cell of the 6T SRAM cell remains the same for which
additional transistors are connected to separate write and A reversible gate is indeed a circuit having k inputs and
read operations. The two write access transistors are k outputs (k*k) which always produces the expected result
controlled by a write signal (WL). As usual, the data storage pattern for every possible input pattern. Numerous 3X3
is done through the core cell itself. The lower sub-circuit of reversible gates have been described in the literature [16].
the new cell is composed of the bit-line access transistors The essential measuring parameter in a reversible gate's
and the read access transistor. The operations of bit-line performance is quantum cost. A reversible gate's quantum
access transistors are controlled by the data stored in the cost is the number of 1 X 1 and 2 X 2 reversible gates or
cell. The read access transistor is controlled by a separate reversible logic gates needed in its construction. The basic
read signal (RL). reversible gates are regulated NOT that employs 1-1 NOT
gate and 2-2 reversible gates such as the Controlled-V-and
V+ gates, and the Feynman gate [17]. The SRAMs can
account for half of the power consumed by the CPUs [18].
The drawback of high power consumption due to high
capacitance and high access rates of static RAMs can be
eliminated using a reversible logic design approach.
Numerous SRAM architectures using reversible logic have
been reported [19, 20, 21, 22, 23, 24]. A few reversible logic
gate structures are shown in Fig.4. The quantum cost and
worst case delay are the crucial parameters while choosing
the reversible gates in the implementation of the chosen
SRAM design. The comparison of various reversible gates
in terms of performance measuring parameters is shown in
Table.1.
Fig. 2. SRAM 9T Architecture

Fig. 3. SRAM 12T Architecture Fig. 4. Reversible gates (a) Feynman (b) Toffoli (c) Peris (d) Fredkin

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 89


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I. COMPARISON OF VARIOUS REVERSIBLE GATES [17,18, &


19]
Reversible Quantum Quantum Number of Number of
Gate Cost Delay Gates Transistors
Feynman 1 1 1 12
Peres 4 4 3 30
Toffoli 5 5 2 18
Fredkin 5 5 8 28

From Table 1, the best reversible gates that help in


improving the design performance in terms of low quantum
cost with less delay-area are identified as Feynman and
Toffoli, which are used in our proposed work for the
implementation of 6T, 9T, and 12T SRAM cells.
III. PROPOSED METHOD OF SRAM ARCHİTETECTURE
DESIGNS USİNG REVERSİBLE LOGİC
The main limitation of conventional 6T cell is slow read Fig. 7. Feynman based 12T SRAM cell
or write operation and is due to time lapse in activating the
access transistors while accessing the latch. Due to this the B. SRAM cells 6T, 9T and 12T using Toffoli Gate
leakage power would increase in the span of read or write
One of the key logical gates is Toffoli gates, also called
operation. This can be overcome using low power reversible
controlled-controlled-NOT (CCNOT). This gate is a
design approaches.
universal gate since it can be used to construct all the logic
A. SRAM cells 6T, 9T and 12T using Feynman Gate circuits with desired binary operations. Using the Toffoli
The configuration of SRAM cells 6T, 9T, and 12T using gate as a key component in place of core SRAM, the three
Feynman is shown in Figs. 5, 6, and 7, respectively, which architectures are configured as shown in Figs. 8, 9, and 10
uses two Feynman gates in the place of conventional respectively.
transistors. In fact, the access transistors can also be
replaced with appropriate reversible gates [15], but the
proposed SRAM architectures are intended to build the core
SRAM cell itself. The read and write operations are similar
to the conventional SRAM cell operation itself.

Fig. 8. Toffoli gate based 6T SRAM Cell

Fig. 5. Feynman based 6T SRAM cell

Fig. 9. Toffoli gate based 9T SRAM Cell

Fig. 6. Feynman based 9T SRAM cell

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 90


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

requirement are compared with respect to three


configurations of SRAM (6T, 9T, and 12T). Fig. 11
compares power dissipation, Fig. 12 compares maximum
current, Fig. 13 compares critical path delay, and Figure 14
compares area analysis.

Fig. 10. Toffoli gate based 12T SRAM Cell


Fig. 11. Power dissipation comparison in proposed reversible SRAMs
IV. RESULT ANALYSIS
The simulation results using respective read and write
operations are observed for each proposed SRAM cell.
Table 2 shows the comparisons between proposed design
results with respect to conventional CMOS-based SRAM
configurations. In our work the circuits are designed using
the default parameters under the model of BSIM3, which
uses constant temperature of 270, threshold voltage of 0.4v,
for a supply voltage of 1.2v for 120nm technology node.

TABLE II. COMPARISON OF PROPOSED REVERSIBLE SRAM


DESIGNS WITH CONVENTIONAL CMOS

PARAMETER CMOS FYNMAN Fig. 12. Comparison for maximum current requirement in proposed
6T SRAM Cell reversible SRAMs
0.066- 0.206- 0.47-
POWER
1.43uW 0.41mW 52.7uW
DELAY, ns 1.69ns 0.63ns 0.08ns
CURRENT, mA 0-0.814 0.19-0.36 0-0.48
AREA, um2 81.6 67.7 108
9T SRAM Cell
0.15- 0.20- 0.46uW-
POWER
0.86uW 0.574mW 0.17mW
DELAY,ns 2.66ns 0.47ns 0.97ns
CURRENT, mA 0-0.743 0.19-0.66 0-0.53
AREA, um2 125.9 117.9 149.2
12T SRAM Cell
0.6- 0.51- 1.05uW-
POWER
3.24uW 1.57mW 0.74mW Fig. 13. Critical path delay comparison in proposed reversible SRAMs
DELAY,ns 2.5 0.77 1.04
CURRENT, mA 0-1.6 0.53-1.71 0-1.26
AREA, um2 202.6 180.7 248.3

From the results, it is observed that the Toffoli based 6T


SRAM is good at resulting in low power and Feynmann
based 6T is good at reducing maximum current and area
requirements with its counterpart CMOS based SRAM
architecture. In a similar way, for both 9T and 12T,
Feynmann based SRAM is observed with low area and
delay capabilities, while Toffoli with low current capability. Fig. 14. Area analysis in proposed reversible SRAMs
The improved parameter values are highlighted in "yellow"
in Table 2. V. CONCLUSIONS
This paper proposes the design and implementation of
Each individual parameter is compared with the rest of
SRAM architectures for 6T, 9T, and 12T using reversible
all the configurations. Each configuration is observed for
logic configurations for the improvement of the
read and write operations individually with logic ‘0’ and
performance of SRAM-based VLSI architectures. The
logic ‘1’. The corresponding observed parametric variations
designs are implemented using Feynman and Toffoli, in
are given in Table II. From Table II, each individual
which the power dissipation of Feynman gate based SRAM
parameter's power, delay, and maximum current
cells is less. That results in an advantage as the design goes

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 91


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

from 6T to 12T while looking for the improvement of Static [12] M. Morrison and N. Ranganathan: Synthesis of dual-rail adiabatic
Noise Margin (SNM). The Toffoli-based SRAM has a lower logic for low power security applications, Computer-Aided Design
of Integrated Circuits and Systems, IEEE Transactions on,
operating current (Imax) than all other counter 33(7):975–988, July 2014.
configurations. As the design scales from 6T to 12T, the [13] Sreekala K .S, Krishnakumar S., “RNM Calculation of 6T SRAM
area in a Feynman-based SRAM cell approaches that of a Cell in 32nm Process Node based on Current and Voltage
CMOS-based SRAM cell. Primarily, it is observed that the Information”, Indian Journal of Science and Technology, Vol
reversible logic designs are far better in improving the 10(29), DOI: 10.17485/ijst/2017/v10i29/116049, August 2017.
overall performance of the design parameters. It is observed [14] Ajay Gadhe, Ujwal Shirode, “Read stability and Write ability
with Feynman gate SRAM from 6T to 12T that the critical analysis of different SRAM cell structures”, International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622
path delay is reduced and the performance in speed is Vol. 3, Issue 1, January -February 2013, pp.1073-1078.
improved by 62.7%, 82.3%, and 69.2%, respectively. [15] P. N. V. Kiran and N. Saxena, "Design and analysis of different types
Despite the speed improvement, the power dissipation is not SRAM cell topologies," 2015 2nd International Conference on
a major issue and is observed to be a maximum of 1.5mW Electronics and Communication Systems (ICECS), 2015, pp. 1060-
in Feynman gate and 0.7mW in Toffoli gate based 12T 1065, doi: 10.1109/ECS.2015.7124742.
SRAM, respectively. It is observed that Imax in Toffoli [16] Edward Fredkin and Tommaso: Toffoli. Conservative logic,
SRAM is less than the other two designs, and the reduction International Journal of Theoretical Physics, 21(3-4):219–253,
1982.
advantage is approximately 99.5% and 40% in Feynman
and Toffoli gate based 12T SRAMs, respectively. The area [17] S.N. Mahammad and K. Veezhinathan: Constructing online testable
circuits using reversible logic, Instrumentation and Measurement,
reduction advantage in Feynman SRAM from 6T to 12T is IEEE Transactions on, 59(1):101– 109, Jan 2010.
observed to be 17%, 63.5%, and 10.8%, respectively, and is [18] S.D. Kumar and S.K. Noor Mahammad: A novel SRAM cell design
much more comparable with CMOS-based SRAM as the using reversible logic, 2014 3rd International Conference on Eco-
design progresses toward SNM improvement. Hence, it is friendly Computing and Communication Systems, 978-1-4799-
observed that Feynman gates can be used for the SRAM cell 7002-5/14, 2014 IEEE Computer Society, Pp:1-4.
design where the need is for high speed and a reduction in [19] M. Aditya, B. Balaji: Performance Analysis Of SRAM Cell Using
the area consumed. The Toffoli gate is more suitable for the Reversible Logic Gates, International Journal of Pure and Applied
Mathematics, Volume 117 No. 19 2017, 203-207
de-signs of SRAM cells where there is a requirement for a
[20] Chinmay Sharma, Varun Chhabra, Balwinder Singh, Hitesh Pahuja:
reduction in power dissipation and maximum current Design of SRAM array using Reversible logic for an efficient SoC
(Imax). design, Proceedings of the International Conference on Inventive
Computing and Informatics (ICICI 2017), IEEE Xplore Compliant -
REFERENCES Part Number: CFP17L34-ART, ISBN: 978-1-5386-4031-9.
[21] O. Mohana Chandrika, M. Siva kumar: Design and analysis of
[1] Paridhi Athe S. Dasgupta: A Comparative Study of 6T, 8T and 9T SRAM cell using reversible logic gates towards smart computing,
Decanano SRAM cell, 2009 IEEE Symposium on Industrial the Journal of Supercomputing, Springer Nature,
Electronics and Applications (ISIEA 2009), October 4-6, 2009, https://doi.org/10.1007/s11227-021-03851-z, Pp: 1-20
Kuala Lumpur, Malaysia. pp. 8.10-8.11. [22] M. Morrison, M. Lewandowski, R. Meana and N. Ranganathan:
[2] S, Birla, R.K. Singh, and M. Pattnaik: Static Noise Margin Analysis Design of static and dynamic RAM arrays using a novel reversible
of Various SRAM Topologies, IACSIT International Journal of logic gate and decoder, International Conference on
Engineering and Technology, Vol.3, No.3, 2011. Nanotechnology, 2011, pp. 417-420, doi:
10.1109/NANO.2011.6144407.
[3] Tejinder Kaur, Rachna Manchanda, Chanpreet Kaur: Parameters for
Stability of Reconfigurable Memory and 6T SRAM Cell, [23] Thapliyal, H., Ranganathan, N., Kotiyal, S. (2014): Reversible Logic
International Journal of Innovative Technology and Exploring Based Design and Test of Field Coupled Nano computing Circuits.
Engineering (IJITEE), ISSN: 2278-3075, Volume-8, Issue-9S, July In: Anderson, N., Bhanja, S. (eds) Field-Coupled Nano computing.
2019, Pp: 887-892. Lecture Notes in Computer Science, vol 8280. Springer, Berlin,
Heidelberg. https://doi.org/10.1007/978-3-662-43722-3_7.
[4] Neil H.E.Weste, David Harris and Ayan Banerjee: CMOS VLSI
DESIGN – A Circuits and System perspective, Pearson eduction, [24] H. Thapliyal and N. Ranganathan: Design of Reversible Latches
Third edition, ninth impression 2009, pp. 179. Optimized for Quantum Cost, Delay and Garbage Outputs, 2010
23rd International Conference on VLSI Design, 2010, pp. 235-240,
[5] Madhura, S. "A Review on Low Power VLSI Design Models in doi: 10.1109/VLSI.Design.2010.74.
Various Circuits." Journal of Electronics 4, no. 2 (2022): 74-81.
[6] Shigeki Ohbayashi, Makoto Yabuuchi, Koji Niiand, Susumu
Imaoka: A 65-nm SoC Embedded 6T-SRAM Designed for
Manufacturability With Read and Write Operation Stabilizing
Circuits, IEEE journal of solid-state circuits, Vol. 42,April 2007,
pp820 829.
[7] Sanjeev K. Jain and Pankaj Agarwal: A Low Leakage and SNM Free
SRAM Cell Design in Deep Sub micron CMOS Technology,
Proceedings of the 19th International Conference on VLSI
Design,May-2016.
[8] Rajasekhar Keerthi and Chein-in Henry Chen: Stability and Static
Noise Margin Analysis of Low-Power SRAM, I2MTC 2008 - IEEE
International Instrumentation and Measurement Technology
Conference, Victoria, Vancouver Island, Canada, May 12-15, 2008.
[9] Landauer, R.: Dissipation and noise immunity in computation and
communication, NATURE VOL. 335, 779-784, 27 October 1988.
[10] Landauer, R.: Irreversibility and heat generation in the computing
process, IBM J. Res. Dev. 5, 183-191 (1961).
[11] Darney, P. Ebby. "Design of a Customized Intelligent Electronic
Device for Power Circuit Safety." Journal of Electronics and
Informatics 4, no. 3 (2022): 142-151.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 92


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Design and Development of Neuro-Fuzzy based


Multi-Level Inverter using FPGA
Ameer Ahamed Z Dr. Anuj Jain Dr.V.K Sharma
Research Scholar Professor Dept of ECE Lovely Professor Dept of ECE Bhagwant
Dept of ECE Bhagwant University Professional University University, Ajmer, Rajasthan, India
Rajasthan, Ajmer, India Punjab, India viren_krec@yahoo.com
ameerahamed007@gmail.com a1978jain@gmail.com

Abstract— In the power electronic applications 1. These applications operate at more than 10kHz
the power electronic converters represent its usefulness frequency, this means the switching losses would
with the advance topology to drive the Grid. In this paper not exist had has no role at the operating
the multilevel inverters are designed with intelligent frequencies, here only thing is there will be
control techniques which given a precise output at the forward loss which made three level inverter cost-
Grid. The paper proposes a three phase three-level effective.
inverter with advance Neuro-Fuzzy technique which is
used to generate a constant voltage at the grid, 2. When the power crosses the 10kW, the higher
connected a BLDC motor as a reference grid with the level of activation process is required for the
influence of FPGA PWM pulses to drive switches. The systems with lower powers, for this 12 drivers are
three phase three level inverter is designed with a six needed instead of 6 IGBT drivers, hence these
power switches, the AC output is given to BLDC motor, devices cost will be more. However with larger
the speed is measured and compared with rated speed,
power less number of IGBT drivers reduces the
the error signal is taken into an Neuro-Fuzzy controller,
the output of controller is taken as a reference to
device sizes, anyhow the heat sink elements
generate PWM pulses from FPGA using Verilog prevails and makes the device cost-effective.
programming to drive switches, the proposed modeled is In the section II the basic of three level phase inverter is
simulated with ModelSim tool of MATLAB/Simulink explained in comparison with Two-level inverter and their
environment respective voltage waveforms are shown, in the section III
Keywords— Inverter, FPGA-Field Programmable Gate the proposed system is presented with the block diagram
Array, Neuro-Fuzzy, Neural Networks, Xilinx ISE, Verilog, with the explanation of each block, in the section IV, the
ModelSim. basic of XILINX Verilog programming is formulated with
I. INTRODUC TION respect to the proposed system and also the basic
advantages of using FPGA based system is explained, in
In the power electronic industries the Multi-level the section V a detailed basic information about the Neuro-
inverters designed is a crucial factor to get the precise Fuzzy system, the section VI presents the simulation circuit
output in the high frequency switching applications, and waveforms of different stages of inverter finally in the
hence many methods are proposed for real time power
section VII the whole system is concluded.
electronic applications, the conventional controllers such
as microcontroller and DSP controllers are given a II. THREE PHASE INVERTER
widespread applications in controlling or driving power
electronic switches but they [1] are well suited only for Traditional 2-level and 3-level inverters display
the low and medium frequency applications. The VLSI characteristics that are common to DC-AC converters.
based logic is considered as the solution for high From the available direct current, both methods can
frequency applications. The Verilog programming is a generate alternating voltage with variable frequency. Only
straight forward programming tool with user-friendly
the use of IGBT switches, diodes, and capacitors will be
instruction with less complexity, the FPGA
different between these two inverters. The three-level
programmable device is the device used with the Verilog
programming to execute the model, since the FPGA is single-phase inverter has three output stages as opposed to
having a very wide development period and the feature of the two-level inverter's two, which has four switches with
re-programmability and also it is having a capacity to four free-wheeling diodes and two additional clamping
drive the high frequency power electronic converters. The diodes to link the neutral point.
wide range of power electronic converters application is
based on three level phase inverters, they have a good In contrast to the two-level design, where the IGBT must
response at MW power level. switch the entire link voltage, the three-level configuration
The three level inverter topology is cost effective with the only causes the IGBT to lose half of the DC link voltage.
following applications: Multi-level Inverters has advantage over standard two level
and three level inverter because of less cost, complexity,
• UPS-Uninterruptible power supplies EMI, voltage tension and switching losses [3]. The most
widely used topologies for MLI are flying capacitors,
• Inverters with the high frequency output.
clamped diodes and cascaded H-bridge inverters.
• The higher clock frequencies dynamic Servo- The DC link capacitor needs to be built so that it can cut the
Drives which are designed for rapid regulation. DC link voltage in half. This occurs automatically in almost
all inverters with a link voltage of about 600 V because two
• Inverters with smart grid applications such as-
weakly-charged capacitors are connected in series.[5]
Battery Management, [2] Regenerative industrial
There are numerous intricate commutation methods for
supply.
switching procedures in a three-level phase. In order
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 93
to do
The main Two features for the above applications:
this, the module must have short current channels, an
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
efficientDVD
layout, and a CFP22CB5-DVD:
Part Number: gate control circuit that takes this
ISBN: 978-1-6654-6083-5 and they include very significant restrictions. These
into account. This is necessary to reduce switching surges processors, especially those [3] with higher operating
and increase efficiency using the highest link voltage frequencies, are unable to complete the necessary
possible. calculations in the allotted time. As a result, the gate control
circuit and protective circuit for power semiconductors are
almost usually stored in programmable logic, such as in a
CPLD or FPGA, in at least part. A powerful, simple single-
chip solution is produced when control is solely handled by
an FPGA. A fly back converter and an initial switching
power supply are used to provide a 15 V dc voltage from
the DC connection voltage in order to power the drivers.
This is utilised to provide the gate drivers for the lower
IGBTs directly (IGBT 4). For the remaining voltages,
which are electrically isolated for each gate drives from 3.
III. PROPOSED BLOCK DIAGRAM

The figure 3 shows the proposed system, in this system a


single phase inverter is shown while in the simulation
model is simulated for the three phase inverter, the output
of the inverter is connected to load/Grid, here the load in
the simulation is a simple BLDC motor, the feedback is
Figure 1: a) two-level inverter b) three-level inverter
taken from the load and given as input to the Neuro-Fuzzy
and FPGA subsystem [17], here the feedback signal will be
With the three-level design, each phase's output voltage is the speed of the motor, which is given to the NFS system
significantly closer to the ideal sine wave (Figure 2). from which the controlling output signal is obtained based
Smaller inductivities can be employed because of the on that controlling data the gate pulses are designed, the
voltage time region between the desired sine wave and the duty cycle is designed based on the output of the neuro-
switched output [4] voltage, which is producing the current fuzzy system, the gate pulses generated from FPGA
ripple. The devices can be made smaller and cheaper by programmable [6] device is incorporated in MATLAB
designing a much smaller filter. Lower copper losses SIMULINK MODELSIM tool, which can be used to
contribute to greater efficiency. The EMC filter can also be control the ON/OFF of IGBT switches of the inverter, this
made simpler since with a three-level inverter, one switch controlling action will generate a constant voltage/speed at
edge only activates 50% of the DC link voltage. the output.

Figure 3: Proposed Block Diagram

The output of the FPGA block has the PWM gate pulses
with duty cycle, here the voltage of these pulses is 3.3V,
hence the gate pulses are amplified using interfacing and
Figure 2: A three-level inverter (b) can reproduce the desired sinusoidal driving circuit, from which the 12V gate pulses is obtained,
voltage curve better than a conventional two-level inverter (a). required to drive the IGBT switches.

Controlling three-level inverters:


Many microcontroller manufacturers offer specialised IV. FPGA-VERILOG MODULES
motor control peripherals with built-in 6-phase PWM units.
Starting from the controller, gate drivers are used to The architecture of the FPGA-based controller [10] is
connect the six signals to the six IGBTs in order to create a modular. A schematic illustration of the top level of the
motor controller. Microcontrollers with two 6-phase PWM three-level PWM IP block is shown in Figure 4.
blocks to control two motors can be used to control a three-
level inverter with a little finesse (such as synchronising the
PWM blocks). However, creating these features is quite
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 94
challenging.
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5 or byte-wide Flash memory, or it is serial to reduce pin
requirements..

V. NEURO-FUZZY LOGIC

By fusing the learning [8] and connectionist structure of


neural networks with the human-like reasoning style of
fuzzy systems, neuro-fuzzy logic make a bridge for two
methodologies so that the output should be more precise
which suppresses their respective disadvantages. The
primary benefit of neuro-fuzzy systems is that they are
approximate models with a wide range of inputs, as shown
in figure 5.
The primary advantage of neuro-fuzzy systems is that they
are interpretable IF-THEN systems with universal
approximates. The interplay between interpretability and
accuracy in fuzzy modeling is at the core of neuro-fuzzy
systems' strength. One of the two qualities usually wins out
in practice. The topic of study on neuro-fuzzy fuzzy
modeling is separated into two categories: exact fuzzy
modeling, which is focused on accuracy, and linguistic
fuzzy modeling.

Figure 4: If the target value of the voltage vector is not within the 24
sectors.

The above figure shows the space vectors present on the


three level inverter, there will be 24 vectors in the proposed
inverter, in which we are selecting the 19 space vectors, the
space vectors are nothing but the different stages of output
voltages which are taken for example (0,1,2), here the 0-
Zero voltage, 1-+Vdc voltage and 2—Vdc voltage, by this
we will get different space vectors in which 5 space vectors
are rejected of same output stage that is (0,0,0), (1,1,1),
(2,2,2).

XILINX:

You may use this document and its associated intellectual


property (hence referred to as "the Design") to create
designs that can interact with or run on Xilinx FPGAs. Any
unlawful use of the Design could [15] be against the law in
terms of copyright, trademarks, publicity, and laws Figure 5: Simple Neuro-Fuzzy implementation
governing communications.
In addition, Xilinx does not grant any license under any of
ANFIS Architecture:
its patents, copyrights, or other rights, nor does it undertake
any liability resulting from the use or use of the Design.
ANFIS [5] includes five layers as depicted in figure 6. The
You are in charge of acquiring any rights you might need
input variable's relative mapping to each membership
for the Design's use or execution. Xilinx maintains the right
function is done by the first hidden layer. The output layer
to alter the Design whenever it deems it necessary in its
totals up all the signals that come into this layer to
sole discretion. Xilinx [16] disclaims all responsibility for
determine the overall output. The least mean [11] square
correcting any errors in this document or informing you of
approach and back propagation learning are used by ANFIS
any changes that could be made. Xilinx disclaims all
to find the membership function parameters which are
responsibility for its accuracy or completeness.
required to generate the output and the consequent
parameters, respectively.
F.P.G.A:
The iterative learning algorithm comprises two elements for
The most popular method of building a [7] PWM generator
each phase. In the first section, here the input parameters
is using a field programmable gate array (FPGA). When a
are operated and the parameters generated as linguistic
design is implemented on an FPGA, the connection
variables are made fixed and the iterative minimum squared
between the blocks can readily be changed, making the
method algorithm is used to determine the parameters of
design adaptable. Compare to conventional converters the
the consequents. The input patterns are repeated in the
FPGA exhibit low delay, hence it is well known method for
second section, and every time the linguistic learning
PWM generation and also for design of inverters. For
outcomes with back propagation system is applied to
modest applications, it is less expensive. The configuration
change the parameters of neuro-fuzzy inference system [12]
data path is either byte-wide for optimal performance or
and the consequents constant.
serial to reduce the amount of pins needed In either
The community has believed that creating a fuzzy system
instance, the configuration data channel is either byte-wide
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 95
with good performance is not an easy undertaking ever
for optimal performance or for simpler interfaces to CPUs
since fuzzy systems started to gain popularity in industrial
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
applications. Finding
DVD Part the
Number: right membership
CFP22CB5-DVD: functions and
ISBN: 978-1-6654-6083-5
rules is typically a time-consuming trial and error process.
This inspired the concept of using fuzzy systems to teach
learning algorithms. It had been suggested that neural
networks, which have effective learning algorithms, may be
used instead of automating or supporting the development
of fuzzy systems.
Fuzzy systems and neural networks can be integrated to
enhance each other's benefits and treat specific problems.
Neural networks contribute their computational learning
features into fuzzy systems and get the interpretation and
clarity of the systems' representation back from them.
As a result, the capabilities of neural networks make up for
the shortcomings of fuzzy systems. The fact that these
methods complement one another warrants using them
together.

Figure 7: Simulation circuit without feedback.

Figure 6: ANFIS architecture [18].

VI. SIMULATION RESULTS

The below figure 7 shows the three phase inverter with the
load as induction motor drive, the controlling of switches in
the three phase inverter with PWM pulses obtained from
the Neuro-Fuzzy system, In the below figure there is no
implementation of FPGA pulses and also no action taken to
get a constant speed/voltage required to a motor to run in a
rated speed.
Figure 8: Simulation circuit with FPGA pulses

The above figure 8 shows the three phase inverter with


Neuro-Fuzzy controller without feedback, but an attempt
made here to generate the PWM pulses using Xilinx-
Verilog programming using FPGA programmable device.
The figure 9 shows three phase inverter output for above
circuit; the only difference between two circuits is the
FPGA PWM pulses are generated using XILINX ISE [13]
and figure 10 shows the PWM pulse voltage in the FPGA
module.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 96


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 9: Three phase inverter waveform Figure 11: RTL schematic of proposed DPWM Architecture

As shown in figure 10 the PWM pulses generated using


VERILOG programming, which are synthesized and
simulated using XILINX-ISE model and then they are
given to the MOSFET switches of the three phase three
level inverter using MODELSIM tool of
MATLAB/SIMULINK, the pulses are generated with a
specified duty cycle, the duty cycle intern designed with a
reference speed and the actual speed of the motor as input,
thus these PWM pulses control the ON-OFF of the
MOSFET switches, which generates the constant voltage
intern constant speed

Figure 10: FPGA pulses using XILINX ISE

Figure 12: Behavioral Simulation for duty cycle =62.5%

Figure 11 and figure 12 shows the RTL schematic and


pulses with a duty cycle 62.5% designed according to the
neuro-fuzzy controller output.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 97


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
The figure 13 Number:
DVD Part shows CFP22CB5-DVD:
Neuro-Fuzzy ISBN:
based978-1-6654-6083-5
three phase
inverter with BLDC motor a load [14], which is connected
as feedback and compared with reference speed and the
error output is given to the NFS controller to generate
controlling pulses required to obtained constant voltage to
run a motor at a rated speed, the figure 14 also shows the
same circuit with clear subsystem of controller subsystem,
error subsystem and BLDC motor subsystem to measure
speed, angular frequency etc.

Figure 15: Three Phase inverter waveform

Figure 13: Three Phase inverter with NFS system.

Figure 16: Constant Speed waveforms of BLDC Motor

The figure 15 and 16 shows the three phase inverter


waveform and constant speed of the motor with a Neuro-
Fuzzy controller.

The figure 17 shows the complete circuit of the model in


which a three phase three level inverter is designed with a
induction motor as a load with a feedback to run a motor
with a constant speed with the help of Neuro-Fuzzy
controller and according to the input from the NFS the
FPGA generate the PWM pulses to drive the IGBT
switches and they are modeled in the
Figure 14: Three Phase inverter with NFS system-2
MATLAB/SIMULINK using MODELSIM tool.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 98


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 20: Motor speed matching the reference speed

The figure 18 shows the three phase three level inverter


with three stages of output +Vdc, 0, -Vdc. The figure 19
shows the FPGA PWM pulses modeled in
MATLAB/SIMULINK using Hardware in Loop logic and
the Figure 20 shows that how the speed of the motor
becomes constant exactly at the reference speed with
Figure 17: The Inverter with NFS-FPGA almost zero error, the figure 20 shows the scope of the
motor speed measurement tool of MATLAB/SIMULINK,
here in this scope it clearly shows that the motor is running
with a different speed at one stage when we simulate the
circuit, the speed is measured and given to the NFS
controller which is compared with the reference speed and
then the action is taken to run the motor for reference speed
with very low acceptable error.

VII. CONCLUSION
The Multilevel inverters, here the three level inverter is
designed with three different control techniques, the three
level inverter with system PWM pulses is designed and
simulated, the same inverter is designed and simulated with
Neuro-Fuzzy PWM pulses and the output is connected to
the BLDC motor, The three phase three level inverter is
designed and simulated using MATLAB Simulink with
Neuro-Fuzzy controller to run the BLDC motor with a
constant speed and lastly the same three phase three level
Figure 18: Three Phase Three-Level Inverter inverter is designed with FPGA PWM hardware pulses
which is simulated in Hardware in Loop
MATALB/SIMULINK ModelSIM tool, for mitigation of
harmonics from which the output voltage at the load will be
constant without any error at the grid.

REFERENCES
1. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain ,‘Survey on
Neuro-Fuzzy Based Single Phase Multi-Level Inverters Using
FPGA’, International Journal of Engineering & Technology. 7.
1. 10.14419/ijet.v7i3.12.15851.
2. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain, ‘Simulation
of Single Phase Five-Level Inverter using Fuzzy Logic and
Neural Networks’, 2020 2nd International Conference on
Innovative Mechanisms for Industry Applications (ICIMIA),
2020, pp. 510-514, doi: 10.1109/ICIMIA48430.2020.9074919.
3. Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj Jain, ‘Design of
Neural Networks fuzzy logic based three level inverter using
FPGA’, of Journal of the Maharaja Sayajirao University of
Baroda. ISSN: 0025-0422.Volume-54, No.2 (XIIX) 2020.
Ameer Ahamed Z, Dr. V K Sharma, Dr. Anuj 99
4. IEEE
978-1-6654-6084-2/22/$31.00 ©2022 Jain, ‘Speed
Figure 19: FPGA pulses modeled in MATLAB/SIMULINK Control Of BLDC Motor Using Multilevel Inverters And Pwm
Generation Using ANN’, International Journal of Mechanical
Proceedings
EngineeringofKalhari
the International Conference
Journals, ISSN: on Automation,
0974-5823 Computing
Vol. 7 No. 6 and Renewable Systems (ICACRS 2022)
DVD
June,Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
2022.
5. Fatih Korkmaz, smail Topaloglu and Hayati Mamur ”Fuzzy
logic based direct torque control of induction motor with space
vector modulation” , International Journal on Soft Computing,
Artificial Intelligence and Applications (IJSCAI), Vol.2, No.
5/6, December 2013.
6. S. Lisauskas, D. Udris, D. Uznys “Direct torque control of
induction motor drive using fuzzy controller”,
ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-
1215, VOL. 19, NO. 5, 2013.
7. C.Bharatiraja , R.Latha “A 3 - Dimensional SVPWM
algorithm, its FPGA - implementation for multilevel inverters”
Journal of Electrical Engineering.
8. K.R.Rekha, Shalini Vashishtha “Survey on FPGA Based Space
Vector PWM Motion Control”, IJAREEIE ISSN (Print) : 2320
– 3765 10.15662/ijareeie.2015.
9. Qamar Muhammad Attique, Yongdong Li, and Kui Wang, “A
Survey on Space-Vector Pulse Width Modulation for
Multilevel Inverters”, CPSS TRANSACTIONS ON POWER
ELECTRONICS AND APPLICATIONS, VOL. 2, NO. 3,
SEPTEMBER 2.
10. Aasha Chauhan, Dr. Ravindra Pratap Singh “A STUDY
PAPER BASED ON SPACE VECTOR PULSE WIDTH
MODULATION TECHNIQUE FOR POWER QUALITY
IMPROVEMENT”, International Journal of Science
Technology & Management Volume No.04, Special Issue
No.01, February 2015 ISSN 2394-1529.
11. Qamar Muhammad Attique, Yongdong Li, and Kui Wang, “A
Survey on Space-Vector Pulse Width Modulation for
Multilevel Inverters”, CPSS TRANSACTIONS ON POWER
ELECTRONICS AND APPLICATIONS, VOL. 2, NO. 3,
SEPTEMBER 2017.
12. J. Selvaraj and N. A. Rahim, ‘‘Multilevel inverter for grid
connected PV system employing digital PI controller,’’ IEEE
Trans. Ind. Electron., vol. 56, no. 1, pp. 149–158, May 2019.
13. E.-J. Lee, S.-M. Kim, and K.-B. Lee, ‘‘Modified phase-shifted
PWM scheme for reliability improvement in cascaded H-
Bridge multilevel inverters,’’ IEEE Access, vol. 8, pp. 78130–
78139, 2020, doi: 10.1109/ACCESS. 2020.2989694.
14. D. Lyu, Y. Sun, C. A. Teixeira, Z. Ji, J. Zhao, and Q. Wang,
‘‘A modular multilevel dual buck inverter with adjustable
discontinuous modulation,’’ IEEE Access, vol. 8, pp. 31693–
31709, 2020.
15. TY - JOUR AU - Alateeq, Ayoob AU - Almalaq, Yasser AU
- Alateeq, Abdulaziz PY - 2022/06/09 SP - 1159 T1 -
Optimization of a Multilevel Inverter Design Used for
Photovoltaic Systems under Variable Switching Controllers VL
- 10 DO - 10.3390/pr10061159 JO - Processes.
16. TY - JOUR AU - Kola, Muralikumar AU - Pathipooranam,
Ponnambalam PY - 2021/06/04 SP - 1 EP - 1 T1 -
Comparison of Fuzzy and ANFIS Controllers for Asymmetrical
31-Level Cascaded Inverter with Super Imposed Carrier PWM
Technique VL - PP DO - 10.1109/ACCESS.2021.3086674 JO
- IEEE Access.
17. JOUR, Hossain Lipu, M. S., Miah, Md. Sazal Ansari, Shaheer
AU - Meraj, Sheikh, Hasan, Kamrul, Elavarasan, Rajvikram,
Mamun, Abdullah, Zainuri, Muhammad, Hussain, Aini
2022/02/13 “Power Electronics Converter Technology
Integrated Energy Storage Management in Electric Vehicles:
Emerging Trends, Analytical Assessment and Future Research
Opportunities” VL - 11 10.3390/electronics11040562
Electronics.
18. Vafaeenezhad, H., Sadegh Ghanei, S. H. Seyedein, H. Beygi,
and Mohammad Mazinani. "Process control strategies for dual-
phase steel manufacturing using ANN and ANFIS." Journal of
materials engineering and performance 23, no. 11 (2014):
3975-3983.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 100


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fuzzy Logic Controlled SEPIC With Coupled


Inductor-based Converter for High Voltage
Applications
D.Kirubakaran1,S.Gomathi2,T.Kavitha3,M.Sai Silvya4,P.Rajeshwari5,T.D.Subha6

Professor1,St.Joseph’s Institute of Technology, Chennai


Associate Professor2, Saveetha school of Engineering, Chennai
3
Assistant Professor ,Vel Tech Multi Tech Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai
Student4 5, Assistant Professor 6,RMK Engineering College, Chennai

Mailid: kirubad@gmail.com,sgomathi411@gmail.com,kavithat.it@veltechmultitech.org,sais20338.ec@rmkec.ac.in,
raje20331.ec @rmkec.ac.in,tdsubha2010@gmail.com

Abstract: This research work presents a novel I. Introduction


hybrid-modified SEPIC DC-DC converter with
coupled inductors that is well suited for DC power supplies were commonly adopted in
photovoltaic applications. Low-noise operation is different areas, including electric vehicles and
made possible by the active components such as airplanes [1]. In order to meet the DC voltage
controller and clamped switching waveforms. specifications of the DC power stack, DC-DC
Continuous mode conduction reduces peak and converters were employed. In addition, DC-DC
RMS currents. The evaluation of the converters were crucial in the force-shaping of
semiconductor's voltage and current stress leads alternative electrical energy sources like PV, breeze
to the continuous conduction mode (CCM), which generators, and energy unit architecture. The DC-DC
will be determined by analyzing the steady-state converter industry stands to benefit from these trends,
dynamic characteristics and the static voltage which bode well for the industry's future expansion
regulation conversion ratio. After that, a [2].Conventional DC-to-DC converters used power
simulation of the converter's PI-PI and FL-FL semiconductor equipment that functioned as
controlled closed loop will be executed. Once the electronic controllers; these were usually referred to
theoretical design is complete, a prototype has as switched-mode power supplies (SMPS) -approach
been constructed to prove the feasibility of the DC-to-DC converters (TDC-converters). A duty
proposed solution and reveal its primary practical cycle change was made that did not consider the
features and limitations. To determine the voltage range or the weight variations to embrace the
significance of the proposed model, it will be yield voltage consistency [3]. The trading devices
compared to other related topologies. Finally, the triggered nonlinear behavior in the boost converters
new hybrid converter will be used in an all- [4]. These useless nonlinear observables required a
inclusive photovoltaic panel system for converting positive-reaction controller in converters [5]. P, I and
the solar energy. The MPPT and solar system will D controls have changed [6]. The PID controller
then be tested in a real-world environment after reacted slowly to sudden changes in the stack or data
being modeled and simulated. voltage. Electronics design centers focused on power
conversion feasibility. Pulse Width Modulation
Keywords: PM Coupled inductor, DC-DC Converter, (PWM) converters could handle market volatility [7].
proportional-integral (PI), fuzzy-logic-controller, Fuzzy logic and the neural networks are examples of
steady-state analysis, and RL-load. fake sharp control that can verify, adapt, and control
nonlinear dynamical structures [8]. Increased yield
could be obtained by splitting the current, producing
it in two, mitigating against I2R catastrophes and AC
difficulties. Different applications of modified SEPIC

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 101


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

converters include power factor correction (PFC), In CCM, the modified SEPIC equations can be
energy unit (EU) systems, PV arrays, and many written as
more. The modified SEPIC converter was built to
eliminate ripple in the output voltage and data
current. Its etymological origins can be traced back to
……………………………… (1)
a method that has been used to structure basic,
complex, and newly-introduced systems based on The modified SEPIC converter duty ratio is
user input, known as fuzzy logic. [9]. When precise
mathematical plans are unrealistic, fuzzy logic
controllers become a suitable alternative. During the
halfway point of the duty cycle, the inductor expands ………… (2)
and clears out any accumulated debris. Capacitor
yield was the sum of currents through two diodes Where the voltage transfer function is C and the
(I1+I2), which is not the yield DC and lowers the efficiency of the converter is 𝜂, Resistance to
yield capacitor wave current (IOUT) and helps to minimum and maximum loads are
complete the duty cycle. The total DC yield from
both diode streams is monitored at a precise time
when the duty cycle was monitoring for 0%, 50% and …………………………..(3)
100%. Capacitor output should channel the inductor
growth currents under any effect based on ideal and
working centers. High-step-up converters are
implemented with a single yield capacitor and a
coupled inductor connected in series and parallel (10-
………………………..(4)
11). The interleaving strategy manages each switch,
and PWM sign difference remain 1800. Since the
current magnitude through each inductor is reduced
between stages, the size and inductance of the ……………………… (5)
inductor, as well as the information current wave can
be made smaller. II. Research Gap

DC to DC Modified SEPIC high step-up The dynamic response of the modified high step-up
Converter converter-DC-DC RL load system must be improved.
However, the background literature does not cover
The capacity of the modified SEPIC converter is
using a proportional-integral/Fuzzy-logic-controlled
meant to act as a voltage step-up converter from one
two-loop modified SEPIC converter-DC RL load
level to the next level. Figure 1 is an example of the
system to improve the dynamic response. Therefore,
circuit used in DC-DC high step-up converter.
this paper proposes a Fuzzy-logic-controller for the
DC-RL Load System with a modified SEPIC
converter.

2.1. System Description

FL Controller
If the input is not normalized, a gain is applied to
make it normal, and the output is then scaled by this
gain. An adjustment to the input-to-output scale
factor is necessary if the input's usable range is to be
Figure 1: DCDC-Modified SEPIC-Converter-Circuit expanded or contracted. This controller design
reduces T Rise, T Settle, E steady.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 102


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

voltage at the input, which is 20V, is portrayed in


Fig. 2 displays a simulation diagram of an open loop Figure 6. Figure 7 illustrates that there is a voltage
source disturbance system. Figure 3 shows the difference of 220V across the RL load. The 4.5A
simulation of a PI-PI controller in a closed loop. The current shown in figure 8 is the one that is flowing
block diagram for the FL-FL controller in closed- through the RL load. It can be seen in Figure 9 that
loop simulation is shown in Figure 4. In closed-loop power is 1000W. The simulation's configurations are
simulation, PI-PI and FL-FL controllers can both be presented in Table1.
found.
Table-1

Simulation parameters

Vin 15V

C1 1000µF

L1, L2 5µH
Figure 2: Block Diagram of Proposed System
C2,C3 2000µF

Frequency 20Khz

Mosfet IRF840

Diode IN4007

R 50Ω

V0 165V

Figure 3: Proposed System with PI-PI Controller

Figure 5: Modified SEPIC Converter with Source


Disturbance
Figure 4: Proposed System with FL-FL Controller

2.2. Open loop modified SEPIC converter with


source disturbance

circuit diagram of a modified SEPIC converter along


with a source disturbance is represented in Fig 5. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 103


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

shown in Figure 13. Fig. 14, shows the power output


is 550W.

Figure 6: Input voltage

Figure10: Modified SEPIC converter with PI-PI


controller
Figure 7: RL-load Voltage

Figure 11: Voltage


Figure 8: RL-load Current

Figure 12: Voltage across RL-Load

Figure 9: Power

III.Two loop-ILBC-DCMS-with P.I-P.I controller


and FLC-FLC

Circuit diagram of a closed-loop PI-PI controller for


a customized SEPIC converter is shown in Figure 10.
Observed in Fig. 11, the input voltage is 20V. Figure
12 shows the 165V across the RL-load that was
measured. Current through the RL load was 3.35A, as

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 104


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 13: Current through RL Load Figure 16: Input Voltage of Modified SEPIC
Converter

Figure 14: Power

A modified SEPIC converter with a closed-loop FL- Figure 17: Voltage across RL-Load
FL controller is shown in Figure 15. According to
Fig. 16, the input voltage is 20V. The RL-load
voltage is 165V, as shown in fig. 17. Fig. 18 displays
the 3.35A current through the RL load. The 550W of
power is displayed in Figure 19.

Figure 18: Current through RL Load

Figure 15: Circuit Diagram of Modified SEPIC


Converter with FL-FL Controller
Figure 19: Output Power

Table 1 shows a comparison of the time domain


parameters of the PI-PI and FL-FL controllers used in
the modified SEPIC converter system. Figure 20 is a
bar chart comparing the Time Domain Parameters of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 105


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the original SEPIC converter system to those of the FL-FL controller. The FL-FL controller allowed for a
modified system using PI-PI and FL-FL controllers; 76% improvement in efficiency, with the steady-state
the Rise time was reduced from 0.43 s to 0.05 s error going from 1.60 V to 0.12 V. Results show that
thanks to the FL-FL controller. Reduced from 0.54 s the closed-loop FL-FL controller in the modified
to 0.07 s, the Peak time is a direct result of the FL-FL SEPIC converter system is superior to the PI-PI
controller. The FL-FL controller allows us to reduce controller.
the settling time from 0.93 s to 0.09 s, a significant
improvement. Utilizing the FL-FL controller reduced
the steady-state error from 1.60 V to 0.12 V. As seen
Table -2 Comparison of Output Parameters
in the results, the modified SEPIC converter system's
closed-loop FL-FL controller outperforms the PI-PI Converter Vin(V) Vo(V) Vor(V) Ior(A) Po(W)
controller in terms of overall system performance.

Table -1 Assessment of time domain parameters Existing 15 95 1.5 0.03 180


SEPIC
Controllers T Rise T Peak T Settle E steady
Modified 15 165 0.9 0.02 550
(s) (s) (s)
SEPIC
PI-PI 0.43 0.54 0.93 1.60

FLC-FLC 0.05 0.07 0.09 0.12

Figure 21: Bar Chart Comparison of Output


Parameters

IV. Conclusion

Simulation of the real SEPIC converter system is and


modified SEPIC converter are modeled. These
Figure 20: Bar Chart Comparison of Time Domain structures are evaluated against one another. The
Parameters output voltage of this modified SEPIC converter
system rises from 95V to 165V. Reduce the output
Time domain parameters of the PI-PI and FL-FL
voltage ripple from 1.50V to 0.90V by using a
controllers of the modified SEPIC converter system
specially designed SEPIC converter system. The
are compared in Table 1. Time Domain Parameters
output ripple current of the SEPIC converter system
for the original SEPIC converter system and the
was reduced from 0.03A to 0.02A as a result of the
modified system using PI-PI and FL-FL controllers
modifications made. The output power was raised
are shown side-by-side in Figure 20. The Rise time
from 180W to 550W using a modified SEPIC
was reduced from 0.43 s to 0.05 s thanks to the FL-
converter system. The updated SEPIC converter
FL controller. Peak time decreases from 0.54 s to
system performs better than the traditional SEPIC
0.07 s when the FL-FL controller is used. Settlement
converter system as a result. A modified SEPIC
time is reduced from 0.93 s to 0.09 s when using the
converter circuit is put to the test in this simulation

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 106


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

using a closed-loop PI-PI controller. The circuit [10]LiP.IngGuo, Johny.Hung and Nelms RM (2009) Evaluation of
DSP-based PID and fuzzy controller for dc converters. IEEE
layout of a customized SEPIC converter outfitted
Transactions on Industrial Electronics.
with a closed-loop FL-FL controller system is [11] Suganyadevi et al, “Performance Comparison of Different
displayed in this simulation. We assess and contrast Bidirectional DC-DC converters For Solar PV System” Journal of
Electrical Engineering,Vol.1.pp 1-6,2019.
the PI-PI and FL-FL controllers' time-domain [12] A.Deepak et al, “Photovoltaic based Induction motor speed
parameters. Reduce the Rise time by 50% with the control Using SEPIC converter” International Journal of Advanced
FL-FL controller, from 0.43 to 0.05 seconds. Reduce Science and Technology, Vol.29.pp 3932-3945,2020
[13]Gomathi, S et al., “Multiple Input Bidirectional DC-DC
the Peak time from 0.54 s to 0.07s by using the FL- converter” International Journal of Advanced Engineering
FL controller. The settling time is reduced by the FL- Technology, Vol.7.pp 959-963, 2016.
FL controller from 0.93s to 0.09s. When using the
FL-FL controller, the steady-state error decreases
from 1.60V to 0.12V. According to the results, the
modified SEPIC converter system's closed loop FL-
FL controller is superior to the closed loop PI-PI
controller.

V. References

[1] Navamani J D, et al.,(2017) Analysis of modified-quadratic DC


to DC boost converter. IEEE International Conference on
Inventive Systems and Control (ICI-SC)15, 2017.
[2]Gomathi S ,et al (2016), “Soft-Switching Design of Isolated
Boost Converter with Coupled Inductor” International journal for
Research in Applied Science in Engineering and
Technology,Vol.4.pp 154-159,2016.
[3]Ibrahim O and Yahaya NZ (2016) PID Controller Response to
Set Point Change in DC-DC Converter Control, International
Journal of Power Electronics and Drive System (IJ-PEDS)7(2).
[4]Ali-A,et al.,(2015) Implementation of simple moving voltage
average technique with direct control incremental conductance
method to optimize the efficiency of DC microgrid, IEEE
international Conference-on-Emerging Tec(ICET)15.
[5] Padmakala.S et al., (2021), “Enhancement of Modified Multi
port boost converter for hybrid system”, International Conference
on Innovative Computing, Intelligent Communication and Smart
Electrical Systems (ICSES) Sep 2021.
[6] Khayamy M,et al.,(2016) Adaptive fuzzy logic control mixing
strategy of dc/dc converter in both discontinuous and continuous
conduction modes, Journal of Control, Automation and Electrical
Systems27(3):274288.
[7]Kumar PVR and Kalavathi MS,(2018) Fractional Order P.ID
Controlled Interleaved Boost converter Fed Shunt Active Filter
System, International Journal of Power
ElectronicsandDriveSystem9(1).
[8] Gomathi .S et al.,(2022) ,“PFC Based Three Stage Interleaved
Boost Converter For Renewable Energy System” 6th
International Conference on Trends in Electronics and Informatics
(ICOEI) April 2022.pp.289 – 295.
[9]Budiyanto and Setiabudy R (2013) Inverter Development as A
Boost Converter for DC Microgrid, TELKOMNIKA
Telecommunication Computing Electronics and Control 11(2).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 107


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Optimal Siting and Sizing of Dispersed Generation
in Electrical Distribution Network with PSO
Aishwarya M. Holi Mihir V. Patel
Shubham B. Kattikar patelmihir006@gmail.com
holiaishwarya@gmail.com Shubhamkattikar1309@gmail.com KLS-GIT, Belagavi
KLSGIT, Belagavi
KLS-GIT, Belagavi
Santosh M. Nejakar
santoshnejakar@jitd.in
Rudresh B. Magadum JIT, Davanagere
rbmagadum@git.edu
KLS-GIT, Belagavi

Abstract—Due to changes in the lifestyle of consumers


demand, the load is increasing day by day. Because of this, we Many scientists, energy managers, policy makers,
are facing power loss power quality issues and poor voltage supplying companies, academicians, industrialists, power
profile at consumers or load side. To address this issue many generating companies to augment the overall operation and
methods are used to solve them those as FACTS devices, Shunt
performance of electric grid [5-6]. Mainly,
capacitors placements, Network reconfiguration, Smart
substations, DTC placement, Automatic Voltage Regulators  Up-gradation of T&D infrastructure
(AVR), and fast operating power electronics components, etc.  Express feeders
So we are addressing this issue by optimal allocation and sizing  Network reconfiguration
of DG in electrical distribution arrangements. In this paper,  Make use of high-speed operating power electronic
the forward & backward sweep method with PSO is employed devices
to identify the most suitable location to enhance the overall  DTC/AVR Placement
network efficiency without violating the security constraints.  Integration of dispersed power generation
Keywords — Particle Swarm Optimization; Dispersed
generation; Line outages; Power quality; Voltage profile;
From the available literature PSO method is more
Power loss. reliable compare to other methods. It facilitates usual
control of the acceleration coefficient, inertia weight and
Nomenclature: other algorithm parameters at the run time thus perk up the
search usefulness and efficiency at the identical time [7].
DG Dispersed Generation
Vmax Voltage maximum
PSO simulates the social behavior of living communities
Psave Power Saving and the main advantage of PSO algorithm as compared to
RDN Radial Distribution Networks other evolutionary ones is easy to implement. The
AVR Automatic Voltage Regulator computational time of PSO is reasonably priced as
PSO Particle Swarm Optimization compared to other optimal algorithm due to its bounded
PL Active power loss number of parameters and also PSO is simple. For its fast
In Node current convergence and ease of implementation in this paper, PSO
NR Newton Raphson Method method is used for optimal siting and sizing of dispersed
DC Direct Current generators in distributed networks and using python
LFA Load Flow Analysis
language for simulation [8-13]. Fig.1 shows typical
kW Killo Watts
p.u. Per Unit electrical network integrated with different types of loads,
k Number of iterations T&D infrastructure and central generating units.
T&D Transmission and Distribution
GS Gauss Siedel
AI Artificial Intelligence
ML Machine Learning
SLD Single Line Diagram
DN Distribution Network

I. INTRODUCTION
Distributed generation is a supple technology that
can be benefited to lower the cost of service [1]. It is a
encouraging solution to the instituted problems in the power
system such as power loss, voltage regulation, etc.
Installation of distributed generators in suitable places can
upshot in more energy losses and voltage instability which
leads to higher operating costs [2-3]. However, the Fig.1 Electrical network
placement of Distributed generators has significant
improvement on the power loss reduction and magnification In this paper, most advantageous allocation and
of voltage profile [4]. sizing of DG is conceded out using backward/forward
method with PSO technique to find the most favorable

X/$XX.00 ©20XX IEEE


978-1-6654-6084-2/22/$31.00 ©2022 IEEE 108
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

location with proper penetration of power to boost the most favorable siting of dispersed generation setback to
overall health of the network with significant enhancement diminish the loss takes the following steps:
of the efficiency and voltage profile.
Step 1. Read the network line parameters, load values and
II. METHODOLOGY node data, and node voltage values.
As the major objective of this work is to find out the Step 2. Compute the loss with distribution LFA supported
optimal node and sizing of the dispersed generation in the on a backward/forward method.
DN to curtail the active power loss, the following objectives Step 3. Arbitrarily generates a preliminary population of
function is chosen as: particles with random positions and velocities on
Min{PTL}=Min{I2R} (1) dimensions in the solution space. Set the iteration
counter k = 0.
Without breaching the voltage and power balance Step 4. For every particle, if the node voltage is contained
equations i.e. by permissible limits, compute the total loss using
Vmin≤V≤Vmax eqn (3). if not, that particle is unrealistic.
Step 5. For every particle, contrast its intended value with
PG=PD+PTLoss (2) the individual best. If the objective value is lower
QG=QD+QTloss (3) than Pbest, set this value as the current Pbest, and
record the corresponding particle position.
Load current can be computed by, Step 6. Select the particle correlated with the smallest
Ij(k)= (( PLj+jQLj )/ Vj (k-1))* for j= 2,3….N (4) individual best as Pbest of all particles, and set the
value of this Pbest as the current generally best
Imn(k)= In(k) + Σ branch current (5) Gbest.
Vn(k) =Vm(k)- Zmn Imn(k) (6) Step 7. Revise the position and velocity of particle using
equations (2) and (1).
Where, n,m= 2,3…………..N and n != m, N Step 8. If the iteration value attains the utmost boundary,
attend the step 9. if not, situate iteration key k = k +
1, and revisit the step 4.
Step 9. Publish the most advantageous elucidation to the
intended predicament. The unsurpassed position
comprises the finest allocation and range of DG,
and the resultant fitness value correspond to the
lowest active power loss.

The PSO algorithm is capable to attain a superior


solution by predetermined steps of progress steps carry out
on a predetermined set of potential elucidation.

Apart from conventional load flow methods the


backward/forward method is used for the LFA due to high
convergence rate & precise computational time. For
distribution network NR, GS and FDC methods are not
suitable converging issues.
III. RESULTS AND DISCUSSIONS
The IEEE 33 nodes network is used as a test system.
The SLD of the network is exemplified in Fig. 3. The IEEE
33-bus system has 32 transmission corridors with a total
load of 3715 kW and 2400 kVAR. The active power losses
are 180 kW. The base MVA is 100 MVA and the foundation
kV is 12660 V. For PSO parameter, Upper bound, Lower
bound, Maximum Iteration = 100. Fig.3 represents the SLD
of IEEE-33 node electrical DN.

Fig.2 PSO based backward/forward method

The flowchart of the intended methodology is exemplified


in Fig.2. The PSO-supported technique for deciphering the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 109


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Prior to the integration of the DG in the network, the


voltage is observed concerning 0.9063 pu volts, which is the
least of all node voltages is shown in Fig. 6. Meanwhile
after integration of a DG, the voltage is progressed.
Nevertheless, after the integration of DG, the voltage at
node-18 is found 0.9510 pu volts. From the LFA, it can be
observed that a DG gives a superior preference for the
enhancement of the voltage profile of the system.

Fig.3 IEEE-33 bus RDN

The Forward/Backward sweep method was applied


to IEEE 33-nodes network with the total active load of
3.715 MW and reactive load of 2.4 MVAR. The real power
losses are 180 kW when computed by using load flow for
the base case. The Fig.4 shows voltage profile of the system, Fig 6 Voltage Profile Comparison
as shown in the figure voltage profile has very poor at 18th
bus and per unit voltage at this bus is 0.9065 pu which is Before installation of the DG in the system, the real
minimum of all node. After this node 33th bus has poor power loss is 180 kW, after integration of DG at 6 bus
voltage rating that is 0.9231 pu. and it size is 1000kW, the real power loss is reduced to
60kW (67.66 % of total real loss), the power losses at
each bus after installation of the DG was represented in
Fig.7.

Fig.4 Voltage profile without DG Fig.7 Power Loss Comparison


The voltage values of the entire network at every
The Fig.5 shows active power loss at each bus and the total node are shown in Fig.8 before and after DG
active power loss is 180 kW when computed by using load integration of two DG’s. For two DG, the real power
flow for the base case. loss was condensed from 180 kW to 41.4 kW, which is
77.12% of the overall active power declination. It can
be observed that the most favorable siting for DG is at
bus 6th and best possible size of the DG is 1000 kW.
Whereas the optimal siting for second DG is at bus
13th and finest size is 635 kW.

Fig 8 Voltage Profile Comparison


Fig.5. Active Power Loss

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 110


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
[1] Suresh, M.C.V., Belwin, E.J. Optimal DG placement for benefit
maximization in distribution networks by using Dragonfly algorithm.
Renewables 5, 4 (2018).
[2] R. B. Magadum and D. B. Kulkarni, "Efficiency Enrichment of
Electrical Networks with Different types of Dispersed Generation,"
2022 4th International Conference on Smart Systems and Inventive
Technology (ICSSIT), 2022, pp. 620-623.
[3] Prasad, C.H., Subbaramaiah, K. & Sujatha, P. Cost–benefit analysis
for optimal DG placement in distribution systems by using elephant
herding optimization algorithm. Renewables 6, 2 (2019).
[4] K.R.Padiyar, “FACTS controllers in transmission and distribution”,
New age international publishers, Edition 2007.
[5] MiPower user manual Power research Development and Consultants
Bangalore.
[6] R. B. Magadum and D. B. Kulkarni, "Performance Enrichment of
Distribution Network with DG in Presence of STATCOM In IEEE
conference ICACCS-2020, pp. 701-705.
[7] J. S. Savier and D. Das, “Impact of network reconfiguration on loss
allocation of radial distribution systems”, IEEE Trans. Power Del.,
vol.2, no. 4, pp. 2473–2480, Oct. 2007.
Fig.9 Power Loss Comparison [8] Thomas Allen Short, “Electric Power Distribution Equipment and
Systems”, CRC publishers, Nov-2015.
[9] Vinay J. Shetty, SG Ankaliki, “Electrical distribution system power
IV.CONCLUSION loss reduction and voltage profile enhancement by network
The optimal sizing and siting of DG play a extremely reconfiguration using PSO”, IEEE ICEES-.2019.
significant role in the power system to promote the grid [10] Tejaswi Timasani, “Minimization of power loss in distributed
reinforcement, loss minimization with enrichment of voltage networks by different techniques”, IJSER volume 3, issue-5 pp. 521-
profile. The literature reviews shows that there are different 557
methods for the finest site & sizing of DG in usage. In this [11] R. B. Magadum, V. J. Shetty, A. V. Deshpande and S. D. Hirekodi,
"Enhancement of Available Transfer Capability With Integration of
project, we have believed the PSO method for the finest Unified Power Flow Controller," 2022 4th International Conference
sizing and site of DG in Python software. Proposed methods on Smart Systems and Inventive Technology, 2022, pp. 667-670
are tested by considering the IEEE 33 bus; finally, it is [12] R. B. Magadum and D. B. Kulkarni, "Performance Enhancement of
observed that the optimal location & sizing of DG facilitates Distribution Network by Optimal Placement of Multiple Capacitors
using FKBC", Advances in Intelligent Systems and Computing, vol.
to improve the voltage profile, real power loss minimization 1119, pp. 591-602, 2020.
which helps to improve the power system stability. [13] Soliman, A.M., Emara, S.M. & Nashed, M.N.F. Grid Performance
Enhancement Study Under Restricted Placement and Sizing of PV
Distributed Generation. J. Electr. Eng. Technol. (2022).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 111


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Study of Genealogy and Tracking Systems for


Automotive Manufacturing Industries
AKHIL THOMAS ARVIND A R ANGELINA GEETHA
Hindustan Institute of Technology & Science Ashok Leyland Hindustan Institute of Technology & science
Chennai, India Chennai, India Chennai, India
akhilthomas2702@gmail.com ara.arvind@gmail.com angelinag@hindustanuniv.ac.in

Abstract—Automotive manufacturing involves aggregation of solve the problems of lack of complete information and
large quantity of parts into a single product. Genealogy, tracking transparency associated with conventional information
and traceability are vital due to the complexity in handling the tracking. In addition, they can also track the quality of steel
quantum of parts which runs into thousands. Understanding
the nuances of Genealogy, tracking and traceability is of vital goods properly [2].
importance. Moreover, vehicle recall policy mandates automotive
industries to have a robust traceability system in place. This Implementation of an e-commerce system based on
paper focuses on the study of various genealogy and tracking sys- blockchain to track spare parts ownership between original
tems in use globally for automotive manufacturing, the standards equipment manufacturers, suppliers, and consumers. In order
governing them and recommends the use of IT based systems as
optimal for cost control and operations friendliness. to execute these functions, trigger events, and modifiers,
smart contracts were developed. They integrated decentralized
Index Terms—Genealogy, Tracking, Traceability, Cost control, storage services (IPFS) to store spare parts details and quotes
Vehicle Assembly from suppliers [3].

I. I NTRODUCTION The paper explains PartChain, a blockchain-based tool for


Manufacturing industries generally use multiple input com- creating, monitoring, and sharing tamper-proof and secure
ponents/ ingredients and convert into basket of products. The digital representations of physical parts across multiple supply
input material undergoes a change in physical (Automotive) chains. A low entry barrier method that is especially useful
/ chemical (Oil and natural gas) / biological (Pharmaceutical) for small and medium-sized businesses, PartChain enables
properties through a series of processes into a final product. businesses to establish an effective, cost-effective supply
There is a requirement to trace the variety of ingredients which chain traceability system [4].
is supplied by multiple vendors and track the sequence in
which they undergo the process. This requirement has of late A game-theoretical model is given to capture the
been mandated as a legal requirement by many governments interactions among manufacturers, retailers, and consumers.
globally. The paper intends to study various systems used for Studying upstream and downstream competition in the
the purpose. recall supply chain by enhancing the tracking capability and
reliability of products. In essence, describes the differences
II. R EVIEW OF L ITERATURE between traceability and reliability optimization [5].
The paper observes the usage of RFID based tracking
systems in dairy products manufacturing companies for Throughout the supply chain, blockchain technology
their finished products. RFID solution collects and tracks will be used to track the condition and traceability of
dairy product manufacturing from raw materials to finished aircraft spare parts. Hyperledger Fabric has been used as
products and in the process tracks the flow of material in a framework and software architecture to enable ASPM
totality. At any time, it can check the information on products, (Aircraft spare parts inventory management) to integrate and
ensure the quality of products, enhance the reputation of share information in a safe and appropriate manner through a
enterprises and brands, and lay the groundwork for future consensus mechanism and channels. This article discusses the
product development [1]. various traceability, condition tracing, and security aspects of
blockchain technology [6].
A blockchain-based system for tracing steel products is
designed to improve the quality of steel products. Steel Automating the safety monitoring of medical devices and
products can be certified using information generated by provides the regulator with information about products at the
manufacturing enterprise, logistics companies, and customer. right time and offer data on the most prevalent inconsistencies
Consumers can gain a greater understanding of the actual on the market, which, after a comprehensive study, aids in
manufacturing process by using this process, which can the improvement of product quality [7]).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 112


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

pharmaceutical. However, in the manufacturing industry it


A Complex product configurations in the automotive is defined as Information on manufacturers, distributors, and
industry can be tracked from the time of production to suppliers is recorded. Throughout the entire manufacturing
completion. By enabling decentralised manufacturing settings process, from the procurement of raw materials and parts to
with a trusted and shared database, Ethereum’s consortium the assembly, machining, distribution, and sales, this data is
and Proof of Authority consensus serve both as transparent tracked so that the history of all products can be traced.
and economic frameworks [8].
D. Genealogy and Tracking differentiated
A discussion on parts tracking, traceability, product geneal- • Even though both genealogy and tracking share some
ogy and describe some parts tracking applications. Printed bar- similar technologies they function entirely different ways
codes can be used, as well as Direct Part Marking (DPM) and to meet very specific goals.
RFID (Radio Frequency Identification) technologies, which • Genealogy is the record of data about a finished product
have become the technologies of choice in recent years, as and all its process from basic material to a finished
DPM is permanent, while RFID is readable and can bear prod- product. It is used to limit the risk of getting a defective
uct genealogy data on the product, instead of in a database. product.
The study also discusses Automated Data Collection (ADC) • Tracking on the other hand is used to know the location
technologies, which are either optical or non-optical Perma- of the parts of a finished product in the manufacturing
nent Optical Marking/DPMs. Because most bar codes cannot process. It is used to increase company efficiency.
be left on forever, manufacturers turn to DPMs, especially for
products that are exposed to harsh conditions [9]. E. Importance of Genealogy and Tracking
• Comprehensive Product Documentation
III. G ENEALOGY, T RACKING & T RACEABILITY As part of a quality management system, records of
A. Genealogy product genealogy are kept electronically so they can
Genealogy focuses on documenting the parent child rela- be audit ready. A documented audit trail also ensures
tions between the parts, assemblies, and sub-assemblies that complete product traceability. Documents pertaining to
comprise a finished product. It’s basically a ”cradle-to-grave” the quality of products and services include configuration
collection of product data which contains both forward [12] records as-built or as-maintained, as well as disposition
(what further additions happens) and backward [11] (what pre- records for nonconformances. The system maintains a
vious additions have happened) information about the product. digital thread of historical production data [12].
The parent part for the tracking system is the one that is • Improved Quality Tracking
being tracked, but all relations with consumed parts are also Manufacturing companies need to monitor custom spec-
maintained. ifications of a product or component and assign various
levels of control over its products, lots, shipments, or
B. Tracking clients. Specific product requirements are tracked traced
Tracking is knowing where and what parts are at any using unique identifiers like month and batch codes [13],
time within manufacturing and warehousing processes. This running serial numbers printed over bar code [14] or QR
is typically done by through identification (marking) and sticker [12].
tracking (tracing within the organization) the container or • Fewer Product Defects and Product Recalls
pallet in which the items are conveyed or packaged, which Good parts management system allows to track, recall,
is usually performed within shipping, receiving, and inventory and dispose of suspect items. Problems can often be iden-
functions. With the introduction of Just-in-time (JIT) concepts, tified quickly (Product traceability with batch number,
the material is fed directly to line side (by-passing stores and running serial number and unique identifier as filters will
inventory) towards better cost control (indirect expenses like help with quick identification of defective product), and
labor for tracking can be eliminated, which further improves rework can be avoided when a product can be traced back
cost efficiency) and traceability. It most often involves the to its raw material processes. By improving visibility, a
use of printed bar code/Quick response (QR) code/Radio company can process fewer recalls or warranty claims
frequency identification labels/tags and handheld scanners to and thereby reap the benefits of better profitability [12].
perform the tracking functions. • Helps Maintain Regulatory Compliance
Regulatory and compliance requirements can be met by
C. Traceability implementing a quality management solution. To facil-
The concept of traceability refers to the tracking of all itate conformity throughout the lifecycle of a product,
processes in the manufacturing process, from the procurement standards can be managed within a quality management
of raw materials, to the production, consumption, and disposal system. This is particularly valuable in an environment
of a product so that its origin, location, or application can be characterized by fast-paced regulatory changes [12].
confirmed. Depending on the industry, its definition differs • Streamlines Shop Floor Operations
slightly, such as automobile, electrical component, food, and Enables managers make better decisions through access

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 113


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for real-time product lifecycle information. Automation symbol, and must display the data Identifier in paren-
of production processes ensure workflow centred on theses rather than start or stop characters when a data
quality, thereby reduces shop floor time while maximizing Identifier is part of the HRI.
efficiency [12]. • Two-dimensional symbols can include multiple data fields
• Holds Suppliers Accountable (Data Matrix and QR Code).
The genealogy of a product keeps vendors accountable • Use ISO/IEC 16022, Symbology Specification - Data
for maintaining quality standards. By identifying points Matrix, or ISO/IEC 18004, Symbology Specification -
of failure, it can be quickly determined where product QR Code, when dealing with two-dimensional symbols.
quality is lacking. At each stage of the product lifecycle, • Due to the large number of characters that 2D symbols
key metrics for suppliers should be available. Continuous can encode, it may not be possible to create a human-
improvement will be encouraged. The suppliers of first- readable interpretation (HRI) of the symbols. Alterna-
tier products can be linked to the suppliers of sub-tier tively, descriptive text or Human Translation (HT) may
products to enable better traceability [12]. accompany the symbol rather than literal text.
• Improved Customer Satisfaction The benefit of adopting standard is as below:
Manufacturing companies can rest assured that their
• Usage of globally unique identifier
products’ quality is closely monitored throughout the
• Inclusion of human-readable information, such as a sup-
lifecycle. Customer satisfaction increases when fewer
plier name, product description, and lot number
defects and recalls occur, and when the overall quality
• Enables employees training (ie by mandating and moni-
of the products is higher than usual [12].
toring training mandays)
F. Standards governing Genealogy and Tracking • Usage of automated data capture processes (for preventive

This second iteration of the Automobile Industry Action and predictive analytics)
• Emphasis on Inventory and resource management
Group (AIAG) B-4 Standard describes the approved identi-
• Serial tracking
fication and tracking symbols for automotive parts that are
• System auditing
required for genealogy and tracking of the finished product.
• Monitoring and storing data
As part of the standard, linear symbols such as Code 39 and
Code 128 are encouraged, as well as two-dimensional symbols G. Vehicle recall policy
such as the Data Matrix and QR Code. Due to the availability
of auto-discriminating equipment, this standard recommends Manufacturers and distributors are exposed to the biggest
the use of multiple symbols. The goal of this standard is risks when it comes to product recalls. Manufacturers in the
to provide a minimum standard for identifying or labelling automotive industry have the highest rate of product recalls
individual components, subpacks, unit packs, assemblies, kits, (refer fig 1)
or subassemblies that has been disseminated outside of their
original site. This specification gives for the most freedom in
terms of symbol size, location, and information. Neither the
dimensions of the labels, marking areas, or marking methods
of the individual parts or unit packs are outlined in this
standard [15].
The following are some of the standards mentioned regard-
ing linear symbols and 2D symbols in this standard:
• A part or label can be marked with any data field that is
agreed upon by trading partners.
• A data field must contain a Data Identifier followed by
data associated with it.
• Linear barcode symbols (Code 39 and Code 128) must
each contain unique data.
• The length of Code 39 or Code 128 symbols should be Fig. 1. Absolute number of recalls in automotive industry (SIAM data)
no longer than 20 characters and should not exceed 30
characters. The risk that companies face when it comes to recalls
• Depending on the linear symbology, ISO/IEC 16388 Bar and regulations that enforce quality and compliance makes
Code Symbology Specification - Code 39 or ISO/IEC it increasingly important for manufacturers and distributors
15417 Bar Code Symbology Specification - Code 128 to have a manufacturing execution system (MES) in place
must be followed. that can provide genealogy and track any changes made to
• A human-readable interpretation (HRI) of the Code 39 the product during the course of its lifespan. These MES
and Code 128 symbol should include all encoded infor- should be able to track and trace vendors and products entering
mation, should be placed consistently above or below the the company, products and processes inside the organization,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 114


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

R EFERENCES
[1] Zhang, T., Cao, C., Yu, H. and Liu, Y., 2020. Design and Implementation
of Dairy Food Tracking System Based on RFID. 2020 International
Wireless Communications and Mobile Computing (IWCMC),.
[2] Cao, Y., Jia, F. and Manogaran, G., 2020. Efficient Traceability Systems
of Steel Products Using Blockchain-Based Industrial Internet of Things.
IEEE Transactions on Industrial Informatics, 16(9), pp.6004-6012.
[3] Hasan, H., Salah, K., Jayaraman, R., Ahmad, R., Yaqoob, I. and Omar,
M., 2020. Blockchain-Based Solution for the Traceability of Spare Parts
in Manufacturing. IEEE Access, 8, pp.100308-100322.
[4] Miehle, D., Henze, D., Seitz, A., Luckow, A. and Bruegge, B., 2019.
PartChain: A Decentralized Traceability Application for Multi-Tier
Fig. 2. Voluntary recall information of 2021-2022 in India [16] Supply Chain Networks in the Automotive Industry. 2019 IEEE Inter-
national Conference on Decentralized Applications and Infrastructures
Source: Society of Indian Automobile Manufactures, 2022 (DAPPCON),.
[5] Dai, B., Nu, Y., Xie, X. and Li, J., 2021. Interactions of traceability
and reliability optimization in a competitive supply chain with product
and customers delivered goods. In order to reduce the effect recall. European Journal of Operational Research, 290(1), pp.116-131.
[6] Ho, G., Tang, Y., Tsang, K., Tang, V. and Chau, K., 2021. A blockchain-
of product returns and recalls, manufacturers and distribu- based system to enhance aircraft parts traceability and trackability
tors should use accurate genealogy, tracking, and traceability for inventory management. Expert Systems with Applications, 179,
throughout the product lifecycle and supply chain, as well as p.115101.
[7] Dudina, D., Vasiliev, V. and Mandrakov, E., 2020. Digital Technolo-
reviewing current materials, products, and processes to reduce gies for Monitoring Product Quality and Safety. 2020 International
the possibility that such events reoccur. Conference Quality Management, Transport and Information Security,
Information Technologies (IT&amp;QM&amp;IS),.
H. Benchmarking various genealogy, traceability and tracking [8] Kuhn, M., Funk, F. and Franke, J., 2021. Blockchain architecture for
systems in use by automotive manufacturing automotive traceability. Procedia CIRP, 97, pp.390-395.
[9] Intermac., 2020. [online] Available at:
A detailed study was carried-out on the various genealogy, ¡https://www.danbygroup.com/docs/White Paper PartsTraceability
traceability and tracking systems across the globe and the Product Geneology.pdf¿ [Accessed 18 October 2022].
[10] Alfano, M. (2021). Towards a Genealogy of Forward-
findings are presented in the figure 3. Looking Responsibility. The Monist, 104(4), 498–509.
Figure 3 compiles the genealogy and traceability systems https://doi.org/10.1093/monist/onab015
currently available on the market. It is important to note that [11] Gehl, R. W. (2017). (Critical) Reverse Engineering and Genealogy. Le
Foucaldien, 3(1), 4. https://doi.org/10.16995/lefou.26
the above classification was based on the importance attribute [12] Bergstrom, L., 2022. The Importance of Product Genealogy
assigned by the system, even though most of the systems - TIP Technologies. [online] TIP Technologies. Available at:
shown in artifact 2.0 provide both genealogy and traceability. ¡https://www.tiptech.com/blog/the-importance-of-product-genealogy/¿
[Accessed 18 October 2022].
As we look at the artifact, we gain a better knowledge of [13] Buchwald, P., & Anus, A. (2020). Industrial Internet of Things Sys-
the many types of systems in use today to provide product tems for Tracking and Traceability of Production Business Processes.
genealogy and components traceability as we examine the Multidisciplinary Aspects of Production Engineering, 3(1), 464–476.
https://doi.org/10.2478/mape-2020-0039
artefact. In addition, we can conclude from the above artifact [14] Bhutta, M. N. M., & Ahmad, M. (2021). Secure Identification, Trace-
that most automotive companies utilize modernized IT systems ability and Real-Time Tracking of Agricultural Food Supply During
to improve product quality. Transportation Using Internet of Things. IEEE Access, 9, 65660–65675.
https://doi.org/10.1109/access.2021.3076373
IV. C ONCLUSION [15] Webmaster, A., 2022. Parts Identification & Tracking — AIAG.
[online] Aiag.org. Available at: ¡https://www.aiag.org/supply-chain-
In this paper, we explore genealogy, traceability, and track- management/packaging-and-labeling/parts-tracking¿ [Accessed 18 Oc-
ing within the automotive industry. Additionally, this paper tober 2022].
[16] Siam.in. 2022. Society of Indian Automobile Manufactures.
provides the importance, differences, and standards that govern [online] Available at: ¡https://www.siam.in/siam-voluntary-
genealogy and tracking at the time of manufacturing.The recall.aspx?mpgid=31&pgidtrail=84¿ [Accessed 18 October 2022].
manufacturing industry has been using genealogy and tracking
extensively in its supply chain. While defects and risks are
inevitable, genealogy and tracking have made it possible
for manufacturers to reduce these risks and defects in their
manufacturing processes. In the past year, the automotive
industry had the greatest number of recalls, which emphasizes
the need for genealogy and tracking, as outlined in this paper.
Additionally, the paper covers different types of systems that
are used by various automobile manufacturers to track and
trace the genealogy of their products and the usage of part
solutions in lieu of complete MES package. Genealogy and
tracking are essential to a manufacturing company because
they reduce costs by decreasing defect rates in the finished
product.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 115


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3. Broad classification and benchmarking study of genealogy, traceability and tracking systems across the globe

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 116


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
A Generic Algorithm for
Controlling an Eyeball-based Cursor System
Praveena Narayanan Sri Harsha.N Sai Rupesh.G
Assistant Professor Department of Department of Computer Science and Department of Computer Science and
Computer Science and Technology Technology Technology
Madanapalle Institute of Technology & Madanapalle Institute of Technology & Madanapalle Institute of Technology &
Science Science Science
Madanapalle, India Madanapalle, India Madanapalle, India
praveenan@mits.ac.in harsha.appu6653@gmail.com guntisairupesh@gmail.com

Sunil Kumar Redy Rupesh.S Yeswanth.M


Department of Computer Science and Department of Computer Science and Department of Computer Science and
Technology Technology Technology
Madanapalle Institute of Technology & Madanapalle Institute of Technology & Madanapalle Institute of Technology &
Science Science Science
Madanapalle, India Madanapalle, India Madanapalle, India
konkisunil67333@gmail.com rupeshsriuma@gmail.com machayeswanth013@gmail.com

Abstract— This paper introduces a specific human- Therefore, in this work, OpenCV is used to call a web
computer interaction system. To get input from the user, a camera that is set to continuously take images from the
system solely depends on various input devices. But the people eye's focusing pupil. Eye recognition and tracking are
who are afflicted by specific ailments or disorders, are unable to accomplished using various image processing techniques.
use computers. Allowing persons with disabilities and vision
impairments to operate computers with their eyes will be very
Because the pixel position in the image does not
beneficial to them. Additionally, this form of control will reduce correspond with screen resolution, various scaling
the need for other parties to assist in operating the computer. techniques are used depending on the size of the image
The individual who is handless and can just utilize their eye taken by the camera.
motions to work will find this measure to be most useful. The
center of the pupil is intimately related to how the cursor moves. The proposed method for using a non-
The electronic device controls the movement of the computer invasive human-computer interface consists of face
cursor. In this proposed system, OpenCV libraries and the Haar detection, face tracking, eye detection and real-time
cascade algorithm are used for detecting eye movements. interpretation of eye blink sequences. Traditional mouse-
based computer interaction is replaced with eye motions.
Keywords— Eyeball Movement, OpenCV, Haar cascade, This method will make it easier and more efficient for
Computer. persons with paralysis, those who are physically
challenged, and especially those without hands to compute
I. INTRODUCTION [10]. First, the camera captures the image and uses
OpenCV code for pupil detection to focus on the eye in the
In today’s era, computers have become a significant part
image. As a result, the human eye is in the center position
of human lives. Human-computer interaction is becoming
(pupil). The human or user then controls the cursor's left
increasingly important as computer technologies advance.
and right movement based on the pupil's center position as
Currently, there are around 21 million people in India who are
a reference.
suffering from one or more physical disabilities, and it
constitutes around 2 percent of India’s population. Such The purpose of this work is to develop a system that
people cannot readily use the computer system [9]. There is a can help people who are physically disabled but visually
need to find appropriate technology that allows for effective intact to use the computer system, so that their physical
communication between humans and computers. Eyeball disability won’t hinder their abilities to use a computer.
movement control is primarily used by the disabled. By
integrating this eye control system with a computer, one can
operate a computer without assistance from others. II. RELATED WORKS
If the person’s body is completely paralyzed, then the way A. Sivasangari et al., [1] proposed a generic
the person can communicate with the computer was algorithm for face detection along with some hardware
uncertain. Later, a solution that was proposed is that a requirements, which resulted in poor performance and
universally recognized nonverbal expression still carries functional limitations. Need for advancement in the field
significant weight in the eyes of humans. Most people agree of Human Computer Interaction (HCI), which focuses on
that the human eyes can express hundreds of words' worth of creating an interface between people and computers and
immense emotions and feelings. Despite this, there are become very crucial. It claimed that a different method of
instances where people suffer from a sickness that prevents computer communication for those who have physical
them from moving anything but their eyes. Eye movement is limitations needs to be developed. In order to save money
now essential for the patient to communicate with the and time, pictures were taken using the laptop's built-in
environment and the outside world. camera and utilized the very precise and sophisticated

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 117


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Haar cascade classifier technique to identify facial vectors III. PROPOSED WORK
for detecting facial expressions. The computer cursor movement in this proposed
system is controlled by eye movement using OpenCV. The
Vadana et al., [2] proposed a hybrid algorithm and eyeball movement is detected by a camera and can be
implemented them in Java. The image was scanned around processed in OpenCV. Open CV is an important
a rectangle, which then divided the rectangle into six component of the working module that keeps the eye
pieces and stored them. The face was detected using SSR moving. The mouse cursor was controlled using the
and SVM. However, the method had low accuracy and PyAutoGUI library.
efficiency, making the USB camera more expensive and
burdensome for the user. The model serves two important purposes. A
detector for detecting faces and a predictor for predicting
It is quite easy to graph eyeball movement to mouse landmarks are used. The face detector is built using
movement using a raspberry pi and OpenCV mobile IP conventional Histogram of Oriented Gradient (HOG),
based system, but it is also rather expensive because it linear classification, image pyramid and sliding window
requires additional hardware. Naveed et al., [3] used this detection functions.
method to recognize face features.
HOG is widely used as feature descriptors for object
For face detection, Brooks,R.E et al., [4] used and human face detection in computer vision and image
MATLAB and a webcam. The monitoring of the eyes and processing. Object search is based on a detection
calculation of the iris shift were done by using the technique applied to a small image defined by a sliding
MATLAB package, which was used for face and iris detection window that probes region by region of the
recognition. Once the shift was mapped using a graphical original input image and its scaled version. HOG detection
user interface, the mouse pointer travelled in accordance consists of dividing the source image into blocks (e.g.,
with the calculated iris shift. Only a monochromatic image 16x16 pixels). Each block is divided into smaller regions
may be searched for in MATLAB; binary conversion is (e.g., 8x8 pixels) called cells. Blocks typically overlap, so
necessary. By converting the grey colours, it can only multiple blocks of the same cell can occur. The vertical
detect the white and black hues. and horizontal gradients for each pixel are present in the
A real-time webcam-based eye ball tracking system cell. HOGs are commonly used in conjunction with
utilizing MATLAB was suggested by Chih Wu et al. [5] Support Vector Machine (SVM) classifiers. HOG
MATLAB libraries and the hardware mouse control computes each descriptor and passes it to the SVM
mechanism were employed in this system. Although it is classifier to determine if the object is found.
not user-friendly, it is cost-effective. It was connected to A. Face Detection
the USB port to allow for user-computer interaction.
Face detection is an application-specific computer
The "Eyeball Movement Based Cursor Using Deep technique that recognizes human faces in digital
Learning" approach was proposed by Ehrlich,K et al. [6]. photographs. The suggested technique recognizes facial
It considered picture and eye ratio as a factor for running features [11]. A simple facial tracking system can be
a program. It delivered high accuracy but it increased the developed using frontal face detector function which
overhead problem by using large datasets. returns the pre-trained HOG + Linear SVM face detector
Eye Tracking System with Blink Detection by Eric included in the dlib library, and combine with Shape
Sung et al. [7] in 2012. MATLAB was used to analyse the predictors, also called landmark predictors, which are used
data in the following steps: image capture, smoothing, to predict key (x, y)-coordinates of a given “shape”.
edge detection, pupil segmentation, and blink detection, Without any user or person contact, face photos can
but only with recorded films, not live ones. be analyzed. The tracking of attendance and time
Murphy.L et al. [8] designed a low-cost eye tracking information can be done using facial recognition
system for total rehabilitation of incarcerated patients. technology. Human-computer interface and emotion
The method involved the use of MATLAB and Java recognition are two examples of the applications that can
programming, some hardware, and while processing the benefit from the facial data that the human face offers.
data may take longer, it was somewhat cost-efficient. Feature extraction can be done using the OpenCV
algorithm. 33-pixel images can be captured via the web
Sangeetha. S. K. B. made a survey on Deep Learning camera. Pixel values can be transformed to binary values
based Eye Gaze estimation methods. The paper discussed of 0 or 1 using encoding processes. N blocks make up the
about how gaze estimation methods work with HCI to use image of the face.
for the digital devices in daily lives to avoid the human
interaction but in these, there was no method for clicking The following is a description of the threshold function:
mouses in PC. When compared to the proposed algorithm
in this paper, it is not efficient.
Sathesh. A. proposed Typing Eyes: A Human To calculate the LBP value, weight values are
Computer Interface Technology. MATLAB was used to calculated for each neighbor.
analyse the data using the following steps: photo capture,
smoothing, aspect detection, pupil segmentation, and blink B. Eye Region Detection
detection, however handiest with recorded To pinpoint the precise location of the pupil,
films, not live ones. horizontal and vertical integral projection are employed.
These projections separate the entire image into

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 118


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

homogeneous subsets. The proposed method employs an


arbitrary threshold. A Gaussian filter can be used to
remove noise [12]. Noise in photography can be defined
as a random variation in the image pixels i.e., random
variation of brightness or color information in images. The
gaussian filter finds the average value of surrounding or
neighbouring pixels and replaces the noisy pixels present
in the image based on Gaussian distribution.
The minimum gradient point is used to calculate the
strong pixel value. The lower threshold protects the
contrast region from splitting edges. The inner and
outermost boundaries are determined using the circular
Hough transform. Utilizing the Hough transform, each
edge point's coordinates are compared to its center. The
Hough transform is used to isolate features of a particular
shape within an image, as it requires the desired features
i.e., eye position be specified in some parametric form
such as lines, circles, ellipses, etc.
The most fundamental element that effectively
utilizes face landmarks is Eye-Aspect-Ratio [EAR].
Among other things, EAR helps to find blinks and winks.
C. Eye Movement Classification
The various eye movements are classified using the
Regression Tree architecture. The webcam records eye
movements such as open eyes, closed eyes, and left and
right eyes [13]. Data can be analyzed and classified using Fig. 1. Flowchart of the proposed methodology
regression tree architecture. IV. PERFORMANCE ANALYSIS
A specialized video camera must be mounted above When the model is run, it captures the video with the
the user's computer or PC monitor while using it to observe OpenCV module and then begins recognizing facial
the eyes. The laptop continuously analyses the video landmarks by using Dlibs prebuilt model. The advantage of
image of the user's focus to determine where the user is using this model is it can detect face detection quickly and
looking on the screen. Nothing is fastened to the
predict 68 2D facial landmarks in high accurate manner. To
consumer's body or head. A key is "picked out" by gazing
detect specific actions like Eye Aspect Ratio and Mouth
at it, for a predetermined amount of time, and a key is
"pressed" by simply blinking the eye. For this gadget, there Aspect Ratio, blink or wink or yawn in face are used to
is no need for a calibration process. The most fundamental predict face landmarks. The PyAutoGUI library is used for
eye in this system is enter process. There is no need for controlling the mouse cursor and those specific features are
external hardware connection. programmed as triggers in this project for controlling the
cursor movement.
The camera receives information from the eye. After
receiving these streaming movies from the cameras, these A. Eye Aspect Ratio (EAR)
videos will degrade into frames [14]. After receiving Eye Aspect Ratio is used to determine the eye action like
frames, it will verify the illumination because cameras whether it is open or close by utilizing the orientation points
need sufficient lighting from outside sources; otherwise, a on the eye. To increase the performance of this proposed
message informing the user of the error will show up on algorithm and overcome the disadvantage of the existing
the screen. Possibly already in RGB mode, the acquired benchmark method, rather than considering the whole face
frames are changed to black and white. Images (frames) for detection, only 68 distinct landmarks on the sample face
from the entry supply that focus the eye are used for iris
are considered.
recognition (middle of the eye).

B. Mouth Aspect Ratio (MAR)


In order to identify whether the mouth is open or closed,
Mouth Aspect Ratio is used. The mouse that was previously
used to move up and down will now scroll up and down after
opening the mouth for around five seconds. To deactivate the
scroll one, the user can repeat the process.
Every person has different eye and mouth dimensions.
Hence, this model calculates both eye and mouth dimensions
as shown in Fig. 2.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 119


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

to control their computer systems. To increase the efficiency


of the system, all functions of the mouse can be covered with
the movement of the eyes to extend the work. Currently, by
interacting with the computer system without the use of a
mouse, this system can be useful for overall operational
behaviour. Cursor control system based on eyeball
movement.

REFERENCES

[1] Sivasangari, A., D. Deepa, T. Anandhi, Anitha Ponraj, and M. S.


Roobini. "Eyeball based Cursor Movement Control." In 2020
International Conference on Communication and Signal
Processing (ICCSP), pp. 1116-1119. IEEE, 2020.
Fig. 2. Moving and Left Click [2] Khare, Vandana, S. Gopala Krishna, and Sai Kalyan Sanisetty.
"Cursor Control Using Eye Ball Movement." In 2019 Fifth
To move the mouse cursor across the screen, one has to International Conference on Science Technology Engineering
move the nose outside the reference circle. When the user and Mathematics (ICONSTEM), vol. 1, pp. 232-235. IEEE, 2019.
points the nose in the direction of the circle's center, the mouse [3] Sidra Naveed, Bushra Sikander, and Malik Sikander Hayat
pointer will follow it. As shown in Fig. 2, keeping the nose tip Khiyal “Eye Tracking System with Blink Detection”, IEEE,2012.
in the reference circle will stop the moving cursor. [4] Brooks,R.E.(1997) ―Towards a theory of the cognitive
processes in computerprogramming,‖ Int. J. Man-Mach. Studies,
Matplotlib and cv2 help to detect the points on the face and vol. 9, pp. 737–751.
based on the movement, the graph displaces. The below graph [5] Cheng- Chih Wu, Ting-Yun Hou(2015)‖Tracking Students’
shows the performance of a cursor movement in all mouse Cognitive Processes DuringProgram Debugging‖—An Eye-
Movement Approach, IEEE.
clicking events like left-clicking, right-click, scrolling mode,
etc. This proposed method performs well when compared to [6] Ehrlich,K. and Soloway,E.(1983) ―Cognitive strategies and
looping constructs: Anempirical study,‖ Commun. ACM, vol. 26,
all benchmark methods [15]. no. 11, pp. 853–860.
[7] Eric Sung and Jian-Gang Wang (2012)―Study on Eye Gaze
Estimation‖, IEEE, VOL. 32,NO. 3, JUNE .
[8] Murphy,L. (2008)―Debugging: The good, the bad, and the
quirky—A qualitative analysisof novices' strategies,‖ SIGCSE
Bull., vol. 40, no. 1, pp. 163–167
[9] QiangJi and Zhiwei Zhu (2007)‖Novel Eye Gaze Tracking
Techniques Under Natural HeadMovement‖, Senior Member,
IEEE, VOL. 54, NO. 12, DECEMBER.
[10] Rajlich,V. and Xu,S.(2004) ―Cognitive process during program
debugging,‖ in Proc. 3rdIEEE ICCI, pp. 176– 182.
[11] Renumol,V.(2009) ―Classification of cognitive difficulties of
students to learn computerprogramming,‖ Indian Inst. Technol.
India.
[12] Seung-Jin Baek and Young-Hyun Kim(2013)‖Eyeball Model-
based Iris CenterLocalization for Visible Imagebased Eye-Gaze
Tracking Systems‖,IEEE.
[13] Tianchi Liu, Yan Yang.Driver (2015)‖Distraction Detection
Using SemiSupervisedMachine Learning‖, IEEE.
Fig. 3. Graph depicting the performance of the cursor
[14] Lee, Jun-Seok, Kyung-hwa Yu, Sang-won Leigh, Jin-Yong
movement Chung, andSung-Goo Cho. "Method for controlling device on the
basis of eyeballmotion, and device therefor." U.S. Patent
9,864,429, issued January 9, 2018.
V. CONCLUSION [15] Hossain, Zakir, Md Maruf Hossain Shuvo, and Prionjit Sarker.
"Hardware and software implementation of real time
electrooculogram (EOG) acquisition system to control computer
cursor with eyeball movement." In 2017 4th International
The OPENCV and Haarcascade systems are used to create Conference on Advances in Electrical Engineering (ICAEE), pp.
an eyeball movement-based cursor control system. The 132-137. IEEE, 2017.
above experimental results demonstrate that we can [16] Sangeetha, S. K. B. "A survey on Deep Learning Based Eye Gaze
efficiently control cursor functions without using a mouse. Estimation Methods." Journal of Innovative Image Processing
In terms of cursor control, the operations performed by this (JIIP) 3, no. 03 (2021): 190- 207.
system are simple. This system could be a solution to all of [17] Sathesh, A. "TYPING EYES: A HUMAN COMPUTER
the problems caused by the existing manual for controlling INTERFACE TECHNOLOGY." Journal of Electronics and
Informatics 1, no. 2 (2019): 80- 88.
the cursor with the mouse, which is not possible for people
with disabilities. This system provides users with new ways

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 120


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Hybrid Optimizer based Nonlinear Model


Predictive Control for Rotary Inverted Pendulum
Supriya P. Diwan
Electronics and Telecommunication Engineering Shraddha S. Deshpande
Department, Electronics Engineering Department,
Government College of Engineering, WCE, Sangli, MH, India
Karad, Dist. Satara, MH, India
Supriya.diwan8@gmail.com shraddhadeshpande@walchandsangli.ac.in

Abstract— A popular nonlinear system in several fields, real-time applications [10], [11]. However, due to the
including as robotics, aircraft, and shipping, is the rotating difficulty in developing a model and the prevalence of
inverted pendulum. In this work, an optimized Non-linear Model uncertainty, its industrial applicability is still limited [15].
Predictive Controller (NMPC) is designed to keep the pendulum Moreover, NMPC is a popular control strategy for controlling
in an upright posture and to deal with disruptions by obtaining a
fast dynamic response and reducing computational time. Here, a
the behavior of complex systems with high dynamic
new concept-based hybrid algorithm named Seagull Insisted performance in both industrial and theoretical applications
Particle Swarm Optimization (SI-PSO) is proposed to enhance [16]. As a result, its application to nonlinear control is
faster dynamic system response and reduce the overall challenging because of the optimization strategy used in these
computational time. Simulation results are presented to reveal controllers. In order to solve non-convex constrained
the optimized NMPC’s robustness to the non-linear systems with optimization problems, the NMPC approach is required [6].
the conventional optimization algorithms. The presented The majority of the existing work is based on nonlinear
approach has the potential to be used to regulate a variety of programming approaches that only produce local optimal
nonlinear systems. values, but the latter is dependent on the starting point selected.
Keywords— Non-linear Model Predictive Controller, Seagull Therefore, a numerical linearization technique has been
Insisted Particle Swarm Optimization, Rotary Inverted Pendulum. developed for this opportunity to gain a convex constrained
optimization problem [7]. To solve the non-convex
Nomenclature optimization problems, there proposes a Genetic Algorithm
Abbreviation Description (GA) however; it faces several challenges including large
MPC Model Predictive Control computational costs due to its natural physical activities [8].
NMPC Non-liner Model Predictive Control The availability of embedded optimization algorithms that can
SI-PSO Sea gull Insisted Particle Swarm Optimization
GA Genetic Algorithm
resolve more quickly, generate a solution within the sample
PSO Particle Swarm Optimization interval available, and are simple and easy to programme
SOA Seagull Optimization Algorithm within the constraints of onboard chip architectures as well as
RIP Rotary Inverted Pendulum being parallel in nature to fit into the FPGA architecture is
SRIP Single Rotary Pendulum Inverter
FLC Fuzzy Logic Control
also mentioned as another barrier to NMPC implementation
on an FPGA chip [9]. Therefore, a number of effective
optimization techniques were considered for solving the
A. INTRODUCTION NMPC problems. In 2021, Farshid Asadi [1] established an
A RIP is similar to a man balancing a stick in his palm approach that focused on Learning-based model predictive
while moving his palm horizontally to keep it from falling control (MPC) to reduce the computational cost of MPC.
[12]. Yet, the study of RIP drives the development of Constraints on the MPC are successfully enforced through
controllers for rockets that help them stay erect and conduct constrained training of neural networks. For the learning-
automatic landings. In the downward position, a regular based MPC technique, recursive feasibility and robust stability
pendulum is stable, but in the upright position, it’s unstable. requirements are also derived.
During the past decades, NMPC has received a lot of attention In 2021, Fnadi and Julien [2] used the NMPC in
[13]. Beyond traditional chemical engineering applications, conjunction with interval analysis methods. Filtering and
advancements in hardware, algorithms, and specialized branching processes are used in the proposed controller to
implementations have enabled demonstrative NMPC discover input intervals that satisfy state restrictions and
applications in a variety of domains, including mechanical ensure convergence with the reference level. Also, opt for the
systems and power electronics[14]. MPC has been used as a optimization techniques que then calculates the best and most
general process control in process industries, oil plants, and timely control input for the system's actuator to the stabilize
pendulum. In 2019, Deebak et al. [3] have presented a new

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 121


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

MPC to keep the pendulum upright and to deal with �−


disruptions. The difficulty of arm angle tracking control is also �� � (1)
taken into account. The MPC, which runs on the LabVIEW
platform, was created to control a rotary inverted pendulum in 1 1
real time. Anyhow, by using the MPC toolbox in LabVIEW, − �� �� �� ��� � � + �� + 4 �� �2� � −
2
1 1
MPC can handle even fast system in this case, 10ms sampling �� �2� ��� � ��� � �2 − �� �� ���� � =−
4 2
time. In 2019, Roja Eini and Sherif [4] have suggested an
�� � (2)
indirect adaptive FLC MPC technique for a nonlinear RIP
with model uncertainties. The parameters of the fuzzy system
were then tweaked using the adaption rules to ensure that the Where,
Lyapunov stability condition was met and the system tracking θ is the rotational arm position
error was kept to a minimum. Supriya and Shraddha et al. α refers to pendulum position
presented the development of the NMPC in 2019 [5] to control � refers to arm velocity
the extremely nonlinear rapid dynamic SRIP system inverted � refers to pendulum velocity
posture with successive linearization at sub-optimal level .
However, the still there is scope for improve the Table1: Physical parameters used for the modeling of the
computational time with using evolutionary algorithms who SRIP. [5]
has parallel search abilities like PSO. Its ability to adapt new
versions of hybridization with other algorithms makes it useful Symbols Description Value (mm)
for solving optimization problem. SI is one of the optimization
Rm “Motor armature resistance” 2.60 (ohm)
method which has been hybridized with PSO to improve the
optimization problem solving capability within prescribed kt “Motor torque constant” 0.00767
sampling time of the system performance. (N.m/A)
km “Motor back-EMF constant” 0.00767
This paper's main contribution is the application of SI- (V.s/rad)
PSO-based optimization for NMPC, which results in a kg “Total gear ratio” 70
reduction in overall computational time and increased quick jr “Motor armature moment of 0.0010 (kg.m2)
dynamic system response which stabilizes the pendulum inertia”
position in the inverted direction. g “Gravitational constant” 9.81 (m/s2)
The major contribution of this research work is: mp “Pendulum Mass with T- 0.127 (kg
 Focuses on developing a new validated and fitting”
reliable Optimized NMPC that is based on an Lp “Full Length of the pendulum 0.337 (m)
uncertain mathematical model is more (w/ T-fitting)”
specifically built. Lr “Distance from pivot to centre 0.216 (m)
 compares the supplied optimized model against of gravity”
the current optimized model to do performance Jp “Pendulum moment of inertia” 0.00120
analysis. (kg.m2)
Br “Viscous damping coefficient 0.00240
The paper is formatted as follows: You may see the reviews as seen at the rotary arm axis” (N.m.s/rad)
in Section II. The proposed system's system model is
Bp “Viscous damping coefficient 0.00240
portrayed in Section III. The constraints problem is solved
in Section IV using the suggested optimization algorithm, as seen at the pendulum axis” (N.m.s/rad)
the results are shown in Section V, and the task is finished
in Section VI. The servo motor generates the torque which is applied to
the base of the rotary arm as calculated by Eq. (3).
B. MODELLING OF PROPOSED SYSTEM ηg Kgηmkt(Vm−Kg kmθ)
τ=
Rm
(3)
a. Modelling of Single Rotary Inverted Pendulam (SRIP) The model is deployed for predicting a state's trajectory
To demonstrate the effectiveness of the proposed technique, over a given time frame and also for shifting a state from one
a simplified SRIP control model that is relevant with two that isn't desirable to one that is, by taking the necessary
degrees of freedom is employed [15]. control measures.
A rotatable arm and a pendulum make up the mechanism,
with the arm's rotation regulated through a motor for
keeping the pendulum balanced in an inverted posture. A C. FORMULATION OF NMPC
nonlinear model is derived by Eq. (1),(2).
1
�� �2� ��� �2 + �� )� − �� �� �� ��� � � + The nonlinear model is used in the construction of the
1
2
1
NMPC which regulates the nonlinear rapid dynamic system
�� �2� ��� � ��� � �� + �� �� �� ��� � �2 = [17].
2 2

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 122


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

a. Control relevant Model Selection Nh


2
Ni
2
Y   b(t )  h t  bref W1   (v(t  i t )) W2 (9)
Let us consider the system as non-linear and its state-space h 1 i 1
model is given by Eq. (4)(5), and its constraints are imposed Where, W1 and W2 are the weighing matrices.
by input and output defined by Eq. (6).
v(t  i t )  v(t  i t )  v(t  i  1t )
a ( t  1)  f ( a ( t ), v ( t )) t  0, a (0 ) (4)
The first �� , �ℎ values are calculated and the rest control
b (t )  h ( a (t ), v (t )) (5) inputs are discarded to calculate the cost function to calculate
the cost function Y . During the optimization process, the
control and prediction horizons will be moved ahead, and the
vmin  v(t)  vmax procedure will be repeated with new determined values.
(6)

bmin  b(t)  bmax


.
a  f (a, v)

Where a � ∈ ℜ�� is the state vector, � � ∈ ℜ�� is the input


vector, � � ∈ ℜ�� denotes the controlled output with the t as
the current sampling instant. f and h are system functions of
the process model, v min , vmax , b min and bmax are constants
which are nothing but upper and lower boundaries of the
constraints. Fig.1 Linearized NMPC
b. Discretization As shown in Fig. 1, the optimization problem is handled at
each subsequent interval by linearizing the nonlinear problem
By using forward Euler discretization, the non-linear state at the sampling moment using updated process parameters.
space model is divided into samples with sample time T S . Eq. Here, an Seagull Insisted PSO (SI-PSO) algorithm is
produces the differential equation for the motion of the rotary introduced to tackle the constrained NMPC optimization issue
arm and pendulum (7). in this work, which will be discussed in the following session.
D. PROPOSED SI-PSO
aek1  aek  Ts fe (aek, vek )  fl (aek, vek ) (7)

A new delay has been added to the state model by considering, In this work, a new hybrid algorithm named "Seagull
Insisted PSO" is proposed to overcome the disadvantages of

ak  aekT xvkT T
, vk  vek , the PSO algorithm [18] to optimize the angle position of RIP.
The PSO algorithm has the disadvantages of being easy to fall
f (ak , vk )  [ fl (aek , vek )T vekT ]T it takes the form is given into a local optimum in high-dimensional space and having a
in Eq.(40). poor iterative convergence rate. So we hybridized the position
update of the seagull algorithm into PSO to overcome the
aK 1  f (ak , vk ) (8) deficiencies of the PSO algorithm. The SOA algorithm was
primarily inspired by the natural seagulls' migratory and
c. Optimization Problem with Constraints fighting behaviour [19]. To show how broadly applicable it is,
it is used to resolve seven constrained real-world industrial
The optimization problem is defined by using dynamic applications. It is a fairly competitive algorithm that is on par
model is shown in Fig. (1). with other optimization methods and is able to resolve difficult
large-scale constrained problems.
minv Y (b(t),v(t))
The optimal moves can be defined by the difference a. The SI-PSO Algorithm
among the expected and reference output signal. The cost
function is given by Eq. (9). In the search space, the PSO algorithm keeps track of a set
of possible solutions and analyses the solution's fitness
iteratively based on the objective function being optimized. A

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 123


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

proposed solution to the optimization issue is represented by


every particle in the swarm. The algorithm's first stage selects
y'  r  sin(k)
candidate solutions at random from the search space, which is
made up of all possible solutions. Because the PSO method z'  r  k
has no prior knowledge of the objective function, the goal is to
find the solution that is closest to the local or global maximum.
r  u  e kv
Simply put, the PSO algorithm operates on the fitness
values obtained after evaluating its candidate solutions using
the objective function. The position of particle i at iteration
k k
here Ps (x) stores the best option and keeps track of other
k is represented as xi . The velocity vi of particle i determines
how it flows across space. Each particle's position is updated
search agents’ position. Ds is the distance between the search
as per Eq. (10) agent and best fit search agent. Cs is the location of a search
agent that is not in conflict with any other search agents. r
xik1  xik  vik1 (10) denote every spiral turn’s radius, and k is a number at random
within [0 ≤ k ≤ 2π]. The spiral shape is defined by the
parameters u and v . The flowchart of proposed SI-PSO
Particle position xik 1 is a combination of the last personal Algorithm is shown in Fig. 2.
best position and the velocity of the particles. It's named
velocity because three acceleration parameters of previously
saved velocity, c 1 r1 , and c 2 r 2 . The optimization process is
driven by particle velocity, which is updated using the
following methods Eq. (11)

vik 1  X *[vik  c1r1 ( pik  xik )  c2r2 ( gik  xik ) (11)

Here inertia is X , r1 and r 2 refers to numbers at random


[0,1], and c 1 and c 2 refers to metrics that represent
cognitive and social activity, respectively. Furthermore, the
best position so far for the i th particle's is Pi , while the best
point for the swarm is gi . The inertial parameter X controls
the algorithm's search behaviour, with highest range of about
1.4 implying a more global search and lowest range of about
0.5 implying a more local search. It has low convergence rate
so it is easy to fall into local optima. Here, a Seagull algorithm
is deployed to resolve the constrained NMPC optimization
issue. The position update equation of seagull is

Ps ( x)  ( Ds  x '  y '  z ' )  Pbs ( x) (12)

Where,

Ds  Cs  M s

x'  r  cos(k) Fig. 2. Flowchart of SI-PSO Algorithm

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 124


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

E. RESULTS AND DISCUSSION Likewise, the simulation has been carried out while the
starting position is nearly identical to the intended position π
a. Simulation Setup as shown in Fig. 3d, 4b and 5d. The pendulum angle response
The presented model was coded and executed in shows a faster response with the SI-PSO algorithm and is able
MATLAB software. Performance analysis was carried out to reject the disturbance more efficiently than SOA and PSO
based on the accuracy, precision, specificity and so on. In algorithms which in terms of switching between swing-up to
general, two control methods are used to balance an inverted the balance position of the Pendulum arm. As if we go through
pendulum’s position: swing up control and balancing control. the results SI-PSO based NMPC shows the fast rise time as
The suggested algorithm can balance the pendulum from its compared to others. Also the control input requirement for the
rest position, as illustrated in the simulation results. algorithm is reduced as we move towards the SOA and PSO,
to SI-PSO optimization methods. The input generated through
b. Response of Rotary Inverted Pendulam
SOA has large variations in between +5 to -5 volts. However
As illustrated in Fig.3, the desired point is used as a the SI-PSO and PSO reduced it to approximately within +2 to
reference to assess the rotary arm's robustness against -2 Volts for balance control of Pendulum.
disturbance in the Fig.3c for SOA and 4c for PSO and 5c for
SI-PSO based NMPC.

a. Control Input b. Pendulum Position

-
C.Rotary arm position d. Pendulum Vs Arm Position angle
Fig.3 Rotary inverted pendulum's response from its rest position to its inverted position by using SOA NMPC

-
a. Control Input b. Pendulum Position

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 125


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

-
c. Rotary arm position d. Pendulum Vs Arm Position angle
Fig.4 Rotary inverted pendulum's response from its rest position to its inverted position by using PSO NMPC

-
a.Control Input b. Pendulum Position

-
c.Rotary arm position d. Pendulum Vs Arm Position angle
Fig.5 Rotary inverted pendulum's response from its rest position to its inverted position by using SI-PSO NMPC

To summarize, the validated NMPC appears to have a F. CONCLUSION


better chance of successfully enabling the system to converge The proposed SI-PSO based NMPC algorithm is
to the reference point with more precision and a short settling successfully applied to a nonlinear rapid dynamic system with
time. For the pendulum's stability and safety, the imposed robustness testing in this research. The stipulated constraints
state and control limitations are respected, important, and were followed by all of the states. The processing time is also
necessary. decreased effectively, demonstrating its suitability for real-
time control of fast dynamic systems. The proposed optimized
The stability analysis of pendulum angle is given by fig. 4 system is based on simulation with conventional optimization
and 4. It is evident that the settling time of SI-PSO optimized strategies for handling the system’s nonlinearities and
RIP is settled faster (within 0.02s computational time) than uncertainties effectively. Optimized NMPC successfully move
other conventional algorithms. to balance condition after swing-up condition. The signle SI-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 126


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

PSO based NMPC shows effectiveness to handle both swing-


up and balance control entirely, so that the arm position and
input abide by their respective limits.
References

[1] Asadi, Farshid. "Constrained Deep Learning Based Nonlinear Model


Predictive Control." arXiv preprint arXiv:2103.13514 (2021).
[2] Fnadi, Mohamed, and Julien Alexandre dit Sandretto. "Experimental
Validation of a Guaranteed Nonlinear Model Predictive
Control." Algorithms 14, no. 8 (2021): 248.
[3] Deepak, K. N., K. Rahul Sharma, and T. Ananthan. "Model Predictive
Control for rotary inverted pendulum using LabVIEW." In IOP
Conference Series: Materials Science and Engineering, vol. 577, no. 1, p.
012113. IOP Publishing, 2019.
[4] Eini, Roja, and Sherif Abdelwahed. "Rotational inverted pendulum
controller design using indirect adaptive fuzzy model predictive
control." In 2019 IEEE International Conference on Fuzzy Systems
(FUZZ-IEEE), pp. 1-6. IEEE, 2019.
[5] Diwan, Supriya P., and Shraddha S. Deshpande. "Nonlinear Model
Predictive Controller for the Real-Time control of Fast Dynamic
System." In 2019 International Conference on Communication and
Electronics Systems (ICCES), pp. 289-294. IEEE, 2019.
[6] Pas, Pieter, Mathijs Schuurmans, and Panagiotis Patrinos. "Alpaqa: A
matrix-free solver for nonlinear MPC and large-scale nonconvex
optimization." arXiv preprint arXiv:2112.02370 (2021).
[7] Campi, Marco C., and Simone Garatti. "A sampling-and-discarding
approach to chance-constrained optimization: feasibility and
optimality." Journal of optimization theory and applications 148, no. 2
(2011): 257-280.
[8] Konak, Abdullah, David W. Coit, and Alice E. Smith. "Multi-objective
optimization using genetic algorithms: A tutorial." Reliability
engineering & system safety 91, no. 9 (2006): 992-1007.
[9] Xu, Fang, Hong Chen, Xun Gong, and Qin Mei. "Fast nonlinear model
predictive control on FPGA using particle swarm optimization." IEEE
Transactions on Industrial Electronics 63, no. 1 (2015): 310-321.
[10] Ganga G, Dharmana M M, 2017, “MPC controller for trajectory tracking
control of quadcopter”, International Conference on Circuit, Power and
Computing Technologies (ICCPCT), pp. 1-6.
[11] Jayanthi R and Anwamsha K, 2016, “Fuzzy-based sensor validation for
a nonlinear benchmark under MPC”, 10th International conference on
intelligent Systems and Control (ISCO), pp. 1-6.
[12] Milton, John, Juan Luis Cabrera, Toru Ohira, Shigeru Tajima, Yukinori
Tonosaki, Christian W. Eurich, and Sue Ann Campbell. "The time-
delayed inverted pendulum: implications for human balance
control." Chaos: An Interdisciplinary Journal of Nonlinear Science 19,
no. 2 (2009): 026110.
[13] Novak, Mateja, and Tomislav Dragicevic. "Supervised imitation
learning of finite-set model predictive control systems for power
electronics." IEEE Transactions on Industrial Electronics 68, no. 2
(2020): 1717-1723.
[14] Kothare, Mayuresh V. "Dynamics and control of integrated
microchemical systems with application to micro-scale fuel
processing." Computers & chemical engineering 30, no. 10-12 (2006):
1725-1734.
[15] Meireles, Magali RG, Paulo EM Almeida, and Marcelo Godoy Simões.
"A comprehensive review for industrial applicability of artificial neural
networks." IEEE transactions on industrial electronics 50, no. 3 (2003):
585-601.
[16] Allgower, Frank, Rolf Findeisen, and Zoltan K. Nagy. "Nonlinear model
predictive control: From theory to application." Journal-Chinese Institute
Of Chemical Engineers 35, no. 3 (2004): 299-316.
[17] Diwan, Supriya P. "Parallel Constrained Predictive Control based on the
Improved Particle Swarm Optimization for Nonlinear Fast Dynamic
Systems." Turkish Journal of Computer and Mathematics Education
(TURCOMAT) 12, no. 13 (2021): 2371-2378.
[18] V. Kennedy and R. Eberhart. : Particle swarm optimization. In: Neural
Networks,1995. Proceedings., IEEE International Conference on,
volume 4, pages 1942-1948,1995
[19] Dhiman, Gaurav, and Vijay Kumar. "Seagull optimization algorithm:
Theory and its applications for large-scale industrial engineering
problems." Knowledge-Based Systems 165 (2019): 169-196.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 127


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Interactive Performance Indicator Dashboard for


Modern Enterprise
Grace Anzel G
Vidya Dharani L Manikanta K Department of Computer science and
Department of Computer science and Department of Computer science and Engineering,
Engineering, Engineering, Koneru Lakshmaiah
Koneru Lakshmaiah Koneru Lakshmaiah Education Foundation,
Education Foundation, Education Foundation, Vaddeswaram, Andhra Pradesh, India
Vaddeswaram, Andhra Pradesh, India Vaddeswaram, Andhra Pradesh, India 190030461@kluniversity.in
190030946@kluniversity.in 190031882@kluniversity.in

Sasi Kiran V Srithar S Aravinth S S


Department of Computer science and Department of Computer science and Department of Computer science and
Engineering, Engineering, Engineering,
Koneru Lakshmaiah Koneru Lakshmaiah Koneru Lakshmaiah
Education Foundation, Education Foundation, Education Foundation,
Vaddeswaram, Andhra Pradesh, India Vaddeswaram, Andhra Pradesh, India Vaddeswaram, Andhra Pradesh, India
190031761@kluniversity.in sss.srithar@gmail.com aravinthkrithick@gmail.com

Abstract—Dashboards help stakeholders to improvise the • Visibility into the Business system.
level of decision-making by visualizing the things which need to
be monitored on a daily/weekly/bi-weekly/monthly basis. With • Time Saving.
the ease in the understanding of dashboards, the use and • Improvised Results.
demand for these increased a lot nowadays. The dashboard
system also helps to provide solutions for many different • Ease in understanding.
problems in the current industry. Another problem with these
dashboards is many open open-source applications help users • Productivity increment.
to get their visualization done within no time. It is better to • Increment in Profits.
have an individual application for each company to have their
visualization done for the things they need to compare. In this As mentioned, the dashboard shows us exactly which
paper, the implementation and a comprehensive literature areas of our business are performing poorly. In our project
review intending to have a Common System for all also, the main aim is to create a dashboard that helps
stakeholders which will help them to refer to the Defects status stakeholders to have an overall view of the metrics given.
at any point in time without any dependency on SQA emails. Some many ways or frameworks that will create the
The main aim is to refer to the status of defects at any point in dashboard for the given data or metrics. Our task is to create
time without depending on any other SQA emails or such a framework without using the existing frameworks that
something. To achieve that, the data to be available in the are available in the current market. Any programming
database at any point in time so that the status whenever it language or framework is used to complete this task but
needs to be checked. The data which is available in the using a framework that gives the optimized output is the
database is under one hierarchy to be followed. That hierarchy better choice to use. There is no Single System to have a
helps us to get the defects by getting the values in days and the
consolidated dashboard view of all PLM KPI/Metrics for
total time taken. Different columns were needed to get a
Dashboard. For our project group name, team name, project
Project/Part/Group/Team[3][4]. Stakeholders are required to
name, and part name are required to get the values in the days, refer to different excel based reports for KPI/Metrics Status
the number of defects, and the total time taken. The Dashboard on weekly/Bi-weekly reports. Every time the SQA is
which will be getting from the given data helps stakeholders to required to use the Master Reports deriving the
have a complete picture of the project details. In this regard, a Project/Part/Group/Team based status reports which are
project which helps stakeholders to refer for the status of time-consuming.
defects. As the metrics are confidential for particular companies
Keywords: Enterprise, Performance Indicator, Visualization,
or stakeholders, the information which are using for the
Metrics, Analysis, Dashboard. visualization in the dashboard needs to be authenticated by
respective stakeholders. The authentication module performs
this task by allowing only particular and allowed admins.
I. INTRODUCTION Dividing our application into different modules helps us to
A Dashboard system is also considered to be a tool under work efficiently and also gives us the knowledge of exactly
information management that is used to get track of the given what our application will do in a specific manner. It starts
KPIs, metrics, and some other key data points which are with the authentication module and ends when the session
relevant for the specific business domain or department or ends after a particular user or stakeholder logs out. It is a
any kind of specific process [1][2]. The visualization can be better option to give download access to a particular user or
done for the data from various sources like databases, web stakeholder for the dashboard that was generated for the
services, and some other locally hosted files. Specifically, the given data or uploaded data [6] [7]. Along with the
right dashboard will give you some key benefits as follows: dashboard, required specifications are calculated using
formulas and display them on the front end. The better

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 128


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

option for choosing a programming language for systems in the market. We got to know the working of those
visualizations is python and the framework that is well dashboard systems and worked on it for some time on, we
recommended for the same is React JS. To get the data from started working on our proposal i.e, to build a website that
the user or from the database, it is recommended to use gives a dashboard for the given data [9] [11]. To get started
spring boot. Hopefully, using these specifications, we can with our solution, we required example metrics to work on
build the desired and effective dashboard. and asked our mentors for them. With the provided dummy
data which is in the form of excel, we started working with
II. LITERATURE REVIEW that data. To get the dashboard, we need to get the data from
the database as the data need to be stored for analysis. At the
Catherine E [5] et al, Investigated that Dashboards also initial stage of our project, we started it off using python in
help in the improvement of necessary fields in various the Streamlit framework as it is easy to build graphs using a
departments. One of those departments is health care in python programming language. At this stage, our phase of
which the performance of physicians will visualize Based on difficulties had started. We are expected to change our
that visualization the growth of those physicians will be framework as well as our way of approach because it is not
improved. Most importantly, patient care and quality of secure to host our prepared solution. The new requirements
treatment would get better. of our project to be secured are using react as frontend,
Francesco Schiavone [8] et al, Investigated monitoring spring boot as backend, and PostgreSQL as a database.
the KPIs in the digitalized health networks, they developed a These requirements keep our project to be secure when it
dashboard system using a conceptual approach that is gets hosted. To meet the given requirements, we started
supported by direct observation of cancer networks in working on these frameworks(react, spring boot). Finally,
Southern Italy. As a result, they were able to outline an we created a website that visualizes different graphs like Bar
inductive process model through which healthcare network charts, Pie charts, Donut Charts, and line charts. We can
managers can develop an MCGDM using the conceptual able to add or delete a record based on our requirements. We
model. also added an option to download the visualized chart. Fig. 1
shows the flow of the project. Table 1, 2, and 3 shows the
Katharine,H [10] et al, Invested to make visualizations sample key metrics.
easy they developed individualized cytopathologist and
cytotechnologist dashboards with unique features. These
dashboards are confidential and based on the previous 10-
year calendar years. The CP and CT dashboards visualize
different metrics and the laboratory director can access all
the results whereas the CP and CT dashboards are updated
on weekly basics [12][13]. This dashboard is developed
based on Tableau and visualizes the color-coded displays. As
a result, it successfully implemented personalized dashboards
which help individuals to focus on their performance and
reach professional benchmarks.
SomnathArjun [14] et al, Investigated they developed a
smart sensor dashboard for a manufacturing workshop. With
the existing visualization, we cannot able to visualize both
temporal and spatial information simultaneously. By using
the three parts IoT units with a single-board computer, an
interactive visualization module, and an early warning
system they visualized the data in 2D, and to get results more
effectively they developed 3D visualizations which allow
users to interact naturally. They went through several user
stories and inferred the results.
Tat’Yana, A [15] et al. Investigated the Vaccine Safety
Datalink(VSD) investigators developed a dashboard system
that visualizes the rapid reviews of vaccine surveillance data
every weekly. They developed using tableau software to get
the visualization done for the required metrics. Throughout Fig. 1. Proposed Flow Diagram
the pandemic, these dashboards which were created by this
team were helpful to track COVID-19 cases, deaths, and also
testing including the aid management of patient flow in
clinical settings.

III. SYSTEM DESIGN


To get the solution for the given problem, we got a
proposal to build a website/web application that gives us a
dashboard for the given data to check on a daily/weekly basis
which helps the stakeholders to have a complete report of
KPI. At first, we observed the already existing dashboard

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 129


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I. SAMPLE METRICS 1


ProjectCode11 3.95 233 919.52
Project code Y21 Project Name Team Name ProjectCode12 4.43 13 57.58
Project Name 1 Team1
ProjectCode1 ProjectCode13 0.91 2 1.81
Project Name 2 Team1
ProjectCode2 ProjectCode14 4.12 218 897.95
Project Name 3 Team1
ProjectCode3 ProjectCode15 7.35 66 485.21
Project Name 4 Team1
ProjectCode4
Project Name 5 Team1
ProjectCode5
Project Name 6 Team1 IV. PROPOSED METHODOLOGY
ProjectCode6
Project Name 7 Team1 We used a simple conceptual methodology through
ProjectCode7
which all the necessary visualizations happen. Technically,
Project Name 8 Team2
ProjectCode8 as we have worked in different frameworks since the start of
ProjectCode9 Project Name 9 Team2 the project, there are many technical models or
Team2 methodologies that were used to build the project. In the
ProjectCode10 Project Name10
Django framework, we used models, charts, notifications,
Project Name11 Team2
ProjectCode11 and forms for our implementation and we got succeed in
ProjectCode12 Project Name12 Team2 using these methodologies. As a result of these
Team2 methodologies, we got an interactive dashboard as a result in
ProjectCode13 Project Name13
the Django framework.
Project Name14 Team2
ProjectCode14
In python, we have built in functions and methods for
Project Name15 Team2
ProjectCode15 the visualization which is very easy compared to all for the
implementation and we implemented this using streamlit
TABLE II. SAMPLE METRICS 2 framework. In React framework, we used react bootstrap for
Project code Group Name Part Name SQA
the front end and react components, react router, redux ,state
Part1 SQA1
and props methodologies for the implementation. Using all
ProjectCode1 Group1 these methodologies within react framework and got
Group1 Part1 SQA1 succeed as we got the dashboard with all the required
ProjectCode2
Group1 Part2 SQA1 visualizations. There are seven steps to be followed to
ProjectCode3
achieve mission.
Group2 Part3 SQA1
ProjectCode4
Part4 SQA1 Step 1: Give each and every column from the front end i.e.
ProjectCode5 Group2
from React.
Group2 Part5 SQA1
ProjectCode6
Part3 SQA1
Step 2: The values which were given in the front end will be
ProjectCode7 Group2 stored in the database. The frontend(React) is connected to
Group3 Part6 SQA3 backend(Spring boot) through API calling which made our
ProjectCode8
Group3 Part7 SQA3 job easy.
ProjectCode9
ProjectCode10 Group3 Part7 SQA3 Step 3: The details which were stored in the database will be
Part7 SQA3 fetched again to the front end.
ProjectCode11 Group3
Group3 Part7 SQA3 Step 4: Those values need to get visualized in different
ProjectCode12
charts to get the report in the front end.
Group3 Part8 SQA3
ProjectCode13
Part9 SQA3 Step 5: Visualization includes various forms of graphs like
ProjectCode14 Group3
charts, pie charts, etc.
Group4 Part9 SQA3
ProjectCode15
Step 6: Using the React framework, the data will be
visualized, and the user will be able to observe the graphs.
TABLE III. SAMPLE METRICS 3
Step 7: All the graphs are dynamic; the user will be able to
update or delete the values and can observe the change of
flow in the visualization.
PLM KPI 1 No of Total time
ProjectCode (Value in Days) Defects Taken V. IMPLEMENTATION DETAILS
Project Code 1 4.11 154 632.34 Initially, the framework which we implemented is a
Project Code 2 3.22 18 57.89 streamlit framework using python. As python is one of the
best options for getting data visualization, we kick-started
Project Code 3 7.45 5 37.24
our project using python and we were able to succeed by
Project Code 4 6.11 198 1208.95 getting the necessary dashboard for the given data there is an
Project Code 5 2.60 47 122.36 option to change/update the required fields for the
dashboard. Due to security reasons, we were asked to change
Project Code 6 2.57 702 1801.03 our more secure framework. We decided to work on the
Project Code 7 2.10 500 1048.35 Django framework which is user-friendly and technically
Project Code 8 4.12 650 2681.16
easy to implement. The reason behind choosing this
framework is a python programming language Using models
Project Code 9 0.10 1 0.10 in Django, it is easier to get the visualization done for the
ProjectCode10 4.41 173 763.54

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 130


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

given data. And for security reasons, we added an getting the analysis of the data in the front end which is used
authentication action module in this framework. to get a complete and clear idea of the summary of the data.
Even after working with 2 different frameworks, we were
given some specific requirements at the final stage of our
project. To meet those requirements we again changed our
framework. For the Implementation, we used react as our
front end for the visualization and getting input from the
user. The data which was given will be stored in the
PostgreSQL database using API calling in spring to connect
with React. Using this API calling we stored the data from
the front end to database and fetched the data from the back
end to front end. We used the spring tool suite (STS) for
implementing spring boot and visual studio code for the Fig. 4. Summary of data in Python
react part and implemented our project in localhost. Fig.2
shows the pie chart visualization between the total time In react framework, we integrated an option to download
taken and groups from the sample data. We can customize the necessary graph from the dashboard in the form of PNG
the input based on our requirements. which we didn’t get on various platforms. In Fig.5 you can
see the option “download as PNG” at the bottom of the chart.
Through this feature, you can able to download and save the
PNG and can see it at any time.

Fig. 2. Pie Chart in Python (total time taken for a group)

Fig.3 shows the pie chart visualization between the total


time taken and groups from the sample data using React
Framework. Here, you can even see the value by hovering on
the graph. Fig. 5 Download option for Line chart

VII. RESULT ANALYSIS


As a result, we succeeded to get the dashboard for the
given data. The dashboard includes various forms of graphs.
After getting login into our website, the user will be able to
enter the details and will be able to see the dashboard for the
given data, and also has access to update or delete the
wanted/unwanted details. In Fig.6 we can able to see the
overview of the dashboard in React. Also, here we can able
to see different charts.

Fig. 3. Pie Chart in React (total time taken for a group)

VI. COMPARATIVE ANALYSIS WITH EXISTING


WORK
While working on inbuilt frameworks, we decided that Fig. 6. Dashboard overview in React
our solution needs to be user-friendly and doesn’t require any
demonstration to work with. Comparatively, our solution is
simple and user-friendly. We added an extra advantage or
feature in all three implementations which we didn’t observe
in the existing ones. Fig.4 shows in python, we will be

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 131


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 7 shows that we can add a new record into the


database with different metrics. This also contains
validations like numerical data cannot be in the form of text
and no metric should be empty.

Fig. 10. Sample Bar Chart

Fig. 7. Dashboard overview in React Fig.11 shows the visualization of a sample Pie chart
between the Project Code and the Number of defects. Here,
Fig. 8 shows all the records from the database. We can we can customize the number of inputs also we can able to
see the value whenever we hover over it.
verify the individual record from this and can make
necessary changes if required.

Fig. 8. Dashboard overview in React

Fig.9 shows the visualization of a sample Doughnut chart


between the Project Code and the Number of defects.
Fig. 11. Sample Pie Chart

VIII. CONCLUSION AND FUTURE WORK


In this technologically competent world, there is nothing
that we don’t get in the desired manner. In the process of
completing our project also, we met up with many
challenges technically. Finally, we were able to satisfy our
mentors by developing a dashboard with the given
requirements. While changing from one framework to
another framework, we had some good real-time learning
experiences. The aim of helping stakeholders to have all the
necessary visualizations in one place is finally completed.
The building of the dashboard was completed but there is
a scope for the improvement of updating each chart with the
necessary columns. Along with individual update in charts,
we need to check with further updates after our application
gets hosted.

Fig. 9. Sample Doughnut Chart

Fig.10 shows the visualization of a sample Bar chart


between Project Code and the Number of defects. Here, we
can customize the number of inputs also we can able to see
the value whenever we hover over it.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 132


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES

[1] AkramVahedi et al. "Applications, features and key indicators for the
development of Covid-19 dashboards: A systematic review study",
Informatics in Medicine Unlocked, Volume 30, No.100910, 2022.
[2] AndreasHinderks et al.” Developing a UX KPI based on the user
experience questionnaire”, Computer Standards & Interfaces Volume
65, Pages 38-44,July 2019.
[3] AndrewZamecnik et al."Team interactions with learning analytics
dashboards", Computers & Education Volume 185, No.104514,
August 2022.
[4] Athena K.Petrides et al. "Pandemic Response in the Clinical
Laboratory: The Utility of Interactive Dashboards", Journal of
Pathology Informatics Volume 13, No.100010, 2022.
[5] Catherine E et al.” Development, Implementation, and Use of an
Emergency Physician Performance Dashboard”, Clinical Pediatric
Emergency Medicine Volume 18, Issue 2, Pages 115-123, June 2017.
[6] Choong-HeeHan "Blockade-detection-response based security
operations dashboard design", Computers in Human Behavior Reports
Volume 4, No.100143, August-December 2021.
[7] FabioGrandi et al. "Design of ergonomic dashboards for tractors and
trucks: innovative method and tools", Journal of Industrial
Information Integration Volume 25, No.100304, January 2022.
[8] Francesco Schiavone et al.“Revealing the role of intellectual capital in
digitalized health networks. A meso‑level analysis for building and
monitoring a KPI dashboard”, Technological Forecasting and Social
Change Volume 175, No.121325, February 2022.
[9] JaehyeongLee et al."Estimating vehicle speed by analyzing the
acoustic frequency of dashboard camera sound", Forensic Science
International Volume 338, No.111384, September 2022.
[10] Katharine,H et al. “Developing dashboards for performance
improvement in cytopathology”, Journal of the American Society of
Cytopathology Volume 10, Issue 6, Pages 535-542, November–
December 2021.
[11] Marco AntonioEsquer Rochin et al. "Design and evaluation of a
dashboard to support the comprehension of the progression of patients
with dementia in day centers", International Journal of Medical
Informatics Volume 156, No.104617, December 2021.
[12] Peter J.Neumann "Toward Better Data Dashboards for US Drug
Value Assessments",Value in Health Volume 24, Issue 10,Pages
1484-1489, October 2021.
[13] Shannon S.Wu et al."Utility of the finance-electronic medical record
digital dashboard in pediatric otolaryngology", American Journal of
Otolaryngology Volume 43, Issue 5,No. 103598, September–October
2022.
[14] SomnathArjun et al. “Interactive Sensor Dashboard for Smart
Manufacturing”, Procedia Computer Science Volume 200,Pages 49-
61, 2022.
[15] Tat’Yana A et al.” Dashboard development for near real-time
visualization of COVID-19 vaccine safety surveillance data in the
Vaccine Safety Datalink”, Volume 40, Issue 22, Pages 3064-3071, 11
May 2022.
[16] Raj, Jennifer S., and S. Smys. "Virtual structure for sustainable
wireless networks in cloud services and enterprise information
system." Journal of ISMAC 1, no. 03 188-205, 2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 133


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Switching and Morphological Studies on Si15Te80Cu5


Glass and Thin Film

Diptoshi Roy Chandasree Das


Department of EEE Department of EEE
CMR Institute of Technology BMS College of Engineering
Bengaluru, India Bengaluru, India
diptoshi.r@cmrit.ac.in chandasreedas.eee@bmsce.ac.in

Abstract— I-V characterization of the bulk and amorphous addressing wireless system, embedded application, solid state
thin film of the as-prepared Si15Te80Cu5 sample is carried out to subsystem and computing platform [4]. An alteration in phase
better perceive the electrical switching behavior. Memory and is experienced by the amorphous semiconductors due to the
threshold switching have been discerned in bulk glass, but only implementation of electric field and this process is coined as
memory switching has been shown by amorphous thin films. The electrical switching. This process transforms the glasses from
thin film device exhibits a substantially lower threshold voltage low conducting “OFF” state (which is amorphous in nature) to
than its bulk version, suggesting that it could be used for phase high conducting “ON” state (known to be crystalline in nature),
change memory (PCM). The glass is subjected to Set –Reset
this transformation is termed as SET process. The reversal of
using a triangle pulse of 6 mA for set operation and a rectangle
the SET process is known as RESET process which involves
pulse of 12 mA for reset operation to determine the suitability of
the provided glass for PCM use. A constant recurrence of a few
transforming the glass from ON to OFF state. The glass is
Set-Resets is evident in this study. Morphological study has also maintained by the switching process (which is a constructive
been carried out on the bulk sample. process) in a particular conductive state when changed to ON
state. Switching occurs at threshold voltage and the latter is an
Keywords— Chalcogenide glasses, electrical switching, Set- element of the composition of the active material, its thickness
Reset [5], prompt history of applied voltage and surrounding
temperature [6].
I. INTRODUCTION
The attributes of chalcogenides manifests a variation when
Alloys of chalcogenides have a wide range of application metallic dopants like copper or silver is added. The network
like in the field of semiconductors, electronic, photonic devices connectedness, electrical conductance and crystallizing ability
[1]. The capability of chalcogenides to reverse its phase stands of a network containing chalcogenides is seen to increase when
as a basis for PCM materials which has evolved to a propitious metallic dopants bonds with them [7]. Optical as well as
candidate against its parallel crystals and is the reason for electrical attributes of chalcogenides containing metallic
vigorous research [2]. The problems encountered by the PCM dopants are dissimilar in comparison to the ordinary glasses.
get skillfully decrypted with the help of engineered solutions, This highlights the reason of wide application of chalcogenide
developing models which are of low cost and this is the main containing transition metal in optical memory and laser
reason behind its success. The PCM has two phases namely materials.
amorphous and crystalline which has subsequent variation in
resistance and in turn causes apotheosis of PCM [3]. Ge- Te glasses doped with elements from fourth to sixth
Amorphous phase has around three to four orders resistivity group of the periodic table have found salient recognition
higher as compared to the crystalline phase. Progress has been because of its broad scope of application in technology [8]. In
the part of PCM in the last few years of which some are contrast literature shows less documentation on amorphous Si-
amelioration in density, vigorous rate of device scaling, Te although it can be used as switching diode [9] because of
reduction in programming power. Device scaling stands as being effectual optic and acoustic material. Study of various
important reason towards decrease in power required for characteristics of Si- Te glasses with metal or semiconductor as
switching and hence in the development of PCM technology. dopant enjoys significant interest.
PCM technology has the following positive features: II. LITERATURE SURVEY
capabilities of fast read and write; large number of writing and
erasing cycles; ability which helps in writing in the memory Glassy chalcogens which display the gradation of phase from
without prior erasing step known as bit alterability [4]. Another non- crystalline to crystalline has been employed in electronic
important feature of PCM is to preserve and sustain more memory technology from ages [10, 11, 12]. Whilst the basic
number of bits for a long duration. For the promising features principles of PCM has been a part of discussing during the
as listed above, the PCM has a wide range of application like initial work, advancement in material and device technology

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 134


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

in the last 20 years has assisted in demonstrating PCM as an


alternative to requisite technologies like flash [13]. While The I-V characteristic recorded by Keithley (2410c)
flash is battling to sustain the present level of credibility and Source-Measure unit (SMU) is used to study the switching
execution with growing density the above criteria seem to be behavior of the sample. The non-crystallinity of the as prepared
hardly adequate for modern applications. Non volatile solid- bulk glass is perceived by XRD which has been carried out by
state memory technologies which have the advantage of good PANalytical X’Pert3 Powder X-ray diffractometer with CuKα
performance, density and less cost can introduce significant radiation, the setting of the generator is 30mA, 45KV. SEMs
changes across the memory and storage segment of the are captured using VEGA3 TESCAN to investigate the
computing network. In case the cost per bit is decreased to morphological differences between switched and un-switched
least value by ultra- high memory density, the magnetic hard samples.
disk drives (HDD) can be possibly displaced by storage class
memory (SCM) [14-19].
IV. RESULTS AND DISCUSSION
III. EXPERIMENTAL DETAILS
Bulk Si15Te80Cu5 glasses have been created by quenching A. Switching Studies
high-temperature melts. High purity integral elements have
been taken in quartz ampoules that have been evacuated and Fig 2 shows the I-V attribute of representative Si15Te80Cu5
sealed at 10-6 mbar. The sealed ampoules are kept in the bulk glass thinned down to a thickness of 0. 3mm.The figure
horizontal rotary furnace, which is set up to heat them to 1100 infers that the bulk material exhibits an ohmic conduct at the
0
C at a rate of 100 0C/hr. To ensure the uniformity of the melt, initial stage. This stage is consequently named as “OFF” as an
the ampoules were continuously rotated in the furnace for 24 insignificant current course through the sample. On reaching
hours before being finally quenched in ice-water mixed with the threshold voltage, also known as switching voltage, the
NaOH. glass changes to its high conducting ON state depicting non-
ohmic or current controlled negative resistance operation.
Flash evaporation technique has been employed for coating
of thin film devices and has the following specifications: (a)
Room temperature and a vacuum of 6.5×10-6 mbar has been
maintained inside the chamber of flash evaporation unit. (b)
Molybdenum boat has been used for evaporating the material.
(c) Coating of the devices has been done in sandwich fashion.
(d) Both the top and bottom electrodes are coated with
aluminum. The diagrammatic representation of Si15Te80Cu5
thin-film switching device is shown in fig 1. The source
material is coated using a flash evaporation method on a 25
mm x 75 mm cleaned glass substrate. At room temperature and
a high vacuum of 6.5x10-6 mbar, the flash evaporation process
is conducted. For the purpose of evaporating the substance,
molybdenum boats are used. The device in this paper has been
raised in a sandwich design. Top and bottom electrodes have
both been made out of aluminum. In order to create the
sandwich pattern, the chalcogenide amorphous sample is
deposited in between the top and bottom electrodes. By using
the right mask, the desired pattern can be produced.

Fig 2: I-V Characteristic of Si15Te80Cu5 showing threshold switching

On limiting current the examined Si15Te80Cu5 bulk glass is


observed to regress to initial low conductance OFF state and
hence can be concluded to exhibit threshold switching. The
kind of switching by a glass fundamentally is dependent on the
following aspects (a) On state current, (b) Thermal diffusivity,
(c) Thermal stability, (d) Network topological impacts.
Fig 3 shows the I-V characterization (memory switching)
of Si15Te80Cu5 bulk glass. The present findings point out that
on restricting the current to the lesser magnitudes, the glassy
system manifests switching of threshold type, in other words
Fig 1: Diagrammatic representation of Si15Te80Cu5 thin-film lowering the current brings the glass to OFF state where the
switching device holding voltage is seen to be lower compared to the threshold
voltage. It has also been found and shown in fig 2 that the glass

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 135


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

manifests memory type of electrical switching at higher ON


state current, wherein the sample is seen to remain latched to
the ON state on removal of the administered current. A similar
behavior is observed in several chalcogenides containing
tellurium [10]. Electrical switching notices the transformation
in the sample from amorphous to crystalline phase and in
memory type the crystalline phase is locked by glass. A
filamentary path is created owing to joule heating of the glassy
material which is in between the electrodes [11]. Memory type
of switching is linked with change in structure and so the
presence of cross linkage which fabricates the system as rigid
makes restructuring of glass intricate. As a result, the systems
with large number of cross linking elements have been seen to
display threshold switching rather than memory. The memory
switching of glasses can be discerned by studying the features
of phase change memory.

Fig 4: I-V Characteristic of Si15Te80Cu5 thin film showing memory switching

To understand the application of a glassy system as PCM it


is essential to study the contrast of electrical switching pattern
of bulk Si15Te80Cu5 glass with its equivalent thin film samples.
An analysis on bulk Si15Te80Cu5 glass specifies that the glass
exhibits memory as well as threshold switching [12] and the
behavior is dependent on the ON state current.
B. Set- Reset Study
Bulk samples thinned to 0.3 mm has been subjected to SET-
RESET experiment to carry out an analysis on the same. The
samples have been exposed to 6 mA of triangle pulse during
SET and 12 mA of rectangle pulse during RESET. Fig 5
shows the SET- RESET analysis of typical Si15Te80Cu5 bulk
sample. The glass is seen to store the detail semi- permanently
in the SET process as there is a transition from amorphous to
crystalline state of the glass with an application of
administered current or voltage. The RESET process reverses
the glass to amorphous state by the introduction of sharp -
current of high magnitude wherein conducting crystal melts
locally followed by formation of amorphous state.
C. Morphological Studies
Fig 3 (A and B): I-V Characteristic of Si15Te80Cu5 showing memory i. Electron microscopic analysis
switching
Fig 6 shows the SEM pictures of switched and unswitched
regions of Si15Te80Cu5 glass respectively. The pictures shows
distinctly the variance in the switched region in comparison to
Fig 4 manifests the I-V characteristics of Si15Te80Cu5 thin the region where switching did not occur. Instantaneous
film device. At the initial stage, an ohmic nature is exhibited by heating, sparking and partial splashing of the sample could be
the device since the current varies linearly with voltage. The one of the reason for the recognizable morphological alteration
thin film is observed to be in ON condition with a proof of displayed by the switching region of Si15Te80Cu5 glass.
increase in current through it, and this condition is seen to Alteration in the resistance and density could be one of the
occur when the device changes from amorphous to crystalline reasons for the image contrast seen at the switched regions.
condition at a distinct voltage termed as switching voltage. The
device is said to indicate memory switching if it exists in the ii. Edge Switching
ON state whilst the current is stopped.
An analysis of switching on the edge for Si15Te80Cu5
system has also been undertaken to recognize the phenomenon
of switching. The consideration of thermal as well as electronic
effect which results into a coupled reaction known as electro-
thermal effect is important during the qualitative examination

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 136


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of switching phenomena. The instigation of switching along


with maintaining the ON state in chalcogenide threshold
switches is basically electronic [13]. The ON (memory) state is
latched by the thermal effect which is its essential role and
wherein the thermal induction leads to the transformation of
amorphous to crystalline phase [14-19].

The sample changes its phase from amorphous to


crystalline and exhibits memory switching when the joule heat
of the current transmitting channel is large enough to
incorporate the transition and is displayed in fig 7. Or else,
threshold behavior is exhibited by the glass.

Fig 5: Set- Reset response of Si15Te80Cu5 bulk glass (B) for an


input triangular SET pulse of 6 mA amplitude and rectangular RESET pulse
of 21 mA amplitude (A).

Fig 6: SEM of un switched (top) and switched region (bottom) of Si15Te80Cu5


bulk glass

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 137


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ACKNOWLEDGEMENT
The authors would like to acknowledge SERB (file no
SPG/2021/000359) under which the research was carried out.
REFERENCES

[1] H.S. Nalwa, Handbook of Advanced Electronic and Photonic Materials


and devices, Chalcogenide Glasses and Sol–Gel Materials, Vol 5,
Academic Press, 2001.
[2] Diptoshi Roy et al., Influence of Cu doping in Si-Te based chalcogenide
glasses and thin films: Electrical switching, Morphological and Raman
studies, IEEE Trans. Elec. Dev., vol 68, pp. 1196- 1201, Mar 2021.
[3] H. S. P. Wong et al., Phase change memory, Proc. IEEE, vol. 98, no. 12,
pp. 2201–2227, Dec. 2010.
[4] Martijn H.R Lankhorst, Bas W.S.M.M Ketelaars and R.A.M.
Wolters,Low-cost and nanoscale non-volatile memory concept for future
silicon chips, Nature.Mat, Vol. 4, March 2005, pp. 347-352.
[5] D. Adler, Amorphous Semiconductors, London, England, Butterworth,
1971
[6] A. C. Warren, Reversible thermal breakdown as a switching mechanism
in chalcogenide glasses, IEEE Trans. Elect. Dev., Vol. ED-20, Feb.
1973, pp. 123–131.
[7] J. Z. Liu and P. C. Taylor, The formal valence shell model for structure
of amorphous semiconductors, J. Non-Crystalline Solids, vol. 114, pp.
25–30, Aug. 1989.
[8] J. Hegedus, S.R. Elliott, Microscopic origin of the fast crystallization
ability of Ge-Sb-Te phase-change memory materials, Nat. Mater., vol 7,
pp. 399- 405, May 2008.
[9] Yu. V. Ilisavskij, L.A. Kulakova, B.T. Melekh, E.Z. Yakhkind,
Amorphous SiTe alloy: An efficient acoustooptic material in the
infrared, Acoust Phys-Engl TR., vol 40, pp. 279, March 1994.
[10] S.R. Ovshinky, Symmetrical current controlling device, U.S. Patent
3271591, 1966.
[11] S.Kim, et al., Thermal disturbance and its impact on reliability of phase
change memory studied by micro- thermal stage, in 2010 IEEE
International Reliability Physics Symposium, Anaheim, CA, USA, 2010
Fig 7: I-V characteristic (top) and SEM (bottom) showing channel like [12] S. R. Ovshinky, Reversible electrical switching phenomena in
formation of Si15Te80Cu5 glass disordered structures, Phys.Rev.Lett., vol. 21, Nov 1968
[13] S. Lai, Current status of the phase change memory and its future, in
V. CONCLUSION Proc. IEEE Int. Electron Devices Meeting, Dec 2003
Bulk Si15Te80Cu5 glass concocted by melt quenching [14] Tanaka H et al., Bit cost scalable technology with punch and plug
technique has exhibited both threshold and memory switching. process for ultra high density flash memory , 2007 IEEE Symposium on
VLSI technology, Jun 2007.
Thin film Si15Te80Cu5 device has shown only memory
[15] Jagannatha K.B, Diptoshi Roy, Chandasree Das, Electrical switching
switching with lower threshold voltage compared to the bulk and crystalline peak studies on Si20Te80-xSnx (1 ≤ x ≤ 7) chalcogenide
sample. The bulk as well as thin film devices of Si15Te80Cu5 bulk glasses, J. Non-Cryst. Solids, vol. 544, pp. 120196, May 2020.
glass has shown good switching response and the data were [16] H. J. Stocker, C. A. Barlow, and D. F. Weirauch, Mechanism of
reproducible. The as- prepared bulk sample has shown Threshold Switching in Semiconducting Glasses, J. Non-Cryst. Solids,
repetition of few cycles in Set- Reset study. Switching study on vol. 4, pp. 523–535, April 1970.
the edge of the bulk sample is done to visualize the formation [17] Diptoshi Roy, Chinmayi H.S. Nadig, Aravindh Krishnan, Akshath
of channel like structure during memory switching. This has Karanam, Abhilash R., Jagannatha K.B., Chandasree Das, Electrical
helped to correlate the phenomena linked with the switching switching studies on Si15Te85-xCux bulk (1 ≤ x ≤ 5) glasses, AIP
Conference Proceedings, vol. 1966, pp. 020033, May 2018.
effect.
[18] D.M. Kroll, Theory of electrical instabilities of mixed electronic and
thermal origin. II. Switching as a nucleation process, Phys. Rev. B, vol.
11, pp. 3814- 3821, May 1975.
[19] Arun Madan and Melvin P. Shaw, The Physics and applications of
Amorphous semiconductors,London,Academic press Inc., 1988.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 138


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Performance Analysis of Slotted Microstrip Antenna


with Variant Substrates
R Gayathri, T Perarasi, M Leeban M oses, P Ramya
Department ECE, Department ECE, Department ECE, Department of ECE
Bannari Amman Institute Bannari Amman Institute Bannari Amman Institute Bannari Amman Institute
of Technology, of Technology, of Technology, of Technology
Erode, India Erode, India Erode Erode, India
*gayathrir@bitsathy.ac.in perarasi@bitsathy.ac.in leebanmoses@gmail.com ramyap@bitsathy.ac.in

Abstract—In this paper, a simple double-side slot [17]. The patch antenna displays similar radiation
rectangular microstrip patch (DS S -RP) antenna is characteristics and acts like a dipole. The antenna is
presented. The antenna is used for multi-band purposes
supported mechanically by the substrate, which also
and the operating frequency ranges from 2 to 4GHz. In
aids in resonance [4]. For the antenna to maintain its
this design, five different substrates (BAKELITE, RT
overall integrity and endurance, the substrate is
DUROID, FR-4, TACONIC, and RO4003) have been
analysed for the proposed antenna design. The crucial. Permittivity and loss tangent are two of a
comparison performance is analysed based on the substrate's most crucial properties that must be taken
Reflection coefficient, VS WR, Axial ratio and into Selecting the right substrate material will
appropriate gain characteristics within the frequency improve antenna performance, lower surface wave
range. This slotted antenna design structure improves losses, and enable beam re configurability[11-13]. To
the dual-band responses for wireless communication. select the substrate, the properties to be considered
The slot insertion on the radiating element will provide
are dielectric constant or a measure of
the appropriate gain characteristics (>1.5dBi) and
electromagnetic wave and loss tangent.
promote the enlargement of the bandwidth.
In this article thicker substrate and increased strip
width to maintain impedance [8]. This will result in
Keywords—Patch antenna, different substrates-
more power through it due to a greater Q, but at a
Bakelite, Rogers RT/duroid, Flame Retardant epoxy
cost be heavier and emanate more power from the
resin and glass fabric composite of type 4(FR-4).,
transmission line. At a resonant frequency of 3 GHz,
Taconic, and Rogers RO4003, Wireless
the antennas were simulated with a strip line feed. To
Communication, CadFEKO antenna software
broaden the bandwidth, the dielectric constant must
simulation tool.
be low for a thick substrate [1-3]. The choice of
substrate is a crucial part of the antenna design
I. INTRODUCTION
process. In microstrip antennas, the substrate is
mostly needed to provide the metallization of the
In the modern world, microstrip antennas are
antenna. A dielectric must be present on the substrate
extensively recognized and utilized in
to offer this support. It could have an impact on the
communication systems due to their durability, small
electrical performance of the antenna [2].
size, ease of manufacture, lightweight, and other
The majority of small microstrip antenna designs
benefits. Due to their many applications, microstrip
exhibit declining antenna gain as a result of the
patch antennas are quickly gaining favour in personal
smaller antenna. To prevail to overcome this
wireless communication systems [9-10].
drawback and increase antenna gain, fabricating a
Reconfigurable bandwidth requirements for practical
substrate with a permittivity dielectric constant
applications shall be met while maintaining a small
microstrip patch antenna that is s mall [5], [6].
and compact size. The three main parts of a
Coaxial feed, microstrip feed and quarter wavelength
microstrip patch antenna are ground, substrate, and
feed are the common feeding methods which could
patch. The metal patch is positioned on one side of
be used for the antenna design. Compared with one
the slab, while the dielectric substrate is on the other
another, microstrip feed is used as it is a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 139


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

straightforward approach to feeding the antenna. The


slot is brought to the middle of the patch so that the
performance is multiplied by others [7], [12-18].

II. PROPOSED METHODOLOGY

The common rectangular patch antenna was designed


in the base paper and the parametric analysis was
taken for different substrates. The proposed method
includes the design made by providing a slot on the
radiating element to promote the enlargement of
bandwidth. There are five different dielectric
materials have been compared for the suitable use of
Fig. 1. Antenna design
the substrate.
The S-band frequency ranges from 2 to 4 GHz.
The design of the slotted patch antenna is shown in
Considering 2.285GHz as a centre frequency, the
fig. 1. The elements of the antenna and their
length(L) and the width(W) for the patch with
dimensions are the width of the patch Wp is 28.2mm,
different substrates are calculated manually using the
the feed line Wm1 is 1 mm and the substrate Ws is
following formula.

32.3 mm. Similarly, the length of the patch Lp is 36.7
W= (1) mm, the microstrip line Lm1 is 25 mm and the

Where Vο is the free space velocity of light, fr is the substrate Ls is 38 mm.
resonant frequency and εr is the dielectric constant of III. PERFORMANCE ANALYSIS AND RESULTS
the substrates.
The basic antenna performance is analysed based on
L= (2)
the Reflection coefficient, VSWR, Gain and Axial
Here λ is the wavelength and ∆L is the patch’s ratio for the five different substrate materials. The
incremental length, which can be calculated using radiation pattern for five different dielectric
equation 3. substrates has been shown in fig.2 and the
∆L= ( ) ( ) ( ) (3) corresponding dielectric constants are tabulated in
table 1.
In this, εr, eff is the effective dielectric constant
Table 1. Parameters of different dielectric materials
which is expressed in equation 4.
( ) ( ) (4)
√( ( )) Dielectric Loss
Parameters
constant tangent
The width and the length of the rectangular patch are
BAKELITE 4.78 0.03045
calculated using equations 1, and 2. To calculate the
length and width of the patch we assume the design TACONIC 3.2 0.002
frequency to be 2.45GHz. The permittivity of the
FR-4 4.36 0.013
substrates is given to be 4.78, 4.36, 3.4, 3.2 and 2.2
for Bakelite, FR-4, RO4003, Taconic TLC and RT- RT-DURIOD 2.2 0.0004
Duroid respectively. The overall size of the antenna RO4003 3.4 0.002
is 60mm x 70mm x 1.58 mm.

One of the important parametric analyses for the


proposed slotted antenna design is the radiation
pattern that is simulated for the above-mentioned
substrates at the centre frequency of 2.45GHz which
is depicted in Figure 2.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 140


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

BAKELITE TACONI FR-4

RT DUROID RO4003
Fig. 2. 3D Radiation pattern of five different dielectric
materials Fig. 4. VSWR Vs Frequency

As already mentioned, the substrate will be chosen The reflection coefficient versus frequency analysis
based on the analysis of different parameters such as is based on S11 (< -10 dB) parameter. Compared to
Reflection coefficient, VSWR, Gain and Axial ratio. all materials RT-DUROID and FR-4 have a good
The simulated results are given for five different reflection coefficient.
substrates and depicted in fig 3. The simulated results are compared for five different
dielectric substrates and given in table 2. For any
system, the VSWR ratio must be less than 1.5 dB and
in this design, the VSWR has been achieved for
different substrate materials.
Table I. Parametric analysis of an antenna
Reflection
Frequency VSWR
Substrate Coefficient
(GHz) (<1.5 dB)
(<-10dB)
BAKELIT
2.16 -12.5298 4.1845
E
TACONI 3.42 -13.6709 3.65287
FR-4 2.96 -30.6709 0.50311
RT-
2.26 -34.8886 0.312994
DUROID
RO4003 2.5 -16.7336 1.34097
Fig. 3. Reflection coefficient Vs Frequency
Compared with one another RO4003 and FR-4 has
very good VSWR value. The gain characteristics of
Bakelite, FR-4, RO4003, Taconic TLC and RT-
Duroid are plotted in fig 5. The gain of an antenna is
the proportion of a particular direction's maximum
radiation intensity to that direction's maximum
radiation intensity from a reference antenna.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 141


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[6] B. Yuan, Y. Cao, and G. Wang, “A miniaturized printed slot


antenna for the six-band operation of mobile handsets,” IEEE
Antennas Wireless Propag. Lett., vol. 10, pp. 854–857, 2011.
[7] Wang, Dian, Hang Wong, and Chi Hou Chan. "Small patch
antennas incorporated with a substrate integrated irregular
ground." IEEE Transactions on Antennas and Propagation
60, no. 7 (2012): 3096-3103.
[8] Liu, Juhua. "Substrate integrated surface-wave antenna."
IEEE T ransactions on Antennas and Propagation 67, no. 8
(2019): 5221-5230.
[9] Kremer, Hauke Ingolf, Kwok Wa Leung, and Mike WK Lee.
"Design of substrate-integrated dielectric resonator antenna
with dielectric vias." IEEE T ransactions on Antennas and
Propagation 69, no. 9 (2021): 5205-5214.
[10] Sahdman, Syed Abid, Kazi Shihabul Islam, SK Shahabuddin
Ahmed, Samir Sakir Siddiqui, and Farzana Shabnam.
"Comparison of Antenna Parameters for Different Substrate
Materials at Terahertz Frequency Region." In 2019 IEEE 5th
Fig. 5. Gain characteristics of different substrates International Conference on Computer and Communications
(ICCC), pp. 680-684. IEEE, 2019.
[11] Christina, G. "A Review on Novel Microstrip Patch Antenna
IV. CONCLUSION Designs and Feeding T echniques." IRO Journal on
Sustainable Wireless Systems 4, no. 2 (2022): 110-120.
Simulated is a rectangle patch with a slot on the
[12] Sahdman, Syed Abid, Kazi Shihabul Islam, SK Shahabuddin
radiating element. Five distinct substrate materials Ahmed, Samir Sakir Siddiqui, and Farzana Shabnam.
(BAKELITE, FR-4, RO4003, TACONIC, and RT- "Comparison of Antenna Parameters for Different Substrate
Materials at Terahertz Frequency Region." In 2019 IEEE 5th
DUROID) with dielectric constants ranging from 2.2 International Conference on Computer and Communications
to 4.8 are investigated. All five substrate materials (ICCC), pp. 680-684. IEEE, 2019.
were tested for different antenna attributes such as [13] Ramli, Nurulazlina, Shehab Khan Noor, T aher Khalifa, and
N. H. Abd Rahman. "Design and performance analysis of
reflection coefficient, VSWR and gain. When different dielectric substrate based microstrip patch antenna
compared to all other substrate materials, the FR-4 for 5G applications." International Journal of Advanced
Computer Science and Applications 11, no. 8 (2020).
substrate produces the best results for the given [14] Sidhu, Sumanpreet Kaur, and Jagtar Singh Sivia.
design. The suggested structure is effective for RFID "Comparison of different types of microstrip patch antennas."
applications in the S-band, which operates at a International Journal of Computer Applications 975 (2015):
8887.
frequency of 2-4GHz. [15] Nyunt, Swe. "Implementation of microstrip patch antenna for
wi-fi applications." American Journal of Computer Science
V. REFERENCES and T echnology 1, no. 3 (2018): 63-73.
[16] Srivastava, Harshit, Amandeep Singh, Arathy Rajeev, and
[1] Kumar, D. Sathish, P. Prithika, and B. Elizabeth Caroline. Usha T iwari. "Comparison of different microstrip patch
"Investigating the performance of microstrip patch antenna antennas with proposed RMPA for wireless applications." In
with photonic crystal on a different substrate." In 2019 IEEE 2019 International conference on power electronics, control
International Conference on System, Computation, and automation (ICPECA), pp. 1-4. IEEE, 2019.
Automation and Networking (ICSCAN), pp. 1-5. IEEE, [17] Majidi, Negar, Mohammad R. Sobhani, Bahadır Kılıç,
2019. Mustafa Imeci, Oğuzhan S. Güngör, and Şehabeddin T .
[2] Mahamine, Sagar D., Rahul S. Parbat, Shekhar H. Bodake, Imeci. "Design and comparison of 4 types of dual resonance
and Mahesh P. Aher. "Effects of different substrates on proximity coupled microstrip patch antennas." Applied
rectangular microstrip patch antenna for S-band." In 2016 Computational Electromagnetics Society Journal (2018).
International Conference on Automatic Control and Dynamic [18] T ütüncü, Bilal, Hamid T orpi, and Bülent Urul. "A
Optimization T echniques (ICACDOT), pp. 1142-1145. IEEE, comparative study on different types of metamaterials for
2016. enhancement of microstrip patch antenna directivity at the
[3] M. Gholamrezaei, F. Geran, and R. A. Sadeghzadeh, Ku-band (12 GHz)." T urkish Journal of Electrical
“ Completely independent multi-ultrawideband and multi- Engineering and Computer Sciences 26, no. 3 (2018): 1171-
dual-band frequency reconfigurable annular sector slot 1179.
antenna (FR-ASSA),” IEEE Trans. Antennas Propag., vol.
65, no. 2, pp. 893–898, Feb. 2017.
[4] Dhai Eddine Salhi, Abdelkamel A Kamel T ari, and T ahar
Kechadi, “Using Machine Learning for Heart Disease
Prediction”, in the book Advances in Computing Systems
and Applications, 2021. DOI: 10.1007/978-3-030-69418-0_7
[5] L. Han, C. Wang, X. Chen, and W. Zhang, “Compact
frequency reconfigurable slot antenna for wireless
applications,” IEEE Antennas Wireless Propag. Lett., vol. 15,
pp. 1795–1798, 2016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 142


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Overview on Battery Management System and


Energy Storage System of Electric Vehicle
Sanitha Michail C Chithra M Nithara P V Reshma P Eldho
Department of EEE, Department of EEE, Department of EEE, Department of EEE,
CMR Institute of Technology CMR Institute of Technology CMR Institute of Technology CMR Institute of Technology
Bengaluru, Karnataka, India Bengaluru, Karnataka, India Bengaluru, Karnataka, India Bengaluru, Karnataka, India
sanitha.c @cmrit.ac.in chithra.m@cmrit.ac.in nithara.p@cmrit.ac.in reshma.e@cmrit.ac.in

Abstract— World is moving towards the path of reducing Additionally, EV batteries frequently have to meet sudden
pollution by reducing the carbon foot prints and eliminating the power demands, they frequently charge and discharge their
emission of greenhouse gases. Electric vehicle (EV) technology is batteries which reduces their lifespan. This is one of the key
a boon that has been developed by mankind towards this goal. factors that deter people from utilizing EVs, thus finding ways
But EVs are still facing a lot of challenges in Energy Storage to increase battery lifespan is critical. Therefore, energy
System (ESS) and Battery Management System (BMS). Energy storage systems are crucial for EVs. Mostly rechargeable
storage techniques used in different types of ESSs used in EVs, energy storage devices (ESD) such Zink batteries, lead-acid
comparison between different ESSs and its challenges are batteries, Li-ion batteries, nickel batteries, and SC are used in
discussed in this paper. Different functions of battery
EVs. The need for portable electric components, particularly
management systems (BMS), importance of monitoring the
battery health and various algorithms used for monitoring the
those used in EVs, has grown quickly with the improvement
status of battery are also reviewed in this paper. of ESD technology.

Keywords— Electric vehicle, Energy storage system, Battery


management system, Renewable energy, Battery technology.

I. INTRODUCTION
Electric vehicle is a technology has been established to cut
the carbon emission. Nowadays environmental pollution is
more due to highly increased carbon emission. So
electrification of automobiles is one of the solutions for clean
and green energy utilization. Block diagram of Electric
Vehicle (EV) is shown in figure 1. Here the typical IC's engine
and fuel tank of normal car are swapped out with an electronic Fig. 2. Summary of the Study.
motor and battery pack, respectively. Other two main parts of
EVs are Energy storage system (ESS) and energy management The battery management system (BMS) is crucial in
system. The electric vehicle's energy storage system is crucial. electric vehicles (EV). BMS is a comprehensive system that
There are different kind of the energy storage system such as includes configurations and techniques for assessing overall
battery, fuel cells, and super capacitors. ESS is used for performance for different types of ESD, overall health,
driving motor, lightning system and other operating charging and discharging processes, battery tracking, data
mechanism. It has mentioned in the figure 2. collection, thermal control, device management, duration, and
thermal management for cell protection. In ESD, an
unbalanced cell voltage during the charge or discharge period
as a result of an electrochemical process. One of the primary
areas of development in the BMS is to enhance the voltage
balancing systems. Researchers are creating cell balancing
systems to increase the longevity of the cell, safeguard it
against explosion, and enhance the voltage balance systems.
Various research studies examined energy management
techniques linked to different energy storage system. The
BMS for plug-in hybrid electric vehicles (HEVs) and hybrid
electric vehicles (HEVs) is explored in [1] by summarizing
offline, real-time, and learning-based algorithms. But in [2]
another evaluation of the BMS for HEVs through 2012 is
provided and contrasted. [3] While looking at the typical BMS
Fig. 1. Block Diagram of EV
of hybrid electric and fuel cell vehicles, a general overview of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 143


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ESSs, power converters, and charging systems is provided. enhance ESS performance and develop a storage device that is
Authors in [4] identify the control tactics used in fuel cell affordable, many researchers and manufacturing companies
hybrid vehicles, and compare the benefits and drawbacks of work diligently.
each. A more thorough segmentation of optimization-based
tactics in HEVs is established has mentioned in [5].
Energy Storage System
This paper explains the many types of energy storage
technologies that are now available and different ways of
energy management system.
Electro-Chemical Battery
· Lead-Acid Battery
II. ENERGY STORAGE SYSTEMS (ESS)
· Nickel-Based
Electric vehicles (EVs) are becoming more prevalent on · Air-Based
the road and in the grid of power plants. In the design of EVs, · Zinc Based
the energy system and management are crucial components. · Sodium-Based
Fully battery electric vehicles (FBEVs) and hybrid electric
· ZEBRA
vehicles are the two main forms of EVs (HEV). Operating
energy for HEVs is provided by Internal Combustion Engine · Lithium Based
(ICE) and Stored Energy (SE). HEVs are valuable in and of · Vanadium Redox
themselves, and their fuel economy can be increased. There
are two forms of HEVs: fuel cell electric vehicles (FCEV) and
plug-in electric hybrids (PHEVs). BEVs are entirely powered Electro-Magnetic
by electricity, which is stored in the battery pack. The process · Super capacitor
of regeneration braking, which the automobile must perform · Super-conducting Magnetic
in order to regain SE, involves charging the battery pack from Energy (SMES)
the charging station. The battery's power determines the
BEV's operating range. Classification of electric vehicle is
shown in figure 3. Chemical
· Fuel cell
· Hydrogen Storage
ELECTRIC
VEHICLE(EV)
· Synthetic Natural Gas
· Biofuel

Fully Battery Electric Hybrid Electric Hybrid


Vehicles (FBEVs) Vehicles(HEVs) · Battery and super capacitor
· Battery and Fuel cell
· Super-capacitor and Fuel cell
Fuel Cell Electric Plug-in Hybrid · Battery,Super-capacitor and
Vehicles (FCEVs) Electric Fuel cell
Vehicle(PHEVs)
Fig. 4. Types of ESS
Fig. 3. Classification of Electric Vehicle.

1)Electro-chemical Storage:
A. Types of Energy Storage Systems (ESS) A battery can store energy by electrochemical storage,
The ESS (batteries) in EVs should be able to accept high which uses a chemical process. Primary and secondary
power repetitive charges from regenerative braking operation, electrochemical batteries are the two different types. The
have a large number of life cycles, operate in a wide range of market has changed significantly as a result of advancements
temperatures, and have a high energy density to increase the in battery technology. The most common type of battery in
driving range of EVs and a high-power density to enable quick conventional EV systems is the lead-acid battery. Following
acceleration of EVs. that, researchers continued to work developing the EV system
and recommended storage with higher specific energy and
Figure 4 depicts the split of ESS into electrochemical power density.
storage, electromagnetic storage, chemical storage, and hybrid
storage systems that is pertinent to electric vehicles. Each ESS The literature mentions batteries made of nickel and lead,
has several different characteristics. The responsibility for such as nickel-metal hydride (NiMH), nickel-cadmium
various implementations should be based on these properties. batteries (NiCD), and lithium-ion batteries (LI-ION). NiMH
An adequate ESS helps the consumer save money in addition batteries require extensive maintenance and perform poorly at
to reserving the electricity for a longer period of time. To higher temperatures. NiCD batteries have a poor energy

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 144


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

density but are suitable for high temperature operation of energy storage system needed for an EV relies on a number
conditions. Because LI-ION batteries have a higher energy of variables, including the type of electric vehicle, consumer
density, they are lighter and require less maintenance in demand, cost, and environmental friendliness, among others.
comparison.
Lithium-ion batteries are the dominant electro chemical III. BATTERY MANAGEMENT SYSTEM
energy storage system. Electric mobility is moving towards global penetration day
by day and it is the responsibility of the manufacturers to
2) Electro-magnetic Storage:
provide a safe and comfortable driving experience to the
Electrodes and electrolytes are used in electro-magnetic
customers. It is inevitable to ensure safety and security of the
storage systems, sometimes known as super- or ultra-
passenger and the vehicle. BMS plays a crucial role to monitor
capacitors, to store static energy. Super capacitors are used as
the battery. BMS is the essential part in almost every high-end
secondary ESS due to their high power density, long life and
electronic device including smart phones, laptops, electric
fast charging capability. The power density range of super
vehicle and so on. The purpose of Battery Management
capacitor is 300- 5000 W/kg. The combination of electrode
system includes (i) Data acquisition (ii) Cell Equalization (iii)
and electrolyte materials, as well as the breakdown voltage
Provide Over/Under charge control (iv) Thermal management
level, affect an ultracapacitor's (UC) ability to store energy.
(v) Battery Stage Determination (vi) Safety and security.
Activated carbon is the most common electrode due to its
Figure 5 shows the main functions of BMS. Even though the
higher energy density and surface area. There are three
battery breakaways and damages cannot be eliminated,
different types of ultracapacitors:
however, the safety functions in the BMS provides a better
i. Double layer electro-chemical UC and safer environment for the batteries to reduce the likelihood
of undergoing unstable situations.
ii. Pseudo-SC
iii. Hybrid SC
3) Chemical Storage System:
3.1. Fuel Cell :
The environmentally friendly hydrogen fuel cells are
another alternative energy storage system that is already
available. Although it has a lesser energy density than
batteries and super capacitors, it is nonetheless favored
because of its minimal environmental impact. Fuel cells only
produce heat and water as waste. The most often used fuel
cells for electric vehicle energy storage systems include
proton-exchange membrane fuel cells (PEMFCs), phosphoric
acid fuel cells (PAFC), direct methanol fuel cells (DMFCs),
solid oxide fuel cells (SOFCs), alkaline fuel cells, and molten
carbonate fuel cells.
3.2. Bio-Fuel :
The type of bio-mass used determines the classification of
bio fuel. Algae, non-edible feedstock, and edible feedstock are
the three main categories of biofuels. In addition to being
economical, these fuels cut GHG emissions by lowering CO2, Fig. 5. Basic Components of BMS
PM, hydrocarbon (HC), and SOx emissions. Although liquid
biofuels can be utilized as a substitute to gasoline, their high
cost and ineffective conversion processes provide significant A. FUNCTIONS OF BMS
practical difficulties.
Energy storage systems used in EVs includes Electro-
Synthetic fuels can be created by mixing carbon monoxide chemical, Electro mechanical and Electrical Batteries. Most
and hydrogen, which eliminates the need to use fossil fuels electrochemical batteries are prone to overheat. Moreover,
altogether. Production of synthetic fuel is primarily based on Lithium based batteries tend to explode while thermally
biomass or recovered CO2. Synthetic methane, methanol, and unstable. To maintain the battery temperature, BMS plays as
diesel/gasoline are a few examples of liquid synthetic fuels. essential role. On any event of fault, the temperature of the
battery pack or the system can tremendously rise which leads
4) Hybrid Storage System: to abnormal heat generation, external heat transfer and poor
The integration of two or more energy storage systems is heat dissipation. Major reasons of thermal shoot up include
known as a hybrid storage system. So, battery and super external short circuit, current sensor fault, overcharging,
capacitor, battery and fuel cell, super capacitor and fuel cell, battery connection fault, cooling system failure, mechanical
or battery fuel cell and super capacitor are all viable options shocks such as collision and many more. The thermal runaway
for hybrid storage systems. Every storage system has can cause battery swelling, battery permanent damage, fire,
advantages and di sadvantages of its own. As a result, the kind

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 145


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

explosion and smoke. During thermal runaway, it checks for IV. CONCLUSION
options to turn on cooling system and helps to provide a better As we are moving towards the world of green energy,
the cell environment. Moreover, it can shut down other cells to electric vehicles play a crucial role in it. Energy storage
protect from severe damages during emergencies. BMS system and battery management system are two important
monitors the battery health and acquire the information functions which need to be discussed in EVs. Researchers are
regarding SOH, SOL, State of Power (SOP) and SOC and finding a lot of challenges in these areas. This paper discusses
ensure the life and safety of the batteries well in advance. about the different types and challenges of ESS in EVs. It also
SOH utilizes and captures the age of battery as capacity fade gives a detailed explanation about the battery management
and internal resistance [17]. A capacity decay of 20% and / or system in EVs. A lot of research is still need in these areas to
an internal resistance rise of 100% are generally considered as improve the performance of EV.
the End-of-Life (EOL) of a battery in automotive application.
There are various techniques available to estimate the battery
properties such as state-of-charge, state-of-health, state-of- REFERENCES
power as mentioned in [18]. Moreover, the status of the [1] A.A. Malikopoulos, Supervisory power management control algorithms
battery can be obtained using various algorithms. Many for hybrid electric vehicles: a survey, IEEE Trans. Intell. Transp. Syst.
15 (5) (2014) 1869–1885.
researches are progressing towards obtaining the said battery
parameters with ultimate accuracy. Main challenges and [2] A. Panday, H.O. Bansal, A review of optimal energy management
strategies for hybrid electric vehicle, Int. J. Veh. Technol. 2014 (2014).
advancements in the field of state estimation is showcased in
[3] S.F. Tie, C.W. Tan, A review of energy sources and energy management
[19]. system in electric vehicles, Renew. Sust. Energ. Rev. 20 (2013) 82–102.
Cell equalization is a very vital feature of the Battery [4] N. Sulaiman, et al., A review on energy management system for fuel cell
Management System. The vehicle battery is made of hybrid electric vehicle: issues and challenges, Renew. Sust. Energ. Rev.
52 (2015) 802–814.
combination of many cells in series/parallel. It is extremely
[5] S.G. Wirasingha, A. Emadi, Classification and review of control
common to have unequal charging rates between each cell in strategies for plug-in hybrid electric vehicles, IEEE Trans. Veh.
the battery pack. To ensure that each cell reaches full charge at Technol. 60 (1) (2011) 111–122.
the same time, there are various cell equalization [6] Somnatha, Kadlag Sunildatta, and Mukesh Kumar Gupata. "Review
methodologies existing. Cell equalization techniques include Paper on Electric Vehicle Charging and Battery Management System."
(i) Active cell balancing and (ii) Passive cell balancing Proceedings of International Conference on Communication and
methods.[20]-[21]. In passive cell balancing, which is also Information Processing (ICCIP). 2019.
called as resistor bleed method dissipated the charge as heat [7] Ranawat, Daisy, and M. P. R. Prasad. "A review on electric vehicles
with perspective of battery management system." 2018 International
across the resistor. In active balancing, it utilizes an inductor Conference on Electrical, Electronics, Communication, Computer, and
or capacitor to transfer the charge effectively from high Optimization Techniques (ICEECCOT). IEEE, 2018.
charged cell to low charged cell thus supporting balancing in a [8] Hasan, Mohammad Kamrul, et al. "Review of electric vehicle energy
much effective manner. An active balancing technique for storage and management system: Standards, issues, and challenges."
Lithium-ion battery is presented in [22] based on inductor Journal of energy storage 41 (2021): 102940.
balancing method. The paper presents equalization of eight [9] Sharma, Snigdha, Amrish K. Panwar, and M. M. Tripathi. "Storage
series connected cells in reduced time. Conventional issues in technologies for electric vehicles." Journal of traffic and transportation
inductor-based methods such as longer time and lesser engineering (english edition) 7.3 (2020): 340-361.
accuracy is eliminated here. Intense communication is [10] Rezaei, Hossein, et al. "Energy managment strategies of battery-
ultracapacitor hybrid storage systems for electric vehicles: Review,
inevitable which helps in proper decision making. Interaction challenges, and future trends." Journal of Energy Storage 53 (2022):
with the motor controller as well as upper vehicle controller 105045.
must be carried out correctly for the vehicles to operate as [11] Nikam, Vivek, and Vaiju Kalkhambkar. "A review on control strategies
intended. A data link is utilized by a BMS's communication for microgrids with distributed energy resources, energy storage
function to monitor performance, log data, issue diagnostics, systems, and electric vehicles." International Transactions on Electrical
or set control variables. The two most widely used protocols Energy Systems 31.1 (2021): e12607.
by BMS to interact inside the vehicle are CAN (standard [12] Sankarkumar, Rayavarapu Srinivasa, and Rajasekar Natarajan. "Energy
management techniques and topologies suitable for hybrid energy
communication) and RS232 and RS485 communications storage system powered electric vehicles: An overview." International
through the data bus. In [23], a new battery fault diagnosis Transactions on Electrical Energy Systems 31.4 (2021): e12819.
algorithm is proposed with better battery safety by utilizing [13] Habib, AKM Ahasan, et al. "A review: Energy storage system and
charge duration, charging current and capacity of the storage balancing circuits for electric vehicle application." IET Power
element. SOC, SOH calculations are implemented and initial Electronics 14.1 (2021): 1-13.
error is reduced using Coulomb counting method (CCM). A [14] Hasan, Mohammad Kamrul, et al. "Review of electric vehicle energy
further subject area that necessitates BMS monitoring is storage and management system: Standards, issues, and challenges."
charging control. Two stages are involved in charging. Journal of energy storage 41 (2021): 102940.
Constant Current (CC), during which the charger provides [15] Eldho, Reshma P., and K. Deepa. "A comprehensive overview on the
current trends and technological challenges in energy storages and
constant current. The secondary stage, known as Constant charging mechanism in electric vehicle." Journal of Green
Voltage (CV), is where the battery receives a fixed voltage Engineering 10.9 (2020): 4679-6713.
level while only receiving little current. The BMS makes sure [16] Kang, Taewoo, et al. "Thermal analysis of a parallel-configured battery
that all these processes go smoothly. pack (1S18P) using 21700 cells for a battery-powered train." Electronics
9.3 (2020): 447.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 146


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[17] Hu, Xiaosong, et al. "State estimation for advanced battery management:
Key challenges and future trends." Renewable and Sustainable Energy
Reviews 114 (2019): 109334.
[18] Hu, X., Feng, F., Liu, K., Zhang, L., Xie, J., & Liu, B. (2019). State
estimation for advanced battery management: Key challenges and future
trends. Renewable and Sustainable Energy Reviews, 114, 109334.
[19] Lipu, MS Hossain, et al. "Intelligent algorithms and control strategies
for battery management system in electric vehicles: Progress, challenges
and future outlook." Journal of Cleaner Production 292 (2021): 126044.
[20] Kelkar, Apoorva, YashwanthDasari, and Sheldon S. Williamson. "A
comprehensive review of power electronics enabled active battery cell
balancing forsmart energy management." 2020 IEEE International
Conference on Power Electronics, Smart Grid and Renewable Energy
(PESGRE2020). IEEE, 2020.
[21] Uzair, Muhammad, Ghulam Abbas, and Saleh Hosain. "Characteristics
of Battery Management Systems of Electric Vehicles with Consideration
of the Active and Passive Cell Balancing Process." World Electric
Vehicle Journal 12.3 (2021): 120.
[22] A. F. Moghaddam and A. Van Den Bossche, "An Active Cell
Equalization Technique for Lithium Ion Batteries Based on Inductor
Balancing," 2018 9th International Conference on Mechanical and
Aerospace Engineering (ICMAE), 2018, pp. 274-278, doi:
10.1109/ICMAE.2018.8467685.
[23] Lee, Jeong, et al. "Battery management system algorithm for energy
storage systems considering battery efficiency." Electronics 10.15
(2021): 1859.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 147


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Enhanced Vehicle Plate Identification using YOLO


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Gayana M N Alonie Jane Crasta Shreenath Acharya


Dept. of Computer Science and Dept. of Computer Science and Dept. of Computer Svience and
Engineering Engineering Engineering
St Joseph Engineering College St Joseph Engineering College St Joseph Engineering College
Mangaluru, India Mangaluru, India Mangaluru, India
gayana.mn@gmail.com aloniejane@gmail.com shree.katapady@gmail.com

Carol Dsouza Divya Cheryl Moras Karvender Singh


Dept. of Computer Science and Dept. of Computer Science and Dept. of Computer Science and
Engineering Engineering Engineering
St Joseph Engineering College St Joseph Engineering College St Joseph Engineering College
Mangaluru, India Mangaluru, India Mangaluru, India
carold131199@gmail.com morasdivya@gmail.com karvender98@gmail.com

Abstract— In the urban areas, there is an increased demand technology of CCTV cameras as Vehicle Number Plate
for ownership of the vehicles which has led to a civic problem of Recognition system. The ultimate goal is to identify a plate
traffic control and vehicle identification. For an number from pictures taken from vehicles (vehicle images).
organization/institution or any restricted areas, security is Several problems can arise from environmental conditions
important and to enhance this security it is advisable to keep like illumination, deteriorated plates, etc., which motivate the
track of the vehicles entering. Hence vehicle number plate development of robust and reliable systems for Automatic
recognition plays an important role in solving these problems. It Number Plate recognition.
is an image processing technique that uses a number plate to
identify the vehicle. In this approach, the image of the vehicle II. RELATED WORK
has been enhanced and threshold technique was applied for a
better resolution. Our approach to license plate recognition is In India, The number plate usually contains the first two
based on a Convolution Neural Network YOLO, holistically letters as the state code followed by district code and then a 4
processes the whole image, avoiding segmentation of the license digit code that is specific to a particular vehicle file. Example,
plate characters. This work aims to recognize license plate KA 19 M 5990 where KA stands for Karnataka, 19 for
images automatically to fulfill the requirement for automation Dakshina Kannada, M 5990 corresponds to vehicle specific
in surveillance of any highly restricted areas. The result shows number. Some techniques have been proposed to detect Indian
the success rate of number plate recognition is 98.6% and 84.7% vehicle number plates. One of the method adopted to detect
in vehicle number detection. This accuracy can be improved the number plate is bounding box [1]. As a first step, the image
greatly by positioning the camera suitably to capture the best is obtained. This obtained image is then converted into
frame and using better image enhancing techniques grayscale and noise is removed using a median filter. The
boundaries of the image were detected using Sobel edge
Keywords—vehicle identification, restricted areas, threshold, detector. After extracting the desired region, bounding box
You Look Only Once method is used to map each character. Each letter will be
I. INTRODUCTION mapped a box and displayed each character into a single
image. This was then followed by segmentation. After
India is a developing country with the second-highest segmentation, comparison has been made for each character
population in the world. Most of the population depends on with and correlation is used for recognition of each character
conventional public transport like buses for commutation, in the number plate.
while the others prefer private vehicles. Vehicles are an
integral part of transportation systems today, and their use has One more method for number plate detection was
increased exponentially due to population growth. As there proposed which is based on Hough lines using Hough
was a rapid development of economy around the world, along transformation and template matching [2]. After the image
with the increase in the usage of the car, the problems such as capturing, a pre-processing technique was used. It was then
car theft case, traffic accident, road congestion have also followed by using the Canny detector to detect the edge of the
increased. In order to solve these problems, each country is license plate. After that, the Hough transformation was used
actively studying how to manage and monitor vehicles more to determine the horizontal and vertical edges. The characters
effectively with low cost and high efficiency. were divided with the use of a dilatation procedure. For
template matching, blocks measuring 38 x 20 were created.
License/Number plates were introduced to uniquely After cross-correlating, the ASCII values were then acquired
identify the vehicle. Our work is inclined to license plate using OCR. The proposed method [13] uses a combination of
recognition for vehicles entering restricted areas like military Feature Extraction Model and Back Propagation Neural
camps, research centers, college campuses and so on. When Networks for license plate detection. Here, the first step
we consider a venue where political conferences are held, it is involves boosting the Automobile image’s contrast ratio. The
important to make sure no one trespassers are allowed in. For second step is to use integral projection method in order to
this purpose, security guards are assigned to each entry point. identify the correspond number plate. The three sets of
However, the process of manual vehicle verification is long features are then combined to create a new feature extraction
and tiresome and inefficient in the long run. To overcome this model, which is then trained using Back Propagation Neural
problem, we add a verification system to the existing Networks to accurately recognize the characters on license

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 148


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

plates. The approach suggested in [11] use K-means Thus, the proposed method of detecting number plates can
clustering and Convolution Neural networks to identify be divided into sub-parts which contain: 1. capturing the
automobile license plates. The CCA and IBA models are used image of the vehicle, 2. Locating the number plate of the
in the first step to locate and detect the License Plate. This is image, 3. Pre-processing the image i.e. image enhancement,
then followed by segmentation step, using clustering reducing noise, adjusting brightness and contrast of the image,
technique. The last step involves usage of CNN model to 4. Recognizing the characters on the number plate, 5.
identify the characteristics. The work [14] has been carried out Verifying if the obtained number plate is a registered one or
using YOLOv4 along with thresholding, Morphological not. Hence a database has to be maintained for the verification
transformations. The characters were recognized using OCR of the registered number with that of the obtained number
technique. As an another approach, a neural network based plate.
Deep Learning Model is proposed [4], wherein, A
comparative study of detecting the mechanical parts of car III. METHODOLOGY
engine using different versions of YOLO is conducted. YOLO The proposed system is to identify vehicle number of a
is a real-time object detection framework and stands for You vehicle in St Joseph Engineering College and to allow only
Only Look Once. The experiment involved identifying eight registered vehicles. The high level architecture diagram is
different mechanical parts of a car engine using different shown in Figure 1. The model for Vehicle Number
versions of YOLO. Experimentation revealed that YOLOv5 Identification has four main steps: image extraction, vehicle
could adequately handle the detection problem. Along with plate detection, Image enhancement techniques and OCR
the detection, YOLOv5 was able to detect object parts from API. The image enhancement is an essential step since the
real time video streams, with high accuracy. A review on resolution of the image is low. Figure 2 depicts the main steps
Indian Number Plate recognition system [10] demonstrates involved.
that the basic steps would involve preprocessing, detection,
segmentation and recognition. A comparative study has been
made and observed that mathematical morphology technique
results in higher accuracy.
A few issues may arise while detecting the appropriate
images. One issue is character recognition in number plate
images. The work [12] is carried out on License plate Fig.1. High Level Architecture
detection in unconstrained scenarios. The approach involves
initially to identify the vehicles. It is then followed by
identifying the license plates. This step is supported using
Warped Planar Object Detection Network. It looks for License
plates and does one affine transformation regression for each
detection. This results in License plate area identification.
This obtained rectified detections are then passed onto the
final step which involves using Optical Character Recognition
network. The study [9] focuses on various plate segmentation
methods and discovered that edge-detection based methods
are the most efficient of all techniques. The work also
addresses the issue of unwanted boundary plates which can
lead to character recognition errors. The problem is addressed
here using thresholding technique. Reference [3] concerned
with dealing with difficult situations such as varying
illumination, blurred, skewed, noisy images, non-standard and
partially worn out number plates. For image pre-processing,
various techniques have been used. Border following contours
are used for number plate segmentation and these contours are
filtered based on character dimensions and spatial
localization. The K Nearest Neighbor algorithm was used for
character recognition with the query point labelled with a class
that has the most neighborhood support; considered as the
nearest neighbor’s simple majority vote. It was implemented
using scikit-learn.
Image resolution is still another issue to be solved. It was
suggested to use unique CNN model [5] for single image super
resolution. This technique uses a sub-pixel convolution layer
in the CNN architecture to upscale the low resolution input Fig. 2. Steps involved in Vehicle number identification
image to a high resolution image. The study [8] shows how to
construct applications using two distinct algorithms—number A. Dataset and Image extraction
plate detection and recognition—along with learned models The dataset for this system is the CCTV camera
rather than random initialization. The task was carried out video footages taken between the timings 8:30am to
using the TAO toolbox. 9:00am and 4:45pm to 5:15pm. This video footage will be
converted into suitable form for further processing. In
order to reproduce the images from the CCTV video, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 149


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

video is split into frames. The following algorithm is used D. Image Enhancement and Thresholding
to accomplish this task The number plate image that has been thusly discovered
Algorithm: Extraction of frames from the video has a low resolution. The image has a resolution that varies
BEGIN from 57 x 26 pixels to 91 x 68 pixels. We applied a model
Video is taken from user known as "Super-Resolution for Single Images and
getFrame(seconds) Videos in Real-Time Utilizing a Powerful Convolutional
Video is set to position to get the frame Sub-Pixel Neural Network "model in order to improve the
It gets the frame model's resolution[5]. It doesn't use perceptual loss or
Frame is Saved generic loss, but because it upscales with sub-pixel
If Success convolutions, it is a very quick model. The model triples
Increase Count the image's enhancement. After enhancement, the image
Increase seconds (Add FrameRate) resolution is 672 × 672 pixels.
The seconds is rounded off To reduce background noise and improve the image,
Get the rest of the frames various different approaches like grey scaling and
till the video is ended Gaussian blur were applied. Thereafter, a thresholding
Seconds is initialized to 0 (start) process will follow, in which pixels below 100 will be
Frame Rate is defined made darker while those above 255 will be made lighter.
Get the first Frame
END E. OCR API
B. Annotation of number plates and dividing the dataset Usually, applications use segmentation of characters and
use models like CNN to train the characters to recognize
The extracted images then, shall be further processed for them. Although such methods have been tried, the low
annotation. This step would result in two different types of quality of the images and the angle at which the CCTV is
files, text file and image file. The task is achieved using placed make them ineffective. This can be accomplished
Computer Vision Annotation Tool (CVAT)[15]. The by making use of OCR API.
dataset is exported in YOLO format for further processing.
IV. EXPERIMENTAL RESULTS AND DISCUSSION
C. Vehicle Plate Detection Using YOLOv5
YOLOv5 model [6] is applied for training the data to In our experiment, we have used CCTV video footages
detect the number plate. It is implemented as a captured at the front gate between the timings, 8:30AM to
convolutional neural network. It consists of 24 9:00AM and 4:45PM to 5:15PM. These videos were in .avi
convolutional layers followed by two fully connected format which was then converted to .mp4 format. Image
layers. The current implementation utilizes the YOLOv5s frames were extracted from the videos at the rate of 2 frames
model, which is a pre- trained model. The model needs to per second.480 images were used for training the algorithm
be trained using trained data, obtained in the previous step. and 105 images were used to test the algorithm. The
A simple algorithm [7] is applied to get the region of annotation of the number plate is done by CVAT tool. We
interest on test images annotated all the training data using CVAT and export it as the
YOLO 1.1 dataset. We now have an image and a text file,
Algorithm: Retrieve the Region of interest which includes the bounding box coordinates in the YOLO
BEGIN format. The current implementation of the application utilizes
Img<-original image the YOLOv5s model, which is a pre-trained model. We
dh,dw<- height and the width of original image trained the model using 16 batches and 100 epoch. The
open text file containing the coordinates of the image training of the model took 15 minutes and 30 seconds. Figure
in yolo format 3 shows the detected number plate using the model YOLOv5.
data<-Read the text file
Initialize ROInumber to 1
#convert yolo format coordinates to box coordinates
For each line in data
Read values in x,y,w,h , convert into float
L<-int((x-w/2)*dw)
R<- int((x+w/2)*dw)
T<- int((y-h/2)*dh)
B<-int((y+h/2)*dh)
If L<0 then L<-0
If R>dw-1 then R<-dw-1
If T<0 then T<-0
If B>dh-1 B<-dh-1
Create a Bounding Box using L,T,R and B Values
Get the ROI Image
Save the Image
Increase the ROI Number Fig. 3. YOLOv5 model recognizing the number plate
END We have used Google CoLab for training our model.
Using the Region Retrieval algorithm, the region of interest
will be obtained on the test image. A sample output after this
step is shown in Figure 4.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 150


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

YOLOv5s 8mins 24 s 143 50


YOLOv5m 20mins 11s 95 50
YOLOv5l 24min 37s 127 50

TABLE 2 TABLE FOR DIFFERENT MODELS WITH EPOCH 100


Model Time Taken Number plate Epoch
detected
Fig. 4. Region of interest identified
YOLOv5s 15mins 30 s 144 100

The image resolution we get after enhancing is 672 X 672 YOLOv5m 29mins 22s 143 100
pixels. The enhanced image is shown in Figure 5. It was then YOLOv5l 46mins 51 s 143 100
followed by thresholding. The corresponding image is shown
in Figure 6.
We have used YOLOv5s model, which is the smallest version
of YOLOv5 models. Additionally, there are models YOLOv5l
and YOLOv5x, the latter of which is the largest. The
performance of the network may also increase as its size
increases, at the expense of longer processing times. As a
result, the larger models may only be useful for complex
problems with a large dataset. We have also analyzed the
training set using different models of YOLOv5, using a
constant epoch and batch size. The results are shown in
Fig. 5. Enhanced image TABLE 1 and TABLE 2.
With OpenCV, thresholding is a technique that assigns pixel
values based on threshold values. Thresholding consists of
comparing each pixel value with a threshold. If the pixel value
falls below the threshold value, it is set to 0. Otherwise it is set
to the maximum value (generally 255). The thresholding
technique is used in computer vision on grayscale images. As
a result, the image has to first be converted into grayscale.
There are different types of thresholding methods like
BINARY, BINARY_INV, TOZERO, and TOZERO_INV.
We have used different methods, the analysis of this is shown
Fig. 6. Image after thresholding in TABLE 3. From the table, we can deduce that TOZERO
produces the best result. Hence, we have used the TOZERO
This image is then given to OCR API to identify the value for thresholding.
vehicle number. TABLE 3 TABLE FOR DIFFERENT THRESHOLD VALUES

A simple user interface is developed to retrieve vehicle Threshold value Total images Detected images
number of vehicles and either to give the result as allow or TOZERO 144 122
deny. The user opens the file explorer to query a picture
obtained by the videos of CCTV footage and uploads it to the BINARY 144 98
application for prediction. The API gives the result which is Without Thresholding 144 95
compared to the database to either allow or deny the vehicle.
In the above example, the image takes 14.27 seconds to be
processed after the user uploads the image in the application. A model's accuracy is determined by the percentage of
Additionally, it has correctly identified the number plate as correctly identifiable images among all images in a dataset.
"KA51AF6349" with an accuracy of 0.879. In some cases, Testing has been conducted using 146 images. The number
poor image quality results in incorrect identification. In the plate could be discerned in 144 images out of 146, which is
following step, the result is compared with the records on the 98.6% accuracy. Among the 144 images analyzed by the OCR
database that contain the user's personal information along software, 121 number plates were correctly identified,
with the vehicle number If the result is matched the vehicle is corresponding to an accuracy of 84.7%.
allowed or else the vehicle is denied. V. CONCLUSION
The work carried out adheres to St Joseph Engineering
College and the problem is approached using Convolution
Neural Network and Yolov5. Although there are several other
methods like Bounding box and Segmentation, a problem
TABLE 1 TABLE FOR DIFFERENT MODELS WITH EPOCH 50 would arise here due to the variant forms and font of license
Model Time Taken Number plate Epoch plates. The proposed system was designed to identify vehicle
detected plate numbers and to see if that vehicle is allowed to enter or
not. This system which was designed works satisfactory for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 151


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

wide variations of conditions and different types of number


plates. Hence it is an effective method of identification of REFERENCES
vehicle number plates. The number plate was made to be
recognized from the images obtained. It was then trained for [1] K. Mahesh Babu., M V. Raghunadh, M. V, “Vehicle number plate
identification of the characters on the number plate. Whenever detection and recognition using bounding box method”, International
Conference on Advanced Communication Control and Computing
a user enters the image of the vehicle the model can detect it’s Technologies (ICACCCT), May 2016, IEEE Xplore, January 2017.
number plate characters and if that number plate was already
[2] Saqib Rasheed, Asad Naeem and Omer Ishaq “Automated number
registered in the database, the user is allowed to go otherwise plate.recognition using hough lines and template matching”,
it’s obvious that he/she is not allowed to get in or was not Proceedings of the World Congress on Engineering and Computer
invited to the place. We can detect the number plate that has Science Vol I WCECS , October 24-26, 2012, San Francisco, USA.
different font size and also different font type. Hence it is an [3] Varma P, R. K., Ganta, S., B, H. K., & Svsrk, P. “A novel method for
efficient method to manage vehicles in a private or public indian vehicle registration number plate detection and recognition
place. using image processing”, ELSEVIER, Procedia Computer Science,
Vol 167, pp 2623-2633, 2020
The accuracy achieved in identifying the vehicle numbers can [4] Ana Malta , Mateus Mendes and Torres Farinha , “Augmented Reality
be increased by incorporating neural networks into the image- Maintenance Assistant Using YOLOv5”, MDPI, Applied Sciences, Sp.
Issue , Artificial Intelligence in Service Systems, May 2021.
enhancing process.
[5] Wenzhe Shi , Jose Caballero , Ferenc Huszar , Johannes Totz , Andrew
Law enforcement officers may avail the benefit of license P. Aitken,, Rob Bishop , Daniel Rueckert , Zehan Wang1R. Nicole
plate recognition in real-time with the aid of an integrated “ Real-time single image and video super-resolution using an efficient
sub-pixel convolutional neural network”. CVPR, September 2016.
system with smaller cameras that can read license plates
quickly, along with more compact and durable processors that [6] Lihi Gur Arie , “The practical guide for object detection with YOLOv5
algorithm”, Towards Data Science, March 2020
can fit in police vehicles. Hence the recognition of number
[7] Mohit Maithani ,”Guide to Yolov5 for Real-Time Object Detection”,
plates should be possible from the video processing as well. Developers Corner, Dec 19, 2020
The system robustness can be increased if a bright and sharp [8] Yue Zhu, Morgan Huang and Fei Chen, “Creating a real time License
camera is used which may be used in dealing with varying Plate Detection and Recognition App”, Technical Blog, NVIDIA
illuminated, noisy, and nonstandard number plates. Also, it DEVELOPER, Feb 2021
can improve the security related to the women’s as they can [9] Pankaj Sharma,Jai Karan Sing , “Challenges and Overview of License
easily detect the number plate before using a cab or other Plate Character Segmentation”, IJCSE, Vol 3, Issue 2, Feb 2015.
services. [10] Varsha K hadke, Rutuja K,Deode, Sonali P Shejwal, “Indian License
Plate Recognition – A Review”, Journal of Electronics and
There are some drawbacks to the system, such as the fact that Communication Systems, vol 1, Issue 3, pp 1-15, 2016
it does not identify vehicle numbers in low-quality images. A [11] Chen, Joy Iong Zong, and Joy Iong Zong. "Automatic Vehicle License
damaged or distorted vehicle plate will not be detected by the Plate Detection using K-Means Clustering Algorithm and CNN."
system. It cannot recognize the vehicle number plates of Journal of Electrical Engineering and Automation 3, no. 1 (2021): 15-
23.
motorcycles since they are too small to be recognized in the
CCTV footage. [12] Sergio Montazzolli Silva and Claudio Rosito Jung , “License Plate
Detection and Recognition in Unconstrained Scenarios”, ECCV 2018.
This work can be taken a step further by live monitoring the [13] Fei Xie, Ming Zhang, Jing Zhao, Jiquan Yang, Yijian Liu, Xinyue
vehicle entering the grounds and notifying the admin if a non- Yuan, “A robust license plate detection and character recognition
registered vehicle would approach. algorithm based on a combined Feature Extraction Model and BPNN”,
Journal of Advanced Transportation, Vol 2018
ACKNOWLEDGMENT [14] Adarsh Sai, Paritosh Pandey, Sambhav Jain, S Kalaivani, “Automatic
License Plate Recognition using YOLO4 and TESSERACT
We are grateful to the Management of St Joseph OCR”,International Journal of Electrical Engineering and Technology,
Engineering College for providing us required data for Vol 12, May 2021
carrying out our work. [15] Boris Sekachev, Andrey Zhavoronkov, Nikita, Manovich, “Computer
Vision Annotation Tool: A Universal Approach to Data Annotataion”,
Article, Intel.com, Feb, 2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 152


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Exploratory Analysis on Geo-Locational Data
Krishna Sahithi Kakunuri
S.Ravi Kishan Akshitha Raj Parasa
Department of CSE
Faculty at Department of CSE Department of CSE
V R Siddhartha Engineering College
V R Siddhartha Engineering College V R Siddhartha Engineering College
Vijayawada, Andhrapradesh
Vijayawada, Andhrapradesh Vijayawada, Andhrapradesh
198w1a0522@vrsiddhartha.ac.in
suraki@vrsiddhartha.ac.in 198w1a0542@vrsiddhartha.ac.in
Prathap Gamini
Vamsipriya Patlolla
Department of CSE
Department of CSE
V R Siddhartha Engineering College
V R Siddhartha Engineering College
Vijayawada, Andhrapradesh
Vijayawada, Andhrapradesh
198w1a0516@vrsiddhartha.ac.in
198w1a0545@vrsiddhartha.ac.in

Abstract—Analyzing Geo-locational data provides a powerful The most typical hierarchical clustering method used to put
source of information about places and regional human objects in clusters based on their similarity is called
behavior. In the fast-moving, effort-intense environment that agglomerative clustering. Each object is first treated as a
the average person inhabits, an amenity rich place which ease singleton cluster by the algorithm. Pairs of cluster centers are
their uses. Most of the time in order to know about a location, progressively combined after all groupings have been
different amenities are explored and calculates whether it is in consolidated into one large cluster that contains all items.
our budget or not. So with data visualization and clustering In The outcome is a dendrogram, which is a tree-based
this article,amenity rich places near to the given location are depiction of the objects as seen in Fig 1.
figure out and within the given radius by considering different
parameters which are near to the location like restaurants,
cafes and parks as a whole .This project involves the use of
Agglomerative Hierarchical Clustering to group population,
and to group geo-locational data ,that are applied on the geo-
locational data obtained from Foursquare API (Application
programming Interface)URL(Uniform Resource Locator)to find
the best accommodation for a person in a location of latitude
and longitude by classifying accommodation for the people on
the basis of their preferences on amenities, budget and
proximity to the location. Our aim is to find the places which
are rich, average and poor in amenities and representing them
on map.
Keywords—Agglomerative Hierarchical Clustering, Foursquare
API, Geo-locational Data Fig. 1. A Dendrogram (right) Representing Nested Clusters
I. INTRODUCTION (left)
Geolocational data analysis aids in learning about locations
and local human behavior. Finding the ideal place to live II. LITERATURE SURVEY
might be challenging for those who travel frequently. India
contributed 1.57% of all foreign visitor visits in 2020. Yang et al.[1] used interactive steering a technique for visually
10.67% of all foreign visitors to the Asia Pacific region in monitoring limited hierarchical clustering that makes use of
2020 were from India. In comparison to 2018, India both user public and user private knowledge. This entails
embraced over 17.9 million foreign tourists, an increase of integrating knowledge (knowledge-driven) and inherent data
3.5%. India currently ranks 22nd globally and is the eighth distribution (data-driven) to automatically create constraints
most visited nation in the Asia-Pacific region. With so many for hierarchical clustering and enables interactive clustering
tourists paying close attention to India, it will be difficult for steering through a visual interface (user-driven). Each data
them to locate a place to stay and enjoy their trip. item is initially mapped using this technique to the most
pertinent knowledge base elements. The ant colony
So, depending on the location they selected as well as their optimization approach is then utilized to extract an initial
preferences for the location, we decide where would be best
constraint tree. The technique evenly distributes the width and
for them. People that relocate to a new location would
already have certain likes and tastes, hence exploratory depth of the tree and provides high confidence coverage of the
analysis on geo-location is utilized in the domain of data points. Dos Santos et al.[2] discussed hierarchical density
determining the ideal location. If the customers lived close to based clustering that is based on a precise, yet very
the favorite outlets, it would save them a lot of trouble. computationally intensive, random blocks parallelization
method. For effective application of hierarchical density-
The population or data points are divided into a number of based clustering to large datasets using MapReduce, we
groups only with the aim of making each group's data points proposed a novel parallelization rough clustering hierarchy
more similar to one another than those of the other groups. In based on a noticeably faster, recursive sampling approach.
other words, the objective is to put people in groups based on
the qualities they have in common.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 153


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Chen et al[3] used Foursquare API (Application programming directions, places to visit, and models. The program can be
interface) to gain knowledge about location-based social used to plan a trip within a predetermined window of time.
networks (LBSNs). It is impossible to offer a comprehensive Additionally, it will be useful for users who wish to quickly
picture of the user community because the majority of visit Mumbai and are unfamiliar with the city.
existing research focuses on a biased sampling of users.
Instead of solely relying on social connectedness data, It In the findings we came to know that K-Means clustering
provided a machine learning method to assess a user's does provide an efficient solution when the number of
influence by reviewing their profile and user-generated clusters are mentioned, but does not help in areas where the
content (UGC).The detailed LBSN data, which also offers number of groups are unknown. So, we used the
information on the movement of a large number of users, can agglomerative hierarchical clustering which provides an
be used to anticipate .Wunsch et al.[4] used a technique efficient and effective solution of forming clusters. Based on
which is based on performance assessment, aggregative the readings we know that FOUR Square API is well-known
hierarchical clustering (HC-PE), an improved clustering social network based on location that has widespread use to
technique, is proposed in this study for the reduction of high- fetch data, So, we’ve used the Foursquare API that helps in
order dynamical system models. Either a genetic algorithm identifying the preferred locations for the given latitude and
(GA) or the Pade approximation is used. Two groups of longitude and also Agglomerative hierarchical clustering
results are shown in this paper. Simple models can be found requires no apriori information and it gives appropriate
in the initial sets. A model having a number of inputs and results in most of the cases.
outputs is used in the second round of trials. We show that,
when compared to other strategies, HC-PE has the best III. METHODOLOGY
performance with the fewest MSEs (mean squared error). In This paper proposed a system to understand Geolocational
order to maintain as many of the qualities of dynamic system data for targeting customers. The geolocational data fetched
models while reducing their complexity, it analyses their from Foursquare API (Application programming interface)
characteristics and features. helps to analyze the customers proximity to location. This
information assists organizations in locating potential
Cheng et al[5] used Silhouette and Davies-Bouldin indexes customers and even provides a thorough study of customer
which are two examples of the cluster validity indices that preferences and tastes. The proposed system is for analyzing
have been presented. These validity indices, however, are and applying hierarchical clustering on geolocational data
unable to comprehend clusters of any shape. Some which helps to analyze the customers proximity to location
academics employ graph-based distances to cluster non- based on different amenities. The Fig.2 represents the
spherical data sets, despite the fact that computing them process flow of the proposed model.
between each pair of points in a data collection takes time.
The selection of a few representative points is a potential • Fetch the data
remedy. Hence proposed the creation of a new Local Cores • Data Exploration and Visualization
index to improve the usefulness of the Silhouette index. As
• Extracting important parameters from migrant data
typical points, local cores with regional maximum densities
are chosen. The LCCV index uses graph-based distance to through Agglomerative Hierarchal Clustering
assess how differently local cores differ from one another. • Get Geolocational Data from Foursquare API
Steiner et al[6] provided thorough analysis of Four Square • Run Clustering techniques on Geolocational data
is a well-known social network based on location that has • Plot the clustered locations on a map
widespread use. After gathering 2.4 million venues from 14
various geographical regions around the world, we establish
the following conclusions about the characteristics that well-
liked venues have in common. First, popular locations are
more likely to have complete profile information. The most
check-ins per venue are in the Travel category which is the
most popular one., with each location receiving an average
of 376 check-ins. Secondly, the vast majority (43%) of
public tips (comments) from users are given to places in the
food category. Additionally, compared to other categories,
the residential, office, and school categories had higher
stickiness of people checking in locations. Last but not least,
older people in general. Psyllidis et al[7] introduced a
framework to find homogeneous areas of social engagement
in cities and determine the best locations for new POIs. This
framework combines Geo-Self-Organizing Map with
contiguity-constrained hierarchical clustering, taking into Fig. 2 Process Flow Diagram
account multiple dimensions of information from social
media data. We create a Factorization Machine-based The model has 6 stages: Dataset Collection, Exploring and
model based on the regions found to find the ideal sites for visualizing the data, Run Clustering techniques on the data,
new POIs in diverse urban settings. Json Nemani et al [8] fetching geolocational data from Foursquare, run clustering
suggested the "City Tour Traveler" (CTT) system, which is techniques on Geolocational data and Representing Clusters
an application for Mumbai URL (uniform resource locator) on map.
and is based on GPS (Global Positioning System) and the A. Dataset Collection
Internet, can simply deliver travel information to mobile Collect the data from the customers, which must be
users. The finest experience to tour the city will be provided represented as CSV files (Comma Separated Values)
154because
by the successful design of the Travel App978-1-6654-6084-2/22/$31.00
with accurate ©2022 IEEE
this data will be used to create clusters using clustering
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

algorithms (groups),[10] To identify the best E. Run Clustering techniques on Geolocational data
accommodations, information based on the customer's Based on the amenities close by, sites are grouped using
preferred location must be retrieved from Four Square. The agglomerative hierarchical methods. When a place's latitude
dataset contains the attributes of migrant preferences like and longitude are inputted and a high number of amenities
income, weight, comfort-food, sports and so on. are present nearby, the location is categorized as amenity
rich, whereas a location with less facilities is categorized
B. Clean and Visualize Data
amenity poor. We can get the count of each amenity such as
Now we have our data, we need to understand it. A good restaurants, cafes, and parks.[14]
way to do this is by visualizing the data via graphs. Graphs This will categories accommodation for individuals
help us quickly get a sense of the data, and are a much more according to their choices for amenities, affordability, and
user-friendly way of understanding data as compared to closeness to the site in order to locate the best lodging for a
reading thousands of rows of data.[11] A graph to look at person in a given location of latitude and longitude. The sites
distributed groups is a Boxplot and it is shown in Fig 3. that share a characteristic will be aggregated or clustered.
Similar locations will be grouped(clustered) together. Graph
of clustered Geolocationsis shown in Fig 6.
C. Extracting important parameters from migrant data
through Agglomerative Hierarchal Clustering
F. Plot the clustered locations on a map
We apply agglomerative hierarchical clustering [9] on the
data. which will help us organize the population into groups A The final phase is to plot the clustered Geolocational data on
way for performing cluster analysis is the wards method. map. Folium is a library which is a great way in mapping
geolocational data.
Instead of employing distance metrics or measures of
association, it essentially views cluster analysis as an
analysis of variance problem.[12] An agglomerative
clustering algorithm is used in this process. Here
extracting important parameters is done by getting the best
value of number of clusters that is where the clusters are
clearly demarcated on particular attributes (e.g., income) Note
the difference in the clusters as you step through different
value of number of clusters. Must not forget to plot boxplots
again to see if there's any visible demarcation based on
different parameters thus, only important parameters are
extracted which are used are used in later process (in grouping
Geolocational data) and it is represented in Fig 4. The distance
between two clusters is the difference between two locations
in each cluster. Here r is the radius bounded by cluster 1 and s Fig. 3 Boxplot of Dataset
is the radius bounded by cluster 2 and the function D is for the
distance calculation between two clusters.

L (a, s) = min (D (xai, xsj))

The difference between two clusters represents the greatest


separation between any two locations within a cluster.
L (a, s) = max (D (xai, xsj))

The average distance between each point in one cluster and


each point in the other cluster is known as the distance
between clusters.
L (a, s) = 1/na ns ∑na ∑ns D (xai, xsj)

D. Get Geolocational Data from Foursquare API


We need to create Foursquare account and get API Fig. 4 Graph of Clustered data
credentials and set up, we can check for the residential
locations in a fixed radius around a point of our choosing
and then we parse the response data into a usable data
frame.[13] We must perform an HTTP GET request to the
REST API server and include an Accept application/json
(JavaScript Object Notation) request header in order to
obtain JSON from a REST API endpoint. The REST API
server is informed by the Accept header that the API client
wants JSON.[15] The response header reveals that the REST
API server returned JSON data. By applying data cleaning,
we can clean the data and summarize the results into a data
frame. Geolocational data is represented as a graph in Fig 5.
Fig. 5 Represents Geolocational Data

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 155


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. CONCLUSION AND FUTURE WORK


Agglomerative Hierarchal Clustering techniques were used
to cluster migrant data and Geolocational data. We have
created a simple website representing a map plotted with
clusters of geolocational data. It is simple to use because it
is user- and wallet-friendly. This software or website helps
to solve a common issue for migrants. This app or website is
used to quickly identify accommodation that suits our
budgets and will be especially helpful for students. Future
research will focus on taking multiple locations but not a fixed
location and applying clustering techniques on it.

REFERENCES
[1] Yang, W., Wang, X., Lu, J., Dou, W. and Liu, S., 2020. Interactive
steering of hierarchical clustering. IEEE Transactions on
Fig. 6 Graph of Clustered Geolocational data Visualization and Computer Graphics, 27(10), pp.3953-3967
[2] Dos Santos, J.A., Syed, T.I., Naldi, M.C., Campello, R.J. and Sander,
J., 2019. Hierarchical density-based clustering using
MapReduce. IEEE Transactions on Big Data, 7(1), pp.102-114.
IV. RESULTS [3] Chen, Y., Hu, J., Xiao, Y., Li, X. and Hui, P., 2020. Understanding
the user behavior of foursquare: A data-driven study on a global
scale. IEEE Transactions on Computational Social Systems, 7(4),
Clusters are formed based on the similarities. We took Benz pp.1019-1032
circle in Vijayawada as the location and applied [4] Al-Dabooni, S. and Wunsch, D., 2018. Model order reduction based
agglomerative hierarchical clustering on it so the final on agglomerative hierarchical clustering. IEEE transactions on neural
networks and learning systems, 30(6), pp.1881-1895.
results are shown in the below figures.
[5] Cheng, D., Zhu, Q., Huang, J., Wu, Q. and Yang, L., 2018. A novel
cluster validity index based on local cores. IEEE transactions on
neural networks and learning systems, 30(4), pp.985-999..
[6] Li, Y., Steiner, M., Wang, L., Zhang, Z.L. and Bao, J., 2013, April.
Exploring venue popularity in foursquare. In 2013 Proceedings IEEE
INFOCOM (pp. 3357-3362). IEEE.
[7] Psyllidis, A., Yang, J. and Bozzon, A., 2018. Regionalization of
social interactions and points-of-interest location prediction with
geosocial data. IEEE Access, 6, pp.34334-34353.
[8] Nemani, Y.M., Yadav, R., Patki, M., Padave, O. and Bhelande, M.M.,
2018. City Tour Traveller: Based on FourSquare API. City, 5(04).
[9] Patel, P., Sivaiah, B. and Patel, R., 2022, July. Approaches for finding
Optimal Number of Clusters using K-Means and Agglomerative
Hierarchical Clustering Techniques. In 2022 International
Fig. 7 Clustered locations on map Conference on Intelligent Controller and Computing for Smart Power
(ICICCSP) (pp. 1-6). IEEE.
[10] Wang, P., Ding, C., Tan, W., Gong, M., Jia, K. and Tao, D., 2022.
Uncertainty-aware clustering for unsupervised domain adaptive object
The locations are divided into clusters based on similarities re-identification. IEEE Transactions on Multimedia.
and in the Fig 7 we can see that there are 3 group of clusters [11] Daraio, E., Cagliero, L., Chiusano, S. and Garza, P., 2022.
are formed. Complementing Location-Based Social Network Data With Mobility
Data: A Pattern-Based Approach. IEEE Transactions on Intelligent
Transportation Systems.
[12] Sharma, S. and Batra, N., 2019, February. Comparative study of
single linkage, complete linkage, and ward method of agglomerative
clustering. In 2019 International Conference on Machine Learning,
Big Data, Cloud and Parallel Computing (COMITCon) (pp. 568-
573). IEEE.
[13] Gong, W., Zhang, W., Bilal, M., Chen, Y., Xu, X. and Wang, W.,
2021. Efficient web APIs recommendation with privacy-preservation
for mobile app development in industry 4.0. IEEE Transactions on
Industrial Informatics, 18(9), pp.6379-6387.
[14] Lee, J.H., Moon, I.C. and Oh, R., 2021. Similarity Search on Wafer
Bin Map Through Nonparametric and Hierarchical Clustering. IEEE
Transactions on Semiconductor Manufacturing, 34(4), pp.464-474.
[15] Chen, Joy Iong Zong. "Optimal Multipath Conveyance with
Improved Survivability for WSN’s In Challenging Location."
Fig. 8 Representing Clusters on map Journal of ISMAC 2, no. 02 (2020): 73-82.

The results are as follows cluster 0(Green) has maximum


department restaurants, cafes and parks. Cluster 1(Yellow)
has minimum restaurants, cafes and parks. Cluster 2(Red)
has more restaurants but less cafes and parks and they are
shown in Fig 8.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 156


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Distance Estimation for Collision Avoidance


of Micro Aerial Vehicles using LiDAR Sensor
Hemanth Verma Pinnamaraju Prashanth Reddy Kapu
School of Aeronautical Sciences School of Aeronautical Sciences
Hindustan Institute of technology & Science Hindustan Institute of technology & Science
Chennai, India Chennai, India
pinnamaraju.hemanth18275@gmail.com prasanth.bodapeta@gmail.com

Adi Narayana Juturu Anbarasu B


School of Aeronautical Sciences School of Aeronautical Sciences
Hindustan Institute of technology & Science Hindustan Institute of technology & Science
Chennai, India Chennai, India
j.adi16410@gmail.com avianbu@gmail.com

Abstract- This research work proposes a novel method Micro aerial vehicles are one of the most widely
to prevent collision in the micro aerial vehicles by researched topic around the world that caught
calculating the distance of the obstacle prior to the attention in recent years around the globe because of
collision. For distance measurement we have used the its less weight and the compact size. They are being
LiDAR sensor which uses the time of flight principle used extensively in the field of Aerial surveillance
and, identified its operating ranges that works for various field sites like power plants, Inspection of
perfectly for the micro aerial vehicles and analyzed power lines in some cases [5] and its applications are
the errors in various operating ranges. Determining of great importance including Aerial Mapping,
accuracy using the Root Mean Square Error and Computer Vision, etc. LiDAR finds it application in
Absolute Mean Error as two parameters for three obstacle avoidance and collision avoidance using the
types of data classified as All calculated data, very time on flight principle [6]
close values and deviating range of the Result plotting
graphs and calculating errors for the same. This
proposed research helps in understanding the LiDAR II. CONCEPT
Sensor in better way for the exploration of the range A. Time of flight principle
of operation of the LiDAR sensor and its applications
in collision avoidance. Though the algorithm that we There are various concepts to measure distance
have done is in the Arduino UNO the same can be using the LIDAR sensor. The widely used technique
implemented in Pixhawk module and the control is to use ‘time of flight principle’[6,7]. TOF emits a
signal can be used to change the direction of the pulse of laser on timely basis. The calculator
micro aerial vehicle where ever necessary. measures the time between the laser pulse and target
and sends the signal to the receiver so the distance is
Keywords: Distance, LiDAR, Collision, Avoidance, obtained. In Time-of-flight LIDAR the target that
Arduino, MAV has to be detected is illuminated and the receiver
collects the backscattered photons to analyze the
I. INTRODUCTION
distance of the object.
One of the most accurate techniques to measure distance
of an obstacle that are in space is the LiDAR. LIDAR
stands for Light detection and ranging which is similar to
the RADAR. LIDAR differs from RADAR, as LIDAR
uses UV light in the visible spectrum whereas RADAR
uses Radio waves [1-2].

LIDAR usage is not limited to distance measurement it


can also be used to understand the detection of objects in a
visual and the amount of light it consists of. Researches
are being conducted on LiDAR sensors applications
including automated guided vehicles[3]. The working FIG.1. Time of flight principle
principle can be understood as follows:[4] primarily, the
sensor aims the target, then the laser emits light on the
target with the help of emitting light is captured by the
receiver
The distance can be measured with the help of speed of
light (c) and Time of flight (TOF). The Distance (D) can be
measured as given by the equation [7]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 157


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

1 with any ofthe development boards they are:


𝐷 = ∗ 𝑇𝑂𝐹 ∗ 𝑐 (1)
2
1. Black - Ground
With the above formula the TOF principle enabled sensor
2. Red – 5V
calculates the distance between its receiver and object
3. White – Rx
B. Collision Avoidance 4. Green – Tx

Collision Avoidance is the concept of using a stimulus The Black cable connects with the GND pin in the Arduino
generated by a sensor which in return tells the Micro Aerial UNO in the same way the Red wire is specified with the
Vehicles to change its direction to the direction other than positionof 5V pin for the right voltage supply to the
where the obstacle is present [9,10]. Arduino and finally the white and green to the PIN 2 and
PIN 3 respectively
After the stimulus is received the MAV has to change
direction or needs to stop near the obstacle

C. Arduino UNO

Arduino UNO is a multipurpose microprocessor used


widely as a tool for study and research purpose because of
its fast processing and easy interfacing with various sensors
[11-15]. Arduino UNO is based on the ATmega328P which
helps in interfacing various with the sensors to perform
necessary operations. The advantage of Arduino is being its
connectivity directly to the USB adapter making it easy to
get the data from the sensors

III. METHODOLOGY

The tf-mini-s micro LiDAR that operates with the Time of


flight principle is used to calculate the distance by using the
time it takes to bounce back the signal once it collides with
obstacle and after the receiving the distance measured the
distance will be sent to the flight controller of the micro Fig. 3. Pin diagram of how we will connect particular
aerial vehicle as control signal and uses to change its positions as specified
direction a few degrees as to avoid the collision this can be
seen in. The information about the distance is sent to the
flight controller as a control signal which acts an impulse For the experiment we have connected the cables in the
that stimulates the flight controller to sense the presence of following described manner each wire goes in the specified
an obstacle. To simulate the procedure we can also use the manner as shown in the picture
Arduino UNO Micro Controller to understand the distance
calculations and analyze the results which we are going to
see in the further section of the paper.

LIDAR
DISTANCE COLLISION
MEASUREMENT AVOIDANCE

Fig. 2. Representation of the Methodology

IV. EXPERIMENT
For the experiment we are using the Benewake’s Tf-
mini-s micro LiDAR sensor which is popular for distance
measurement in UAV’s and is widely because of its Fig.4. Describes the wires which we have to connect to
specified operating range being 10-1200 cm and its
LiDAR
compatibility with the micro controller boards like
Arduino UNO. Arduino NANO or python development
board like Raspberry PI. For the experiment we are using
Arduino UNO which uses Arduino CC compiler for V. CODING
deploying our code.` For coding we have used Arduino CC compiler which uses
C++ programming which has the two bodies in the coding
The LiDAR has the following wires[14] to connect of setup and loop.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 158


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In the setup part we have specified the code to take output TABLE I. Actual Distance vs Distance Measured
from the Rx and Tx pins that is PIN 2 and PIN 3 of the by LiDAR
Digital Section. We have imported the “Software Serial”
Library and used to setup the PIN 2 and PIN 3 with the S.no Y in cm Y’ in cm
serials as 9600 and 115200 serials in the void setup. 1 50 51
2 100 101
3 150 154
4 200 200
5 250 254
6 300 301
7 350 353
8 400 408
9 450 452
10 500 501
11 550 555
12 600 603
13 650 652
14 700 709
15 750 755
16 800 803
17 850 852
18 900 905
Fig. 5. Pin connections from LiDAR to Arduino UNO. 19 950 959
20 1000 1008
21 1050 1058
22 1100 1113
23 1150 1166
In the looping module we use it get distance measure from 24 1200 1185
the LiDAR as continuous output of result. During the
looping procedure we take readings from the previously
stated serial of the PINS 1 and 2 and perform operation to
get the distance of the obstacle from LiDAR as a part of the
process we gave a continuous print statements comprising
DATA ABSTRACTION
of the Distance measured and Strength of Signal as two 1200
outputs. For a slow portrayal of result we kept a delay of 1150
5ms. 1100
1050
1000
After completing the coding and reverifying for error in the 950
inbuilt interpreter we have deployed the code to the 900
Arduino in the above specified manner and the code was 850
800
working without any error and was giving the output of 750
DISTANCE

Distance and Signal strength continuously which helped us 700


650
for performing our experiment. 600
550
VI. DATA COLLECTION 500
To perform data collection operation we have done using a 450
400
TAPE such that from 0cm to 12000 cm we have marked 350
points with a difference of 50cm each such that there are 24 300
points to calculate the distance between the obstacle. 250
200
150
The distances are such that 100
[50,100,150,200,250,300,350,400,450,500,550,600,650,70 50
0,750,800,850,900,950,1000,1150,1200] and 0
using the obstacle we have noted all the measurements 1 3 5 7 9 11 13 15 17 19 21 23
given by theLiDAR sensor and saved in the excel file for NUMBER OF EXPERIMENTS
calculations.
ACTUAL DISTANCE LIDAR MEASUREMENT
VII. DATA ABSTRACTION
We have created the data Table as shown in the TABLE 1 Fig. 6. Bar Graph of Actual data and LiDAR data
with the manual calculated distance and distance measured
with help of LiDAR as two parameters that are to be used
to calculate the errors respectively
For the correct validation of the data measured using the
LiDAR we have calculated errors for the same the two

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 159


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

parametric errors are Root mean Square Error(RMSE) and 4 1100 1113
Mean Absolute Error(MAE). 5 1150 1166
6 1200 1185
RMSE and MAE are key statistical parameters use in
various studies like Geo Sciences, Atmospheric Sciences
VIII. RESULTS
[15] we are going to use the same to understand our
After calculating the errors we have deduced the following
purpose
from the 24 samples we have calculated
∑𝑛 ′
1 (𝑦 −𝑦)
2
𝑅𝑀𝑆𝐸 = √ (2) RMSE OF TABLE 1= 6.934
𝑁

1
MAR OF TABLE 1 = 5.333
𝑀𝐴𝐸 = |𝑦 − 𝑦′| (3)
𝑛
After creating the Table we have calculated the root mean
square error and mean absolute error of the data from
Where, TABLE 2 and the results are as follows:

y’ is distance measured by LiDAR RMSE for TABLE 2 = 0.000

y is the actual or distance measured by tape MAE for TABLE 2 = 3.278

From the data we can understand that the first 18 iterations The RMSE of 0 is quite impressive result which matches
that is from 50-900 we have very accurate reading to the the expectation and is the most suited for wide range
actual values which implies that the LiDAR Sensor application including UAV’s within the specific range for
performs accurately within that range. collision avoidance.

If we take most accurate results from the TABLE 1 from the When analyzed the tabular data present in the TABLE 3
data of 50-1200 cm and make another Table for the data and calculated the RMSE and MAE and the result is :
which helps us understand the result in that range of 50-
900 and make it as TABLE 2. RMSE OF TABLE 3 =11.965

TABLE II. Most Accurate data MAE OF TABLE 3 = 11.500

S.no Y in cm Y’ in cm From this we can understand that the RMSE of around


1 50 51 11.965 results in error of measurements in the range of
950-1200cm.
2 100 101
3 150 154 The Range of threshold has more Error than compared to
4 200 200 that of the range of 50-900cm
5 250 254
The threshold distance between the obstacle and the Micro
6 300 301
Aerial Vehicle is set to 150 cm
7 350 353
8 400 408 Based on the collected data from the LiDAR sensor, Pulse
9 450 452 width modulated signal is transmitted to the flight
10 500 501 controller to pitch the MAV backwards to avoid collision
11 550 555 with the obstacles. Threshold distance of 150 cm is used to
12 600 603 avoid obstacle collision in the indoor or outdoor
environment.
13 650 652
14 700 709 IX. LIMITATIONS
15 750 755 The Limitations of the following research is that LiDAR
16 800 803 sensor which we used in the paper is of range 10-1200cm.
17 850 852 so there is probable error in the closest and farthest ranges
18 900 905 of the Specified range. Performing the same operation
For better understanding and analysis of the result that we might be difficult in Pixhawk compared to the Arduino
have carried out and out of that we have made another because of interfacing with LiDAR makes it more complex.
Table which includes the data in the most deviating range Ultrasonic sensors can measure range upto 400 cm. For
and formed it as TABLE 3 Micro aerial vehicle with high flight speed ultrasonic
TABLE III. LiDAR results in the most deviated sensors are not suitable for collision avoidance system. To
range overcome this limitation, LiDAR sensor is used in this
work to estimate the distance of the obstacle for MAV
S.no Y in cm Y’ in cm collision avoidance system
1 950 959
2 1000 1008
3 1050 1058

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 160


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

X. CONCLUSION
After performing this experiment using the LiDAR and Unmanned Aircraft Systems (ICUAS)June 7-10,2016.
collecting its distance measurements after clear analysis of Arlington, VA USA
the results including the calculation of errors like RMSE [8] C. Ye and J. Borenstein, "Characterization of a 2- D
and MAE we have clearly found the ranges where the laser scanner for mobile robot obstacle negotiation," in
LiDAR Sensor performed really well and the range where ICRA, 2002, pp. 2512-2518
it performed satisfactorily for the use case. From the results [9] Jawad N. Yasin, Sherif A. S. Mohamed, Mohammad
that we have performed it can be clearly understood that Hashem Haghbayan, Jukka Heikkonen, Hannu
the LiDAR can be applied for collision avoidance in the Tenhunen and Juha Plosila, Unmanned Aerial
range of 50-900cm from the obstacle and in the range of Vehicles (UAVs): Collision Avoidance Systems and
950-1200 it is less preferred because of the sensitivity of Approaches”, IEEE Access, vol. 8, pp. 105139–
the the application that we are performing for. 105155, June 2020.
[10] Sivaganesan, D. "Efficient routing protocol with
Collision avoidance algorithm will be implemented in the collision avoidance in vehicular networks." Journal of
Arduino UNO board. Suitable control signal will be Ubiquitous Computing and Communication
transmitted to the Flight controller based on the LiDAR Technologies (UCCT) 1, no. 02 (2019): 76-86.
range estimation and threshold distance between the MAV [11] Leo Louis, Working Principle of Arduino and Using It
and the obstacle to avoid collision with the obstacles. From As a Tool for Study and Research, International
the experimental results, it is inferred that long distance Journal of Control, Automation, Communication and
from 50 cm to 900 cm accurate obstacle distance can be Systems (IJCACS), Vol.1, No.2, April 2016.
estimated for collision avoidance. [12] Sensor Fusion for Accurate Object Detection
Underneath Stationary Vehicles, Fady A.
XI. ACKNOWLEDGEMENT
I want to pay tribute to my teachers who have been a Abouelghit; Waleed Y. Alarid; Mostafa S.
continuous support in every aspect and the global Elmanfalouty; Hagar S. ElSakka Ibrahim E. Elamry
researchers deserve huge respect because their research’s in Ramez M. Daoud. Hassanein H. Amer,Mustafa H.
various forms like publications and journals and helped in Arafa,26th IEEE International Conference on
various aspects of learning and helped us complete this Emerging Technologies and Factory Automation
project and motivated us to perform in future. (ETFA),2021
[13] S. S. Bolbhat, A. S. Bhosale, G. Sakthivel, D.
XII. REFERENCES Saravanakumar, R. Sivakumar and J Lakshmipathi,
Intelligent Obstacle Avoiding AGV Using Vector
[1] Comparison of Lidar-Based and Radar-Based Field Histogram and Supervisory Control, Journal
Adaptive Cruise Control Systems Glenn R. Widmann, of Physics: Conference Series, Volume 1716, National
Michele K. Daniels, Lisa Hamilton, Lawrence Humm, Science, Engineering and Technology Conference
Bryan Riley, Jan K. Schiffmann, David E. Schnelker and (NCSET)2020,11-12 May 2020, Vellore Institute of
William H. Wishon,Vol. 109, SECTION 7: JOURNAL Technology,Chennai, India
OF PASSENGER CARS: ELECTRONIC AND [14] Benewake Tf-mini-s Data Sheet by Benewake,
ELECTRICAL SYSTEMS (2000), Beijing, China
[2] Heinrich Gotzig, and Georg Geduld, “Automotive [15] Dulakshi Santhusitha Kumari Karunasingha Root
LiDAR,” 2016 Springer International Publishing 2016 mean square error or mean absolute error? Use their
H. Winner et al. (eds.), Handbook of Driver Assistance ratio as well, Information Sciences volume 585, march
systems 2022
[3] Fardiansyah Nur Aziz1 , Masduki Zakarijah2,”Tf- mini
LiDAR sensor Performance Analysis for Distance
Measurement,” Jurnal Nasional Teknik Elektro dan
Teknologi Informasi | Vol. 11, No. 3,August 2022
[4] J. Liu, Q. Sun, Z. Fan, and Y. Jia, “TOF LiDAR
Development in Autonomous Vehicle,” 2018 IEEE
3rd Optoelectron. Glob. Conf. (OGC), 2018, pp.
185−190.
[5] P. Marker, The 2010-2015 World Outlook for
Unmanned Aerial Vehicles (UAV) and Systems,
ICON Group International Inc., 2009.
[6] Sakthivel P,and Anbarasu B, “Integration of Vision
and LiDAR for Navigation of Micro Aerial
Vehciles,”2020 IEEE 3rd International
Conference,2020
[7] Roberto Opromolla ,Giancarmine Fasano, Giancarlo
Rufino, Michele Grassi. “LIDAR- Inertial Integration
for UAV Localization and Mapping in Complex
Environments,”2016 International Conference on

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 161


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Low Power, Highly Stable and Enhanced Read


Speed 7T SRAM
Deberjeet Usham, Malti Bansal*
Department of Electronics & Communication Engineering,
Delhi Technological University (DTU), Delhi-110042, India
*maltibansal@gmail.com
Abstract— Cache memory is one of the most important So, in this paper a novel SRAM cell is proposed that
functional part of any system ranging from System on Chips intends to solve the above-mentioned problems. The paper is
(SoC) to personal computers. The cache memories are composed organized into five sections to help in better comprehension
of millions of SRAM cells. Thus, for the cache memory to be of our proposition. Section II gives a brief overview of the
reliable, it is important that SRAM cells have some specific
features such as: high stability of the data retained, low static
SRAM cells which includes the working mechanics of the
and dynamic power consumption, low read delay. As an attempt traditional 6T SRAM cell and also the complications and the
to accomplish the incorporation these features, a novel SRAM shortcomings of the model. Then, in Section III,
cell consisting of 7 transistors is proposed in this paper. The cell implementation of the proposed model will be discussed.
has separate bitlines for the read and write operation thereby Section IV will be composed of simulation results and
isolating the two operations. Also, the storage node formed by analysis of the same. The paper will be concluded with
the back-to-back inverters are not disturbed by read operation, Section V discussing the conclusion and future scopes.
this leads to enhanced robustness of data stored. The cell also
makes use of dual Vt(threshold voltage) transistors in order to II. OVERVIEW OF SRAM CELLS
minimize leakage power consumption. Transistors in the cell is
configured in such a way that there are minimum number of A. Conventional 6T SRAM cell
transistors in the read critical delay path, thereby reducing the An SRAM cell is a piece of circuitry that can hold one
read delay. Performance of the proposed model is compared bit of data, either 0 or 1 as long as there is power supplied. It
with that of the conventional 6T SRAM cell to showcase the should also be able to have its data read or written into as long
enhancements obtained.
as power supply is not cut off. The SRAM cell that will be
Keywords—6T SRAM (6 Transistor Static Random Access used as a point of reference for comparison with the proposed
Memory) , 7T SRAM (7 Transistor SRAM), Dual Threshold model is the conventional model consisting of 6 transistors.
voltage transistors, SNM (Static Noise Margin), Butterfly curve It uses a weak back to back CMOS inverter to hold the data
and a pair of access transistors on either side of the back to
I. INTRODUCTION back inverter to make reading and writing onto the cell fairly
Today’s technology market has become more memory easy. The circuitry is shown in Fig. 1.
depend than ever. Every device such as mobile phones and
computers performs memory intensive tasks on a day-to-day
basis. It is not an exaggeration to state that memory is one of
the most important components of any system ranging from
microcontrollers and System on Chips (SoCs) to personal
computers and workstations. And in the memory hierarchy, Q_b
Q
cache memory is very crucial for quick processing of data by
the CPU (Central Processing Unit). They work as an
augmented memory to the CPU by temporarily storing data
frequently requested by the CPU. This cache memory is
mainly composed of a class of random access memory known
as Static Random Access Memory (SRAM). Thus, it is of
utmost importance to ensure that the SRAMs used are of
highest quality and reliability.
Fig. 1. Conventional 6T SRAM (Reproduced from [2])
Certain features that can be highlighted to guarantee this
are: high stability of the data retained (also termed as
To write a data onto the cell, the bit line(𝐵𝐿) and the bitline
robustness), low static and dynamic power consumption, low
read delay. But the aforementioned features are threatened bar ( ̅̅̅̅
𝐵𝐿 ) are first set equal to the data bit and its complement
because of various reasons. Firstly, in an attempt to reduce respectively, then the WORD line is set high to turn on the
the size of devices and transistors, voltages have been scaled access transistors (N3 and N4), so as to force the data on the
down drastically such that it degrades the stability of data two nodes of the weak cross coupled inverter. To read data
from the cell, the bit line(𝐵𝐿) and the bit line bar ( 𝐵𝐿 ̅̅̅̅) are
stored in the cell [1, 5]. In addition to this, since SRAM cells
are a memory element, a significant amount of power pre-charged high with the help of a precharge circuit, then the
consumptions particularly leakage power consumption takes WORD line is set high to turn on the access transistors N3
and N4, so that one among the 𝐵𝐿 and 𝐵𝐿 ̅̅̅̅ is discharged to
place. The standard 6T SRAM cell and current model SRAM
cells are ineffective in addressing these issues [6, 7]. ground according to the data stored on the nodes.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 162


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

There are two constraints that are to be followed to circuit schematic of the proposed 7T SRAM is as shown in
ensure correct reading and writing of data onto the cell. First Fig. 2.
is the read stability constraint [2]. This constraint states that
“the driver transistors N1 and N2 should be stronger than the
access transistors N3 and N4” so that during the read
operation when one among the 𝐵𝐿 and ̅̅̅̅ 𝐵𝐿 is to be discharged
to ground by one of the nodes via the access transistors, the
particular node which is 0 is not raised high enough by the
current flowing through the access transistor. So, the driver
transistors N1 and N2 should be sized bigger than that of the
access transistors, N3 and N4. Second is the writability
constraint [2]. This constraint states that “the access
transistors N3 and N4 should be stronger than the pull up
transistors P1 and P2”. To explain this, suppose Q = 0 and
Q_b =1 in the cell. Now a 1 is to be written, i.e, Q has to be
forced to 1 by the bitline 𝐵𝐿. But due to the read stability
constraint as explained above, N1 is stronger than N3 and Fig. 2. Proposed 7T SRAM schematic
thus Q can’t be forced 1 by the weaker access transistor. As
an alternative to accomplish the write operation, Q_b has to First noticeable change is the MOS transistors illustrated
̅̅̅̅ , this will only be possible if the pull up
be forced to 0 by 𝐵𝐿 in thick lines, they are the MOSFETs with high VT (Threshold
transistor P2 is weaker than the access transistor N4. To Voltage). The main motive behind using high-VT transistors
summarize, according to the writability constraint, the pull up for 3 of the 4 transistors of the cross-coupled inverter is to
transistors P1 and P2 must be sized smaller than the access reduce static( mainly leakage) power consumption. This can
transistors N3 and N4. be explain using the mathematical equation that governs the
The evaluation of resilience to noise in various operation current in off state.
modes is done through the use of a quantity called Static 𝑞(𝑉𝐺𝑆 − 𝑉𝑇 −𝑉𝑜𝑓𝑓𝑠𝑒𝑡 ) −𝑞𝑉𝐷𝑆
Noise Margins (SNMs), measured in various operation 𝐼𝑂𝐹𝐹 = 𝐼𝑆 . 𝑒 𝑛𝐾𝑇 (1 − 𝑒 𝐾𝑇 ) (1)
modes, namely read, write and hold [8-10]. Static Noise
Margin is defined as the amount of noise that can be applied Where, 𝑉𝑇 = Threshold Voltage, and
to the two nodes of the back-to-back inverter before a data 𝑃𝑠𝑡𝑎𝑡𝑖𝑐 = 𝐼𝑂𝐹𝐹 . 𝑉𝐷𝐷 (2)
stored in the node is flipped.
As it can be seen from the above equation, as 𝑉𝑇 increase,
B. Complications in 6T SRAM the off state current (subthreshold current) decreases
As compact and simple a conventional 6T SRAM is, it exponentially. So, this in turn decreases the static power
has its own shortcomings. First, comes the robustness. The consumption.
term “robustness” in an SRAM cell quantifies how well a data The next thing noticeable is the use of separate read and
held (stored) in the nodes is not disturbed during any of the write lines (indicated by R and W in the Fig. 2) and also
access operations. Configuration of transistors in 6T SRAM separate write bitline (WBL) and read bitline bar (RBL_b) for
is in such a way that the nodes Q and Q_b are directly writing to and reading the stored data respectively. This is
accessed by the bitlines 𝐵𝐿 and 𝐵𝐿̅̅̅̅ via the access transistors, done so as to isolate the read and write operations completely.
N3 and N4. Careful observation reveals that a voltage The write bitline (WBL) alone is used to write a new data
division happens in the storage nodes. This voltage division onto node Q via the access transistor N3 controlled by the
occurs between the transistors in the back-to-back inverters write signal. When node Q is forced with a new data, Q_b is
and the access transistor. So, the storage nodes are already at also automatically changed because of the cross coupling of
a raised voltage level and thus are vulnerable and can be the inverters. The read bitline bar (RBL_bar) alone is used to
easily disturbed during a read operation. This is termed as read the complement of the data from the storage node via the
destructive read in paper [3]. Second matter of concern is the stacked transistors N4 and N5, where the transistor stack is
leakage or static power consumption. As staying static is an controlled both by the read signal R and also Q_b of the
inevitable act required in all memories, an SRAM cell suffers storage node. The purpose of such an architecture can be
from power dissipation during the static state. And since better understood after understanding the read and write
SRAMs mainly make up the cache memories, it is highly operation.
desirable that the power consumption is reduced through B. Read and Write operation
innovations [11-13].
To perform a read operation, first the read bitline bar
III. PROPOSED 7T SRAM CELL (RBL_b) is precharged to 𝑉𝐷𝐷 , then the read (R) signal is set
high, while write (W) signal is set low so that N4 is ON. Now
A. Architecture of the proposed model since N5 is directly connected to Q, if a ‘1’ was stored on Q
In an attempt to solve the complications in 6T SRAM (which means the cell), N5 would become ON and the
cells as discussed above, a novel 7T SRAM cell is proposed, RBL_b will be discharged to GND via the series stacked
which makes use of two types of MOS (Metal Oxide transistors N5 and N4. On the other hand, if a ‘0’ was stored
Semiconductor) transistors, one type with low threshold on Q, the RBL_b will stay charged (high). So the RBL_b
voltage and the other type with high threshold voltage. The reads a complement of the bit stored on the cell, and hence

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 163


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the name. Because of the architecture the storage nodes Q and 𝛽


𝑉𝐷𝐷 −|𝑉𝑇𝑝 |+ 𝑉𝑇𝑛 √ 𝑛
Q_b are completely isolated from the read bitline bar, since 𝛽𝑝
𝑉𝑀 = 𝛽
(2)
the nodes are not directly accessed by the bitline as was the 1+ √ 𝑛
𝛽𝑝
case in 6T SRAM cell. This enhances the read stability of the
proposed SRAM cell. Also, the read bitline bar is
conditionally discharged through the transistor stack with the Where, |𝑉𝑇𝑝 |= Threshold Voltage of pMOS
data on storage node acting as one of the control signals. So, 𝑉𝑇𝑛 = Threshold Voltage of nMOS.
the pull up and the pull-down transistors of the back-to-back
inverter does not take part in the critical read delay path and Thus, it is clear that if the pMOS is of high 𝑉𝑇 and the
hence their sizing does not affect the read delay. nMOS of low 𝑉𝑇 ,the inverter will have a decreased switching
To write onto the cell, the Write Bitline (WBL) is first pre- threshold, 𝑉𝑀 . Therefore, the use of dual 𝑉𝑇 is beneficial at
charged to 𝑉𝐷𝐷 , then the Write (W) signal is set high, while many levels while decreasing leakage power consumption
Read (R) signal is set low. Now if the input data to be written remains of the main reasons.
is a ‘1’, the WBL remains charged to 𝑉𝐷𝐷 and thus the bit ‘1’
is forced to the node Q via the low 𝑉𝑇 access transistor N3 IV. SIMULATION RESULTS AND ANALYSIS
(for easy write process). Alternatively, if the input data to be Simulations were performed on the Cadence Virtuoso tool
written is a ‘0’, the WBL is discharged to GND and thus the by constructing schematics for the suggested 7T SRAM cell
bit ‘0’ is force to node Q via N3. It should be noted here that as well as for the conventional 6T SRAM cell for the purpose
WBL is required to be precharged to 𝑉𝐷𝐷 every time of comparison. Sizes of transistors used in the 6T SRAM is
regardless of whether the input data is 0 or 1 because of the shown in Table I.
fact that the write driver that are used in every memory
circuitry can only do the job of pulling down the WBL to TABLE I. TRANSISTOR SIZES OF 6T SRAM CELL
GND via the control of Write (W) signal and input signal D. Width (W) Length (L)
The write driver circuit is shown in Fig. 3. for better N1,N2, (Pull Down 400n 100n
understanding. Transistors)
P1,P2 (Pull-Up 120n 100n
Transistors)
N3, N4 (Access 200n 100n
Transistors)

So, the Cell Ratio (𝛽)= ratio of pull-down transistor to the


access transistor, is set to 1. And the sizing is in accordance
to the read stability and writability constraints as discussed in
above section. Similarly, sizes of transistors used for 7T
SRAM cell is as shown in Table II.

TABLE II. TRANSISTOR SIZES OF PROPOSED 7T SRAM CELL


Width (W) Length (L)
N1,N2 (Pull Down 120n 100n
Transistors)
Fig. 3. Write driver used for 7T SRAM cell.
P1,P2 (Pull-Up 120n 100n
Like the constraints related to read stability and writability Transistors)
in 6T SRAM cell, there are design constraints to be followed N3, (Write Access 120n 100n
here as well. To accomplish a successful write of bit ‘0’ onto Transistors)
the cell, the pull up transistor (P1) must be weaker than the N4, N5 (Read Stacked 300n 100n
access transistor (N3). Correspondingly, to accomplish a Transistors)
successful write of bit ‘1’ onto the cell, the pull-down
transistor N1 must be weaker than the access transistor N3. Since the stack transistors are connected in series, it results
This is automatically accomplished by the use of high 𝑉𝑇 in increased resistance, so to get a less equivalent resistance
transistors N1 and P1. So, the high 𝑉𝑇 transistors serve dual overall they needed to be sized double that of the other
purpose here. transistors. All the other transistors have the minimum
Also, there is a problem of transfer of weak (degraded) ‘1’ possible size, thus making the overall area occupied by the
through the access nMOS transistor N3 from the WBL due circuit much less compared to that occupied by the
the threshold drop in N3. This is solved by making the conventional 6T SRAM despite the fact that the proposed
inverter formed by transistors P2 and N2 have lower model has 1 extra transistor [14-15].
switching threshold so that the weak ‘1’ will not be A. Transient Analysis
misinterpreted as a ‘0’. To make this possible low 𝑉𝑇
Both the conventional and the proposed model were put
transistor N3 is used, as evident form the equation defining
under transient analysis to verify the correct functioning of
switching threshold.
the read, write and the hold operations. Both the models were
simulated by using the same input data signal, similar write
and read signals, and precharge signals for read (RBL) and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 164


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

write bitline (WBL) ( 𝐵𝐿 and 𝐵𝐿 ̅̅̅̅ in case of 6T SRAM). remain unchanged always. But this is not the case in node Q
Similar precharge circuits, sense amplifiers and write drivers and Q_b in 6T SRAM cell. Suppose node Q stores a’1’ (VDD),
were used for both the models so that the performance node Q_b will not be proper 0 but a slightly higher value
comparison results remain reliable. The simulation outputs because of voltage division happening during the read
are illustrated in Fig. 4. operation because of the structure formed by the driver
transistor (N2) and the access transistor (N4). As a result of
the already elevated voltage level at Q_b, the bit stored is
most prone to noise while a read operation is taking place.

(a)

Fig. 5. RSNM comparison between the proposed model and 6T SRAM

The write SNM (WSNM) for both models are illustrated


in Fig. 6. The proposed novel 7T SRAM has two write
margins, one for writing ‘0’ and the other for writing ‘1’. This
is because of the unsymmetrical nature of the 7T SRAM cell.

(b)
Fig. 4. (a)Transient analysis of proposed 7T SRAM, (b)Transient analysis
of 6T SRAM.

As evident from the output of transient analysis, read,


write and hold operation is performed satisfactorily well in
both the models. For the 7T SRAM, separate precharge Fig. 6. WSNM comparison between 6T SRAM and proposed model
signals are used prior to each read and write operation. PC_r
signal is used to precharge RBL just before a read operation. The WSNM for the 7T SRAM is observed to be small
Likewise, PC_w is used to precharge WBL just before a write during the write ‘1’ mode because of the use of single bitline
operation. While, in 6T SRAM, one precharge signal, PC is for writing purpose. But the margin is till fairly manageable
used to precharge 𝐵𝐿 and ̅̅̅̅
𝐵𝐿 just before a read operation. and is compensated by the large margins in other modes. The
Hold SNM (HSNM) for both models are shown in Fig 7.
B. Data Stability
Stability of the data in read, write and hold operation in an
SRAM cell is quantified by Static Noise Margin (SNM) and
is measured for the three different operation modes. SNM is
defined as the maximum amount of noise that can be applied
to the storage nodes before that state stored is flipped and this
applies to all three operating modes. SNM is measured by the
use of butterfly curves and the detail is explained in paper [3].
The read SNM (RSNM) for both the models are shown in
Fig. 5. The read margin is hugely improved by about 3.5
times. This because of the fact than the storage nodes Q and
Q_b are completely isolated from the bitlines. To understand
this better, suppose, node Q of 7T SRAM is storing a ‘1’
(VDD), then node Q_b will store a proper ‘0’ (GND) and will Fig. 7. HSNM comparison between 6T SRAM and proposed model

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 165


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Hold stability was not a problem for the conventional 6T D. Read and write delay.
SRAM, but still it is improved by a small margin in the In addition to the improvements mentioned above, the
proposed model. proposed model also has reduced read and write access delay,
C. Power consumption meaning they can be read or written to faster than the
conventional model. The comparison chart is shown in Fig.
Comparison between the two models in terms of power
9.
consumed is illustrated graphically in figure 8.

Fig. 9. Delay comparison between 6T SRAM and proposed model


(a)
The decrease in read delay can be mainly accredited to the
configuration of transistors in the proposed model such that
critical read delay path is minimized. The critical read delay
path in 6T SRAM comprises of the access transistors (N4 or
N5) and the pull down transistors ( N1 or N2) in series
connection. Whereas in the proposed 7T SRAM, read
happens via the stack transistors N4 and N5 that are sized
double that of other transistors, thereby reducing the
equivalent series resistance and hence the critical read delay
path. One may be confused that the usage of high VT
transistors must decrease the current flowing through it and
hence increase the delay. But this does not happen because of
the fact that the high VT transistors in the cross coupled
(b) inverters do not form any part in the critical read delay path.
One may expect the write delay in 7T SRAM to be more
Fig. 8. Comparison of (a)Dynamic power consumption, (b)Static power
consumption than that of 6T SRAM because of the use of only one bit line
to force a data onto the storage nodes. It is indeed a little bit
The problem of power consumption is one among the more while writing a ‘0’. But the delay for writing ‘1’ and the
major issues faced in the conventional model because of the average write delay (i.e. average of writing ‘1’ and ‘0’) is
off-state leakage currents during steady state. But this has significantly lesser as compared to that of 6T SRAM. This
been greatly reduced thanks to the usage of high threshold can be accredited to the precharge writing mechanism used in
transistors in the back to back inverter. Also the stacked conjunction with the write driver as shown in Fig. 3 and
transistors N4 and N5 also help to further reduce leakage explained in section III(B). Because the bit lines are
power consumption. To understand this better, suppose node prechared prior to a writing operation, writing 1 is much
Q is storing ‘0’ and is in steady state, then N5 and N4 are both easier now, even if it is only with one bit line.
turned off. So, the leakage current through the stack N4 and
N5 is significantly reduced due to the stacking effect V. CONCLUSION AND FUTURE SCOPE
explained in detail in paper [4]. On the other hand, if a ‘1’ is From all the simulation results and examination of the
stored in Q in steady state, then N4 is ON but N5 is OFF, so same, the proposed novel SRAM model is clearly seen to be
it is N5 that will have an off-state current. However, the N5 more enhanced in almost every aspect. First of all, stability of
off-state current is also significantly reduced because the the data stored, which is also stylistically termed as
drain-to-source voltage of N5 will not be VDD due to voltage robustness of the cell is significantly better in the proposed
drop in N4. This can be understood better with the equation SRAM cell. As discussed, this is mainly attributed to the fact
(1). So, as VDS decreases, IOFF decreases exponentially. Also, the storage nodes are completely secluded from the read bit
the dynamic power consumption is also observed to be lines. Secondly, the power consumption is also greatly
reduced owing to the use of minimum sized transistors. reduced both in terms of dynamic and static or leakage power
consumption. This is primarily attributed to the fact that dual
VT transistors are used to make the cross-coupled inverter and
also to the use of minimum sized transistors. Thirdly, the read

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 166


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and write access speed is also observed to be fairly improved [7] Z. Liu and V. Kursun, "High Read Stability and Low Leakage Cache
Memory Cell," 2007 IEEE International Symposium on Circuits and
in the proposed 7T SRAM. This is mainly attributed to two Systems, 2007, pp. 2774-2777, doi: 10.1109/ISCAS.2007.378628.
things: I) reduction of critical read delay path, and II) the [8] Kiran, P & Saxena, Nikhil. (2015). Design and analysis of different
precharge mechanism of the write bit line. Last but not the types SRAM cell topologiesDesign and analysis of different types
least, although a comparison of area occupied is not SRAM cell topologies. 167-173. 10.1109/ECS.2015.7124870.
simulated, a fair deduction can be made that the proposed [9] Rath, Subhashree & Panda, Siba. (2017). Analysis of 6T SRAM Cell
model is more compact despite the use of one extra transistor. in Different Technologies. Circulation in Computer Science.
MCSP2017. 7-10. 10.22632/ccs-2017-mcsp026.
This is because of the use of minimum sized transistors as
[10] Shikha Saun and Hemant Kumar,” Design and performance analysis of
illustrated in Table I and Table II, which is carefully achieved 6T SRAM cell on different CMOS technologies with stability
by the use of dual threshold voltage transistors and the characterization”, 2019 IOP Conf. Ser.: Mater. Sci. Eng. 561 012093,
configuration of transistors in the cell. As a part of future DOI 10.1088/1757-899X/561/1/012093
scope, some more innovations can be added on the proposed [11] M. Bansal and J. Singh, "Qualitative Analysis of 2-bit CMOS
Magnitude Comparator and GDI Magnitude Comparator using FinFET
7T SRAM such as using two bit lines to enhance the writing Technology (18nm)," 2020 International Conference on Smart
performance. Electronics and Communication (ICOSEC), 2020, pp. 1323-1327, doi:
10.1109/ICOSEC49089.2020.9215251.
[12] A. Bhaskar, "Design and analysis of low power SRAM cells," 2017
REFERENCES Innovations in Power and Advanced Computing Technologies (i-
[1] P. N. V. Kiran and N. Saxena, "Design and analysis of different types PACT), 2017, pp. 1-5, doi: 10.1109/IPACT.2017.8244888.
SRAM cell topologies," 2015 2nd International Conference on [13] R. M. Gangadari and D. S. Yadav, "Extraction and Comparative
Electronics and Communication Systems (ICECS), 2015, pp. 1060- Inspection of several parameters of 6T, 8T, 10T SRAM," 2021 First
1065, doi: 10.1109/ECS.2015.7124742. International Conference on Advances in Computing and Future
[2] Neil Weste and David Harris. 2010. CMOS VLSI Design: A Circuits Communication Technologies (ICACFCT), 2021, pp. 119-124, doi:
and Systems Perspective (4th. ed.). Addison-Wesley Publishing 10.1109/ICACFCT53978.2021.9837366.
Company, USA. [14] Bansal, M., Maiya, R.R. (2023). A Taxonomical Review of MOS
[3] Jose, A.A., Balan, N.C. (2016). Static Noise Margin Analysis of 6T Power Transistor for Electronic Circuits and Devices. In: Namrata, K.,
SRAM Cell. In: Dash, S., Bhaskar, M., Panigrahi, B., Das, S. (eds) Priyadarshi, N., Bansal, R.C., Kumar, J. (eds) Smart Energy and
Artificial Intelligence and Evolutionary Computations in Engineering Advancement in Power Technologies. Lecture Notes in Electrical
Systems. Advances in Intelligent Systems and Computing, vol 394. Engineering, vol 927. Springer, Singapore.
Springer, New Delhi. https://doi.org/10.1007/978-81-322-2656-7_22 https://doi.org/10.1007/978-981-19-4975-3_49
[4] V. Kursun and E. G. Friedman, Multi-Voltage CMOS Circuit Design, [15] M. Bansal, R. Arora and R. Bharti, "VLSI Layout: Concept to
242 pp., John Wiley & Sons Ltd., 2006, ISBN # 0-470-01023-1. Realization," 2022 International Conference on Applied Artificial
Intelligence and Computing (ICAAIC), 2022, pp. 1590-1596, doi:
[5] N. Raghav and M. Bansal, "Analysis of Power Efficient 6-T SRAM 10.1109/ICAAIC53929.2022.9792835.
Cell with Performance Measurements," 2017 International Conference
on Innovations in Control, Communication and Information Systems
(ICICCI), 2017, pp. 1-4, doi: 10.1109/ICICCIS.2017.8660819.
[6] Malti Bansal, Vishal Bharti and Vibhor Chander, “Comparison
between Conventional Fast Multipliers and Improved Fast Multipliers
using PTL Logic”, 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1126 012041

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 167


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Simulation of Flight Trajectories of Quadrotor using


MATLAB and Simulink
Akash S Dr.B. Anbarasu
School of Aeronautical Sciences School of Aeronautical Sciences
Hindustan Institute of Technology and Science Hindustan Institute of Technology and Science
Chennai, India Chennai, India
akashspaceaks@gmail.com avianbu@gmail.com

Abstract— The flight trajectories of quadcopter have been Software in the loop is to have different softwares in
simulated in a three dimensional environment using MATLAB controlling copter and plane. Mission planner ArduPilot was
and Simulink. PID and PD controller is used for the pitch, roll used for formation flying simulation in [2]. The ground
and yaw controls of the quadcopter respectively. In the input control station is stable, reliable, flexible and simple while
stage, pitch, roll, yaw, North-East-Down coordinates have been monitoring areas of interest. The operation can take place for
applied to the quadcopter in the simulation environment. both single vehicle and multi vehicle.
Different navigational waypoints have been used to generate
flight trajectories, namely, triangular, quadrilateral and linear Relation between coordinates, position vector and
trajectories. No-fly zones are also included in the simulation attitude vector is derived for quadrotor. MATLAB
environment. optimization toolbox is used. Swarm based multi drone
platform is proposed by integrating aggregation term and
Keywords—Software in the loop simulation, Quadrotors, motion term [3].
Trajectories, Simulink
Rotary wing aerial vehicles are usually of small
I. INTRODUCTION TO UNMANNED AERIAL VEHICLES dimension, and can hover with high maneuverability. They
Unmanned Aerial Vehicles (UAVs) are flying robots that can survey hard to reach spaces like pipelines and bridges, or
can remotely fly and carry no human operators. A Micro can reconnaissance in buildings [4]. Best known types are
Aerial Vehicle (MAV) is an Unmanned Aerial Vehicle of quadcopters and hexacopters. Lithium batteries are a good
length between 15 to 100 cm and weigh between 50g to power source due to their low weight.
2kgs. With a flight range of 25 km to 40 km. Classification Comparison of controllers is done on the basis of speed
of UAVs are based on operational purpose, fabrication and response. PID has more stability by bringing loops closer
materials, and complexity. A UAV can be a fixed wing, to negative side of s-plane. LQR are more robust, produce
flapping wing, or rotary wing UAV. Their applications low steady state error, and higher response speed. PID has
include military-based scouting as well as surveillance and delayed response, and is a bad choice when system needs a
mapping for meteorology and disaster response. fast parameter update [5].
Fixed wing MAVs is made of rigid wings, a fuselage and Gazebo is an open source software [6]. Simulated
a tail to cover a wide range of operational environments. A hardware is accurate to real ones. Simulation is limited to a
motor and propeller is the propulsion system. Flapping wing few robots. Gazebo sensory realism is time-saving. It has a
MAVs are made up of flexible flapping wings while using an simple interface and realistic environment.
actuation mechanism for the flapping motion. Rotary wing
MAVs have an advantage of flying in confined spaces, and Actual drone tests require expensive hardware. The tests
they can also hover at a place. They are made up of rotating consume time and need a trained safety-pilot. Simulations
propeller-based wings. reduce testing time, make debug easier, and reduce crashes
of real UAVs [7].
Different waypoint navigations, namely, triangular,
quadrilateral and linear have been introduced in this work to
navigate in the outdoor environment without colliding with
obstacles.
II. LITERATURE REVIEW
MAVs have small mass and moment of inertia, and
complex non- linear dynamics, while operating in low
Reynold’s number aerodynamic regimes. Integral LQR
(Linear Quadratic Regulator) has the best possible
performance with respect to some given measure of
performance, while PID (Proportional Integral Derivative) is
a widely applied feedback control of simple structure. LQR
also has better dynamic performance in transition time and Fig. 1. Quadrotor drone in simulation environment
speed [1].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 168


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Command
Command

Visualization
Actuator

Flight
Control
Sensor System
Sensors
Data Airframe
State

Environment
Environment

Fig. 2. Simulink model of drone

The simulation of Parrot Bebop 2 quadrotor is done in formation in GCS [2]. A GCS can be wirelessly
MATLAB and Simulink. Parameters of drone are noted. communicating instructions to a UAV.
Equations of dynamic motion of drones were done. System is
a PID controlled system. The quadrotor experienced crashes The GCS system consists of the ground control station,
and unwanted movements in the vertical direction of the with data terminals for wireless command of the UAV. The
simulated system [8]. work of mission planning, platform monitoring, mission
monitoring, and data recording are done. Existing man-
PX4 open source libraries are helpful to develop UAVs machine interaction control system of UAV ground control
with the basic controller code for flight control. PX4 can be station is mainly through a dual-level operating system,
built and uploaded to an open hardware Pixhawk, which is a touch screen, mouse and keyboard [9].
very popular hardware for UAV applications [10].
Source waypoint and destination waypoint for the
The most popular type of UAV is multirotor UAVs [11]. navigation of the vehicle have been included in the graphical
The application of quadrotor includes agriculture, surveying, user interface of the ground control station. Based on the
military surveillance, and mapping [12]. A UAV can also waypoint input specified in the GCS, the vehicle can be able
help in maritime patrols as they are relatively inexpensive to navigate in the simulated environment.
with more degrees of autonomy and stealth [15].
B. Simulink Model
Recently, a quadrotor movement control method has been The simulink model is shown in Fig. 2. The command
implemented for people with disabilities by detecting eye block selects aircraft command from a signal editor, a
movements [13]. A human movement observation can be joystick or a data file. The sensor block involves
done using a camera sensor and a Kinect SDK sensor [14]. measurement of altitude and position from the sensors
This can help in area surveillances. present in the UAV. For altitude measurement, a sonar
sensor is used. For position measurement, an inertial
III. SOFTWARE IN THE LOOP SIMULATION
measurement unit is used. The flight control system involves
Software in the loop simulation is to evaluate input and transfer of commands signal to the actuators of quadrotor
output conditions for software systems. The simulation can motors. The airframe refers to the equation of the degrees of
be mathematical or practical. It uses machine language freedom in a quadrotor. Using Aerospace Blockset
derived from both high level and low level programs. environment blocks, the environment block is created. The
A. Ground Control Station (GCS) purpose of the visualization block is to visualize data. The
inner loop of the model must be functioning at an higher
It is a human control and command station for UAVs. It frequency than the outer loop. A PD controller is used for
can be used for defining the formation flying control of position control.
multirotor UAVs. With the commands of “Navigation” and
“Do”, it can simulate copter vehicles, fix navigation C. Trajectory Generation
waypoints and can plan a home position. GCS can also act as The trajectory generation can be used to generate drone
a virtual cockpit, or as a working principle through trajectories in the simulation environment. Trajectories are
simulation in the loop. Military crafts can maintain flight generated using Dubin’s model. A robot’s pathway is made
direction and altitude in GCS. Swarms can be set in flying of combinations of left turns, right turns and straight paths.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 169


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

3. (a) 3. (b)

3. (c) 3. (d)

3 (e) 3. (f)

Fig. 3. Generated trajectories (a) Triangular, (b) Triangular with no-fly zone,(c) Quadrilateral, (d) Quadrilateral with no-fly zone, (e)Linear, (f)
Linear with no-fly zone

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 170


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Definition of the required parameters of waypoints and deviations in trajectories. An IMU sensor measures the
no-fly zones is done. In the two dimensional map, with East simulated quadcopter’s angular rates and translational
on the x axis and North on the y axis (where the units are in accelerations, while a sonar sensor measures its altitude. The
meters), the mapping of trajectory is done. quadcopter poses can be defined in the simulation
environment, using the north and east positioning in
IV. EQUATIONS OF QUADROTOR DYNAMICS meters(m), heading of quadcopter in degrees(°) from north
A. Translational Dynamics and the turning curvature in meter inverse(m-1) and the turn
direction in clockwise or anti clockwise directions.
m = −mgEz + uT R( , , ) Ez The no-fly zones are considered to be a circular region in
this experiment. For the no-fly zones, the position of the
Where m is quadrotor mass, uT is total motor thrust, center of the zone and the radius of the zone is taken as input
 is (x y z ) ie. the position of the quadrotor and E z
T parameters, along with the margin of safety. These
parameters are taken in meters(m), except for the curvature,
is (0 0 1) ie. the drone position at (0, 0, 1). The
T
which is in meters inverse(m-1).
rotation matrix R( ,  , ) is dependent on the Euler The trajectory represented by a sequence of red lines,
angles of roll(  ), pitch(  ) and yaw( ), as well as the blue lines, black markers and green circles. The red lines
show the trajectories, the blue lines show the headings, the
attitude matrix  = (   )T . black markers show the changes in pose or trajectory of the
drone, and the green circles represent no-fly zones.
B. Rotational Dynamics
I B = −B  IB +  The development of trajectories is done considering
various waypoint combinations. The triangular trajectory is
Where  is the cross product and achieved by the use of four waypoints, where the fourth
waypoint refers back to the first waypoint, as shown in Fig. 3
I = diag( I x , I y , I z ) is the inertial matrix with respect to (a) and Fig.3 (b) respectively. Similarly, the development of
principal axes for I x being the moment of inertia along x a quadrilateral trajectory is achieved by the use of five
waypoints, where the fifth waypoint coincides with the first
axis, I y being the moment of inertia along y axis and I z waypoint, thus closing the loop. It is shown in Fig. 3 (c) and
being the moment of inertia along z axis. Fig.3 (d) respectively. A straight line trajectory is attempted,
both in the presence of a no-fly zone and in the absence of a
B = (x y z )T is the angular velocity, where no-fly zone. They are shown in Fig. 3 (e) and Fig.3 (f)
respectively.
 x is the angular velocity along x axis,  y is the angular
The changes in trajectory or pose are then noted based on
velocity along y axis, and z is the angular velocity along z the number of black markers on the map. Use of higher level
 = (u u u )T
languages like C++ can be used for the real-time waypoint
axis. is the critical torque vector. navigation of the quadrotor. Factors like wind, shear, and
turbulence can be taken into account for real-time operations
Where u , u , u are the inputs for roll, pitch and yaw of the proposed model.
respectively.
VI. CONCLUSION
V. RESULTS
In a three dimensional environment using various
Trajectories are generated for the quadrotor drone using navigational waypoints, different flight trajectories, namely,
the navigational waypoints. In the waypoint property, the triangular, quadrilateral and linear, have been developed for
coordinates of the waypoint, along with the heading of the the quadrotor simulation in a virtual environment using
drone, and the curvature of the drone path are the input MATLAB and Simulink. Different controllers are used for
parameters. The PD controller aligns the quadrotor from the control of the vehicle in different flight path trajectories.
Navigation in the outdoor environment without collision is
TABLE I. TRAJECTORY TABLE done in the simulation. The conclusion reached is that the
number of changes in the pose of the quadrotor is increased
Trajectory details
for the inclusion of no-fly zones. This is due to the quadrotor
Changes
Trajectory Number of
in having to avoid the no-fly zones in the flight path.
Number of waypoints no-fly
trajectory
zones REFERENCES
or pose
Triangular 4 0 9 [1] B.S. Anjali, A. Vivek, J.L. Nandagopal,Simulation and Analysis of
Integral LQR Controller for Inner Control Loop Design of a Fixed
Triangular with no-
4 1 12 Wing Micro Aerial Vehicle (MAV),Procedia Technology,Volume
fly zone
25,2016, Pages 76-83, ISSN 2212-0173,
Quadrilateral 5 0 10 https://doi.org/10.1016/j.protcy.2016.08.083.
Quadrilateral with [2] A. Kaviyarasu, A. Saravanakumar and K. Elumalai, "Software in the
5 2 18 Loop Simulation of Formation Flying of Multi Rotor UAV," 2019
no-fly zone
International Conference on Intelligent Sustainable Systems (ICISS),
Linear 2 0 4 2019, pp. 336-340, doi: 10.1109/ISS1.2019.8908015.
Linear with no-fly [3] H. Kim and H. Ahn, "Realization of swarm formation flying and
2 1 7
zone optimal trajectory generation for multi-drone performance

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 171


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

show," 2016 IEEE/SICE International Symposium on System [10] K. Dang Nguyen and T. -T. Nguyen, "Vision-Based Software-in-the-
Integration (SII), 2016, pp. 850-855, doi: 10.1109/SII.2016.7844106. Loop-Simulation for Unmanned Aerial Vehicles Using Gazebo and
[4] M. Hassanalian, A. Abdelkefi,Classifications, applications, and PX4 Open Source," 2019 International Conference on System Science
design challenges of drones: A review,Progress in Aerospace and Engineering (ICSSE), 2019, pp. 429-432, doi:
Sciences,Volume 91,2017,Pages 99-131,ISSN 0376-0421, 10.1109/ICSSE.2019.8823322.
https://doi.org/10.1016/j.paerosci.2017.04.003. [11] S. N. Yaşar and E. Karaköse, "Trajectory Control of Quadcopter in
[5] S. Khatoon, D. Gupta and L. K. Das, "PID & LQR control for a Matlab Simulation Environment," 2022 International Conference on
quadrotor: Modeling and simulation," 2014 International Conference Decision Aid Sciences and Applications (DASA), 2022, pp. 1127-
on Advances in Computing, Communications and Informatics 1131, doi: 10.1109/DASA54658.2022.9765119.
(ICACCI), 2014, pp. 796-802, doi: 10.1109/ICACCI.2014.6968232. [12] S. N, T. Indiran and S. Chokkadi, "Simulation Studies of Nonlinear
[6] N. Koenig and A. Howard, "Design and use paradigms for Gazebo, an Model Predictive Controller for Hexsoon EDU 450 Quadrotor
open-source multi-robot simulator," 2004 IEEE/RSJ International Trajectory Tracking," 2022 International Conference on Sustainable
Conference on Intelligent Robots and Systems (IROS) (IEEE Cat. Computing and Data Communication Systems (ICSCDS), 2022, pp.
No.04CH37566), 2004, pp. 2149-2154 vol.3, doi: 909-913, doi: 10.1109/ICSCDS53736.2022.9760984.
10.1109/IROS.2004.1389727. [13] E. Kavichai, R. Huang and S. -W. Woo, "Quadcopter Movement
[7] Furrer, Fadri & Burri, Michael & Achtelik, Markus & Siegwart, Control Using Image Processing Techniques," 2019 16th International
Roland. (2016). “RotorS – A Modular Gazebo MAV Simulator Conference on Electrical Engineering/Electronics, Computer,
Framework.” doi: 10.1007/978-3-319-26054-9_23. Telecommunications and Information Technology (ECTI-CON),
2019, pp. 939-942, doi: 10.1109/ECTI-CON47248.2019.8955346.
[8] G. Silano, P. Oppido and L. Iannelli, "Software-in-the-loop
simulation for improving flight control system design: a quadrotor [14] Ranganathan, G. "Real Life Human Movement Realization in
case study," 2019 IEEE International Conference on Systems, Man Multimodal Group Communication Using Depth Map Information
and Cybernetics (SMC), 2019, pp. 466-471, doi: and Machine Learning." Journal of Innovative Image Processing
10.1109/SMC.2019.8914154. (JIIP) 2, no. 02 (2020): 93-101.
[9] Y. Zhou, J. Hou and Y. Gong, "Research and Application of Human- [15] G. M. De Lima Filho, A. Passaro, G. M. Delfino, L. De Santana and
computer Interaction Technology based on Voice Control in Ground H. Monsuur, "Time-Critical Maritime UAV Mission Planning Using a
Control Station of UAV," 2020 IEEE 6th International Conference on Neural Network: An Operational View," in IEEE Access, vol. 10, pp.
Computer and Communications (ICCC), 2020, pp. 1257-1262, doi: 111749-111758, 2022, doi: 10.1109/ACCESS.2022.3215646.
10.1109/ICCC51575.2020.9344892.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 172


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Effectual Home Automation using ESP32 NodeMCU


R. Niranjana Arvind S
Department of ECE Department of ECE
Sri Krishna College of Engineering and Technology, Sri Krishna College of Engineering and Technology,
Coimbatore, India. Coimbatore, India.
niranbme@gmail.com 21euec501@skcet.ac.in

Vignesh M Vishaal S
Department of ECE Department of ECE
Sri Krishna College of Engineering and Technology, Sri Krishna College of Engineering and Technology,
Coimbatore, India. Coimbatore, India.
20euec165@skcet.ac.in 20euec170@skcet.ac.in

Abstract - The fourth technology revolution is the one we're in II. LITERATURE SURVEY
right now. As we live in a time where the internet and its use are
constantly expanding. The idea of a smart device is growing in A. Automation
acceptance. The availability of web and software system A low-cost home automation system with autonomous control
technologies is making our lives easier. A smart house could be one features was developed by Eleyan and J. Fallon et al. [3] using an
of the major features of IoT. In this paper, we offer an inexpensive, Android application and MQTT-broken communication. The
useful, and Internet of Things-based home automation system. The suggested solution will allow customers to remotely manage
Blynk ASCII text file IoT server supports this technique. In our household appliances using an Android smartphone. Relays and
project, the Esp32 module may link a server to the internet,
a NodeMCU (ESP8266) microcontroller were suggested as a
way to remotely control electrical switches from a Node server
allowing us to operate any linked home appliances. Between the
by H. K. Singh, S. Verma, S. Pal, et al. [7].
esp32 and the electrical appliances, there will be a relay that
controls the 230-volt appliances by switching a certain low voltage
from the esp32. B. Energy efficient Home Automation
Keywords: Blynk app, Internet of Things, Smart home, Internet, The primary focus should be on remotely activating and
Wi-Fi Module(Esp32) managing various smart home devices, according to a proposal
made by B. R. K. Kodali and S. Yerroju et al. [4]. Utilizing
energy more wisely is possible thanks to home automation
I. INTRODUCTION technology. The ESP8266 board is very desirable and
advantageous since it provides the IoT system with the requisite
We need to conserve energy for present and future
ultra-low power consumption capability at an inexpensive price.
generations because the demand for it in our everyday lives is It also transforms a house into a residence.
increasing significantly. This initiative's main objectives are to
lower electricity bills and power consumption. The best approach
to conserve energy in a home is through home automation. We C. View and performance of home automation
can use IOT to access and manage home equipment in a smart A technique for IoT-based wirelessly programmable smart
home [1]. Through the internet, it has the capacity to turn non- home automation was proposed by K. Agarwal, A. Agarwal,
smartgadgets into smart ones. It transforms a house into a smart and colleagues. Home automation solutions leverage the IoT to
houseand offers more powerful means of controlling household remotely monitor and control household appliances [5]. This
approach makes use of a specifically designed website
appliances [2]. This enables the user to operate home
connected to the internet or a local area network to manage
automation equipment like lights, fans, and other items without standard home appliances from smartphones or desktop
using their hands [8]. The smart home market is anticipated to computers (LAN).
grow by 17%from 2019 to $ 141.2 billion by 2023 [10]. We can
access our household appliances from anywhere in the world D. Home automation with cloud organizing
thanks to thistechnology. Most of the earlier systems were built
using these DTMF or Bluetooth-based methodologies [11]. Y.Wenbo, W.Quanyu, and colleagues concluded that,
Users are connected to the connectivity of things through the because there are likely many undiscovered IoT apps and
Internet of Things (IoT), which makes life easier [12]. The services, object resolution methodologies can also be defined
by an IoT reference model [6]. From a public policy aspect, it is
focus of IoT is now on "Thing to Thing"[13].
vital to confirm that IoT applications, such as those for aid,
energy management, transportation, or other cutting-edge
purposes, can have reasonable access to current infrastructure.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 173
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. SOFTWARE DESCRIPTION
III. LIMITATIONS OF EXISTING WORK
A. Arduino IDE
When compared to prior projects, ours makes extensive 1. The main purpose of the open-source Arduino IDE software is
use of the ESP32, which connects to the internet and enables us
to construct a compiler that turns code into Arduino modules.
to control the connected appliances from a distance. Comparable
to other Wi-Fi modules, it is inexpensive. Through the BLYNK 2. Given that it is the official Arduino software, the code is far
app, ESP32 gives us the convenience of remotely managing too simple to compile.
home appliances, such as lights, fans, and TVs. As more people
utilise smart home gadgets, security will, like it does with other 3. It is easily available on operating systems such as MAC,
computing equipment, become a bigger problem. There will Windows, and Linux and operates on the Java platform. It comes
undoubtedly be a variety of security issues, which will lead to with built-in features and instructions that are necessary for
the emergence of smart home security software and hardware. debugging, altering, and compiling programme, inside the
However, because of the use of the Blynk app in our project, the environment.
security concerns are reduced. One system can be used to
operate all the smart home gadgets thanks to integrated smart 4. The Arduino Uno, Arduino Mega and Arduino Micro are justa
home systems offered by previous exiting works. The risk here few of the various Arduino module varieties.
is obvious: If hackers get into the system, they may take over
your smart home and control everything. 5. Each contains an integrated microprocessor that can really be
programmed and accepts data in the form of code.
6. The main code, commonly referred to as a sketch, imported
IV. METHODOLOGY
into the IDE platform will eventually generate a HEX file,
STEP 1- Control Relays with Internet Using Blynk which will be shipped and downloaded to the board controller.
STEP 2- Control Relays Without Internet Using Push- buttons 7. There are two key components to the IDE environment.
Compiler and editor. The first component is used to write the
STEP 3- Configure the Blynk App for the ESP32 required code, which is then combined and uploaded to the
STEP 4- Add the button contrivances in Blynk app appropriate Arduino module.

STEP 5- Law for Blynk ESP32 Home robotization


B. BLYNK IoT Cloud
STEP 6- Program the ESP32 With Arduino IDE Blynk is an IoT platform for iOS or Golem smartphones that
STEP 7- Connect the Home Appliances allows for the online management of Arduino, Raspberry Pi,
and Node-MCU. With the use of this application, a graphical
STEP 8- Turn on the Supply user interface (GUI) or Human Machine Interface (HMI) can be
created by gathering available widgets and supplying the
necessary addresses.
Built for the Web of Things, Blynk. Remotely manage
IoT cloud hardware, see device data, store data, visualize, and perform
Physical other cool tasks.
switch
It analyses all incoming and departing instructions and enables
Electrical
Appliances communication between the server and all frequently used
hardware platforms.
Blynk When a user clicks the Button in this app, the data is transferred
Relay to the Blynk Cloud and then mysteriously makes its way to the
installed devices. Everything occurs in a split second and works
in the opposite direction.

C. Working Of Blynk App


ESP32
Internet Wi-fi The new Blynk framework makes it simple to build user
module interfaces for iOS and Android smartphones to maintain and
control your hardware projects. Blynk app serves as the
intermediary server in our project between the IoT device and
Fig 1. Block diagram the user. The User will be able to control the device’s state by
utilizing the Blynk programme, which sends the Device’s state
via the Internet. After installing the Blynk program and adding
switches, sliders, charts, and other features to the174desktop, you
978-1-6654-6084-2/22/$31.00 ©2022 IEEE
may build a project panel. By using gadgets, you may show
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

sensor data or turn on and off pins B. Why ESP32?


How to configure Blynk app,
The ESP32 is intended for Internet of Things applications that
• Create a Blynk Account require less power. It is suitable for the majority of portable IoT
• Create a New Project devices because to its high processing power, integrated Wi-Fi,
Bluetooth, and Deep Sleep Operating capabilities, as well as its
• Choose Your Hardware 520 KB of SRAM, 448 KB of ROM, and 4MB of Flash memory.
• Auth taken The ESP32 has more GPIO pins than the Arduino Uno, which
allows it to accommodate more sensors and modules. Additionally,
• Add a Widget it now has extra analogue and PWM pins. Even without factoring
• Run the project. in the cost of the Wi-Fi shield, it is nearly five times less expensive
than the Arduino Uno. That’s really impressive for a board with
twice as many GPIO pins. The primary incentive to switch to the
ESP32 is likely its built-in Wi-Fi and Bluetooth capability.
Without needing to purchase shields, you can communicate
information wirelessly thanks to the built-in interconnectivity
capability. By doing this, you might reduce the cost of the
hardware and battery life for your ESP32-based IoT projects.

C. 2-Channel Relay

The 2-Channel 5V Relay Module is an interaction board for


relays that can be entirely controlled by several devices, such as
Arduino, AVR, PIC, ARM, and others. We'll attach an Arduino
signal pin to operate the relay, connect over Wi-Fi to arm the
connected pin by switching it to output mode with an analogue
instruction, and then arm the linked pin. The pin can be used to
Fig 2. Working of Blynk app send digital commands to the pin to turn the relay on and off once
it has been set to output mode by setting the pin to 1 or 0.

VI. HARDWARE DESCRIPTION


A. NodeMCU ESP32

It is a low cost IoT platform with open source. It can connect


objects through the internet and make them to transfer data using
the Wi-Fi protocol. Support for 32-bit ESP32 MCUs was
subsequently added. The relay that regulates the AC power is
managed by a Node-MCU. Relays are electrical switches that are
used to safeguard electrical equipment. Typically, relay modules
use 5V/12V. Electrical devices are mechanically switched using
electromagnets. Relays’ main job is to manage high voltage and
run low voltage equipment. Since there is no direct contact
between the Node-MCU and the device, it is regarded as safe to
use.

Fig 4. Circuit diagram

VII. PROPOSED WORK

Our proposed solution uses a WIFI module, Blynk IoT


cloud, and a physical switch for backup, since we use Blynk IoT
for it, it is more secure than any other IoT device as the auth code
of the project has been programmed to the Wi-Fi module. our
solution offers both physical and IoT switch for switching so even
in the network issues time the appliances can be controlled by the
physical switch. Also, it is low cost with more security. In present
scenario, usage of home appliances has become an important part
and parcel of our life and home automation using ESP32 is
Fig 3. ESP 32 Wi-Fi module effective.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 175
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I. Difference between existing and proposed method.

Existing method Proposed method


High cost. Low cost.
Less efficient. More efficient.
Not compatible with all Compatible with all the
electrical devices. electrical devices.
Not compact. Compact.

VIII. NOVELTY

The older approaches that were used had a lot of issues.


The major goal is to design and execute a creative, cost- effective
automated home system. For connection between the server and
the electronic items, we employ a Wi-Fi-based technique. The
appropriate software and hardware will be used to build this
automated smart home system. Smart appliances are built using a
low-cost ESP8266 Wi-Fi module device. The customer would be
able to remotely control home appliances including lights, fans, Fig 5.2 Output at On Condition
and TVs through an Android app.

ESP8266 is inferior to ESP32 in quality. You may X. CONCLUSION


develop significantly bigger projects on just one SOC because to
its quicker CPU and adequate memory size. You can count on In this project, we demonstrated a low-cost Internet of
ESP32 to give you cutting-edge security. One of ESP32’s Things-based smart home automation system. The main objective
specialties is the robust security feature. It supports dual-core of our project was to remotely control electrical appliances using
speeds between 160 and 240 MHZ. With Bluetooth or Wi-fi, you the internet. Everybody’s home is a cosy refuge, and we always
can monitor and operate your gadget for a very minimal cost. You appreciate anything that could enhance the atmosphere while also
get more GPIOs from it. You can get a high speed of 150Mbps making our lives a little bit simpler. Even though the general
from ESP32. public is just a corollary benefactor, the physically disabled are the
true winners in this scenario. In order to communicate with
IX. RESULT DISCUSSION AND OUTPUT household appliances and fix all the current issues, our solution
proposes using an ESP32 Wi-Fi module and a mobile device
This study demonstrated the idea of smart home linked to the internet. As is evident, there are numerous problems
automation Using a low-cost Wi-fi module and an Android smart with earlier methods that were in use. The utilisation of IoT for an
phone. IOT presents several challenges because it is a cutting- advanced, energy- efficient, and self-learning home automation
edge technology that can be used for home automation. One of system is the main topic of this section. Designing and
the primary issues with a smart home setting is the lack of implementing a smart, cost- effective automated home system is
security. The esp32 module in our project will connect to the the major goal. For communication between the server and the
internet and give us the ability to remotely operate the linked home appliances, we are employing a Wi-Fi based technique. This
appliances. A relay that switches for a certain low voltage coming automated smart home system will be created with the use of
from the esp32 and controls the appliances with the 230v pertinent software and hardware. Through an Android app, the
connected to it will be placed between the esp32 and the electrical user will be able to remotely manage household items including
appliance. lights, fans and TVs.

REFERENCES

[1] S. Dash and P. Choudekar, “Home Automation using Smart


Devices and IoT,” 2021 9th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and
Future Directions) (ICRITO), 2021, pp. 1-5, doi:
10.1109/ICRITO51393.2021.9596533.

[2] Hamdan, Yasir Babiker. "Smart Home Environment Future


Challenges and Issues-A Survey." Journal of Electronics 3, no. 01
(2021): 239-246.

[3] A. Eleyan und J. Fallon, “Internet-of-Things-Based Home


Automation Using Android Applications”, International
Fig 5.1 Output at Off Condition
Symposium on Networks, Computing and Communications
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 176
(ISNCC)2020,2020,S.14,doi:10.1109/ISNCC49221.2020.9297320
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[4] K. Agarwal, A. Agarwal and G. Misra, “Review and


Performance Analysis on Wireless Smart Home and Home [15] https://images.app.goo.gl/nAhCJgse8pZPcWCW8
Automation using IoT,” 2019 Third International conference on I-
SMAC (IoT in Social, Mobile, Analytics and Cloud) (I- SMAC),
2019, pp. 629-633, doi: 10.1109/I- SMAC47947.2019.9032629.

[5] H. K. Singh, S. Verma, S. Pal and K. Pandey, “A step towards


Home Automation using IOT,” 2019 Twelfth International
Conference on Contemporary Computing (IC3), 2019, pp. 1-5,
doi: 10.1109/IC3.2019.8844945.

[6] T. Chaurasia and P. K. Jain, “Enhanced Smart Home


Automation System based on Internet of Things,” 2019 Third
International conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud) (I-SMAC), 2019, pp.709-713, doi:
10.1109/I-SMAC47947.2019.9032685.

[7] A. Jain, P. Tanwar und S. Mehra, “Home Automation


Systems Using the Internet of Things (IOT)”, 2019 International
Conference on Machine Learning, Big Data, Cloud and Parallel
Computing (COMITCon), 2019, S300-305, Doi:
10.1109/COMITCon 2019.8862201.

[8] B. R. K. Kodali and S. Yerroju, “Energy Efficient Home


Automation Using IoT,” 2018 International Conference on
Communication, Computing and Internet of Things (IC3IoT),
2018, pp. 151-154, doi: 10.1109/IC3IoT.2018.8668155

[9] D.G. Lokhande und S.A. Mohsin, “Internet of Things for


Ubiquitous Smart Home Systems”, 2017 1st International
Conference on Intelligent Systems and Information Management
(ICISIM), 2017, S. 314-320, doi :10.1109/ICISIM20178122191.

[10] P. J. Rani, J. Bhaktakumar, B.P. Kumar, U. P. Kumaar und


S. Kumar, “Voice Controlled Home Automation System
victimisation language process (NLP) and net of Things (IoT),
2017 third International Conference on Science Conference thirty
four Technology Engineering & Management
(ICONSTEM),2017,S.368373,Doi:10.1109/ICONSTEM.2017.82
61311.

[11] M. Asadullah and K. Ullah, “Smart home automation system


using Bluetooth technology,” in International Conference on
Innovations in Electrical Engineering and Computational
Technologies (ICIEECT), 2017.

[12] G. V. Vivek und M. P. Sunil, “Using wireless local area


network to change IOT Services – ZigBee Gateways for Home
Automation Systems,” 2015 IEEE International Conference on
analysis in procedure Intelligence and Communication Networks
(ICRCICN), 2015, S. 77–80 , doi: 10.1109 /IKRK.2015

[13] Y. Wenbo, W. Quanyu and G. Zhenwei, “Smart home


implementation based on Internet and WiFi technology,” 2015
34th Chinese Control Conference
(CCC),2015,pp.90729077,doi:10.1109/ChiCC.2015.7261075.

[14] Y. Wenbo, W. Quanyu and G. Zhenwei, “Smart Home


Implementation Based on Internet and WiFi Technology”, 2015
The 34th China Control Conference (CCC), 2015, S. 9072-9077,
doi:10.1109 / Chick. 2015.7261075.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 177
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Design and Analysis of a Meta Material based


Nested Circular Split Ring Resonator for
Terahertz Applications
Swathi Dasi Swathi Dasi Dr. G Manmadha Rao
Scholar ,Department of ECE Assistant Professor,Department of ECE Professor,Department of ECE
Andhra University PVP Siddhartha Institute of Technology Anil Neerukond Institute of Technology
Andhra pradesh,India Andhar Pradesh, India and Sciences
swathi.d@pvpsiddhartha.ac.in dswathi289@gmail.com Andhra Pradesh,India
profmanmadharao.ece@anits.edu.in

significant with the rapid growth of terahertz innovation.. In this


Abstract—In this paper nested circular split ring paper, a comparative study of circular SRR is made by increasing
resonator structure is implemented using metamaterials at the no of rings.
terahertz frequency range. The mathematical analysis of a
resonator structure is made to estimate the resonating
frequency. Transmission characteristics of a resonating II. DESIGN EQUATIONS
structure are extracted using CST software to demonstrate the
behaviour of metamaterials at tera hertz frequency. This Split-ring resonators (SRRs) consist of concentric metallic
paper comprises the investigation of a nested circular split rings in a square or circle form are etched onto the dielectric
ring resonator frequency response ,that is by increasing the substrate. At one end or both ends, they have gaps or splits. The
no of circles .The simulation results shows that by increasing splits are the structural inhomogeneities, resonance wavelengths
the no of circles, no of resonating frequencies also increases that are substantially longer than the rings diameter which help
that is at 1.2THz ,2.1THz and 2.42 THz which is used as a to support SRR. The splits or gaps in the rings creates a
multiband antenna and also we can observe the absorbivity capacitance with a high value, where the relationship between
at terahertz frequency regime which is used for imaging and the capacitance and the resonant frequency is inverse. This
sensing applications . significant capacitance enables the resonator to demonstrate
resonance at frequencies that are far higher than its dimension.
Keywords—Terahertz(THz),Resonant Frequency, Splitring The split ring resonator's diameter is greater than the resonant
resonator, absorber, Meta materials, permittivity, permeability wavelength consequently, quality rises. Based on it, we may
conclude that the SRR's shape, resonant frequency, and
I. INTRODUCTION associated attributes are interrelated. At resonance, current loops
are produced when the rings are subjected to a uniform, time-
In designing metamaterials the split ring resonator varying magnetic field. The split ring resonator acts as an LC
structure is frequently employed to achieve negative effective resonator because of the enormous capacitance from the splits,
permeability. At resonance the size of these structures is very which completes the closed-loop for current circulation. The
small compared to free-space wavelength and compared to the resonance phenomenon's huge capacitance and current
wavelength at the desired frequency, the dimensions are just a circulation lower the resonator's electric size. Split ring
tenth of that value . By regularly aligning structures with negative resonators employ inter element spacing and various diameters
permittivity and negative permeability, double negative (DNG) for higher frequencies and smaller sizes. Nestled split rings, rod
media or negative index materials (NIM) can be created. Split split rings, spiral split rings, distorted split rings, and single split
ring resonators can be used to achieve negative permeability rings are among the several types of SRRs.
while conducting wires are used to achieve negative
permittivity[1] which is showed by pandey. Different researchers
have experimented with many SRR configurations, including
hexagonal (H-SRR), square (S-SRR), and circular (C-SRR). for
employing the SRR as perturbations or realizing artificial
magnetic material to create various passive planar circuits. A
thorough analysis of circular and square split ring resonators has
been conducted[1]-[7]. There have been several uses for C-SRR,
S-SRR, and H-SRR in passive planar circuit design during the
past few years, including filter, power divider, duplexers, and
phase shifters. [8]-[12]. THz waves have a wavelength between
30μm and 3 mm and have a frequency between 0.1 and
10THz[13,14]. The terahertz (THz) sector has recently
demonstrated a wide range of applications, including
spectroscopy, communication, sensing, imaging, research,
medicine, etc. [15-17]. For applications of THz innovation,
research on THz devices such as polarizers, modulators, switches, Figure 1: Structure and Equivalent circuit of a single split ring
waveguides, antennas, and bandpass filters is particularly
important.[18-20]. Metamaterials (MMs), have unique properties resonator
compared to other materials available in nature , The THz area
has seen a lot of interest in artificial magnetism and
electromagnetically induced transparency (EIT), two features that
distinguish metamaterials (MMs) from other materials found in
nature. To enhance terahertz imaging capabilities A practical tool
for determining frequency or wavelength is the parallel plate
waveguide (PPWG). Since all the devices with low transmission
loss can couple free-space terahertz wave. It becomes increasingly

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 178


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 3: circular split ring resonator model using


CST software

Where fr represents the resonating frequency, L


represents the inductance of a circuit, C is a circuit's overall
capacitance, while w is a ring's width. R stands for the ring's
inner diameter, g for the split gap, and h for the ring's height
relative to the substrate. From the design equations, it is
clear that we may make oscillators, mixers, or filters out of
SRRs that perform flawlessly at the given resonant
frequency by varying the radius, breadth, length, and height Figure 4:S11of a circular split ring resonator with one ring
of single split- ring structures.

Figure 5 shows a split ring resonator's construction with two


III. PROPOSED UNIT CELL STRUCTURE rings each with a dimension of 3µm width and the distance
between the first ring and second ring is also 3µm. Figure 6 from
the simulation results of a two-split ring resonator illustrates the
The split ring resonator designed consists of three layers .It rise in the number of resonances at frequencies of 1.2, 1.4, and
uses a lossy poymide substrate having a thickness of 26 m, a 2.1 THz.
dielectric constant of ε=3(1+i0.06)[29]. Lossy gold with a
conductivity of =4.56107S/m and a thickness of 0.4 m was used to
create rings with a circular split on the top side and metallic
continuous layer. Using a continuous metal plane on the reverse
side that has a thickness of 26 m and offers zero transmission
(T(w) = 0). the proposed structure consisting of three rings , each
of the three rings in the suggested construction resonates at a
distinct frequency, resulting in a structure that resonates at three
separate frequencies.

Figure 5: Two circular ring resonator model using CST


Software

Figure 2: Geometry of split ring resonator (all units in µm)

IV. SIMULATION RESULTS AND DISCUSSION


Figure 6 : S11of a circular two split ring resonator
Figure 1 shows the proposed absorber with one circular split
ring resonator Figure 2 represents the Figure 7 shows the resonator with three split rings with a width
reflectioncoefficient(S11(dB))curveobtained by simulating the of three micro meter and the distance between third ring and
figure 1 structure using FDTD method .It is observed that the second ring is three micrometers and third rind and first ring is
unit cell resonates at a frequency of 1.2 THz and 2.14THz. nine micrometers. The simulation results of a nested split ring
resonator with three rings that resonate at frequencies of 1.2, 1.4,
2.1, and 2.49 THz are shown in Figure 8.By observing the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 179


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

results by increasing split rings in a structure no of resonances are the result the absorptivity of the structure is 68.6 % which is
increasing ,which is useful terhertz applications increased compared to one split ring structure.

Figure 7: Three circular ring resonator model using CST


software
Figure 10: Absorptivity of a circular two split ring resonator

Figures 11 shows the absorptivity of the one circular split


resonator structure.from the result the absorptivity of the
structure is 70 %. By comparing the results single split ring
resonator shows better performance compared to nested split ring
structure.

Figure 8: S11of a circular three split ring resonator

One of the application of metamaterial split ring resonator is


absorber . The method for obtaining the absorptivity A(ω) is[30]

The reflectivity is represented by R(ω) Figure 11: Absorptivity of a circular one split ring resonator
The transmissivity is represented by T(ω)
In terms of S-parameters absorptivity is expressed as
V. CONCLUSION
Finally, utilizing metamaterial we designed a nested split ring
Because of zero transmission transmissivity is zero, and the resonator, with a three layer metamaterial structure that can
absorptivity can be expressed as resonates at frequencies 1.2,1.4 2.1 and 2.49 THz. From the
results it is observed that by increasing the no of split rings, no
of resonances are increasing which can be used for designing the
multiband antenna at terahertz frequency range .Additionally, we
can use the structures as absorbers. A single split ring resonator's
Figures9 shows the absorptivity of the three circular split absorbance is 70%. An absorber in the terahertz range can be
resonator structure. From the result the absorptivity of the easily generated by altering the absorber structure's size. We
structure is 62 %. believe that the developed THz split ring resonator structure
would make a good option for communication, radar, and stealth
technology based on the aforementioned results.

VI. REFERENCES
[1] J.B. Pendry, A.J. Holden, D.J. Ribbins, and W.J.
Stewart,Magnetism from conductors and enhanced
nonlinearphenomenon, IEEE Trans. Microwave Theory
Tech., 47(1999), 2075-2084.
[2] R.Marquez, F. Medina and R. Rafii-El-Idrissi, Role
ofbianisotropy in negative permeability and left-
handedmetamaterials, Phys. Rev. B, 65 (2002), 144 440(1) –
144440 (6).
[3] R. W. Ziolkowski, Design, fabrication, and testing ofdouble
negative metamaterials, IEEE Trans. AntennasPropagat.,
Figure 9: Absorptivity of a circular three split ring resonator 51(2003), 2572-2581
[4] R.Marquez, F. Mesa, J. Martel, F. Medina,
Figures 10 shows the absorptivity of the two circular split resonator Comparativeanalysis of edge- and broadside- coupled split
structure was obtained by using CST software madelling . From ringresonators for metamaterial design-theory
andexperiments, IEEE Trans. Antennas Propagat.,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 180


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

51(2003),2572-2581.
[5] C.Saha and J.Y.Siddiqui, Versatile CAD Formulation
forEstimation of the Resonant Frequency and
MagnetiPolarizability of Circular Split Ring
Resonators,International Journal of RF and Microwave
ComputerAided Engineering, 21(2011), No.4.
[6] S. Lim, C. Caloz, and T. Itoh, Electronically
scannedcomposite right/left handed microstrip leaky-
waveantenna, IEEE Microwave Wireless Comp.
Lett.,14(2004), 277–279.
[7] C. Saha and J.Y. Siddiqui “Simplified CAD model
foraccurate estimation of the Resonant Frequency of
EdgeCoupled Hexagonal Split Ring Resonators”
Proc.APSYM 10, Cochin,
December 14-16, 2010
[8] I. Arnedo, et.al, Forward and backward leaky waveradiation
in split ring resonator based metamaterials,IET Microwaves,
Antennas Propag., 1 (2007), 65-68
[9] M. A. Antoniades and G. V. Eleftheriades, Abroadband
series power divider using zero degreemetamaterial phase
shifting lines, IEEE Microwave
[10] J.B. Pendry, A.J. Holden, D.J. Ribbins, and
W.J. StewartMagnetism from conductors and enhanced
nonlinear phenomenon, IEEE Trans. Microwave Theory
Tech.
[11] F. Martin, et. al, Split ring resonator-based left-
handedcoplanar waveguide, Applied Phys. Lett., 83
(2003),4652 – 4654.
[12] F. Falcone, et. al, Coplanar waveguide Structures loadedwith
split ring resonators, Microwave Opt. Tech. Lett.,40 (2004),
3– 6.
[13] P.Gay-Balmaz and O.J.F. Martin,
Electromagneticresonances in individual and coupled split-
ringresonators, J. Appl. Phys., 92
(2002), 2929–2936.
[14] Sirtori C. Bridge for the terahertz gap. Nature, 2002,
417(6885): 132–133.
[15] double negative metamaterials, IEEE Trans.
AntennasPropagat.,51(2003), 2572-2581
[16] R.Marquez, F. Mesa, J. Martel, F. Medina,
Comparativeanalysis of edge- and broadside- coupled split
ringresonators formetamaterial design-theory and
[17] Tonouchi M. Cutting-edge terahertz technology. Nature
Photonics,2007, 1(2): 97–105
[18] Jepsen P U, Cooke D G, Koch M. Terahertz spectroscopy and
imaging–modern techniques and applications. Laser &
PhotonicsReviews, 2011, 5(1): 124–166
[19] Federici J F, Schulkin B, Huang F, Gary D, Barat R,
Oliveira F,Zimdars D. THz imaging and sensing for
security applications—explosives, weapons and drugs.
Semiconductor Scienceand Technology, 2005, 20(7):
S266–S280
[20] S Smitha, T. V., and Sahana Udupa. "Optical Waveguides
and Terahertz Signal by Finite Element Method: A
Survey." IRO Journal on Sustainable Wireless Systems 3,
no. 2 (2021): 68-86.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 181


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Wheat Head Detection using YOLO: A Comparative


Study
Neeraj S Kumar, Stephi S, Meenakshi R and Greeshma Sarath
Department of Computer Science and Engineering
Amrita Vishwa Vidyapeetham, Amritapuri
Kollam, India
Email: neerajskumar911@gmail.com, stephisajeev1997@gmail.com, meenakshir13@gmail.com, greeshmasarath@am.amrita.edu

Abstract—Classical object detection techniques such as Retina-


Net, Fast R-CNN, and Single-Shot MultiBox Detector (SSD) are
unable to locate objects in a single iteration. These approaches
have solved the modelling and data scarcity issues in object
detection. The YOLO algorithm has gained popularity because it
performs better than the above-mentioned object recognition ap-
proaches. YOLO achieves cutting-edge findings and significantly
outperforms prior real-time object identification algorithms by
approaching object detection in a novel way. YOLO object
detection algorithms advance from YOLOv1 [1] in 2016 attaining
63.4mAP on the Pascal VOC dataset to YOLOR in 2021 with
73.3 mAP on the far more difficult MS COCO dataset. This study Fig. 1. Basic YOLO Model [1]
assess the efficacy of the several YOLO algorithm iterations, from
versions 3 all the way to version 7 and how well versions 3, 4,
5, 6 and 7 of the YOLO algorithms perform at identifying the
Learning [4] [5], YOLO and Faster-RCNN are two- and one-
wheat head from the provided object image.
Index Terms—Wheat, Deep Learning, YOLO, Darknet, Effi- stage detectors used in current detection techniques, however
cientDet even after being trained on a huge dataset, they still exhibit
a bias toward the training region. [6] [7] [8] [9] [10] [11]. In
I. I NTRODUCTION this study we check the efficiency of different YOLO models
Precision agriculture benefits greatly from the work of in accurately predicting bounding boxes within the images.
scientists, researchers, and governmental agencies. The only
way this is feasible is if the agricultural fields produce high- II. YOU O NLY L OOK O NCE – S INGLE S TAGE O BJECT
quality crops. By doing thorough study and putting different D ETECTION M ODEL
techniques into practise like Vertical farming, excellent quality
The YOLO is short for You Only Look Once. A real-
in crops can be obtained. In this study, the wheat crop was
time object recognition model that is capable of recognizing
the subject of the investigation.
multiple objects in a single frame by creating a bounding box.
Wheat is a crop and food that is highly researched due
YOLO distinguishes between items with greater accuracy and
to its popularity. Plant experts utilise image identification of
speed than previous recognition systems. Up to 9000 classes,
”wheat heads”—spikes atop the plant bearing grain—to obtain
including undiscovered ones, can be predicted. Multiple things
extensive and precise data about wheat fields throughout the
will be picked out of an image by the real-time recognition
world. The density and size of wheat heads in various kinds
system, which will also draw a boundary box around each
are estimated using these photos. When making management
object.
choices for their fields, farmers may utilise the data to evaluate
Different Iterations of the model released over a span
the health and maturity of their fields. However, it might be
of years upgrading the base model efficiency, tweaking the
visually difficult to distinguish wheat heads with accuracy in
backbone network, reducing complexity, as well as improving
photos of open fields. The images might get blurry due to
computation dependency
the wind and the frequently overlapping thick wheat plants.
Both make it challenging to recognise individual heads. The
A. YOLOv3
maturation, colour, genetics, and head orientation all affect
looks in different ways. Finally, because wheat is farmed all In terms of speed, accuracy, and class specificity, YOLOv3
over the world, it is important to take into account various [12] and earlier versions differ significantly. While YOLOv3
kinds, planting densities, patterns, and field conditions. [2] [3] currently uses Darknet-53, YOLOv2 was employing Darknet-
The models created for wheat phenotyping must be trans- 19 as its backbone feature extractor. Darknet-53 is more potent
ferable to other growth conditions. Since the advent of Deep than Darknet-19 and more effective than rival backbones

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 182


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

D. YOLOv6
A single-stage object detection framework with great perfor-
mance and a hardware-friendly design, YOLOv6 is intended
for industrial applications. It is the best OS version of the
YOLO architecture for production applications since it per-
forms better than YOLOv5 in terms of detection accuracy
and inference speed. In comparison to all previous YOLOv5
versions, YOLOv6s (red) offers a better mean Average Pre-
cision (mAP) and an approximately 2-times faster inference
Fig. 2. YOLO Bounding box format [17] time. Additionally, we can observe a significant performance
difference between EfficientDet, which uses two-stage object
detection, and YOLO-based design. The primary distinction
because it uses 53 convolutional layers as opposed to the is that although YOLOv5 makes use of YAML, YOLOv6 de-
preceding 19 layers. clares the model parameters directly in Python. A preliminary
When it comes to intersection over union (IOU) values look also suggests that YOLOv5 might be somewhat more
and mean average precision (mAP), YOLOv3 is quick and customisable.
accurate. Compared to other object detection models this
model shows much higher performance and better accuracy E. YOLOv7
in short time.
Disadvantages of YOLO V3 is that given that RetinaNet The upgraded official YOLOv7 [16] comes with huge
requires more training time than YOLOv3, YOLOv3 AP does upgrades. YOLOv4 was upgraded with numerous features to
show a trade-off between speed and accuracy when employing yield YOLOv7. This includes the introduction of Extended
YOLO. YOLOv3 is a great alternative for models that can Efficient Layer Aggregation Network (E-ELAN) and Model
be trained with large datasets because it can be used to Scaling for Concatenation based models. It also introduced
detect objects with an accuracy that is comparable to that of the concept of Trainable BoF (Bag of Freebies) which is a
RetinaNet when utilising a larger dataset. reparameterization algorithm to improve the model. It is a
kind of ensemble modelling technique wherein the model is
generated using averaged weights of multiple models trained
B. YOLOv4 with different training sets.
YOLOv4 [13] greatly outperforms the current approaches in
terms of both “detection performance” and “better speed”. It is III. M ETHODOLOGY
a “efficiently trainable” object detector that may be utilised in
production systems. After carefully examining the effects on A. Dataset
the performance of numerous detectors, features suggested in A fairly large dataset with 3432 images of Wheat Planta-
the previous YOLO models, the team also introduces various tions across the globe, the major being from Europe (France,
different architectures and architectural selections with the UK, Switzerland) and North America (Canada). The dataset
primary goal of “optimising neural networks detector for par- is publicly available as part of a Kaggle Competition - Global
allel computations.” When comparing performance, YOLOv4 Wheat Detection; however, it is maintained by nine research
is twice as quick as EfficientDet (a competitive recognition institutes from seven countries: the University of Tokyo, Insti-
model) [14]. Additionally, AP (Average Precision) and FPS tut national de recherche pour l’agriculture, l’alimentation et
(Frames Per Second) improved by 10 l’environnement, Arvalis, ETHZ, University of Saskatchewan,
University of Queensland, Nanjing Agricultural University,
C. YOLOv5 and Rothamsted Research. These institutions are joined by
many in their pursuit of accurate wheat head detection, includ-
YOLOv5 [15] was released by a company called Ultralytics ing the Global Institute for Food Security, DigitAg, Kubota,
in 2020. The overall public has acknowledged YOLOv4 as and Hiphen.
a genuine advancement over YOLOv3, and the moniker is
not particularly contentious. On the other hand, YOLOv5 has
B. Data Pre-processing
unvalidated data to support its advancement above YOLOv4.
The YOLOv5 network architecture have three components The bounding box values are retrieved from the supporting
to it: CSPDarknet for the backbone, PANet for the neck, csv document from the competition files which lists bounding
and YOLO Layer for the head. Before being sent to PANet box values for each occurrence of the wheat head. This
for feature fusion, the data are first fed to CSPDarknet for document is converted into YOLO annotation format, wherein
feature extraction. YOLO Layer then outputs the results of each image will have its own annotation file with the entire
the detection (class, score, location, size). localization of the box values in them.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 183


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3. Advancement towards E-ELAN [16]

C. Data Splitting and combination. The speed of YOLOv4 is double that of


The data follows 80-20 train-test split wherein 2698 images EfficientDet.
where trained and the result was validated on 675 images. The YOLOv4 style underwent a considerable change, got
The metrics described throughout the paper deals with the much better, and gave more weight to data comparison.
validation results of these 675 images. One ground truth was established by several anchor points
in YOLO V4. By keeping the same number of anchor
D. Experimental Results frames and raising the selection ratio of positive samples,
YOLO V3 is a well-liked master of previous versions. this fixes the problem of an imbalance between positive
YOLO v3 finds objects by applying 1x1 detection kernels and negative samples. The advantage is that the open
to three different size feature maps at three distinct points period and grid sensitivity are avoided because of the
across the network. The most noticeable feature of version range of the sigmoid function, but the exact placement of
3 is that it executes detections at three different scales, the boundary is unknown. YOLO V4 includes an updated
each of which is precisely defined by down sampling the detector that is faster and more accurate than any of the
dimensions of the input picture by 32, 16, and 8 respectively. prior alternatives. The original concept for a detector based
on a single-stage anchor has been proven to be workable.
Since YOLO V3 uses three previous boxes for each
position, K-means is used to obtain nine previous boxes and
divide them into three scale feature maps. The preceding boxes
are smaller on larger feature maps. The residual model, on the
other hand, was applied using the YOLO V3 feature extraction
network. Since it includes 53 convolution layers instead of
the Darknet19 used by YOLO V2, it is known as Darknet-53.

Fig. 5. YOLOv4 mAP score for 20 epochs

It varies from all prior releases in that YOLOv5 uses


PyTorch rather than the original Darknet as a base. Similar
to the v4, the YOLOv5 has a CSP backbone and PA-NET
neck. Auto-learning bounding box anchors and mosaic data
augmentation are the two most significant changes. The
Fig. 4. YOLOv3 mAP score for 20 epochs various network topologies in YOLO V5 are as precise as
those in YOLOv4 and are easier to use. They also have very
YOLOv4 selected and evaluated each potential process modest model sizes. YOLOv5 sends each batch of training
adjustment to determine the best result in each permutation data via the data loader while simultaneously enhancing it. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 184


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

data loader performs three main types of data improvement:


scaling, colour space correction, and mosaic enhancement.
The proof suggests that during model training, Mosaic
augmentation may effectively handle the trickiest micro-
object challenge. In other words, the accuracy of detecting
little objects is lower than that of detecting huge objects.

Fig. 8. YOLOv7 mAP score for 20 epochs

IV. O UTPUTS
All the official YOLO models were cloned from the
respective publishers from GitHub and results are tried
out on the same with minimal specifications to understand
the efficiency of the models. Hence the metrics are
calculated for the smallest model of the individual version.
Fig. 6. YOLOv5 mAP score for 20 epochs
Sample output from the best performing models:

YOLOv6 is a single-stage object detection framework de-


signed for industrial applications. It has excellent perfor-
mance and a hardware-friendly architecture. As it outperforms
YOLOv5 in terms of detection precision and inference speed,
it is the best OS version of the YOLO architecture for com-
mercial applications. YOLOv6s delivers a better mean Average
Precision (mAP) and an approximately 2-times faster inference
time compared to all prior YOLOv5 versions. YOLOv6s
delivers a better mean Average Precision (mAP) and an
approximately 2-times faster inference time compared to all
prior YOLOv5 versions even in its validation phase.

Fig. 9. Sample Output

V. R ESULTS
The models were trained in Google Colab provisioned with
Nvidia Tesla T4. The hyperparameters were:
• Epochs : 20
• Batch-size : 4
Fig. 7. YOLOv6 mAP score for 20 epochs
• Worker threads : 8
• Image Size : 1024x1024

The model performance improved gradually with epochs,


YOLOv7 compared to its base models has reduced number while to counter the training time as well as overfitting, 20
of parameters to 40% and computation to 50%. This has epochs were chosen as the results were promising enough
seemed a boost to its benchmark performance, currently be- with the testing data. Batch-size of 4 was chosen to reduce
ing the state-of-the-art object detection algorithm. The major the GPU memory hog as the high resolution images required
improvement in performance can be directly linked with its large amount of GPU memory to load all the 3432 images.
architectural upgrade by the concept of BoF(Bag of Freebies) The default YOLO model uses 8 worker threads to divide
averaging out the weights without increasing the training cost, the workload. Lastly, the Image size of 1024 was chosen to
which slightly increasing the time for training. effectively visualize the bounding box created by the models.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 185


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I
R ESULTS

Model Model Layers Average mAP Precision Recall Training Loss


Name Time
mAP@ mAP@ (in hrs) Box Objective
0.5 .5:.95

YOLOv3 yolov3-tiny 59 0.905 0.443 0.903 0.835 2.352 0.048 0.909


YOLOv4 yolov4-tiny 99 0.939 0.556 1 0.003 1.116 0.053 0.316
YOLOv5 yolov5s 270 0.949 0.544 0.928 0.897 2.903 0.035 0.291
YOLOv6 yolov6s 0.897 0.472 0.897 0.546 1.914 1.325 0.896
YOLOv7 yolov7-tiny 263 0.899 0.43 0.898 0.843 1.855 0.044 0.093

VI. C ONCLUSION [4] X. Zhu, S. Lyu, X. Wang, and Q. Zhao, TPH-YOLOv5: Improved
YOLOv5 based on transformer prediction head for object detection on
The models were trained to find Wheat heads on a con- drone-captured scenarios. ArXiv [Cs.CV], 2021.
siderably large dataset. The model’s performance ultimately [5] C.-Y. Wang, A. Bochkovskiy, and H.-Y. M. Liao, YOLOv7: Trainable
bag-of-freebies sets new state-of-the-art for real-time object detectors.
increased when the number of epochs, optimization parame- ArXiv [Cs.CV], 2022.
ters, batch size, and learning rate were adjusted. The average [6] R. Ramachandran, D. C. Rajeev, S. G. Krishnan, and P. Subathra, “Deep
mAP @ 0.5 was greater than 89% for all the models, owing learning – An overview,” International Journal of Applied Engineering
Research, vol. 10, pp. 25433–25448, 2015.
which, the results are quite accurate. When taking into account [7] R. K. Megalingam, Dasari Hema Teja Anirudh Babu. Venkata Sai
individual models, YOLOv3—the baseline model with the YashwanthAvvari ”Concurrent Detection and Identification of Multiple
greatest number of changes—performs better with fewer itera- Objects using YOLO Algorithm ”: Ghali Sriram, 2021.
[8] R. Ippalapally, S. H. Mudumba, M. Adkay, and H. R. Nandi Vardhan,
tions, but at the expense of longer training times. Darknet-53 is Object Detection Using Thermal Imaging. New Delhi, India: in 2020 IEEE
more powerful than Darknet-19 and more effective than rival 17th India Council International Conference (INDICON), 2020.
backbones since it uses 53 convolutional layers rather than the [9] U. Subbiah, D. K. Kumar, T. Dr. Senthil Kumar, and L. Parameswaran,
“An Extensive Study and Comparison of the Various Approaches to Object
previous 19 layers.Thus in terms of mean average precision Detection using Deep Learning,” in 2020 Third International Conference
(mAP) and intersection over union (IOU) values, YOLOv3 is on Smart Systems and Inventive Technology (ICSSIT, 2020.
rapid and accurate. With a mAP@0.5 of 0.905, the 20 epochs [10] A. Alexander and M. M. Dharmana, “Object detection algorithm for
segregating similar coloured objects and database formation,” in 2017
of YOLOv3 required 2.3 hours for training. Comparing this International Conference on Circuit, 2017.
to the succeeding iterations, YOLOv5 achieved a score close [11] B. N. K. Sai and T. Sasikala, “Object Detection and Count of Objects
to 95% at the expense of an additional 60 minutes of training in Image using Tensor Flow Object Detection API,” in 2019 International
Conference on Smart Systems and Inventive Technology (ICSSIT, 2019.
time. [12] A. Premkumar et al., “Sign language recognition: A comparative anal-
The precision and recall trade-offs in the standard YOLO ysis of deep learning models,” I. Computation and I. T. S. N. Singapore,
versions 3 and 5 were satisfactory. Although the findings from Eds. 2022, pp. 1–13.
[13] K. B. Kumar and D. Dr. Venkataraman, “Object Detection Using
the intermediate models YOLOv4 and v6 were encouraging, Robust Image Features,” in Springer International conference on artificial
their precision and recall values do not allow them to be con- Intelligence and Evolutionary Algorithms in engineering systems, 2015,
sidered all-arounders. Here, YOLOv7 triumphs, its Precision- pp. 285–295.
[14] S. Hameed and I. Amin, Detection of Weed and Wheat Using Image
Recall curve, which mimics the strong baseline models while Processing, vol. 10, no. 1109, pp. 1–5, 2018.
requiring only 35% less training time (compared to YOLOv5). [15] E. David et al., Global Wheat Head Detection (GWHD) dataset: a large
With a higher epoch, the mAP@0.5 score of 0.899 for and diverse dataset of high resolution RGB labelled images to develop and
benchmark wheat head detection methods. In arXiv [cs.CV], 2020.
YOLOv7 appears to be something that can be improved. The [16] M. Tan, R. Pang, and Q. V. Le, EfficientDet: Scalable and Efficient
model needs five minutes every epoch on average. Object Detection. ArXiv [Cs.CV], 2019.
Therefore, to yield higher accuracy with a reduced training [17] S. K. S. Ishita Jain, Ed., Convolutional Siamese RPN++ and Yolo v3
based Visual Tracking Regression, vol. 66, no. 1. Journal of Scientific
time one can employ YOLOv7 with a higher number of Research of The Banaras Hindu University, 2022.
epochs as the iterative improvement in the mAP score in the [18] Sairamkumar, S. ”Design of ANN Based Machine Learning Method for
incremental iterations tends to improve, thus able to produce Crop Prediction.” Journal of Innovative Image Processing 3, no. 3 (2021):
223-239.
better results and faster performance.

R EFERENCES
[1] J. Redmon, S. Divvala, R. Girshick, and A. Farhadi, You only look once:
Unified, real-time object detection. ArXiv [Cs.CV], 2015.
[2] J. Redmon and A. Farhadi, YOLOv3: An Incremental Improvement.
ArXiv [Cs.CV], 2018.
[3] A. Bochkovskiy, C.-Y. Wang, and H.-Y. M. Liao, YOLOv4: Optimal
speed and accuracy of object detection. ArXiv [Cs.CV], 2020.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 186


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Comparison between Symmetrical and Asymmetrical


13 Level MLI with Minimal Switches
Sindhuja R Padma S
Research Scholar, Department of Electrical Engineering, Department of Electrical Engineering
Annamalai University Annamalai University
Department of Electrical and Electronics Engineering Chidambaram, Tamil Nadu
Sree Vidyanikethan Engineering College spadmapnr@gmail.com
Tirupati, 517102, Andhra Pradesh
sindhuja.r@vidyanikethan.edu

Parimalasundar E Suresh K
Department of Electrical and Electronics Engineering Department of Electrical and Electronics Engineering
Sree Vidyanikethan Engineering College Christ University
Tirupati, 517102, Andhra Pradesh Bangalore, Karnataka
parimalasundar.e@vidyanikethan.edu sureshk340@gmail.com

Abstract - Voltage source converters that are dependable and applications like massive induction motor drives, UPS systems
of the highest quality are offered by Multilevel Inverter to and versatile AC Transmission Systems.
convert DC power systems to the AC power grid. One of the
intriguing technologies in the field of power electronics are Desired output is obtained from many levels of DC links
multilevel inverters (MLIs) in various configurations. It is also
that are created within the circuit. The DC to AC power
possible to integrate a few DC sources in MLIs to create a
converters are called inverters. The ability conversion is
singular output, reducing the number of isolated inverters, the
overall component count, and losses. MLIs are the top converters
achieved either by controlled input and turn-off switches or by
in many applications because to their capacity for medium and forced commutated thyristors, betting on applications. These
high-power applications. In order to produce the levels for the inverters is also of voltage controlled or current controlled.
stair case wave shape, this research work introduces a new Inverters with levels either zero or ±Vdc called 2 level
configuration module for asymmetrical multilevel in which inverters [7]-[9]. In dynamic and application of high voltages,
capacitors are employed as DC linkages. With two unequal DC these conventional inverters with 2-level output have restriction
sources, the suggested Box -type modular structure will produce in operative at high frequency in the main thanks to changing
more voltage levels. It is useful for a variety of renewable losses and constraints imposed on the device ratings. So as to
applications since it has two back-to-back T-type inverters and beat these limitations, the thought of multi-level inverters is
minimal parts. This module contains this structured method to used. The DC power input to the electrical converter is
lessen the Total Harmonic Distortion (THD) rating and raise the batteries, fuel cells or alternative DC sources. However, in
quality of the sinusoidal output voltage. most of the commercial applications, for feeding the input
power, rectifiers are used. Within the rising trends, multi-level
Index Terms - Cascaded H-bridge, Multilevel Converter, electrical converter (MLI) thought plays a very major role in
Symmetrical Inverter, Asymmetrical Inverter. shaping the AC output waveform with no distortion. Compared
to the traditional electrical converter
I. INTRODUCTION
The MLI has several blessings like minimal harmonics,
In past few years, the generation of power from the energy reduced switch stress, higher quality of power and having
sources which are renewable have become a lot of widespread capability to reach high voltage. The typical two-level inverters
as there's an addendum in power demand and insufficiency of are largely used nowadays to get Associate in Nursing AC
typical energy sources which are not easily replaced by natural voltage from a DC voltage. The two- level electrical converter
means. An alternative energy is that the most propitious and will solely produce two completely different output voltages
copiously on the market renewable energy that may well be for the load. To create up AC output voltage these 2 voltages
absorbed simply with PV systems. Therefore, there is an are sometimes switched with Pulse dimension Modulation
increasing need to find an alternative energy with high (PWM) [10]-[13]. Through this methodology is effective, it
potency, reduced price and improved energy capture. Thus, to creates harmonic distortions within the output voltage in
get the higher than mentioned options, a box type comparison to two-level inverters. The thought of multi-level
unsymmetrical electrical converter with reduced parts is inverters is introduced to beat the issues related to these typical
enforced to get a sleek wave [1]-[6]. This unsymmetrical inverters by adding many voltage levels to make a power tool
stepped wave with lower harmonic distortions. once the
structured electrical converter is wide employed in high power
quantity of voltage levels gets increase the waveforms becomes
power tool, however several levels the planning becomes a lot

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 187


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of difficult, with a lot of parts and a lot of difficult controller extremely low distortion, which can help with magnetic force
for the electrical converter is required. In construction inverters, compatibility (EMC) concerns. Common-mode voltage (CM):
because the change involves many little voltages, the speedy A motor coupled to a structural motor drive may have less
amendment in voltage is smaller. stress on its bearings since multilevel converters provide lower
In recent years, greater power equipment has become more CM voltage. Additionally, CM voltage may be removed by
in demand for a variety of industrial applications. Utility using sophisticated modulation techniques like those described
applications that require medium voltage motor drives and in. Multilevel converters will have little distortion when
power unit power level. Directly connecting just one power drawing input current.
semiconductor switch to a medium voltage grid is difficult.
This prompted the development of a structural power device TABLE I
structure as a replacement in high- and medium-voltage COMPARISON OF MLI AND ITS PARAMETERS
products [14]-[15]. Multilevel Inverters
Parameters Diode Flying capacitor Cascaded
The electrical converter is a component that transforms Clamped MLI MLI MLI
direct current (DC) into alternative current (AC). The electrical Power
converter is used in homes as a source of emergency backup semiconductor 2(m-1) 2(m-1) 2(m-1)
power. [16] In some craft systems, the electrical converter is switches
used to convert portion of the craft's DC power to AC. The Clamping
majority of electrical gadgets, including lights, radar, radio, Diodes per (m-1) (m-2) 0 0
motors, and other devices, are powered by AC power. Further, Phase
change at the basic frequency will lead to decreasing voltage DC bus
worth by range of times. This voltage amendment happens as (m-1) (m-1) (m-1)/2
Capacitors
per basic cycle. Consequently, the primary problem for Balancing
building inverters is harmonic removal. So, many Pulse capacitor per 0 (m-1) (m-2)/2 0
dimension Modulation (PWM) techniques are custom-made to phase
beat the harmonics constraints like curving pulse dimension
Voltage
modulation, third & second harmonic injection PWM etc. once Average High Very Small
such multi-level inverters are integrated with circuit style Unbalance
harmonic currents can occur, that causes the severe
disturbances. To simulate the results, MATLAB/SIMULINK
tool has been used [17].

II. MULTILEVEL INVERTER S1 S7 S2


C2
A. Multilevel Inverter + -
Besides achieving high power ratings, a structural device
also facilitates the use of energy from renewable sources. For Vdc1 S10
a high power application, renewable energy sources S3 S4
S8
comprising electrical phenomena, wind, and fuel cells can
effectively be linked to a structured device system.
S11
Since 1975, the concept of structural converters has been - +
proposed. The three-level device was the first instance of a
structure. The development of several structural device Vdc2 C1
S5 S9 S6
topologies follows. The basic idea behind a structure device,
however, is to utilise a number of power semiconductor
devices with numerous DC voltage sources of lesser amplitude Fig. 1 13 Level MLI Topology
to execute the ability conversion by synthesizing a stairway
voltage wave shape. Because there are numerous dc voltage Switching frequency of the Multilevel converters will
sources, they can all be utilised. The ability switches function at both low- and high-PWM switch frequencies. It
commutate these several dc sources together to produce high should be noted that improved potency and lower switch loss
voltage at the output, but their rated voltage simply depends are often associated with lower switch frequency.
on the quality of the dc voltage sources to which they are Sadly, there are certain drawbacks to structure converters.
attached. The larger range of power semiconductor switches needed is
There are numerous advantages of a structural device over one clear drawback. Every switch requires a coupled gate
a standard two level device that uses high switch frequency drive circuit, even though lesser voltage rated switches may be
pulse dimension modulation (PWM).The following succinct utilised in an extremely complex device. The overall system
list of appealing features of a structural device is available. could become more expensive and difficult as a result.
Quality of the wave-like staircase: Multilevel converters can Numerous structural device topologies have been predicted
lower the dv/dt stresses and produce output voltages with over the past 20 years. New device topologies and unique

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 188


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

modulation methods have been used in recent study. converter stands out among various topologies thanks to its
Additionally, three completely distinct primary structure versatility and strong power contribution.
device structures are reportable in the literature: flying The mode of operation is as given in Table II for all
capacitors, diode clamped (neutral clamped), and cascaded H- output voltage levels. According to these switching states, all
bridges with separate dc sources (capacitor clamped). of the output voltage values were obtained by activating the
switches. To avoid a short circuit between two DC sources,
B. Types of MLI Topology the switches (S1, S7, S3, S8, and S5, S9) shouldn't be turned
on at the same time. The switches in this switching table
Case1: Symmetrical H bridge inverter should always be appropriately switched to generate similarly
Three full bridge inverters that are fed with various sources negative voltages.
of similar magnitude make up the symmetrical H-bridge Some features of the configuration comprise relatively
multilevel inverter, which has all of its input sources of same low number of Dc supplies, high speed abilities, reduced
magnitude. A single-phase full-bridge inverter is coupled with switching cost, and good conversion performance in terms of
an equal-magnitude cascaded H-bridge multilevel inverter.
efficiency.
Different level inverters' ac terminal voltages are linked
together in series. by a variety of arrangements of the four IV. SIMULATION RESULTS
switches.
Here two different topologies were simulated and results
Case2: Asymmetrical H bridge inverter were compared. Figure 2 shows the simulation of conventional
The topology of an asymmetrical inverter is one in which symmetrical 13 level multilevel inverter. Figure 3 depicts the
the inverter is equipped with two independent DC sources of output waveform of the symmetrical 13 level converter.
differing magnitude. The below figure 1 shows the
Asymmetrical topology of 13 level multilevel inverter where it
having two unequal DC sources Vdc, 2Vdc.
Likewise, superabundant modulation techniques and
management paradigms are being developed for structural
converters including curved pulse dimension modulation
(SPWM), selective harmonic elimination (SHE-PWM), home
vector modulation (SVM), and others. Furthermore, traction
motor drives, utility link for photovoltaic systems, and
commercial intermediate motor drives are the target of a
multitude of structure device applications.
TABLE II
11 SWITCHES SWITCHING STATES
State of Switches
Levels Vout S
S2 S3 S4 S5 S6 S7 S8 S9 S10 S11
1
6 Vdc 1 0 0 1 1 0 0 0 0 1 1
5 Vdc 0 0 0 1 1 0 1 0 0 1 1
Positive
Level

4 Vdc 1 0 0 1 0 0 0 0 1 1 1
3 Vdc 1 0 0 0 1 0 0 1 0 0 0 Fig. 2 Symmetrical topology of 13 level MLI
2 Vdc 0 0 0 0 1 0 1 1 0 0 0
1 Vdc 1 0 0 0 0 0 0 1 1 1 0
0 Vdc 1 1 0 0 0 0 0 1 0 0 1
-1 Vdc 0 0 1 0 1 0 1 0 0 0 0
-2 Vdc 1 0 1 0 0 0 0 0 1 1 0
Negative
Level

-3 Vdc 0 0 1 0 0 0 1 0 1 1 0
-4 Vdc 0 0 1 0 0 1 1 0 0 0 1
-5 Vdc 0 1 1 0 0 0 0 0 1 1 0
-6 Vdc 0 1 1 0 0 1 0 0 0 0 1

III. UNSYMMETRICAL 13 LEVEL MLI


Due to their advantages over the conventional three-level
multilevel inverters, multilevel inverters have recently Fig. 3 Output Waveform for 13 level Symmetrical MLI
attracted the attention of various researchers. The following
are some advantages of building inverters: generate The proposed topology of asymmetrical 13 level multilevel
inverter simulation circuit and corresponding output waveform
waveforms of higher quality with less total harmonic
showed in figure 4 and 5.
distortion (THD). Flying capacitors, neutral purpose clamped
(NPC), and cascaded H-bridge (CHB) inverters are three For simulation purpose the two unequal input DC voltages
common electrical converter topologies. The CHB electrical were taken in the ratio of 1:2. The frequency of switching is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 189


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

taken as 2kHz. The capacitors were chosen in the sameratio of


1:2 such that C1= 100 µF and C2=200 µF .From the simulation
results obtained the THD value were compared with the
conventional converter.
TABLE III
COMPARISON BETWEEN SYMMETRICAL AND UNSYMMETRICAL 13 LEVEL MLI

13 Level MLI
Parameters 13 level Symmetrical
Proposed Topology
MLI
Total Harmonic
11.8 % 3.18 %
Distortion
Total Number of switches
24 switches 14 switches
used
2 unequal DC
Number of DC sources 6 DC sources
sources

TABLE IV
THD, POWER LOSS AND CONDUCTION LOSS PARAMETERS OF 13L SYMMETRIC
MLI
Parameters Values
Fig. 4 Symmetrical topology of 13 level MLI
Number of power switches 24
Load type R (100 Ω) and RL (100 Ω and
50 mH)
Modulating frequency fm (Hz) 50
Carrier frequency fc (Hz) 5000
Output voltage (Peak value in volts) 315 V
Output current (Amps) 4.52 A (R Load)
3.51 A (RL Load)
Switching loss 0.112
Conduction loss 51.32
Power loss 51.43
Efficiency 84.61
% THD (Voltage) 22.15
% THD (Current) 10.57

TABLE V
THD, POWER LOSS AND CONDUCTION LOSS PARAMETERS OF 13L
ASYMMETRIC MLI Fig. 5 Output Waveform for 13 level Symmetrical MLI
Parameters Values
Number of power switches 11 When the load varies from resistive load of 80Ω to the RL
Load type R (100 Ω) and RL (100 Ω and load of 100+j40Ω the wave shaping occurs and the harmonics
50 mH) present in the waveform gets reduced as shown in fig.6. Fig. 7
Modulating frequency fm (Hz) 50 represents the various comparative analysis being carried out
Carrier frequency fc (Hz) 5000 between symmetric and unsymmetrical 13 Level MLI.
Output voltage (Peak value in volts) 328V
Output current (Amps) 4.20 A (R Load)
2.17 A (RL Load)
Switching loss 0.106
Conduction loss 40.52
Power loss 40.72
Efficiency 92.47
% THD (Voltage) 14.32
% THD (Current) 4.02

Fig. 6 Output Waveform for the dynamic load variation

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 190


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[11] K. Suresh, K. Jyotheeswara Reddy, R. Dash, S. Hampannavar, R.


Srikakulapu and V. Subburaj, "A Universal Converter For Different
Power Conversion Operations and High Power Applications," 2021
IEEE 12th Energy Conversion Congress & Exposition - Asia (ECCE-
Asia), 2021, pp. 1666-1671.
[12] K. Suresh and E. Parimalasundar, "Design and Implementation of
Universal Converter Conception et implémentation d’un convertisseur
universel," in IEEE Canadian Journal of Electrical and Computer
Engineering, vol. 45, no. 3, pp. 272-278, Summer 2022.
[13] M. F. Kangarlu and E. Babaei, “Cross-switched multilevel inverter: an
innovative topology,” IET Power Electron., vol. 6, no. 4, pp. 642–651,
2013.
[14] Parimalasundar E, Jayakumar S, Ravikumar R, Suresh K (2022),
Investigation analysis of open circuit and short circuit fault on cascaded
H-bridged multilevel inverter using artificial neural network approach.
Fig. 7 Comparative analysis between conventional and proposed structure IJEER 10(2), 320-326.
[15] E. Babaei, S. Laali, and S. Alilu, “Cascaded multilevel inverter with
series connection of novel H-bridge basic units,” IEEE Trans. Ind.
V. CONCLUSION Electron., vol. 61, no. 12, pp. 6664-6671, Dec. 2014.
[16] Parimalasundar, E., Kumar, N. M. G., Geetha, P., & Suresh, K. (2022).
Hence a low value of Total Harmonic Distortion (THD) Performance investigation of modular multilevel inverter topologies for
can be obtained by using this proposed 13-level multi-inverter photovoltaic applications with minimal switches. Electrical Engineering
with reduced number of switches. The operation and & Electromechanics, (6), 28–34.
simulation of existing and proposed model have been analyzed [17] Bagde, Sejal, Pratiksha Ambade, Manasvi Batho, Piyush Duragkar,
Prathmesh Dahikar, and Avinash Ikhar. "Internet of Things (IOT) Based
and done. Finally, we conclude that this inverter has the Smart Switch." Journal of IoT in Social, Mobile, Analytics, and Cloud 3,
advantages of low Total Harmonic Distortion (THD), less no. 2 (2021): 149-162.
number of switches and less number of DC sources. High
output voltages can be obtained with less DC input.
REFERENCES
[1] E. Samadaei, M. Kaviani, K. Bertilsson, “A 13-levels Module (K-Type)
with two DC sources for Multilevel Inverters,” IEEE Transactions on
Industrial Electronic Aug22, 2018.
[2] Sourabh Rathore, Mukesh Kumar Kirar and S. K Bhardwaj, “Simulation
of Cascaded H- Bridge Multilevel Inverter Using PD, POD, APOD
techniques,” An International Journal (ECIJ) Volume 4, Number 3,
September 2015.
[3] N. Sandeep, "A 13-Level Switched-Capacitor-Based Boosting Inverter,"
in IEEE Transactions on Circuits and Systems II: Express Briefs, vol.
68, no. 3, pp. 998-1002, March 2021, doi:
10.1109/TCSII.2020.3017338.
[4] Suresh K, Parimalasundar E, Jayakumar S & Ravikumar R (2022)
Encapsulated 3Ø converter for power loss minimization in a grid-
connected system, Automatika.
[5] Essakiappan, S. Krishnamoorthy, H.S. Enjeti, P. Balog, R.S. Ahmed,
“Multilevel Medium-Frequency Link Inverter for Utility Scale
Photovoltaic Integration,” in Power Electronics, IEEE Transactions on
vol.30, no.7, July 2015.
[6] K. Suresh and E. Parimalasundar, "A Modified Multi Level Inverter
With Inverted SPWM Control," in IEEE Canadian Journal of Electrical
and Computer Engineering, vol. 45, no. 2, pp. 99-104, Spring 2022.
[7] J. Venkataramanaiah, Y. Suresh, and A. K. Panda, “A review on
symmetric, asymmetric, hybrid and single DC sources based multilevel
inverter topologies,” Renewable Sustain. Energy Rev., vol. 76, pp. 788–
812, 2017.
[8] Ezhilvannan, P., Krishnan, S. (2020). An efficient asymmetric direct
current (DC) source configured switched capacitor multi-level inverter.
Journal Européen des Systèmes Automatisés, Vol. 53, No. 6, pp. 853-
859.
[9] K. Suresh and E. Parimalasundar, “A novel dual-leg DC-DC converter
for wide range DC-AC conversion”, 2022, Automatika, vol. 63, no. 3,
pp. 572-579.
[10] E. Babaei, M. F. Kangarlu, and M. Sabahi, “Extended multilevel
converters: An attempt to reduce the number of independent DC voltage
sources in cascaded multilevel converters,” IET Power Electron., vol. 7,
no. 1, pp. 157–166, Jan. 2014.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 191


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Development of Hardware prototype and
testing of short Transmission Line
V. Johsna1 V Harshith Varma2 Reddi Vivek Vardhan 3
Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
Amrita School of Engineering, Amrita School of Engineering, Amrita School of Engineering,
Bengaluru Bengaluru Bengaluru
Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham
India India India
joshna.velpula@gmail.com vharshithvarma@gmail.com reddivivek2002@gmail.com

Sailaja V4 K Deepa5 Manitha PV6


Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
Amrita School of Engineering, Amrita School of Engineering, Amrita School of Engineering,
Bengaluru Bengaluru Bengaluru
Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham Amrita Vishwa Vidyapeetham
India India India
v_sailaja@blr.amrita.edu k_deepa@blr.amrita.edu pv_manitha@blr.amrita.edu

the insulin particularly all through terrible climate. The


Abstract— This paper describes about the performance electrical comparable of the spillage affect is spoken to by
characteristics of short transmission line. Performance of any
the shunt conductance, connected in parallel with the
transmission line is decided by four parameters namely
Resistance, Inductance, Capacitance, and shunt conductance.
framework capacitance. By and large the spillage streams
In this paper performance characteristic is observed for are little and consequently the shunt conductance is ignored
different types of loads. The performance involves in in calculation [1].
determining sending end voltage, current, power factor, Transmission lines are categorized as short, medium,
receiving end voltage, current, power factor, efficiency of and long in regards to the transmission line duration and
transmission and regulation. For an ideal Transmission line, the voltage levels. When the duration of the overhead
total input supply is same as output without any losses. In transmission is nearly 50km and the load voltage relatively
normal scenario, transmission lines undergo losses. Efficiency
low (< 20kV), it's miles customarily taken into
and regulation are two factors which will give what ratio of
input is getting converted into output and also gives the amount
consideration as quick transmission line. Due to small
of power which is getting wasted. So the regulation and duration, decrease voltage level and little spillage current,
efficiency are considered here as the main factors that decide the capacitance affects are little and therefore may be
the performance. ignored. Hence, while inspecting the execution of quick
transmission line; the resistive and inductive masses are
taken beneath consideration [2].
Keywords— Short Transmission Lines, Varying loads,
Regulation, Efficiency, Performance Characteristics. Performance of transmission line can be analyzed by
changing the type of load. The amount of energy generated
I. INTRODUCTION and transmitted to load through transmission line depend
The demand of power is developing immensely on the load. Request on vitality in transmission strains will
however the expansion of transmission framework and get changed and stage point distinction between the voltage
generation is confined because of different ecological and current will alter. For example, for resistive load both
requirements and restricted accessibility of resources. voltage and current will be in phase whereas for reactive
Generated power is distributed to industries and household load the phase angle difference of voltage will lead or lag
through transmission lines and the amount of power that by current [3].
can be transmitted will depend on the construction and the Power flow evaluation is huge for arranging,
type of transmission line. Major faults occurs in manipulate and obligations of present frameworks. The
transmission lines than in the power generation system. So, suitable activity of the framework is predicated on knowing
Transmission line assurance is a significant issue in power the impacts of inter connections, new loads, new
system engineering in spite of the fact that 85-87% of generation stations and new transmission line. System
intensity framework deficiencies are happening in stability should be maintained for proper power
transmission lines. transmission. So, load flow analysis need to be done for a
Transmission line execution is represented with the system [4]..
help of 4 parameters: resistance, inductance, shunt II. LITERATURE SURVEY
capacitance and conductance. All of these parameters are
dispersed along the length of the line. The separator of the Transmission lines make up the majority for any power
line is rarely idealize and spillage streams over surfacSe of system network, as is well known. Therefore, it makes

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 192


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

sense that one of the essential topics that should be given Vs = sending end voltage
clear cut attention is the accurate modelling of such lines in
various power analysis studies.[5][8] Such modelling Ir = receiving end current
method will be the primary method for predicting the Is = sending end current
performance of the line. There is a great desire for the
power flow control in the transmission lines with fast Vr = receiving end voltage
operation, efficiency and reliability [6][9]. Ps = sending end power
III. METHODOLOGY Cos ∅r =load power factor
A. Transmission Line model Cos ∅s = sending end power factor
A short transmission line circuit with ac supply and load
linked [5] is as shown in Fig1. The transmission line The series impedance of the lines is given as,
parameters resistance R, and reactance X are distributed Z=R+jX
throughout the length of the transmission line and the
The shunt conductance and shunt capacity of short
transmission line parameters are considered for this work are
transmission lines are ignored. Therefore, at all the points
lumped. Every conductor has a resistance R [7] as well asan thecurrent remains the same in line.
inductive resistance X. [7] For ease, the conductor parameters
are grouped in one conductor and the return conductor is Practically, it is,
accepted as having neither resistance nor inductive reactance. Is = Ir = I
-phase values and the all currents are phase currents.
Therefore, in the case of three-phase line calculation,
Power per phase = (1/3) × (total
power) Reactive volt − amperes per
phase
= (1/3) × (total reactive volt − amperes)
For a balanced 3-phase, star connected line,
Phase voltage = 1/√3 × (line voltage)

B. Phasor diagram
Figure 3 shows a phasor diagram of the lag load [9]. The
Fig. 1. Single-phase circuit of short transmission line receiving termination current Ir is considered a reference
phasor and is indicated as OT in the phasor diagram. If there
Figure 2 shows the same circuit for a single-phase line is lag load, Ir lags Vr by the angle ∅r shown in Fig 3.Where
and ashort transmission line. The loop resistance and loop OQ = Vr. IrR is the voltage drop over the line's resistance.
inductance of the short transmission line [6] is represented Phasor QR is in charge of IrR. It is drawn in parallel with the
by resistance R and inductive reactance X respectively. OT because it is in phase with the current. IrX is the voltage
drop in the line's reactance. Total impedance voltage drop is
defined as IrZ. The phasor sum of the resistive and reactive
voltage drops, and it is given by SQ inside the graph. The
sending conclusion voltage Vs is represented by OS, and the
control calculate point between the sending conclusion
voltage and the current is representedby S.

Fig. 2. Equivalent circuit model of short transmission line

R = Loop resistance of the line


R = 2*( one conductor resistance) =
2*(R1) X1 = inductive reactance of one
conductorX = 2*(X1)
Fig.3. Phasor diagram.

The receiver is the end of the line to which the load is


connected, and the sender is the end to which the source The magnitude of Vs can be found from the
power is connected [8]. right angle triangle.
Let Vr = receiving end voltage Vs  (V Cos  I R)2  (V Sin   I X )2

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 193


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Where,r  Re ceiving end Power factor V. OBSERVATIONS


R – Series resistance By observing the readings of sending end
X – Series reactance voltage(Vs),sending end current (Is), sending end
Power factor of the load measured at the sending end is power(Ps), receiving end voltage (Vr),receiving end
CosPr current(Ir) and receiving end power (Pr) the following
calculations are done for different loads.
I r *Vr
Voltage regulation (VR) is the measure of change [ 1 0 ]
inmagnitude of receiving end voltage from no-load to full A. Calculations
load A. For R-load :
%VR= % voltage regulation =
power to sending end power [11]. % transmission efficiency = ,
% Efficiency =
𝑃𝑟
If Vr be the reference phasor then, CosΦr =
𝐼𝑟∗𝑉𝑟
V  V 0V + j0
% voltage regulation = =7.98,

% transmission efficiency = = 94.734


For lagging power factor
CosΦr, I  I r   r  IrCosr  jIr Sinr CosΦr = 0.8475
For leading power factor B. For L-load :
CosΦr, % transmission efficiency = 25
% voltage regulation = 6.512
For unity power factor, I  I0
% transmission efficiency =
 I  j0 The line impedance is
given by Z  R  jX CosΦr = 0.0357
C. For R-L load
This work will deal with pure resistive, pure inductive and % voltage regulation =
RL load for short transmission line. In summary, the % transmission efficiency
capacitance of the short transmission line is neglected due to
its low operating voltage and lower load current and its very
small length. So, capacitance effect of short transmission % voltage regulation = = 3.11
line is very small it can be neglected. Varying loads of cos∅ = 0.2777
different types calculate the voltage regulation and cos∅ = 0.222(UPF),
efficiency of short transmission lines and performance % transmission efficiency = 40
characteristics of short transmission lines for different loads
are plotted.
B. Graph
IV. CIRCUIT DESCRIPTION Plot of % voltage regulation, Efficiency and
The 1-Ph., 230V AC input supply is fed [12] to the short power factor Vsreceiving end power is obtained
transmission network through a variable Auto transformer. to analysis the performance of short transmission
Voltmeters V1 and V2 (0-300V) are connected in parallel to
lines.
Vs and Vr respectively for measuring voltages across them.
Ammeters A1 and A2 (0-10A) are connected in series to Vs A. For R-load :
and Vr respectively for measuring currents across them.
Wattmeter’s W1 and W2 (300V, 10A, UPF) are used for
measuring power [13] across sending end and receiving end
respectively. A transmission line model having the lumped
parameters 14 ohms, 8 mH per phase per 50 km line length.

Fig.5. R load performance characteristics

Fig.4. Circuit diagram of short transmission line

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 194


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig.5 shows the performance characteristics of inductive will takes reactive power remaining power can be
short transmission line when pure resistive load transferred to the receiving end [15]. Receiving end current
[14] is connected. Resistive load corresponds to lags the receiving end voltage but it is less than 900. Due to
unity power factor at the receiving end due to the presence of resistive load phase angle has reduced.
which receiving end voltage and the receiving
For resistive and inductive load : 90 < 𝜑𝑟 < 0
end current can be maintained in same phase.
(0 < 𝑐𝑜𝑠𝜑𝑟 < 1, −1 < 𝑠𝑖𝑛𝜑𝑟 < 0)
For unity power factor, 𝜑𝑟 = 0 Z=R + jXL (no capacitive reactance so, XC = 0)
X = XL - XC = XL
I  I0  I  j0 𝐼 ≈ 𝐼∠𝜑𝑟 ≈ 𝐼(𝑐𝑜𝑠𝜑𝑟) + 𝑗(𝑠𝑖𝑛𝜑𝑟)
𝑉𝑉 ≈ 𝑉𝑉 + 𝑉𝑉 𝑉𝑠 ≈ 𝑉𝑟 + (𝑅 + X)
Here the drop is more when compared to the pervious
Vr is the amount of voltage transferred from sending side to purely R and L loads.
receiving side and the remaining voltage IR is dropped at the
resistor Sl.No Instruments Type (Ratings) Quantity
1) DPSTS 10A One
B. For L-load 2) Autotransformer 1-Phase, 230V One
3) Inductor 8mH One
4) Resistor 14 ohm One
5) Voltmeter M.I (0-300V) Two
6) Ammeter M.I (0-10A) Two
7) Wattmeter 300V, 10A, UPF Two
Table:I simulation values when R load connected
V. OBSERVATIONS

By connecting the blocks as per circuit diagram


.Fig.6. Inductive load performance characteristics for R-load in matlab Simulink the following results
are observed.
Performance characteristics of short transmission line
with pure inductive load is presented in Fig. 6. Inductive load For a resistive load with R=238 ohms the readings
current lag the voltage by 900. Because when current start tabulated are listed in Table
flowing in inductor an induced voltage will be generated in it Sl R Vs IS Ps Vr Ir Pr % %ᶯ
which opposes the change in current, so, the power angle𝑓𝑟 < .no load pea Peak (W pea pea (W) VR
(ohm) k ( A) ) k k(A)
(V) (V)
0. In case of purely inductance load it will be equal to - 1 283 32 1.2 8 191 305 1.2 180 6.55 94.2
900 ie 5 8
2 106 32 2.685 401 28 2.5 351. 14.3 87.6
fr= -900. 5 4 4
𝐼 ≈ 𝐼∠ − 90 ≈ (0) + (−1) 3 64 32 4.11 614 26 4.1 497 23. 81
5 3 .4 5
𝐼 ≈ −1𝑗 7
Z=R+jX As it is pure inductive load R= 0 4 44 32 5.5 821 24 5.5 612 34. 74.5
5 2 .5 2
𝑉𝑉 ≈ 𝑉𝑉 + 𝑉𝑉 9

C. For R-L load :


The readings for receiving end and sending
end power, voltage, current are captured and
analysed in this section.

Fig.7. RL load performance characteristics


From fig.7 we can observe the performance
characteristics ofshort transmission line when resistive and
inductive load is attached. In these effect due to resistive and
inductance loadscannot be nullified hence both will be taken
into account because resistive load takes real energy and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 195


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig.11. Output power Vs Time

From Fig.11 shows the receiving end power and its


observedthat the power gets transferred to the receiving end
side withvery less power loss as it is pure resistive load. So
Fig.8. Input power Vs Time only real power is observed by the load and power Pr
Fig.8 gives the information about how much delivered at the receiving side is 180W and power loss noted
input power issupplied from sending end side i.e is 11. When compared with fig.10
PS =191W.

Fig.12. Output voltage Vs Time


From the plot appeared in Fig.12. able to watch the
voltageat the receiving end side is less than the sending
conclusion side by 20V and this drop is less since the stack
Fig.9. Input voltage Vs Time is simply resistive in nature and the getting conclusion
Fig.9 presents the input voltage from voltage was famous as Vr = 305V.
sending end side withthe peak measuring as Vs
= 325V

Fig.13 output current Vs Time

Fig.10. Input current Vs Time


From plot 13 It can be seen that the current on the receiving
Fig.10 presents the input current drawn at the sending end side is smaller than the transmitting end current
end side (i.e) Is = 1.28A compared to the transmitting end current shown in Fig. 12,
and the transmitting end current is given as Ir = 1.28A.

VI. REGULATION
The regulation plot for R load is plotted Vs receiving end
power as shown in Fig. 14. The figure clearly depicts that the
regulation increases with increase in receiving end power
drawn and Efficiency decreases [16]. This increase and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 196


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

decrease in regulation and power is because of increase in [4] Shailendra Shrivastava, Vishal Sharma, Annapurna Bhargava,
“Modelling and Performance Analysis of Distributed Power Flow
receiving end current with increase in load, which in turn Controller on Multi Machine System,” European journal of Advances in
increases thepower losses (I2R ) and voltage drop IR Engineering and Technology,5(2):99-105,ISSN:2394-658X,2018.
[5] Manoharsingh, B.K.Panigrahi, R.P.Maheshwari “Transmission line fault
detection and Classification” International conference on Engineering and
Computer Technology in power systems, Nagercoil, IEEE 2011.
[6] Maamar Table, Mohamed Jassim Dittlo, Tahar Bouthiba, “Performance
of short transmission lines models” GCC Conference ,Manama, IEEE 2006.
[7] Mohamed.M, Ismail, M.A.Moustafa Hassan, “Distance Relay Protection
for Short and Long Transmission line”, International conference on
Modelling ,Identification and control(ICMIC), Cario, 2013.
[8] S. Balamurugan, J. Sunil and J. Kashreya, "Real Power Flow Control in
a Transmission Line by Varying the Turns Ratio of the Injection
Transformer," 2019 Innovations in Power and Advanced Computing
Fig.14 %Efficiency and Regulation Vs Receiving end Power Technologies (i-PACT), 2019, pp. 1-5, doi: 10.1109/i-
PACT44901.2019.8960069

Due to the voltage drop in the transmission [9]S. Balamurugan, T. N. P. Nambiar, N. Janarthanan and K. R. M. V.
Chandrakala, "Laboratory model to teach power system stability," 2014
resistance; the receiving end voltage will be less IEEE International Conference on MOOC, Innovation and Technology in
than sending end voltage and receiving end Education (MITE), 2014, pp. 53-55, doi: 10.1109/MITE.2014.7020240.

current is also less when compared with sending [10] Balamurugan, S. & Natarajan, Janarthanan & Vijayachandrakala,
K.R.M. & Rr, Lekshmi. (2014). Laboratory Model for Teaching Real Power
end current, hence the overall power transferred Flow Control in Transmission Line. 144-145. 10.1109/T4E.2014.47.
also reduces. As the resistive load decreases, [11] Basavaraju, Jayanth & Sailaja, V. & Kaliyaperumal, Deepa &
losses will increases due to high current, thus Manickavasagam, K.. (2022). Intermediate Administrative System for Load
Side Management in Different Kinds of Load Present in a Cluster of Micro
regulation will increase and also efficiency will Grid. 1-5. 10.1109/DELCON54057.2022.9752829.
decreases.
[12] Rahul, G. & Teja, O. & Shivani, P. & Kaliyaperumal, Deepa &
Manitha, P. & Sailaja, V.. (2020). Long Distance Power Transmission
System with ZVS Ultra-Lift Luo Converter from Large Photovoltaic
Generation. 400-405. 10.1109/ICSSIT48917.2020.9214162.
VII. ANALYSIS
[13] Sailakshmi, & Navyasri, Goteti & Kaliyaperumal, Deepa & Sailaja, V.
From the above, it can be analysed that: & Manitha, P.. (2022). Fault Analysis in Three Phase Transmission Lines
To obtain maximum power and power factor the using Wavelet Method. 248
254.10.1109/ICOEI53556.2022.9776716
load must be resistive and for least power factor
[14] Bindhu, V., and G. Ranganathan. "Effective Automatic Fault
the load must be inductive. Detection in Transmission Lines by Hybrid Model of Authorization and
For short transmission line the transmission Distance Calculation through Impedance Variation." Journal of Electronics
length is small and operating voltage is 3, no 01 (2021): 36-48.
additionally low thus the charging current is [15] S. Kumar A and K. Manickavasagam, "Transmission Line Dynamic
small. So, the impact of capacitance in small Circuit Model for Effective Length of Ground Electrode Under Lightning
Transients," in IEEE Transactions on Electromagnetic, no. 2, pp. 543-550,
transmission lines is less thus can be ignored. April 2022, doi: 10.1109/TEMC.2021.3124679.
VIII. CONCLUSION [16] P. G. Shivani, S. Harshit, C. V. Varma and R. Mahalakshmi,
"Detection of Broken Strands on Transmission Linesthrough Image
This paper presents the performance analysis Processing," 2020 4th International Conference on Electronics,
of the short transmission line using the hardware Communication and Aerospace Technology (ICECA), 2020, pp. 1016-
prototype model. Experimental results are used 1020, doi: 10.1109/ICECA49313.2020.9297639.
to find the regulation efficiency of the line for the
pure resistive load, pure inductive and resistive
and inductive load. Experimental results for
efficiency vs receiving end power, variation of
the input, output voltages, currents, power are
presented. This model can be used to analyze the
different faults on transmission lines.
REFERENCES:

[1]Sandeep Kaur,Amarbir Singh,Raja Singh Kela “Load flow analysis


of three bus system by using micropower software” International journal of
engineering Research technology(IJERT),vol. 4, Issue 03, March- 2015.
[2] D.Hill, “On the equilibrium of power systems with non linear
loads,” IEEE Trans. Circuit system, vol. 36, pp.1458-1463,1989.
[3] Eric H. Allen , M. D. Ilic “Interaction of Transmission Network
and Load Phasor Dynamics in Electric Power Systems” IEEE Transactions
on Circuits and System , vol. 47, no. 11, November 2000 .

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 197


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Review of Dynamic Wireless Power Transfer


System Technology used in Solar Wireless Electric
Vehicle Charging Stations
Vinoth Kumar K Maruthi B Rahul R
Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
New Horizon College of Engineering New Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India Bengaluru, India
kvinoth_kumar84@yahoo.in maruthi5665@gmail.com shashi1991982@gmail.com

Sathish S
Santhosh Melvin D
Department of Electrical and
Department of Electrical and
Electronics Engineering
Electronics Engineering
New Horizon College of Engineering
New Horizon College of Engineering
Bengaluru, India
Bengaluru, India
sathishs06052002@gmail.com
santhoshmelvind939@gmail.com

Abstract—This study demonstrates how the recently


developed Dynamic Wireless Power Transfer System can extend
the range of an electric vehicle (EV). The demand for big
batteries in EV applications may therefore be reduced as a
result of powered highways. To transfer the most power possible
from the ground to the vehicle, the complete DWPT system must
be precisely constructed.

Keywords— Wireless charging, inductive coupling, and


microgrid.

I. INTRODUCTION
Battery requirements and recharge times are issues
specific to electric vehicles. The battery's capacity needs to
be raised in order to increase the cruising range. The required
engine power rises as the battery capacity does. While
driving, wireless charging degrades memory. [1] The benefits
of wireless charging include automation, simplicity, security,
and toughness. Installing the dynamic loading mechanism on Fig. 1. Structure of the wireless charging [28]
our route was simple. Battery replacement, conductive In-vehicle and in-vehicle are the two different types of EV
charging, and inductive charging are a few charging chargers. When a converter is built inside a vehicle, the
techniques [2]. charger is referred to as an on-board charger, while a
Battery replacement technology allows you to swap out a converter built into a charging station is referred to as an off-
dead battery for one that has been partially or fully charged. board charger. Inductive power charging is the process of
Side, bottom, and back modifications each have a different recharging a vehicle via electromagnetic induction. Vehicle
method. Dislocation and deterioration problems are charging is one application where inductive energy
complications needs a sophisticated infrastructure. For the transmission is used. [5] While increasing range and lowering
purpose of charging electric vehicles, conductive technology storage capacity, dynamic and semi-dynamic wireless
is employed. a reasonable and useful approach. Safety and charging are both used. As a result, the cost of electric
charge time are problems with conductive charging. vehicles is decreased by the charging system & distance. [2]
Charging is dependent on the range and type of current. There The four technologies are mechanical, acoustic, far field,
are two charging options: rapid charging and standard and near field. For inductive and resonant inductive devices,
charging. [3-4] the frequency ranges are kHz to MHz; for capacitive devices,
it is Hz to MHz; and for microwave devices, it is GHz. Figure
1 depicts the article's overall structure. The magnetic and
electric fields of the short-range wireless power transfer
system (WPT) can be separated. When two panels in an
electric field WPT system are aligned, a process called as
capacitive power load occurs that transfers power from one
panel to the other. An inductive load is created when two
magnetic resonators are aligned and power is transferred from
one to the other ended a predetermined reserve in the airborne
average increase. [6-8]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 198


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The transmit coil is supplied with electricity by a power coil is positioned over the transmitting coil. There is no
converter. The power converter's operational pulses are stimulation in the other segmented pads. [19]
controlled by the position of the vehicle. A compensation
network controls the spreader side control missioner's output. Non-polarized coils are single coil structures that solely
The components of the return network are passive. In generate vertical magnetic flux, whereas polarized coils are
compensation networks, different assemblages of inductive multiple coil structures that generate horizontal magnetic
and capacitive components are utilized. Automated flux. Segmented and extended busbars are two types.
distributed charging by QDWC is taking the role of laborious Elongated designs employ lengthy track coils. In terms of
physical charging along roads and business districts (Feng et magnetism, the long and narrow has a smaller ratio of
al., 2020). High installation costs, misalignment tolerances, interlinkage magnetic flux to leakage flux. Non-shrinkage
and constrained speed ranges are problems with DWC points produce a lot of electromagnetic pollution and
systems. A rectifier converts the interacting available flux to interference as a result.
DC in order to charge the battery bank. Primary and The power loss is substantial as a result of the non-
secondary power are converted using power electronics reacting component. Multiple coils are contained in segment
converters. coils, which are driven by a group of transducers or by a
single transducer. In order to minimize power loss and
A long transmitter can generate an unlimited amount of
magnetic flux relatively low. There is a lot of electromagnetic prevent energizing non-interactive coils, transmit coils are
interference and exposure in the tracking coil's non- only activated when the receive coil is aligned with a certain
interacting area. Due to the non-retroactive portion of the transmit coil. The requirement for small transmitter spacing
transmitter coil, power losses are also larger. System and high converter and compensator ratings is a drawback of
reliability is influenced by transmit coil size. Additionally, these segmented transmitters. Systems for inductive power
the entire coil may malfunction if any one component of it transfer are susceptible to misalignment and loosely
fails. Multiple transmit coil shapes are sporadically connected coil designs. The coil has a large leakage
positioned in a track in a segmented DWC. Individual or inductance because it operates dynamically.
more inverters can control transmitters. When the receive coil High leakage inductance reduces a coil's ability to handle
passes over the transmit coil, it becomes activated. The power, and efficiency rapidly decreases as misalignment
second coil is not powered up. rises. Reactive power correction can be used to offset this
large leakage inductance. A passive resonant network
therefore balances reactive power. The coil can now transfer
more power at its maximum capacity. The objectives of
different compensation topologies include compensating
VAR, achieving smooth switching, maintaining bifurcating.
Minimizing soft switching behavior and perceived power
rating. Additionally, these networks keep the network's
output voltage and current constant. Monoresonant and
multiresonant compensation networks are two different
subtypes based on passive elements. The expansion of EV
market penetration was not kept up with by the construction
of charging infrastructures. The expansion of EV charging
stations will have an impact on the grid for public utilities.
Fossil fuel consumption had to rise dramatically to keep up
Fig. 2. Basic representation system with the energy demand created by charging stations.
Different traditional energy sources are becoming less
II. EXISTING METHODOLOGIES
plentiful every day. Additionally, the world's temperature
Two coils are used in the IPT system to transfer energy. will rise as a result of greenhouse gases. Many nations are
Vehicle mounted coils are regarded as secondary coils or enforcing regulations and striving for net-zero emissions by
vehicle assemblies, whilst floor mounted coils are regarded 2050. In 2020, the generation of electricity based on
as primary coils or floor assemblies. Within the air core, the renewable energy will increase by 3% while demand for all
coils are magnetically connected to one another. Choice of other fuels will decline. To increase the penetration of the EV
coil construction depends on the application. Determinants of market, it is crucial to install the charging infrastructure
coil construction design, or coil size and coil shape, include properly.
transmission distance, system power rating, coupling
characteristics and the performance of ferrite cores is An electric vehicle's total cost of ownership comprises
increased. infrastructure development expenses, energy consumption
costs, and vehicle costs. Therefore, for a cost analysis to be
The DWPT load's most reliable factor is vehicle speed. effective, the charging infrastructure must be taken into
The link flux of the coil also varies with the lateral or account. By using CNG, his OLEV's economic energy
longitudinal movement of the receiving coil. The amount of consumption variables were examined by KAIST. According
power transfer decreases laterally as the electric vehicle to analysis, OLEV reduces energy costs by 73%. Driving the
moves. The transmitter is experiencing open circuit voltage car 250 km per day was used to analyze energy expenses. The
when there is no car around. The vehicle's bottom has a cost savings for electric automobiles rises as the mileage
mounting for the receiving coil. Power level and standards does. An online electric vehicle was created by KAIST in
are used to determine the distance between coils on the 2009. The vehicle uses 60 kW of electricity. Dynamic
ground. The vehicle's battery is charged when the receiving induction power transmission technology, which is used for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 199


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

EV charging, transmits high power over considerable III. CONCLUSION


airborne distances. 85 kHz is the highest output frequency
This article focuses especially on DWPT technology
level. The emergence of environmentally friendly vehicles
publicity for microgrids. In-depth information is provided
will push the island grid system to incorporate an inductive
power charging system that is powered by the roads. The regarding the various converters also payment network
ability to tolerate abrupt load changes, management of topologies. Based entirely on packages comprising load and
generation and usage, and fault tolerance are the primary coupling differences, the unique repayment networks may be
considerations for these solar-powered island microgrid used. The payback community is also employed to
systems. reverberate with the charging pads. The largest component of
the arrangement of dynamic charging systems is the
During this energy transfer, the induced electromotive configuration of the charging pads. The charging pads are
force produces a powerful magnetic field. High field strength powered by the strong inverters. A manage sign's generation
generation must stay within legal safety bounds. Different depends on the detection circuit's output. The detection
shielding techniques are applied to lessen flux leakage
circuit is used to determine the location of the car by
throughout the system. The growth of the infrastructure for
charging electric vehicles did not support their market observing how the abroad item interacts with the charging
adoption. The public supply network will be impacted by the pads. The main impartial of the design system will maximize
rise in electric vehicle charging stations. performance while minimizing expense. The machine's
power level being increased to facilitate faster charging
surely raises the visibility of magnetic emissions. Thus,
Over the past ten years, there has been a considerable adequate protection is necessary to lower sector emission
global growth in the production of electricity using renewable levels also included.
energy sources. Emissions of greenhouse gases will decline
with the expansion of PV-based electricity generation. REFERENCES
Therefore, incorporating renewable energy sources into the
infrastructure for electric car charging aids the advancement [1] N. Langhammer and R. Kays, "Performance Evaluation of Wireless
Home Automation Networks in Indoor Scenarios", IEEE Transactions
of electrification of the road transportation sector. A on Smart Grid, vol. 3, pp. 2252-226, 2012.
expanding utility sector and a decrease in the cost of
[2] Yuvaraja S,, Narayanamoorthi R, Jagabar Sathik Mohamed Ali 2 and
electricity per unit because to this consolidation. In Figure 3, Dhafer Almakhles, "A comprehensive review of the On-Road Wireless
the microgrid system is shown. Energy metres with an Charging Station System for E-Mobility Applications", Frontiers in
electromechanical design were formerly available. Today's Energy Research, vol. 10, pp. 1-23, 2022.
energy metres are digital. Only when there are surges in the [3] R. Jiang, R. Lu, C. Lai, J. Luo and X. Shen, "Robust group key
circuit's current can the metre’s function. This indicates that management with revocation and collusion resistance for scada in
the amount of current flowing through the circuit is directly smart grid", IEEE Globe Communication Conference (Globecom), pp.
824-829, 2013.
proportional to the speed at which the disc rotates. [18]
[4] Hao-wei Yao, Xiao-wei Wang, Lu-sen Wu, Dan Jiang, Teng Luo and
The previous way of spinning a disc clock involved gears Dong Liang, "Prediction method for Smart Meter Life Based on Big
Data", Procedia Engineering, vol. 211, pp. 1111-1114, 2018.
turning as needed and a microprocessor that kept track of the
amount of power used by the load. The meter's integrated [5] R. Pereira, J. Figueiredo, R. Melicio, V.M.F. Mendes, J. Martins and J.
C. Quadrado, "Consumer energy management system with integration
LEDs' flashing frequency is also tracked. A blinking LED is of smart Meters", Energy Reports, vol. 1, pp. 22-29, 2015.
also included in modern energy metres for pulse counting. [6] Soma Shekara Sreenadh Reddy Depuru, Wang Lingfeng, Vijay and
The external memory used to store these measurements. Devabhaktuni, "Smart meters for power grid: Challenges issues
EEPROM is used as external memory. You can save this advantages and status", Renewable and Sustainable Energy Reviews,
memory if you ever need to check your energy usage and see vol. 15, pp. 2736-2742, 2011.
where it stands right now. The microcomputer is connected [7] S Maitra, "Embedded energy meter - a new concept to measure the
to the liquid crystal display of the liquid crystal television. energy consumed by a consumer and to pay the bill", Joint
International Conference on Power System Technology and IEEE
The microcontroller will inform the LCD that the GSM Power India Conference, pp. 1-8, 2008.
modem is currently unavailable. [19-27] [8] J. Every, L. Li and D. G. Dorrell, "Leveraging smart meter data for
economic optimization of residential photovoltaics under existing tariff
structures and incentive schemes", Appl. Energy, vol. 201, pp. 158-
173, 2017.
[9] Michael C. Lorek, Fabien Chraim and Kristofer S. J. Pister, "Plug
Through Energy Monitor for Plug Load Electrical Devices", IEEE
conference on SENSORS, pp. 1-4, 2015.
[10] S. Bayram and T.S. Ustun, "A survey on behind the meter enegy
management systems in smart grid", Renew. Sustain. Energy Rev., vol.
72, pp. 1208-1232, 2017.
[11] Md. Masudur Rahman, Noor-E Jannat, Mohd, Ohidul Islam, Md.
Serazus and Salakin, "Arduino and GSM Based Smart Energy Meter
for Advanced Metering and Billing System", Int. Conf on Electrical
Engineering and Information & Communication Technology
(ICEEICT) Jahangimagar, pp. 1-6, 2015.
[12] D. Alahakoon and X. Yu, "Smart Electricity Meter Data Intelligence
Fig. 3. Flowchart for FOD for Future Energy Systems: A Survey", IEEE Transactions on
Industrial Informatics, vol. 12, no. 1, pp. 425-436, Feb. 2016.
[13] L. I. Minchala-Avila, J. Armijos, D. Pesántez and Y. Zhang, "Design
and Implementation of a Smart Meter with Demand Response
Capabilities", Energy Procedia, vol. 103, pp. 195-200, 2016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 200


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[14] N. Batra and M. Chawla, "Design And implementation of Smart Power Electronics Smart Grid and Renewable Energy (PESGRE2020),
Energy Meter Using Internet of Things (IoT)", International Journal pp. 1-5, 2020.
of Advanced Research in Computer and Communication Engineering, [22] Meenal, R., Binu, D., Ramya, K.C., Rajasekaran, E., Sangeetha, B.
vol. 9, no. 5, May 2020.
“Weather Forecasting for Renewable Energy System: A Review”,
[15] M. M. Haque, Z. H. Choudhury and F. M. Alamgir, "IoT Based Smart Archives of Computational Methods in Engineering, 2022, 29(5), pp.
Energy Metering System for Power Consumers", 2019 2nd 2875–2891
International Conference on Innovation in Engineering and
Technology (ICIET), pp. 1-6, 2019. [23] Mahesh, M., Kumar, K.V., Prabhakar, M. “Enabling Technologies for
Smart Buildings: High Power Density Power Electronic Converters”
[16] Q. Malik, A. Zia, R. Ahmad, M. A. Butt and Z. A. Javed, "Design and
Smart Buildings Digitalization: IoT and Energy Efficient Smart
Operation of Smart Energy Meter for Effective Energy Utilization in
Buildings Architecture and Applications, 2022, pp. 217–228
Smart Cities", IEEE Conference on Sustainable Utilization and
Development in Engineering and Technologies (CSUDET), pp. 219- [24] G. Mehta, G. Mittra and V. K. Yadav, "Application of IoT to optimize
223, 2019. Data Center operations", proceedings of International Conference on
Computing Power and Communication Technologies 2018 GUCON,
[17] B. K. Barman, S. N. Yadav, S. Kumar and S. Gope, "IOT Based Smart
pp. 738-742, 28-29 Sept 2018.
Energy Meter for Efficient Energy Utilization in Smart
Grid", International Conference on Power Energy and Environment: [25] G. Mehta and V. K. Yadav, "Impact of Renewable Distributed
Towards Smart Technology (ICEPE), pp. 1-5, 2018. Generators in Competitive Electricity Markets Considering Economic
[18] Joseph, J.J., Meenal, R., Josh, F.T., Chandran, G., Veerabathran, S. Factors", proceedings of IEEE Power Electronics Drives and Energy
“Weather observation and forecasting using radiosonde” Telkomnika Systems PEDES, 18-21 December 2018.
(Telecommunication Computing Electronics and Control), 2022, [26] G. Mehta, Y. Mishra, S. Dubey Uzair, M. Singh and R. Khanam,
20(6), pp. 1376–1383. "Accident Prevention using Auto Braking System and Accident
[19] W. W. V. Souza et al., "Development of an Energy Meter based on Detection using Internet of Things", proceedings of International
IoT", 2020 IEEE International Workshop on Metrology for Industry Conference on Smart Machine Intelligence and Real Time Computing
4.0 & IoT, pp. 241-244, 2020. GBPIET, June 26-27, 2020.
[20] N. Shivaraman, S. Saki, Z. Liu, S. Ramanathan, A. Easwaran and S. [27] Kamali, A. R., and V. Prasanna Moorthy. "Design of Solar and Battery
Steinhorst, "Real-Time Energy Monitoring in IoT-enabled Mobile Hybrid Electric Vehicle Charging Station." Journal of Trends in
Devices", 2020 Design Automation & Test in Europe Conference & Computer Science and Smart Technology 4, no. 1 (2022): 30-37.
Exhibition (DATE), pp. 991-994, 2020. [28] Mohamed, Naoui, Flah Aymen, Ben Hamed Mouna, and Sbita
[21] S. V. Sreedevi, P. Prasannan, K. Jiju and I. J. Indu Lekshmi, Alassaad. "Review on autonomous charger for EV and HEV." In 2017
"Development of Indigenous Smart Energy Meter adhering Indian International Conference on Green Energy Conversion Systems
Standards for Smart Grid", 2020 IEEE International Conference on (GECS), pp. 1-6. IEEE, 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 201


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Hardware Integration of Sensors for Automating


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Smart Homes
C.Lasya N.Madhav Sai N.Gunavardhan Reddy
Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
Amrita School of Engineering Amrita School of Engineering Amrita School of Engineering
Bengaluru,India Bengaluru,India Bengaluru,India
Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India
bl.en.u4eee19006@bl.students.amrita.e bl.en.u4eee19013@bl.students.amrita.e bl.en.u4eee19014@bl.students.amrita.e
du du du

N.Manoj Reddy Lekshmi S. Syama S.


Department of Electrical and Department of Electrical and Department of Electrical and
Electronics Engineering Electronics Engineering Electronics Engineering
Amrita School of Engineering Amrita School of Engineering Amrita School of Engineering
Bengaluru,India Bengaluru,India Bengaluru,India
Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India Amrita Vishwa Vidyapeetham,India
bl.en.u4eee19015@bl.students.amrita.e s_lekshmi@blr.amrita.edu s_syama@blr.amrita.edu
du

Abstract—Human existence is getting more advanced and control systems that can make sense of erroneous data
better in all aspects due to the tremendous advancements in the regardless of the environment in which they operate.
field of automation. An automation system is a combination of
sensors, controllers, and actuators that work together to A. Advantages of Smart Home Automation:
accomplish a task with little or no manual intervention. Non- • Smart home automation systems make homes more
automated techniques are being replaced by automated convenient and comfortable.
systems. A home automation system will monitor and/or
regulate appliances, entertainment systems, lighting, • Maximizes home security: Home security can surge
temperature, and other factors. Additionally, home security when security and surveillance capabilities are included into
systems like alarm systems and authentication mechanisms smart home network. To increase home security, house
may be used. The aim of this project is to create a home automation systems, for instance, can link motion detectors,
automation system where different sensors and devices are set video surveillance, automated door locks, and other useful
up to trigger one another, like having a smart siren turn on security measures across the house.
whenever the laser detects motion. This system was created by
integrating a range of sensory data and human knowledge in • Convenience and Cost Efficiency: Automation enables
order to complete jobs effectively and efficiently without the users to keep an eye on the control of electrical devices,
need for human intervention. preventing time and energy waste while the devices are not
in use. This lo[rs utility costs, enabling users to save money.
Keywords—Ultrasonic Sensor, Light Dependent Resistors (LDR)
Sensor, Arduino UNO, passive infrared sensor (PIR sensor), Gas • Appliance Safety and Lighting Control: The lighting
Sensor. can be controlled based on the user’s requirements. This
makes it possible for the user to make sure that the lights are
I. INTRODUCTION off and the appliances are switched off while they are not
home to conserve energy.
A smart home system is a home-like setting with ambient
intelligence and autonomous control, enabling it to respond II. LITERATURE REVIEW
to occupants' behaviour and provide them with a range of
Smart home automation or Computerization is the most
amenities. Home automation can include centralised control
popular way of creating smart houses. A system of sensors
of appliances, lighting, HVAC, heating, cooling, and other
captures numerous sets of data about the occupants and the
systems to improve ease, comfort, energy consumption, and
home's energy utilization. Turning on the lights when a
security. A system of sensors gathers various forms of
person walks into the room is a simple example of smart
information about the residents and the home's utility
home automation system. However, more complex
consumption. These data can be analysed by computers and
challenges, such as identifying that whether elderly person is
other devices with computational capability (e.g.,
alone and ill, seem to be more difficult. Machines play a vital
microcontrollers) to identify resident activities or events.
role in people's lives, Home robotization allows control over
They then react to the events by controlling specific built-in
household items. Significant improvements can be made in
devices in the house. In reality, incorporating sensors into
the field of consumer electronics. The concept of a home
intelligent devices and systems has expanded the ability to
automation system can improve a traditional home life. The
monitor, analyse, and aggregate data at a local level. Many
aim is to provide a luxurious life for the elderly and the
physical parameters can be sampled and measured
physically challenged. By using this framework, home
selectively by autonomous and networked sensors. Sensor
appliances work professionally to provide extended personal
integration is expanding rapidly as the foundation for reliable
satisfaction, and comfort to customers.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 202


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In paper [1], Among the Home Automation apps , this


paper makes use of Bluetooth technology. The Bluetooth
innovation operates at 2.4GHz frequency and can link
devices within a 10-100m range at 3Mbps. It demonstrates
whether Bluetooth could be more than merely a standard
method of transmitting data. It connects the efficient
operational system to the microprocessor ATmega328P,
which is at the foundation of the contemporary architecture.
It captures user input information and sends it to the data
directly, which manages the on/off functioning of power
transformers. This approach reinforces a very easy capacitive
fingerprint software that allows individuals of every age to
comprehend the home automation procedure. Only verified
user fingerprints can activate the fingerprint lock.
In paper [2], Several degrees of wireless technology have
been created and implemented throughout the last decade.
Many users in today's culture are familiar with terms like
GSM, Wireless internet, and USB. With extreme
thunderstorms, these levels become part of their regular
norm. Although all of the wireless people's wants appear to Fig. 1. Block diagram of the system
have been addressed, it is evident that they are lacking
something like the "Internet of Things," particularly in
popular home automation (HA). Interoperability between IV. HARDWARE PROTOTYPE MODULES
various electrical and energy equipment is provided by HA
systems, as is the possibility for users to regulate their The essential components for building a smart home
performance. These properties are extremely beneficial in the automation hardware prototype are listed in Table I.
development and the improvement of energy efficiency.
These technologies make people's lives simpler, particularly TABLE I. Hardware modules specifications
the old and the crippled. These systems do exist, but they are
frequently inefficient, costly, and wired. Home automation in Name of the Component Respective Model
existing buildings is challenging to deploy due to wire
placement. It is possible to build an open network and stable
Arduino UNO ATmega328P
connection of limited rechargeable batteries detectors,
actuators, and control devices capable of communicating
successfully and participating in a new extreme of wireless Passive Infrared Sensor HC-SR501
environment. To build such a network, the term "ZigBee" is
employed. This level's name alludes to packet routing Gas Sensor MQ–135
algorithms for big node networks and zigzag data transfer.
2.1. Ultrasonic Sensor HC- SR04
The survey gave a brief idea of the existing technologies
which are ZIGBEE and Bluetooth. The importance of these Light Dependent Sensor LM393
technologies has been analysed and its social impact on the
people with disabilities and elderly people has increased Servo Motor SG90
compared to a traditional home.
Laser Transmitter and KY-008
Receiver
III. DESIGN OF THE SYSTEM
Smart home automation is designed using Arduino UNO
where the automation and security of the home is achieved. V. SYSTEM COMPONENTS
Automation is achieved by integrating multiple sensors, for
motion detection using PIR sensor and ultrasonic sensor, A. Arduino UNO
LDR sensor is used for the control of light intensity. Security The Arduino Uno is a free open-source microcontroller
of a home is achieved using lasers where a laser transmitter board powered by the ATmega328P processor and created
is used which transmits laser light continuously and is being by Arduino. The board has six analog and input/output (I/O)
received by the laser receiver. When the receiver laser
pins and can be programmed using the Arduino IDE
doesn’t receive the laser light which is transmitted from the
(Integrated Development Environment) with a Type-B USB
transmitter, the buzzer system is activated and a gas sensor
(MQ135) is used to detect gases like Carbon Monoxide, connector. It can be powered by an external 9 V battery or
Methane, Hydrogen Sulphate, etc [4-6]. Whenever a fire USB cable [3]. The Arduino Uno board, along with the
breaks out or an LPG leak, a buzzer will be turned on to Arduino IDE version 1.0, became the basis for this long line
indicate that there’s an explosion. To obtain a high-level of USB-based Arduino boards. The Arduino UNO is
security, a camera surveillance (ESP32 CAM) can be perhaps the most widespread microcontroller board, and it is
incorporated to maintain a safe and secure home [7]. supported by a variety of platforms including Linux and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 203


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Windows. The Arduino IDE is an open access application C. Actuators


framework for controlling devices. Arduino is a basic and
Actuators are essential components of the sensing
minimalistic electronic interface that is very affordable and
applications that power today's machines. These gadgets let
does not demand any external hardware.
machines to communicate in their environment in the same
manner that individuals do.They control a home automation
B. Sensors system's real mechanism or functionality. They might be
1) PIR Sensor- electronic switches, gearboxes, or motor-driven valves.
An electronic sensor that detects infrared light emitted 1) Servomotor –
by objects in its range of vision is known as a passive Angular or linear position, velocity, and acceleration can
infrared sensor. PIR is made up of a pyroelectric device be precisely controlled by servo motors in rotary or
that can detect specific quantities of infrared radiation. linear actuators. It consists of a suitable motor connected
Everything, for example, emits varying levels of to a position feedback sensor. It also needs a controller.
radiation, with the amount of radiation increasing as the A servomotor is a closed-loop servomechanism that uses
object's temperature rises. PIR (Passive Infrared position feedback to control its motion and final
Detector) sensors are also termed as PID (Passive position. An analog or digital signal representing the
Infrared Detectors). As a result, the PIR sensor is position of the output shaft is sent to the control system.
capable of detecting infrared light released by particles. It is simply constructed consisting of a simple motor that
In general, PIR sensors can detect animal/human motion is controlled by a servo mechanism.
within a selected limit, which is specified by the sensor's
specifications. The detector does not emit energy; 2) DC motor –
instead, it passively collects it and detects infrared light A direct current motor, also known as a dc motor, is an
from the environment. electrical machine that produces a direct current
magnetic field to transform electrical power into
2) Ultrasonic Sensor- mechanical power. When a DC motor starts operating, a
An ultrasonic sensor is a device that uses ultrasonic magnetic field is generated in the stator. The field
sound waves to measure the distance to an entity. The continues to rotate the rotor by ability to attract and
sensor head sends out an ultrasonic signal, which is repelling the rotor's magnets. The commutator, which is
reflected back to it by the target. Ultrasonic / level connected to the power source brushes, delivers current
sensors use the duration between emission and reception to the motor wire winding, which manages to turn the
to calculate the distance of an object. High frequency rotor.
sound waves reverberate from surfaces, creating
different echo patterns.
3) Light Dependent Resistor(LDR)-
VI. HARDWARE IMPLEMENTATION
LDRs (light dependent resistors) are light-sensitive
resistors. Photo resistor, photocell, and photoconductor
are other names for it. It is a type of resistor in which the Fig.2 displays the hardware configuration for the home
resistance varies depending on the amount of automation. A security system has been used in this system
illumination that strikes the surface. When light is coupled with automation. The door is automated, when the
radiated on the resistor, the properties change. These sensor once detects a human being and to close after a
resistors are extensively utilized in numerous circuits certain amount of time dependent on detection by an
ultrasonic sensor with the aid of a servo motor as an
that necessitates luminous detection [8-10]. These
actuator. A PIR sensor may be used to switch on and off the
resistors were indeed available in a variety of sizes, and
fan in response to human presence. Based on the brightness
resistance levels. Whenever the LDR is in the pitch
of the light, an LDR sensor is utilized to automatically
black, it can turn on a light, and since it is in the switch on and off the lights. In the event of a fire or an LPG
brightness, this can flip off the light. leak, the gas sensor detects the gases and notifies the buzzer
system. A laser security model employs an alarm system to
4) Gas sensor- alert the operator of an intruder's presence [12-15].
The gas sensing module is constructed up of an iron
mechanical structure that houses the sensing element.
This detector receives power from connecting wires.
Gases that come into contact with the sensing element
are electrically charged and assimilated by the detecting
material as a result of this current, which is referred to as
a heating current [11]. This alters the characteristic
impedance of the sensor module, resulting in a shift in
the electricity passing through it.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 204


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

C. PIR sensor and LDR senor


Fig.5 demonstrates the automated control of a fan and a light
using PIR and LDR sensors. This technology controls the fan
automatically depending on the passive infrared rays emitted
by humans, detects motion through a PIR sensor, and may be
operated manually. LDR can change the brightness of the
lights depending on the intensity of the light. If the intensity
is strong, the light will be turned off; alternatively, the lights
will turn on and may be controlled manually.

Fig.2 Sensors Integration for smart home automation

A. Gas sensor system


The gas sensor system is shown in the Fig.3. The
MQ135gas sensor can detect harmful fumes including
ammonia (NH3), benzene (C6H6), smoke, and LPG leaks.
If any of the aforementioned gases are detected or in case of
any fire breakout, the buzzer system is updated[16-18]. Fig.5. Implementation of PIR and LDR sensors

D. Automated Door opening and closing System


The controlled door opening and shutting system is depicted
in Fig.6. The ultrasonic sensor detects motion based on the
distance between the sensor and the individual. If a person's
motion is detected, the servo motor receives a signal to open
or close the door.

Fig.3. Implementation of Gas Sensor and Buzzer

B. Laser security system


In Fig.4, the laser security system is depicted. The laser
receiver in this security system picks up the laser beam that
the laser transmitter continually emits. An alarm system
signaling the presence of intruders will notify the user if the Fig.6.Implemetation of Ultrasonic Sensor
transmission is interrupted.

VII. CONCLUSION
This research work has proposed a home automated system
in which a smart house with high levels of safety and
automation is constructed using multiple integrated sensors.
Numerous sensors are employed in this project for various
functions of the appliances, such as an ultrasonic sensor for
motion detecting. A servo motor is coupled to the sensor
and is used to operate the door. Similarly, a PIR sensor is
used to detect motion (for example, if a human enters the
room), and the sensor will engage. Based on this, Fan or
other associated apps can be activated. LDR sensors are
used to regulate the brightness of lights by turning them on
and off. Laser control is used to secure the residence, and
when the laser is tripped, an alarm sound is buzzed to
Fig.4.Implementation of laser security system

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 205


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

provide an alert. Similarly, gas sensors with a buzzer are [8]R.Piyare, M.Tazi “ Bluetooth Based Home Automation System Using
Cell Phone”, 2011 IEEE 15th International Symposium on Consumer
fitted for any fire breaks out . Electronic.
[9]Bulusu, Sowjanya; Krosuri, Madhuri; Koripella, Rishitha; Sampath,
The difficulty of connecting systems from various Nalini,"Smart and Secure Home Automation Using Internet of Things
vendors is one of the drawbacks of the current smart home Enabling Technologies",Journal of Computational and Theoretical
automation systems. It is challenging to combine new Nanoscience, Volume 17, January 2020
devices with already existing ones created by a different [10]R. Thomas Mathew, Sreeram Thattat, K. V. Anirudh,Adithya Varma P.
brand because so many manufacturers create unique systems. K., and Geena Prasad, “Intelligent Energy Meter with Home
Automation”, 2018 3rd International Conference for Convergence in
Limited functionality and unstable service may occur from Technology (I2CT). 2018.
integrating devices from several vendors. [11]Jalpa Shah, Pathrabe, L., and Patel, B., “Wireless smart power saving
The ideal energy usage for smart homes is still, and will system for home automation”, in 2012 1st International Conference on
Emerging Technology Trends in Electronics, Communication
continue to be, a major concern Networing, 2012.
[12] Ganesh Kumar C, Januja Josephine S, and Premanand V
Chandramani, “Mining Based Device Control for Home
VIII. FUTURE SCOPE Automation”, Joint International Conference on Communication,
Computing and Power Technologies ICCCPT-2015 and Artificial
The proposed model integrates numerous sensors and Intelligence and Evolutionary Computations in Engineering Systems
actuators to allow individuals to live comfortably in their ICAIECES-2015, 2015.
residences. An ESP8266 WIFI module may be added to this [13]V. S. Babu, Kumar, U. A., Priyadharshini, R., Premkumar, K., and
Nithin S, “An intelligent controller for smart home”, in 2016
prototype to permit for remote access and control of International Conference on Advances in Computing,
appliances through a smartphone or tablet. For increased Communications and Informatics (ICACCI), 2016.
protection, a camera may be added, with data transmitted to [14]S. K. Sooraj, Sundaravel, E., Shreesh, B., and K. Sireesha, “IoT Smart
the cloud using modules such as Raspberry pi and picture Home Assistant for Physically Challenged and Elderly People”, 2020
International Conference on Smart Electronics and Communication
categorization accomplished using machine learning (ICOSEC). IEEE, Trichy, India, 2020.
techniques. An application may be designed and interfaced [15]Oberoi, Aaryan; Basavaraju, Sagar;Lekshmi, S“Effective
with IOT to enable a broad range of control over appliances. Implementation of Automated Fertilization Unit Using Analog pH
Sensor and Arduino”, 2017 IEEE International Conference on
REFERENCES Computational Intelligence and Computing Research, ICCIC 2017,
8524170
[1]N. Sriskanthan and Tan Karand. “Bluetooth Based Home Automation [16]Abraham, G., R., R., Nithya, M., “Smart Agriculture Based on IoT and
System”. Journal of Microprocessors and Microsystems, Vol. 26, Machine Learning” ,Proceedings - 5th International Conference on
pp.281-289, 2002. Computing Methodologies and Communication, ICCMC
2021,9418392, pp. 414-419
[2]Rana, Jitendra Rajendra and Pawar, Sunil N., Zigbee Based Home
Automation (April 10, 2010). Available at SSRN: [17]Joshna, V., Kashyap, M., Ananya, V., Manitha, P.V.,“Fully
http://ssrn.com/abstract=1587245. Autonomous Robot to Detect and Degasify Hazardous Gas after
Flood Disaster”, Proceedings of the 2019 2nd International
[3]Lalit Mohan S., et al., "Arduino based home automation using Internet Conference on Power and Embedded Drive Control, ICPEDC
of things (IoT)", International Journal of Pure and Applied 2019,9036703, pp. 134-139
Mathematics Volume 118 No. 17, 769-778, 2018.
[18]Hamdan, Yasir Babiker. "Smart Home Environment Future Challenges
[4]E. Yavuz, B. Hasan, I. Serkan and K. Duygu. “Safe and Secure PIC and Issues-A Survey." Journal of Electronics 3, no. 01 (2021): 239-
Based Remote Control Application for Intelligent Home”. 246
International Journal of Computer Science and Network Security,
Vol. 7, No. 5, May 2017.
[5]S. Lakshmi Ojaswini, et al.,"IoT based Smart Home Security System
and Door Alert using Smart Phone", IRE Journals, Volume 1, Issue 8,
Feb. 2018.
[6]Hamdan, Yasir Babiker. "Smart home environment future challenges
and issues-a survey." Journal of Electronics 3.01 (2021): 239-246.
[7]Amul Jadhav, S. Anand, Nilesh Dhangare, K.S. Wagh “Universal
Mobile Application Development (UMAD) On Home Automation”
Marathwada Mitra Mandal’s Institute of Technology, University of
Pune, India Network and Complex Systems ISSN 2224-610X (Paper)
ISSN 2225-0603 (Online) Vol 2, No.2, 2012.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 206


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Analyzing the Effects of Electric Mobility Charging


Harmonics on Power Grid
Nishant Sharma Akshay Dhiman
Dr.O.P Rahi
M.Tech (CMPA) M.Tech (CMPA) Electrical Engineering
Electrical Engineering Electrical Engineering NIT Hamirpur
NIT Hamirpur
NIT Hamirpur,India Hamirpur,India
Hamirpur,India
21mee201@nith.ac.in oprahi@nith.ac.in
21mee208@nith.ac.in
nishantt01@yahoo.com

Abstract— EVs are restricted in quantity compared to fuel- caused by the congestion of EV charging stations, voltage
based cars, but that will change soon. EVs provide imbalance, and effects on the windings of distribution
environmental and social advantages. The electricity demand transformers, are studied in this paper.
to charge these cars will skyrocket, straining the power system.
Thus, several EV charging stations will be connected to the
grid. Harmonics will be created, affecting voltage stability and II. CHARGING STATION OF ELECTRIC VEHICLE
power quality. In this Paper, harmonic analysis and THD are
assessed with an increase in charging stations. This study Fast charging converters demand a lot of power, which the
considers transformer loads, harmonics, and voltage local power source cannot provide. As a result, suitable
instability. Using an LCL filter at the rectifier end reduces infrastructure for electric vehicle charging stations (EVCS)
harmonics for a same number of charging cars. is necessary [4]. These rapid charging stations have a high
charging rate and need a high-power consumption. The
Keywords—Electric Vehicle (EV), Quality of Power,
fundamental block diagram of the EV charging approach,
Harmonics, Total Harmonic Distortion (THD), Charging Station
for Electric Vehicles which comprises of a transformer, a converter, and a
rectifier, is depicted in Fig.1. An EVCS is created by
combining two bi-directional AC-DC rectifiers and a bi-
I. INTRODUCTION directional DC-DC converter.
The concept of electric vehicles is growing rapidly in
the sector of transportation as compared to conventional Control Control
Grid
fossil-fuel vehicles. There are several benefits of using an
EV, such as less pollution to the environment, a cheaper
transportation mode, and a reduction in the use of fossil
fuels. EVs have become highly prominent and people are Filters

shifting towards EVs.

EVs can be considered not only as a random load that Transformer Bi-directional Bi-directional Electric
consumes energy but can also be used for power AC-DC converter DC-DC converter Vehicle
generation and back to the grid [1]. For the establishment
of this connection between vehicles and the grid, electric Fig.1 Brief Model of EV charging methodology
vehicle chargers are required. There are various types of PROBLEM FORMULATION
chargers used, such as Type 1 chargers, Type 2 chargers,
and Type 3 chargers. The low-power chargers are Type The EV charging stations include a variety of non-linear
One and Type Two chargers, which have a high charging loads, resulting in harmonics, voltage disturbances, and
time. The Type three charger is the fastest of all, which power quality concerns in the system.
increases the percentage of the battery from 25% to 80%
within a few minutes [2]. Since in the charger, various As a power loss takes place in the distribution transformer
non-linear elements are present as a result of which [5]. An EV charging station of type 2, which is mostly used
harmonics are produced. Due to the presence of these in India, has a maximum current rating of 16A and a
harmonics, the windings present in the transformer get maximum power rating of 3.4 KW. Type 3 chargers are fast
affected, and power output deteriorates. So, when more chargers that charge the vehicle within minutes. The power
EVs are charged, the power quality in the system gets rating of type 3 fast chargers is near about 60KW and
worse [3]. Battery performance can be improved by using charges at a constant current, which is in the range of 60A.
various control techniques like fuzzy logic In this section, the mathematical analysis of various factors
implementation [13]. Use of renewable energy sources like power quality, harmonics mitigation, distorted voltage
like wind energy with proper enhancement can be used to waveform, and transformer overloading is discussed.
improve the efficiency of the circuit. In this article,
MATLAB Simulink software is used to study the impact
of EV charging stations on the distribution grid. Certain
factors, such as degradation of power quality, which is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 207


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A. Power Demand cos1 is Phase coefficient. From the above equation THD
The battery of the electric vehicle takes power from the
electric distribution network. With the presence of non- can be calculated as
linear elements in the system, as the demand for power
increases, the system may lose stability. The expression of I2 I I
the power demand can be expressed as in equation 1. THD = ( )2 + ( 3 )2 + +( n )2
PEV Cbattery*(SOCmaximum − SOCminimum)/ TD I1 I1 I1
=
Here, battery is the capability of the battery, and TD is the D. Performance Of Transformer
time taken by the battery for charging. SOC is a factor that
determines whether high power or low power is taken by an The increased stress on the distribution network caused by
EV. The total power required by all the EVs is the addition the mass deployment of EVs has a multiplier effect on the
of the individual powers of all the EVs combined together. life cycle. There should be a limited charging rate of EVs
per day, and the charging stations must be kept far away
B. Voltage Profile from the distribution transformer to further reduce the power
Fast charging results in the waveform of voltage being loss and improve power quality. The prominent reason for
distorted and somewhat unbalanced. Since high power power loss in the transformer is harmonic current, and the
transfer takes place in the case of a fast charger, it has an harmonic voltage results in no load losses. [9]. Due to these
impact on overall system stability and leads to grid instability losses caused by harmonics, there is an increase in the heat
[6, 7]. This can be made better if the charging stations use with respect to purely sinusoidal waves. The capability to
renewable energy sources like solar and wind power. These combat harmonics can be measured by a factor known as the
renewable sources can act as the backbone of the grid during K-factor.
the time of peak demand and reduce instability in the system
during charging. The low voltage produced could be SOLUTION METHODOLOGY
threatening sometimes. It results in grid instability and a
degradation in voltage profile.. When batteries of Electric Vehicles are charged from the
charging station connected to utility grid ,the power
C. Harmonics quality would be hampered. Here in this paper, the
EVCS impact on the local grid is studied and analyzed
As compared to fundamental frequency, harmonics are the using a simulation model shown in Fig.2.
high frequency component of voltage and current [8].
Harmonics affect the power quality of the system by Control
distorting the voltage and current waveform. Measurement
of harmonics can be done with the help of a factor known as
Total Harmonic Distortion (THD). THD basically tells you
the distortion in the signal. Power factor is defined in a
harmonic power system as the ratio of actual power (P1) to
apparent power (S). The product of the effectual value of Control
Grid
voltage and current results in apparent power. The rms value 132 kV
Control
of the harmonic current for the current which is non- A

sinusoidal in nature is given as:


I=
B Pi-

I12 + I22 +
\
+In2 section
20 km
Filters
Feeder
C

P1 U I1 cos 1 I1
cos = = = cos =  cos1 120kV/25kV
47MVA
25 kV/440V
200 kVA
Bi-directional
AC-DC converter
Control
1
S UI I

Where,  is the Harmonic factor

Fig.2.Simulation of Electric Vehicle Charging Station (EVCS) model

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 208


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Two step-down transformers are used to reduce the voltage


from the utility grid, which is supplied at 132 kilovolts
(KV) at 50 hz. A transformer at the sending end reduces the
voltage from 120 kilovolts to 25 kilovolts before it travels
over a transmission line with n sections across a distance of
25 kilometres. The 25KV is reduced to 440V via a
transformer at the receiver side. This is where DC is
produced and fed into the buck boost converter, that convert
DC to AC. This converter is also serving as a charger.
Currently, all cutting-edge EVs employ 5 KWh Li-ion
batteries.

III. ANALYSIS OF RESULTS


If the grid's power quality is improved, consumers will be
supplied with clean, consistent electricity that has a
sinusoidal waveform, is devoid of noise, and falls within the
acceptable range of voltage and current harmonics. One of
the most typical issues with power quality is the drooping Fig 4(a) Input voltage when charger is not connected
and swelling of the voltage waveform caused by harmonics.
These issues arise from the non-linear components
contained in EV chargers that interact with the grid. These
negative impacts need investigation since India is moving
toward adopting EVs.
Fundamental (50Hz) = 62.12 , THD value= 4.92%

Fig. 3a. Harmonic variation when single EV is charged.

Fundamental (50Hz) = 62.28 , THD value= 15.69%

Fig. 4(b) Connected Charger Input Voltage

E. Implementing LCL filter to reduce THD

Fig. 3a. Harmonics variations when four EV’s are charged.

Fundamental (50Hz) = 62.26, THD value= 24.86%

Fig.5a.When one EV is connected

Fig. 3(b)Harmonic variations when eight EV’s are charged

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 209


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Thus, hybrid power generation schemes such as solar, wind,


and biomass can be a critical solution to overcoming these
challenges in EV charging [11]. the use of various electronic
devices to improve voltage stability can be implemented.
The research that was performed on Green House Gas
(GHG) emissions mentioned that chargers with non-
renewable resources are much more pollutive in comparison
to chargers with renewable resources [12]. As a result, the
scheme of using renewable resources for EV charging has
the potential to have a significant impact on EV charging
while also reducing GHG emissions and improving power
quality.
Fig.5b.When four EVs are connected
V. CONCLUSION
It is inevitable that EVs will capture the entire market in the
foreseeable future. As a result, there is a need for charging
stations that are located near to the residential area, and they
should be consumer-friendly. There is a requirement for an
efficient and strong grid system to hold out against
integration with EVCS. In the above study, the impacts of
the integration of EV fast charging stations with the local
utility grid are analyzed. Certain issues present in the
system, such as harmonics, voltage swelling/sagging,
increase in demand, and overloading of transformers, are
addressed in this article. The MATLAB Simulink software
Fig.5c.When eight EVs are connected is used for the analysis, and the results are explicated.
Methods like the use of an LCL filter to mitigate power
quality issues and instability in the grid are also briefly
F. Power Deterioration In Transformer discussed in this paper. Apart from having a negative
With multiple EV charging taking place, overloading of the impact, EVCS also has some positive impacts like peak
transformer will take place, thereby increasing power loss. shaving, load balancing, and reactive power support in
The harmonics in the current lead to heating of the vehicle-to-grid technology. Thus, regularization of EVCS to
transformer core and winding, thus resulting in power loss. grid integration is required for future development.
The table shown below demonstrates the loss of power due
to harmonic injection.
REFERENCES
TABLE I. TRANSFORMER OUTPUT KVA BEFORE AND AFTER EV
CHARGING STATION CONNECTION. [1] M. Yilmaz and P. T. Krein, "Review of Battery Charger Topologies,
Charging Power Levels, and Infrastructure for Plug-In Electric and Hybrid
S.No Output kVA without EV KVA obtained with Vehicles,” IEEE Transactions on Power Electronics, vol. 28, no. 5, pp.
EV 2151-2169, May 2013.
1. 200 197.83 (Single EV) [2] M. Brenna, F. Foiadelli and M. Longo, "The Exploitation of Vehicle-
toGrid Function for Power Quality Improvement in a Smart Grid," in IEEE
2. 200 192.64 (Four EV)
Transactions on Intelligent Transportation Systems, vol. 15, no. 5, pp.
3. 200 185.91 (Eight EV) 2169-2177, Oct. 2014, doi: 10.1109/TITS.2014.2312206.
[3] J. Y. Yong, V. K. Ramachandaramurthy, K. M. Tan and J. Selvaraj,
"Experimental Validation of a Three-Phase Off-Board Electric Vehicle
From the table above it can be seen that as the number of Charger With New Power Grid Voltage Control," in IEEE Transactions on
EV are increasing the loss is significantly increasing and Smart Grid, vol. 9, no. 4, pp. 2703-2713, July 2018, doi:
10.1109/TSG.2016.2617400.
thus the efficiency of the system is reduced. The loss of
[4] V. T. Tran, M. R. Islam, K. M. Muttaqi and D. Sutanto, "An Efficient
power in the transformer can be reduced by the use of Energy Management Approach for a Solar-Powered EV Battery Charging
transformer which has higher value of k factor. Facility to Support Distribution Grids," in IEEE Transactions on Industry
Applications, vol. 55, no. 6, pp. 6517-6526, Nov.-Dec. 2019, doi:
10.1109/TIA.2019.2940923
IV. TECHNIQUE TO IMPROVE POWER QUALITY ISSUES [5] L. Zhu, A. R. Taylor, G. Liu and K. Bai, "A Multiple-Phase-Shift
Control for a SiC-Based EV Charger to Optimize the Light-Load
Multiple disturbances that are observed in MATLAB Efficiency, Current Stress, and Power Quality," in IEEE Journal of
simulation act as deteriorating factors for the stability of the Emerging and Selected Topics in Power Electronics, vol. 6, no. 4, pp.
power system. In order to improve efficiency and power 2262-2272, Dec. 2018, doi: 10.1109/JESTPE.2018.2820064.
quality, there is a need to minimize these disturbances.
Renewable resources such as solar, wind, and biomass have
enormous potential in India. Integration of these resources
with EV charging can provide a good solution that can
mitigate the barriers to power quality improvement [10].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 210


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[6] S. Weckx and J. Driesen, "Load Balancing With EV Chargers and [11] Yusuf, Sk Suzauddin, and Nirendra Nath Mustafi. “Design and
PV Inverters in Unbalanced Distribution Grids," in IEEE Transactions simulation of an Optimal Mini-Grid Solar-Diesel Hybrid Power
on Sustainable Energy, vol. 6, no. 2, pp. 635-643, April 2015, doi: Generation system in a remote Bangladesh.” International
10.1109/TSTE.2015.2402834. Journal of Smart Grids, ijSmartGrid 2, no. 1, March (2018): 27-33.
[12] Ilieva, Liliya Mihaylova, and Simeon Penchev Iliev.
[7] A. Khan, S. Memon and T. P. Sattar, "Analyzing Integrated “Feasibility assessment of a solar-powered charging station for
Renewable Energy and Smart-Grid Systems to Improve Voltage electric vehicles in the North Central region of Bulgaria.”
Quality and Harmonic Distortion Losses at Electric-Vehicle Charging Renewable Energy and Environmental Sustainability 1 (2016): 12.’
Stations," in IEEE Access, vol. 6, pp. 26404-26415, 2018, doi: [13]Atul Nayan and O.P.Rahi. “Charging and Discharging of
10.1109/ACCESS.2018.2830187. Battery in a PV system using Fuzzy Logic Controller” 2022 First
[8] A. Verma and B. Singh, "Multimode Operation of Solar PV Array, International Conference on Electrical, Electronics, Information and
Grid, Battery and Diesel Generator Set Based EV Charging Station," Communication Technologies (ICEEICT)
in IEEE Transactions on Industry Applications, vol. 56, no. 5, pp. [14]B.K.Biswal and O.P. Rahi “An enhanced control
5330-5339, Sept.-Oct. 2020, doi: 10.1109/TIA.2020.3001268. methodology for LVRT Improvement of DFIG under fault
[9] D. B. Wickramasinghe Abeywardana, P. Acuna, B. Hredzak, R. P. condition. 2022 IEEE Delhi Section Conference (DELCON)
Aguilera and V. G. Agelidis, "Single-Phase Boost Inverter-Based
Electric Vehicle Charger With Integrated Vehicle to Grid Reactive [15]Nirbhay Tiwari and O. P. Rahi, “Application Oriented SEPIC
Power Compensation," in IEEE Transactions on Power Electronics, Converter with Improved Voltage Gain for Electric Vehicle Battery
vol. 33, no. 4, pp. 3462-3471, April 2018, doi: Charger”, IEEE- International Conference on Distributed
10.1109/TPEL.2017.2700944. Computing and Electrical Circuits and Electronics (ICDCECE-
[10] A. Das., M. A. M. Bhuiyan, and A. Nasir. “Prospects of solar 2022),23-24thApril2022,pp..
energy in Bangladesh.” IOSR J. Electr. Electron. Eng 4.5 (2013): 46-5.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 211


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Optimal Placement of Electric Vehicle Charging
Station by Considering Dynamic Loads in Radial
Distribution System
Dandu Srinivas Dr.M. Ramasekhara Reddy
Research Scholar Assistant Professor
Department of Electrical Engineering Department of Electrical Engineering
JNTU Anantapur JNTUA College of Engineering, Anantapur
Anantapur, India Anantapur, India
srinivasphd226@gmail.com ramasekharreddy.eee@jntua.ac.in

Abstract— Electric vehicles with unique characteristics In the existing radial distribution systems, the current
like lower noise, energy saving and pollution free due to problems that are facing by EV’s and the obstacles for
reduction of carbon dioxide are consider to be the best development of EV’s are the optimum placement of electric
choice for future automobile industry. The battery of vehicle charging stations [1] and the charging time for a
electric vehicle (EV) must get recharged at charging battery to get charged. It is fact that the power system
stations when they are used for driving in urban area. operation and control has been already faced wide variety of
Since electric charging stations will be used problems due to rapid growth and integration of distributed
simultaneously by many EV. The existing distribution generation but now if the integration of these large numbers
system might not be highly affected by the installation of of electric vehicle charging stations may become further
charging stations if the numbers of electric vehicles are burden for the power grid if not planned properly. As the
small. However, with the increase in the number of charging of maximum number of EV’s at same time will
electric vehicles the characteristics of the electric vehicle have the significant impact on electrical power grid because
charging patterns may have considerable impact on charging a greater number of EV’s at a time may lead to
distribution systems which depends particularly on the peak demand of electricity which can have significant
electric vehicle charging location. There may be impact on the electrical grid system. Therefore, necessary
significant impacts like overloading and power losses in precautionary actions to be taken to avoid failure of
the system. These impacts could be mitigated by proper electrical power grid system due to the peak demand. The
system planning and through strategic placement of placement of charging stations (CS’s) in this existing system
Electric Vehicle Charging Station (EVCS) in the existing with high energy demand can results in more power
radial distribution network. In this research the optimal demand, this may cause disturbance in the distribution
location EVCS are identified in radial distribution system. So, the analysis is required for optimal placement of
network and also the active power losses and system CS’s by considering either by static size or dynamic size in
voltage profile are examined. This research proposes a the radial distribution system. The charging points in the
heuristic algorithm called Particle Swarm Optimization charging station will charge the specified battery size of
(PSO) to optimize the IEEE 33 bus radial distribution electric vehicle. The location of EVCS is the focus of
system with electric vehicle charging stations. The prime current researchers. However, for the best EVCS placement
objective is to place the EVCS at optimal location in the power losses and system voltage profile must be
existing radial distribution network by considering the assessed. For lower bus systems, such as the 69 radial bus
real (active) power losses and also the voltage at the systems and the 119 radial bus system, etc., the method of
buses of the system. trial and error for EVCS placement and sizing is very
Keywords—Electric vehicle, Charging station, Radial simple. The location of the charging station may be best
distribution systems, Optimal placement, Particle swarm served by looking for low sensitivity voltage buses.
optimization However, this way of searching is unable to deliver the best
EVCS on greater bus radial systems.
I. INTRODUCTION
Heuristic algorithms were created as a result for the best
Environmental issues have become one of the most
placement of EVCS for EV as well as for reduced power
serious concerns for the environmental researchers. Now
losses [2] and subsequently to improve the system voltage
one of the primary issues of big cities is growth in emission
profile. For the best position of the charging station, the
of greenhouse gas which is linked to use of internal
researchers take into consideration restrictions like voltage
combustion engines of fossil fuel cars. Greenhouse gases are
and current limits. Since the EV's charging current is always
being reduced through the use of various technologies. As
real, the batteries power rating is expressed in kW.
an ecologically friendly transportation technology, Electric
Therefore, in addition to the current load at the buses, extra
Vehicles (EVs) are giving tremendous potentials for
real power loads must be provided in order to represent the
increasing the power system dependability and flexibility.
EVCS connected in the radial bus system. A heuristic
Among the many advantages of electric vehicles is a
approach called Particle Swarm Optimization (PSO) is
reduction in reliance on fossil fuels of 40-60 percent. Other
proposed in this work for the best positioning of EVCS. The
advantages include convenience, safe charging, high
concept is used with the IEEE 33 bus radial distribution
performance, and flexibility in fuel choice.
standard system while taking into account dynamic loads.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 212


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. RELEVANT BACKGROUND 1) Negative impacts:


Fig.1 shows the categorization of the effects of EV The first is the effect on the distribution system's power
integration. The analysis of EV load impact is presented. The quality which is defined as the ability of power system
influence of EV load on distribution network [4] parameters which delivers continuous power to loads without any
comes first, then the effects on the environment and the harmonics and a clean power supply. Two common power
economy. The potential benefits and drawbacks of
quality problems are harmonics and voltage sag/swelling in
integrating EV load into the distribution network are shown
particular. Electric vehicle charging stations are creating
in Fig.1.
those power quality problems when connecting to the power
grid. As per IEEE 519 defining power quality, the (THD)
total harmonic distortion values for power networks up to 69
kV should be less than 5%. This study suggests that
integration of EV’s to the grid and the EV load connection
to existing distribution will results in increase in harmonic
disturbances. The total harmonic distortion ranges at 4.82%
for single EV which is connected to the device to 19.69%
for about five EV’s using various modules.
a) Voltage impact: Voltage impact: This section
discusses how Plug in EV introduction influences voltage
variations, which has an impact on how efficiently power is
delivered to consumers. There is a voltage drop across the
buses during charging due to adding of EV’s to the existing
distribution network. The literature states that less than 95%
of nominal voltage lost due to voltage loss in some
locations. Due to that the system upgrades are necessary.
With varying charging rates between 20 and 80 percent, the
voltage deviates from the specified voltage by 12.7% to
43.3% [4] penetration of PEV.
b) power loss impact: Losses in the power system has
become a significant problem during the energy demand that
will be produced in the future is taken into account [12]. As
stated by “reference” Dharmakeerthi. et. al 2011, for 62
percent market penetration of PEVs, 40% of loss in energy
is seen during off-peak charging. The researchers found that
when PEV adoption rose, network power losses increased
considerably. Applying the ideal placement of the EVCS
process would reduce the increase in power loss to a certain
value.
Fig. 1 EV Load Impact Classification c) Reliability impact: In recent years, a difficult field
of research has been the distribution network reliability
A. EV Load Affects on existing distribution system: studies. Specifically, statistical information on the failure
The expansion of EVCS’s introduces various issues to rate, repair rate, average outage time, and the number of
existing distribution system. These topics have undergone users is used to determine the distribution network's
careful evaluation recently. In the past researches it is seen dependability indices [6]. Additionally to evaluate
that electric vehicle’s effect analysis is generally used to dependability and vulnerability of each bus in distribution
determine how inclusion of electric vehicle’s affect the network the term employed is bus reliability index. The
electricity generation, the age of transformers, and the stability analysis of the distribution system can be evaluated
power efficiency of distribution systems. In fact, it's feasible using reliability indices of the system. The system
that EV charging during times of high demand will increase dependability indices are divided into customer and energy
that demand, necessitating an increase in generation based categories. The official names of the customer based
capacity. Additionally, a higher demand for EVs will reliability indices are SAIFI, SAIDI, and CAIDI. While
overload transformers in substations and services, reducing SAIDI specifies the average interruption time per customer
the lifespan of those components. Furthermore, EVCS’s can served and SAIFI gives the information how many times
result in among other power quality problems [5] like that client encountered the power interruption in a specified
current and voltage harmonics, voltage sags, and power time period. Additionally, SAIDI is influenced by the
fluctuations. quantity of consumers as well as the length of the outage
[7].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 213


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

2) Positive impacts: Advantage of the V2G programme k  =Branch incidence matrix,


is that The Vehicle to Grid scheme of EVCS’s has many
benefits like lower cost EVCS operators, lower cost EVCS
customers, and better EVCS load duration curves. In reality,
ibranch  =Branch current in given radial distribution
the V2G program's primary advantage is the ability to network,
transfer energy from automobile batteries to the grid during v = z ibranch  (3)
periods of high demand and to recharge the batteries during
periods of low demand. According to the study's most v  = vbus  − v
u
(4)
encouraging finding, the system could handle wind z=Bus impedance matrix,
v = Difference in the voltage,
integration of up to 59 percent of total grid generation
capacity when EV participated in primary frequency
regulation. However, a certain amount of solar energy can
be used to charge an electric vehicle.
v =Bus voltage which is undated.
u

The most encouraging finding of the study was that 59% Therefore an updated voltage given in the equation (4)
of the grid's generating capacity could be supplied by wind is used for the calculation of bus current.
energy when EVs were used for main frequency This procedure will be continued upto the error between
management. The EV, however, may be charged using a vbus and v u → 0 as t→∞. As the cdth branch which is in
limited amount of solar power.
between bus c and bus d as shown in Fig.2 and the losses in
III. PROBLEM FORMULATION this branch is determined by equation (5) which is given
With the rapid expansion of the electric vehicle industry below.
wants an urgent need for charging stations, particularly in (v(c.) − v(d .))2
light of the relatively low energy storage capacity of EV Losses (m) = (5)
batteries. Sixty-two percent of fleet cars will be replaced by z cd .
EVs by 2050 if the current pace of adoption is maintained.
B. Electric Vehicle Charging Station Modeling:
Due to the rapidly expanding demand for electric vehicles
(EVs), charging stations (CS) [12] are now a need. Electric car batteries are charged at stations known as
However, the research has not yet examined the need of electric vehicle charging stations (EVCS) [14]. Typically,
studying how the introduction of EVCS would affect the the energy rating of EV batteries is indicated in kWh and
already-in-place radial distribution system. With this study, Ah. Therefore, the main presumption for modeling the
we examine how the radial distribution system will change EVCS is that it only provides the EV battery with the
when EVCS is implemented. necessary real current. Any bus's actual power is enhanced
if EVCS is linked to it. As a result, these EVCS are
A. Distribution System Load Flow
strategically placed in regions where branch currents are at
Due to several unique topological characteristics, load their lowest. Assume that bus d from Fig. 2 is the best bus
flow algorithms for power distribution systems are very for EVCS placement. The active power in addition to the
different from those for transmission systems. Due to the power required for already existed load is drawn by EVCS
radial nature and more R/X index of the branches a from this bus d.
traditional load flow technique Newton-Raphson method not
possible to apply. So for distribution systems a forward and
backward sweep method is used. In this method with loads
at each bus, the current from the last branch to the first
branch may be determined. So, forward/backward load flow
is the name given to this load flow [13].
The fundamental power equation can be used to compute
the bus currents [9].

i  = s 
*

v 
bus
bus *
(1)
bus

ibranch  = k ibus  (2)


Where,

s  = apparent power across the bus,


Fig.2. Radial Distribution Network where EVCS at bus d
*
bus

vbus  =Voltage across the bus,


ibus  =Current across the bus,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 214


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. EVCS OPTIMAL LOCATION IN RADIAL DISTRIBUTION


NETWORK USING PSO
Another popular and effective approach that enhances
performance through real number randomness and cross-
particle communication is Particle Swarm Optimization
(PSO). The swarms of potential solutions (particles)
continuously exchange and assess the individual bests and
collective bests as they search for the ideal solutions in
search space. In reality, at the beginning of the iteration,
every particle goes in a route vector that is achieved from its
individual and collective bests, finally convergent to the
global optimum. PSO provides a straightforward
computation methodology to identify the ideal site,
according to [1], [3], and [10]. However, the research did
not address how EVCS might affect the existing distribution
systems regarding the power losses and voltage profile.
Therefore in this research a methodology is suggested effort
to choose the best bus for installing EVCS in a radial
distribution system and to assess its impact using PSO.
Initializing starting and final velocities, as well as particle
initialization with random values based on the problem's
dimensions, are the fundamental stages of PSO
optimization. The number of EVCS is one of the dimensions
for the current issue. Figure 3 depicts the flow chart for the
aforementioned methods. The radial distribution system's
EVCS [3] location pseudo code/algorithm is given below:
Step-1: Set the particles initial bus numbers by utilizing

Y (1,i) =randi (2,nbus)

 y11 y12 − − y1nx 


y y 22 − − y 2nx 
 21
Y = − − − − −  (6)
 
 − − − − −  Fig.3 Flow chart of EV Charging Station on a Bus of the Radial
Distribution Network
 y np1 y np 2 − − y npnc 

Step-7: Follow the above steps from 3 to 6 for all
Where, generations. By adopting PSO for optimal placement of EV
nx is termed as minimum EVCS necessary, charging station on IEEE 33 bus radial distribution system.
The below table gives the list of parameters considered for
Step-2: Represent Wmin as minimum inertia while Wmax. as
PSO.
maximum inertia.
Step-3: Calculate the losses of each particle in every TABLE I: PARAMETERS CONSIDERED FOR PSO IN THIS
generation by the application of load flow studies. METHODOLOGY
Step-4: Determine the losses that existing for each
generation S.No. Parameter Symbol Value
Step-5: As in [7] by equation (7) given below update the 1 Generations ng 100
particles regularly. 2 Particles np 50
3 Maximum inertia Wmax 0.9
Y(update)=W*Y+C1*randi(1)*(Pbest-Y)+C2*randi(1) 4 Minimum inertia Wmin 0.2
*(Gbest-Y) (7) 5 Intial Velocity C1 2.2
Where, 6 Final Velocity C2 2.3

W = Wmax -
(Wmax. − Wmin. ) (iteration-1) (8)
ng − 1
Step-6: The maximum and minimum constraints are
adjusted by updating the positions.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 215


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. RESULTS AND DISCUSSION


Fig. 4 shows the single line diagram of IEEE 33 bus
radial distribution system with 12.66 kV and 100 MVA
capacities which has four feeders where each feeder supplies
the same amount voltage. The main branches are
represented with think line where as the tie lines are
represented with the dotted lines. The proposed PSO method
[15] is evaluated in a MATLAB environment on a
conventional in order to identify the optimal position of
EVCS. In this research charging stations with different
capacities 1.5 MW, 3.0 MW and 4.5 MW are considered.
Each charging station having a built up of 50kW charging
units.

Fig.5. Voltage Profile at Buses with and without Placement


of EVCS
From Fig.5, we can observe that the bus 1 and bus 19 are
having better (higher) voltage profile when compared to all
other buses in the distribution system. The voltage at bus 2
and bus 19 with better values therefore the bus 1 which is
nearest bus to 2 having less losses compared to bus 2 and
bus 19 were the ideal locations to place the EVCS which are
shown in Fig.4. A vital task for effective operation is
reducing power losses in a distribution system to save
energy. Fig.6 displays the actual power losses in the
distribution system with and without the installation of
EVCS.

Fig.4. Radial Distribution Network Line Diagram


Consisting 33 Bus with EVCS at Bus 1 and Bus 19
To verify the performance, the proposed system is
properly evaluated regarding the system voltage profile and
active power losses. We are aware that (0.95 V 1.0) is the
allowed voltage range for all of the network's buses.
Accordingly, the suggested methodology only needs one
load flow analysis as opposed to the 32 load flows analysis
needed if the trial-and-error technique is employed to find
the appropriate location of EVCS (for 33 bus distribution
system). As a result, not only does the proposed algorithm
aid in locating the best EVCS, but it also shortens the
amount of time required to do so. After the load flow
analysis using proposed PSO algorithm, the voltage profiles
before and after placement of EVCS at different buses Fig.6. Real Power Losses at Buses with and without
(nodes) of the distribution system are shown in Fig.5. Placement of EVCS

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 216


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II. COMPARISON OF IEEE 33 BUS RADIAL REFERENCES


DISTRIBUTION NETWORK WITH AND WITHOUT EVCS
[1] M. S. K. Reddy, A. K. Panigrahy and K. Selvajyothi, "Minimization
Voltage Active of Electric Vehicle charging Stations influence on Unbalanced radial
Optimal EVCS distribution system with Optimal Reconfiguration using Particle
S.No Cases profile in power
bus location Swarm Optimization," 2021 International Conference on Sustainable
p.u (bus) losses (kw)
Energy and Future Electric Transportation (SEFET), 2021, pp. 1-6,
Without doi: 10.1109/SeFet48154.2021.9375665.
1 0.9978 (19) 198.1 -
EVCS
[2] F. Ahmad, A. Iqbal, I. Ashraf, M. Marzband and I. Khan, "Placement
With of Electric Vehicle Fast Charging Stations using Grey Wolf
2 0.9939 (19) 234.6 1 and 19 Optimization in Electrical Distribution Network," 2022 IEEE
EVCS
International Conference on Power Electronics, Smart Grid, and
Renewable Energy (PESGRE), 2022, pp. 1-6, doi:
10.1109/PESGRE52268.2022.9715842.
The above table displays a comparison of IEEE 33 bus
[3] M. S. K. Reddy, K. Selvajyothi, "Optimal Placement of Electric
radial distribution network with and without EVCS. By Vehicle Charging Stations in Radial Distribution System along with
integrating EVCS at the best sites, the active power losses Reconfiguration", 2019 IEEE 1st International Conference on Energy,
are observed to be enhanced in the table above. The bus Systems and Information Processing (ICESIP), Chennai, July 4-6,
voltages will drop in this case, which will affect the stability 2019, pp. 1-6.
margin in the distribution network. DOI : https://doi.org/10.1109/ICESIP46348.2019.8938164.
[4] M. O. Khan, S. Kirmani, M. Rihan and A. Kumar Pandey, "Optimal
Integration of Electric Vehicle Charging Stations and Distributed
VI. CONCLUSION Generation in Distribution Network," 2022 IEEE Students Conference
The usage of the EV’s will reduce the emission of on Engineering and Systems (SCES), 2022, pp. 01-06, doi:
10.1109/SCES55490.2022.9887650.
greenhouse gas and will have many environmental benefits.
[5] Fareed Ahmad, Imtiaz Ashraf, Mousa Marzband, Irfan khan, “
The optimal placement of EVCS’s has become a high Optimal location of electric vehicle charging station and its impact on
concern for the existing distribution network operator due to distribution network: A review”,Energy Reports 8 (2022) 2314–2333.
increase in EVCS’s installations. With the sudden increase of [6] P. Jamatia, S. Bhattacharjee and S. Sharma, "Optimal allocation of
EV load penetration into the distribution system results in the EV charging station in Distribution Network," 2022 4th International
mismatch of generation-load demand which in turn increases Conference on Energy, Power and Environment (ICEPE), 2022, pp.
the losses in the system. This may lead to decline in the 1-6, doi: 10.1109/ICEPE55035.2022.9798348 .
voltage stability margin due to decrease in voltage quality. [7] Devisree Chippada, M. Damodar Reddy, “Optimal Planning of
Therefore, it is necessary to integrate the EVCS’s at suitable Electric Vehicle Charging Station along with Multiple Distributed
Generator Units” I.J. Intelligent Systems and Applications, 2022, 2,
locations in order to reduce the harmful effects due to the 40-53. DOI: 10.5815/ijisa.2022.02.04
penetration of EV load into the existing radial distribution [8] Kamali, A. R., and V. Prasanna Moorthy. "Design of Solar and
system. This research proposes a new approach by Battery Hybrid Electric Vehicle Charging Station." Journal of Trends
considering dynamic loads to deal with the issues related to in Computer Science and Smart Technology 4, no. 1 (2022): 30-37.
optimal placement of EVCS’s in the IEEE 33 bus radial [9] D. Sanchari, Kari Tammi, Karuna Kalita, P Mahanta, "Impact of
distribution systems by using Particle Swarm Optimization Electric Vehicle Charging Station Load on Distribution Network",
(PSO). To determine the optimal location of EVCS’s the Energies, 11, no. 1:178, 2018. DOI:
https://doi.org/10.3390/en11010178. (Article)
proposed PSO algorithm is applied on standard IEEE 33 bus
[10] Deb, S., K. Kalita, and P. Mahanta. December, 2017a. Review of
radial distribution network with MATLAB environment. The impact of electric vehicle charging station on the power grid.
performance of the proposed system is compared with and Proceedings of IEEE Conference on Technological Advancements in
without charging station placement where the proposed PSO Power and Energy (TAP Energy), Kollam, India.
algorithm does not only helpful in finding the optimal [11] Deb, S., K. Kalita, and P. Mahanta. 2019. Distribution network
location of EVCS but it also reduced the total computing planning considering the impact of electric vehicle charging station
time in finding the optimal EVCS locations. load. Smart Power Distribution Systems, Academic Press, 529–53.
doi:10.1016/B978-0-12-812154- 2.00022-5.
Research Challenges and Future Research Directions: [12] M. Etezadi-Amoli, K. Choma, and J. Stefani, Rapid-charge electric
In this research the findings are that the active power vehicle stations, IEEE Trans. Power Del., vol. 25, no. Jul. 2010, pp.
18831887.
losses are increased by adding EVCS to the existing IEEE
[13] Dharmakeerthi, C., Mithulananthan, N., Saha, T.K., 2011. Overview
33 bus radial distribution network as the current drawn from of the impacts of plug-in electric vehicles on the power grid. In: 2011
the substation is more which in turn increases the losses in IEEE PES Innovative Smart Grid Technologies. IEEE, pp. 1–8.
the system. Therefore, there many attractive research [14] C.Y. Wu, C.B.Li,L.Du, and Y.J.Cao,A method for electric vehicle
directions to pursue in the future. One among them is to charging infrastructure planning, Autom. Elect. Power Syst., vol. 34,
investigate the impacts of EVCS on the radial distribution no. 24, pp. 3639, Dec. 2010.
system because it has been witnessed that the power losses [15] J. Kennedy, RC. Eberhart,“ Particle swarm optimization”, In:
Proceedings of IEEE International Conference on Neural Networks,
were high in the system after the placement of the charging Perth, Australia, Vol 4., 1995, pp 1942–1948.
stations when compared with the power losses without DOI: https://doi.org/10.1109/ICNN.1995.488968.
charging stations.
▪ The impact of rise in real power losses in the
system can be mitigated by the reconfiguration
of existing radial distribution network before
finding the optimal location of EVCS.
▪ The power losses in the system can be
minimized if EVCS’s are placed far away from
the substation along with the DG units.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 217


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Performance Enhancement of Kesterite


Cu2ZnSn(S,Se)4 Thin Film Solar Cell

1st Satyendra Kumar 2nd Swati Arora

Department of Electronics Engineering, Department of Electronics Engineering,


Swami Keshwanand Institute of Technology, Management Swami Keshwanand Institute of Technology, Management
& Gramothan, Jaipur, India-302017 & Gramothan, Jaipur, India-302017
rajeshwar.satyendra@gmail.com, aroraswati14@gmail.com

Abstract –Work presented in this paper is based on 0.2% absolute increment in efficiency is possible with
findings of SCAPS simulation of Kesterite CZTSSe thin optimization of thickness of TCO layer. Therefore, wide gap
film solar cell. The main objective of this work is to in SQ limit ≈ 30% and observed efficiency motivated to
investigate and improve overall performance of study effect of variation in other parameters contributing to
nanostructured Cu2ZnSn(S1-x ,Sex)4/CdS/ZnO solar cell the overall performance. To model the cell Cu2ZnSn(S1-x,
through optimization of thickness, band gap and doping Sex)4 is used as p-type active layer as shown in figure 1.
concentration in absorption layer. These are major Aluminium doped ZnO of thickness 0.050μm is used as
parameters which determine performance of the cell on trans-conducting oxide for front contact. It behaves as
large extent. The highest efficiency (simulation) reported transparent medium for solar irradiance with transmittance
greater than 90% for photons of wavelength 𝜆 greater than
for CZTSSe/CdS/ZnO before is 13%. Materials with
350nm [2]. An n-type buffer layer of Cadmium Sulphide of
large absorption coefficient in visible spectrum of solar
thickness 0.050μm with band gap 2.4eV [3] is modelled.
irradiance, regular crystal structure and optimum band Series resistance 𝑅𝑠 = 0.36Ω. 𝑐𝑚2 and parallel resistance
gap are being searched by researchers and industrialists 𝑅𝑠ℎ = 1000 Ω. 𝑐𝑚2 are used. Optical and electrical
for solar applications. There are less number of material properties of CdS as well as ZnO are directly used from the
compositions used for solar cell thin film application 1D- SCAPS [4, 5] library files.
with concerns of cell-efficiency, device flexibility,
manufacturing cost and availability of source materials
in nature. Because extracting elements from its ores and
then making a compound for the required applications
raised manufacturing cost significantly. Adequacy of
Kesterites in nature, less toxic, easy extraction of CZTS
as compared to chalcogenide CIGS make it competent
for the application. Removal of toxic elements
introduced additional challenges which can be future
objective of this work. The proposed optimizations have
increased the cell-efficiency by 22.76% w.r.t. the
reference work.

Keywords– Solar Cell Capacitance Simulator, Fig. 1 Structure of Thin Film Solar Cell
Kesterite, Cell-Efficiency, Solar Irradiance,
2. LITERATURE REVIEW
Optimisation
There are number of research work and publications
1. INTRODUCTION referenced to propose this work. A few of them, works on
kesterite thin film solar cell are introduced here in brief.
The reference work on CZTSSe thin film single junction
solar cell was based on optimization of thickness of Meriem Chadel et al. – improved the cell simulation
transparent conducting oxide layer. It reported that cell efficiency upto 13% at band gap of active layer 1.13eV
efficiency of optimized thickness TCO Kesterite thin film through optimised trans-conducting oxide layer. [1]
solar cell can be improved up to 13% [1]. However the
percentage enhancement in efficiency published with J. Kim et al. - achieve efficiency upto 12.4% by using
similar treatment of TCO layer does not hold the same double emitter structure with deficit of 593 mV in open
result. After simulating multiple iterations with different circuited voltage at band gap of active layer 1.13 eV [6].
possible configurations it has been found that maximum

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 218


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Y. Lee et al. - reported the efficiency of 11.1% by using co- 1−𝑅𝑓


𝐴(𝐸) = 1−𝑅𝑓
evaporation of pure Se to improve transportation of photo 1+
4𝑛2 𝛼𝑑
generated carriers [7].
(1)
K. Yin et al. - reached the efficiency of 12.5% by Where d>>λ represents thickness of absorber layer,
configuring the interface band structure, treatment of R f and 𝑅𝑏 is reflectance at front and back contact
surface microstructure [8]. respectively and n represents refractive index for the layer.
Therefore, if reflectance at front and back contact is
Reference 1D-SCAPS model has simulated and results
assumed to be zero then equation (1) can be approximated
are verified with a deviation of 0.04% to 0.07% as
as
compared to simulation result of reference cell [1, 9], and
0.05% to.25% with [6, 8, 10] existing experimental
measurements. 𝐴(𝐸) = 4𝑛2 𝛼𝑑
(2)
3. WORK PROPOSED According to theory of photoelectric effect the incident
It has been observed that change in S:Se ratio changes photons will be absorbed completely if its energy is greater
the band gap of the material. Change in thickness of than energy gap of the material. Therefore, absorbance will
absorber layer changes its absorption coefficient, and be nearly constant for the region 𝐸 > 𝐸𝑔 and so α will follow
change in donor concentration changes the rate of the same. Absorption coefficients for semiconductor
generation as well as rate of recombination of charge materials is given by
carriers into active region. While change in any parameters 𝑟−1
among band gap, thickness, and donor concentration yield ℎ𝑐 𝑟−1 𝜆𝑔 − 𝜆
𝛼 = 𝐵( ) ( )
variation in 𝑉𝑜𝑐 , 𝐽𝑠𝑐 , and FF of the cell respectively. 𝜆 𝜆𝑔

Therefore, optimization of these parameters could provide


precise and higher efficiency. 𝐵
= (ℎ𝜈 − 𝐸𝑔 )𝑟
ℎ𝜈
The band gap can be obtained in the range of 1.0 to 1.5
(3)
eV for Cu2ZnSn(S1-xSex)4 by changing the S:Se ratio x =
0 to 1 and annealing process. Therefore, it has been Where 𝑟 = 0.5 for direct band gap materials and B is an
proposed to optimise the band gap of the cell first. Then arbitrary constant. It has been calculated at 𝛼=
optimization of thickness and thereafter that of doping 1x104 (𝑐𝑚−1 ) at 𝐸𝑔 = 1.13 𝑒𝑉, thereafter absorption
concentration for the optimized value of band gap are coefficients corresponding to irradiance spectrum are
proposed. The physical dimensions of individual layer are determined using SCAPS. Also, equation (3) can be
kept same as mentioned in introduction and figure 1 as well. rewritten as
The chemical composition of materials of active layer can
also be estimated using one of numerical methods and 𝐵 1
characterised subsequently. 𝛼= (ℎ𝜈 − 𝐸𝑔 )2
ℎ𝜈
A tremendous growth in cell efficiency highest up to
%ƞ = 15.89% has achieved through the proposed 𝑜𝑟, (𝛼ℎ𝜈)2 = 𝐵(ℎ𝜈 − 𝐸𝑔 )
optimization with identical material, physical dimensions of (4)
individual layers, and absorption coefficients. The specific
values of parameters like electric permittivity, electron-hole
mobility, electron thermal velocity, and number of energy 8.00
states in valance & conduction bands are taken from 7.00
reference [11] after validating the simulation models. 6.00
1 x 10^8 (eV.cm^-1)^2

4. OPTIMIZING ENERGY GAP OF ABSORBER 5.00


Intensity of light defines the amount of photons incident 4.00
(αhν)^2

per unit area for a specific wavelength 𝜆. Therefore, any


3.00
increase in intensity of irradiance spectrum increases
number of incident photos and so generation of charge 2.00
carriers i.e. electron hole pairs into the region. 1.00
Consequently, it improves the apparent efficiency as eV
reported by A Bernal-Condia et al. Absorption of light 0.00
(photons) incident on a material takes place when it satisfies 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
the relation 𝐸 ≥ ℎ𝜈. Absorption coefficients of direct band Fig. 2 Graph of incident energy verses (αhν)^2
gap thin film Cu2ZnSn(S1-xSex)4 layer are determined with
consideration of existing experimental results through Characteristics curve of (𝛼ℎ𝜈)2 obtained from equation
equation (1) [12], and (3) [13] in 1D-SCAPS. (4) is represented in figure 2. It provides linear relation
between (𝛼ℎ𝜈)2 and hν. Therefore, tangent on linear portion

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 219


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of curve intersecting horizontal hν-axis at (𝛼ℎ𝜈)2 = 0 open circuited voltage and short circuited current density
gives the band gap of the material. which widely depend on material properties, crystal
structure, physical dimensions of layers and fabrication
0 = 𝐵(ℎ𝜈 − 𝐸𝑔 ) techniques used [18-20].

𝐸𝑔 = ℎ𝜈𝑔 = 1.18𝑒𝑉 1
It is found correlated with the synthesis results of
0.8
𝐶𝑢2 ZnSn(S1−𝑥 Se𝑥 )4 reported by Y Jhao et al. The optical

Voc------->
characterizations of Kesterite reported band gap 1.16 eV for 0.6
Cu2ZnSn(S1-x Sex)4 [14] at 𝑥 = 0.76 and similar conclusion
made by J. Krustok et al. that band gap is found close to 1.2 0.4
eV [15] at AM 1.5G. It has also been observed that band
gap varies linearly in agreement with reflectance and 0.2
(eV)-------->
transmittance measured by Gao et al. [16] and He et al. [17]. 0
The linear relation can be established as
1.13 1.16 1.18 1.21 1.24 1.27
𝐸𝑔 = −𝑚 × 𝑥 + 𝑐 Fig. 3(b) Band Gap V/s Voc of Cu 2 ZnSn(S,Se) 4 /CdS

(5) 25

Jsc (mA/cm2)----->
By placing Eg =1.16 eV at x = 0.76 in the material 20
composition of S1-x:Sex, slop m = 0.447 is determined.
Therefore, the value of x = 0.72 is computed corresponding 15
the band gap Eg = 1.18 eV. Thus absorption model
presented in figure 2 is used for simulation of reference 10
models (1, 6, 7, and 8) for their respective estimated band 5
gaps along with optimised band gap of 1.18eV. The (eV)-------->
simulation results obtained are approximately same with 0
considerable error of 0.4% to 0.7% as compared to 1.13 1.16 1.18 1.21 1.24 1.27
simulation results reported and 1% to 2% with respect to
experimental cell measurement done in laboratory. This Fig. 3(c) Band Gap V/s Jsc of Cu 2 ZnSn(S,Se) 4 /CdS
verified the proposed model is précised and so optimization
of band gap for Kesterites solar cell can be performed. The
performances are given in figures from 3(a) to 3(d). 82
80
%FF-------->

13 78
12.5 76
%Efficiency

74
12
72 (eV) ---------->
11.5 70
1.13 1.16 1.18 1.21 1.24 1.27
11
(eV) Fig. 3(d) Band Gap V/s %FF of Cu 2 ZnSn(S,Se) 4 /CdS
10.5
1.13 1.16 1.18 1.21 1.24 1.27 The performance parameters of CZTS Se thin film solar
cell are investigated by varying energy gap in its widely
Fig. 3 (a) Band Gap V/s Efficiency of Cu2ZnSn(S,Se) 4 reported range of 1.0 eV to 1.5eV, Thickness from 1μm to
3μm and donor concentration from
Figure 3(a) represents characteristic curve of efficiency 1013 𝑐𝑚−3 to 1017 𝑐𝑚−3 in 1D-SCAPS simulator.
verses band gap in which a maxima is observed at 𝐸𝑔 = Characteristic %ƞ, Voc, Jsc %FF curves are obtained
1.18 𝑒𝑉. The four performance parameters used for corresponding to different energy band gaps of
characterization of a solar cell are Voc, Jsc, %FF and %ƞ. Cu2ZnSn(Sx,Se1-x)4 as plotted in fig. 3(a), 3(b), 3(c), and
Where, ƞ denotes efficiency and defines maximum possible 3(d). Here, experimentally obtained absorption coefficients
(theoretical) power that can be generated whereas %FF i.e. for the reference model is also studied. The simulation
percentage fill factor specify the maximum usable results all together agree with the optimum band
percentage of electrical power by a load. Voc and 𝐽𝑠𝑐 are gap 𝐸𝑔= 1.18 𝑒𝑉determined as shown in figure 3(a).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 220


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

5. RESULTS AND DISCUSSION


COMPARATIVE STUDY
Simulation results corresponding to optimized energy
gap and thickness d of absorption layer keeping other
parametric values of the cell unchanged with respect to
reference cell-model obtained are presented by 𝐽 𝑠𝑐 verses
𝑉 curves in fig. 4(a) and 4(b) respectively.

Fig. 4(b) JV curve of thickness optimization with existing model of Cu 2


ZnSn(S,Se) 4 /CdS

Figure 4(b) in which optimised thickness is found less than


the reference cell. Thus, it increases the percentage
collection of charge carriers crossing the junction. Any
further increase in thickness reduces collection of charge
carries in buffer side resulted in decrease in current through
through the diode. It has observed that optimisation in
Fig. 4(a) JV curve of band Gap optimization with existing model of Cu 2 energy gap as well as thickness have raised the performane
ZnSn(S,Se) 4 /CdS
parameters significantly. The effect of variation in acceptor
Figure 4(a) shows enhancement in performance. It can doping concentration 𝑁𝑎 = 1 × 1013 to 1 × 1017 of p-type
be understand easily as there is negligible loss of current as CSTSSe are examined through simulation and it has been
compared to increase in open circuited voltage observed. found that optimum range lies in between 𝑁𝑎,𝑜𝑝𝑡 =
This is as expected as the intensity of irradiance in large 1 × 1015 and 𝑁𝑎,𝑜𝑝𝑡 = 1.5 × 1015 where performance
wavelength region are almost constant. The Voc has parameters are further increased. The results of complete
increased in the same proportion as the difference in Voc simulations at temperaure 𝑇 = 300 K of thin film CZTSSe
and band gap has decreased. It also yields negligible change solar cell are represented in table 1.
in current.

Table 1Comparative performance of reference and optimized band gap model of cztse thin film solar cell with cds buffer layer

S.N. Band Gap Eg(eV) Thickness (d) Voc (V) Jsc (mA/cm2) %FF %ƞ
1 1.13 (reference cell) 2 μm (reference cell) 0.67 25.0 74.69 12.95

2 1.18 (optimized) 2 μm
0.69 24.5 74.86 13.07
3 1.18 (optimized) 1.6 μm (optimized) 0.69 24.7 75.22 13.30

1.6 μm (optimized) 77.93 15.89


4 1.18 (optimized) 0.69 26.7
𝑁𝐴 = 1.5𝑋 1015 (optimized)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 221


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The comparative study of optimization shows that the 6. CONCLUSION


highest cell efficiency %ƞ = 15.89% observed at band gap A wide deviation between simulation and experimental
Eg = 1.18 eV, thickness d = 1.6 μm, and acceptor results were observed for solar cells. Because of negligence
concentration of absorber NA = 1.5 × 1015 . In optimized of interdependence of parameters. Optimization of such
range of absorber cocentration the J − V curve near Voc has parameters minimises the errors produced and also
flatened caused to increase area (%FF) under the curve and estimates performances more precisely. While investigating
so the efficiency while other performance parameters are optimum band gap, ‘𝛼’ is modeled inaccordance with
remain same. The resultant data in table 1 are evident that intensity of irradiance. Capture crossection of electrons and
there is improvement in Voc by 3.43% , Jsc by 5.67%, %FF holes are considered for optimizing its thikness ‘d’. Relative
by 4.34% and %ƞ by 22.7%, after optimisation with respect permittivity of the material at different doping concentration
ot reference models having values of %ƞ 12.95% [1], 12.6% changes and so the band gap at different Se:S ratio are
[6], 11.6% [7], 12.5% [8] respectively. Power factor [20] for introduced. Band gap optimization improved 𝑉𝑜𝑐 , thickness
resistive load of the cell should be unity it may be an optimization enhanced 𝐽𝑠𝑐 , and donor concentration
extended work to determine PF for ac load and its increased FF. Collective they yeild highest efficiency for
improvement with additional PFC circuits. Whereas Kesterite solar cell till date is 15.89%. It can be further
quantum efficiency of determines the proportion of charge raised by application of alkali metals and concentrated
careers generated due to incident photons and found unity in irradiance model.
the region Eincident ≥ Eg .

REFERENCES
[1] Meriem Chadel, Mohammed Moustafa Bouzaki, Asma Chadel, [11] Sonam Tripathi, Brijesh Kumar, D. K. Dwivedi, “Study on formation
Michel Aillerie, Boumediene Benyoucef, “Thickness optimization of and characterization of kesterite CZTSSe thin films deposited by
the ZnO based TCO layer in a CZTSSe solar cell. Evolution of its thermal evaporation technique for solar cell applications” Journal of
performance with thickness when external temperature changes” Materials Science: Materials in Electronics, Springer Nature 2020
Journal of Physics: Conf. Series 879 (2017) 012006 [12] J. Krustok, R. Josepson., M. Danilson, D. Meissner, “Temperature
doi:10.1088/1742-6596/879/1/012006 dependence of Cu2ZnSn(SexS1−x)4 monograin solar cells” Solar
[2] Chan Kim, Hyun-Jun Jo, Dae-Hwan Kim, Dae-Ho-Son, Dong-Ha Energy, Volume 84, Issue 3, March 2010 DOI:
Lee, IIsu Rhee, “Effect of ZnO Layer Thickness on Efficiency of 10.1016/j.solener.2009.09.011
Cu(In,Ga)Se 2 Thin-film Solar Cells” Molecular Crystals and Liquid [13] Satyendra Kumar, Swati Arora, “Effect of Buffer Layer on Cu(In,
Crystals 565(1):52-18,2012 Taylor & Francis Ga)Se2 Solar Cell Performance” SKIT Research Journal,
DOI:10.1080/15421406.2012.692227 DOI:10.47904/IJSKIT.11.3.2021.20-24
[3] Sadao Adachi, Springer Newyork, NY, “Optical Constants of [14] A Bernal-Condia, J AS´anchez-Cely, J D Bastidas-Rodriguez, M A
Crystalline and Amorphous Semiconductors”, Optical Materials, Botero-London and M A Mantilla-Villalobos, “Simulation of a thin-
Characterization and cal Technique, 1999 ISBN: 978-0-7923-8567-7 film solar cell based in kesterite using Matlab” Journal of Physics:
[4] Huiling Duan, Yimin Xuan, “Enhancement of light absorption of Conf. Series 1159 (2019) 012020 doi:10.1088/1742-
cadmium sulfide nanoparticle at specific wave band by plasmon 6596/1159/1/012020
resonance shifts” Physica E: Low-dimensional Systems and [15] Yun Zhao, Xiuxun Han, Wen Li, Liang Liubc and Tooru Tanaka,”
Nanostructures, Vol-43, issue-8, June 2011, pages 1475-1480 Synthesis of the Cu2ZnSn(S,Se)4 alloys with tunable phase structure
[5] H. Yoshikawa, S. Adachi, “Optical Constants of ZnO” Japanese and composition via a novel non-toxic solution method” journal of
Journal of Applied Physics, 1997, 36, 6237 Royal Society of Chemistry, RSC Adv., 2013, DOI:
[6] Kim J H, Hiroi H, Todorov T K, Gunawan O, Kuwahara M, 10.1039/c3ra45094e
Gokmen T, Nair D, Hopstaken D, Shin B, Lee Y S, Wang W, [16] Gao, F., Yamazoe, S., Maeda, T., Nakanishi, K. & Wada, T. (2012)
Sugimoto H, Mitzi D B “Device Characteristics of CZTSSe Thin- Structural and optical proper- ties of In-free Cu2ZnSn(S,Se)4 solar
Film Solar Cells with 12.6% Efficiency” Adv. Mater. (2014) 26 7427 cell materials. Japanese Journal of Applied Physics, 51, 10NC29-1-5.
[7] Y.S Lee, T. Gershon, O. Gunawan, T. Gokmen, Y. Virgus, and S. [17] Haight, R., Barkhouse, A., Gunawan, O., Shin, B., Copel, M.,
Guha, “Cu2ZnSnSe4 Thin-Film Solar Cells by Thermal Co- Hopstaken, M. & Mitzi, D. B. (2011) Band alignment at the
evaporation with 11.6% Efficiency and Improved Minority Carrier Cu2ZnSn(SxSe1–x)4/CdS interface. Applied Physics Letters, 98,
Diffusion Length” Adv, Energy Mater. 26(44), 7427-7431 (2014) 253502-1-3
[8] Kang Yin, Xiao xu, Muyu Wang, Jiazchengzhou, BiwenDuan, [18] Swati Arora, and Y. K. Vijay, “Electrical, structural and optical
Jiangjiyan Shi, Dongemei Li, Huijui Wu, YanhongLuo, QingboMeng properties of tellurium thin films on silicon substrate,” vol. 1953, pp.
“A high-efficiency (12.5%) kesterite solar cell realized by crystallization 03008
growth kinetics control over aqueous solution based Cu2ZnSn(S,Se)4” Journal [19] Swati Arora, Vivek Jaimini, Subodh Srivastava, and Y. K. Vijay,
of Materials chemistry A, issue 2, 2022 “Properties of Nanostructure Bismuth Telluride Thin Films Using
[9] Kentaro ITO, Copper Zinc Tin Sulfide-Based Thin-Film Solar Cells, Thermal Evaporation,” Journal of Nanotechnology, vol.
John Wiley & Sons, Ltd 2015 ArticleID4276506
[10] A. Benmir, M.S. Aida, “Simulation of a thin film solar cell based on [20] Karuppusamy, P. "An Overview of the Solar Cell Technology and its
copper zinc tin sulfo-selenide Cu2ZnSn(S,Se)4” Elsevier, Future Challenges." Journal of Electrical Engineering 4, no. 2 (2022):
Superlattices and Microstructures 91 (2016) 70e77 doi: 10.1016/ 77-85.
j.spmi.2015.12.027

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 222


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

EEG Signal-based Epileptic Seizure Detection

Gokul M Jagasri L Sindhuja M


Department of Biomedical Engineering Department of Biomedical Engineering Department of Biomedical Engineering
Kalasalingam Academy of Research Kalasalingam Academy of Research Kalasalingam Academy of Research
and Education and Education and Education
Krishnankoil, India Krishnankoil, India Krishnankoil, India
mrgokul3@gmail.com ipjv111@gmail.com mrmsindhuja@gmail.com

Barkavi R Pradeep Murugesan Arun Prasath T


Department of Biomedical Engineering Department of Bioinformatics Department of Biomedical Engineering
Kalasalingam Academy of Research Bharathiyar University Kalasalingam Academy of Research
and Education Coimbatore, India and Education
Krishnankoil, India pradeepmp1997@gmail.com Krishnankoil, India
sushmabarkavi@gmail.com t.arunprasath@klu.ac.in

Abstract— Epilepsy is a neurological condition marked by Only patients with epilepsy are monitored using the high
abnormal brain activity, which includes seizures. EEG data, which standards practices used in the medical industry. A test called
are recordings of brain activity, are frequently employed in a wide electroencephalography (EEG) is carried out in hospitals
range of medical applications, including the identification of over a few days. It comprises recording audio using an
epileptic seizures. Neurologists used to draw conclusions by visual electro-acoustic transducer, taking pictures of the patient
assessment. The findings, however, depended on the reader's level with a camera, using an EEG to record brain activity, and
of skill and were frequently quite time-consuming. Thus, using a cardiograph to record electrical activity in the gut
automatic epileptic seizure detection methods that can deliver
(ECG). Long-term patient monitoring is not practical due to
accurate outcomes quickly are needed. Hence, this paper
the very intrusive nature of these approaches and the
differentiates the normal and epileptic EEG waveforms with
frequency estimation technique. Consequently, the frequency
unpredictable nature of seizures. Real-time epileptic seizure
information of the non-epileptic and epileptic EEG is discovered, monitoring is now possible because to wearable technology
and the waveforms between them are easily distinguished. and embedded computing. For long-term patient monitoring,
these innovative ultra- low energy transportable devices get
Keywords: Electroencephalogram signal database, around the constraints of medical technology [3].
Electroencephalogram (EEG), epileptic seizures, time-frequency Particularly with regard to the gadgets' portability, everyday
domain. remote patient monitoring is possible. By using ambulatory
I. INTRODUCTION real-time patient observation, hospital doctors can access
patient data from a distance and, as a result, stop any patient
Epilepsy, one of the most important issues with brain state deterioration through the early identification of
health, affects more than 65 million people worldwide. It is epileptic seizures [4].
the fourth most common chronic illness after migraine,
stroke, and Alzheimer's disease. Despite notable The most popular wearable device for spotting epileptic
improvements in antiepileptic drug tolerance and seizures is an EEG headband with integrated electrodes to
effectiveness, one-third of epileptic patients still experience measure brain activity. The worldwide 10-20 system
seizures. Intermittent seizures, which are caused by provides the foundation for the electrode placement.
abnormalities in the electrical activity of the brain, are the Approximate entropy and discrete wavelet rebuild analysis
defining feature of epilepsy. The duration of these seizures were utilized to create a replacement theme for epileptic
can vary from a few seconds to several minutes, and they seizure identification on 100 EEG channels. The literature
might range from minor impairments of consciousness to has also published a number of techniques for convulsion
severe whole-body convulsions. Consciousness impairment identification supported by EEG signals that use artificial
can cause drowning and other severe injuries, such as those neural networks. All of these techniques necessitate the use
that occur in auto accidents. This significantly has a negative of EEG head caps, which are heavy and inconvenient to wear
effect on one's quality of life and psychological health. These because they require connecting 23 to 256 wired electrodes
people have a mortality risk that is 2-3 times higher than the to the patient's scalp [3, 4].
general population due to the unpredictable nature of Due to the detrimental effects of societal stigma on their
seizures. The most severe seizures, particularly those that daily lives, the majority of epileptic patients refuse to wear
occur at night, may also result in sudden, unexpected death these caps. Numerous studies have been done on patients'
due to a brain condition [1]. daily lives to lessen the number of EEG electrodes needed
Epilepsy-related causes of death account for only one for epileptic seizure detection in order to avoid the harmful
hundredth of all deaths in populations of patients with brain effects of social stigma. For instance, the authors of employ
diseases. Periodic patient observation is crucial for alerting eight electrodes in the front head montage and seven
family members and caregivers to provide quick emergency electrodes in the back head montage as two distinct montages
medication and assistance during a seizure, helping to lower with fewer electrodes for automatic multimodal detection of
morbidity and mortality from brain disease [1, 2]. epileptic seizures. The suggested remedy is still obtrusive,
therefore the social stigma issue still exists [4].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 223


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Software description: MATLAB: partner. Inside a similar gathering, the MLPNN-based


classifier was more exact than the LR-based classifier.
A high-performance language for technical computing is
called MATLAB. In a simple-to-use interface, it mixes Howl Mardini et al. Upgraded Detection of Epileptic
computation, visualization, and programming while Seizure Using EEG Signals in Combination with Machine
expressing issues and solutions using well-known Learning Classifiers. This work means to work on the
mathematical notation. Options for object-oriented precision of epileptic seizure discovery and diminish
programming, input/output, and information structures in computational expenses. To address this, the proposed
MATLAB. It enables both "programming in the small" to system utilizes the 54-DWT mother wavelets examination of
quickly create quick, disposable applications and EEG signals here the ANN classifier accomplished the best
"programming in the gigantic" to create comprehensive, exactness in many datasets mixes, and it outflanked the other
intricate application programs. The MATLAB graphics analyzed classifiers.
system is seen here. It offers advanced instructions for
presentation graphics, image processing, animation, and two- C Baumgartner et al. EEG-Based Early Epileptic Seizure
and three-dimensional information visual images. Detection and Epilepsy Diagnosis: A Unified Framework
Additionally, it has low-level commands that let you fully and Method.The epileptic seizure identification stage can
give a fast recognition to peculiarity EEG designs yet the
Customize the appearance of graphics and create full
Graphical User Interfaces with MATLAB [5,6]. subsequent dubious portion might incorporate epilepsy or
other disarranging EEG exercises hence expected to be
II. MATERIALS AND METHODS distinguished.
Existing Methods: Shanen Chen et al. Nonlinear Dynamics Features for
Automatic Diagnosis of Epileptic Seizures in
Lara Thompson et al. An AI way to deal with epileptic Electroencephalography Signals K-closest neighbors, SVM,
seizure forecast utilizing Electroencephalogram (EEG) and Least Square Support Vector Machine (LSSVM).
Signal. SVM and KNN learning calculations were applied to
group pre-handled EEG signal. Execution correlation Rosana Esteller et al. Half and half Feature Selection
depended on Accuracy, Sensitivity and Specificity. This across Multiple Intracranial EEG Electrode Contacts for
Experiment showed that SVM has a slight edge over KNN. Epileptic Seizure Prediction. This strategy applies an astute
hereditary hunt cycle to EEG flags at the same time gathered
Lalit Garg et al. An innovative method for obtaining EEG from numerous intracranial cathode contacts and various
data, extracting highlights, and creating element spaces for quantitative elements got from these signs.
early detection of epileptic seizures. This paper illustrates a
simple and fast strategy for information AI retrieval, Pack Wang et al. Epileptic seizure discovery in light of
highlight extraction, and element space generation for halfway coordinated cognizance examination. This
epileptic seizure identification. technique for EEG epilepsy checking can help specialists
analyze and treat epilepsy. The proposed technique in view
Péter Kovács et al. The Rational Discrete Short-Time of PDC examination accomplished huge improvement with
Fourier Transform is utilized to order epileptic seizures in regards to seizure location.
EEG time series. The adequacy of the proposed strategy is
contrasted and a few condition of-craftsmanship highlight Rohit Bose et al. Discovery of epileptic seizure utilizing
extraction calculations utilized in disconnected epileptic an original arrangement of highlights extricated from
seizure recognition. The consequences of the near multifractal range of EEG signals. The informational
assessments show that the proposed strategy beats collection - Five volunteers, contains 5 arrangements of EEG
contending methods with regards to grouping precision. accounts (A, B, C, D and E), length of each sign 23.6s,
inspecting recurrence of 173.61Hz, 128-channel speaker
Nasir Hussain et al. A glance at how AI classifiers can framework. This method for robotized location of epilepsy is
assist with identifying epileptic seizures. In view of the proposed in view of a clever arrangement of highlights got
scientific classification of measurable elements and AI, the from the multifractal range of EEG.
extraordinary assortment of these procedures throughout the
course of recent years The cutting edge strategies and Varun Bajaj et al. Exploring hermite transformation in
speculations given will give an exhaustive handle of seizure mind sign evaluation for the detection of epileptic seizure.
recognition and order, as well as future exploration This examine is meant to expand a brand new pc aided
prospects. detection device which can routinely and successfully
perceive epileptic seizure from large quantity EEG statistics.
Manoranjan Paul et al. Programmed epileptic seizure This paper added Hermite Transform for extracting
distinguishing proof in EEGs utilizing fake brain discriminating data from EEG statistics for the detection of
organizations and a line length trademark. Results exhibit epileptic seizure.
that the proposed techniques outflank the current cutting
edge strategies concerning arrangement precision, S. R. Mousavi et al. A new framework primarily based
awareness, and particularity with more noteworthy totally on recurrence quantification evaluation for epileptic
consistence for the enormous size benchmark dataset in seizure detection. This device proposes recurrence
various cerebrum areas. quantification evaluation (RQS) is followed because it does
now no longer require assumptions approximately duration
Abdulhamit Subasi et al. Programmed seizure discovery of sign, noise. The normal accuracy of 98.67% which shows
in EEG utilizing calculated relapse and counterfeit brain the excessive accuracy of the proposed method.
network.The EEG power spectra were utilized as a
contribution to a classifier. in light of examination the Gang Wang et al. The Use of a Directed Transfer
MLPNN based classifier out played out the LR based Function Method to Detect Epileptic Seizures Using EEG.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 224


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The intention of this examine is to check out an automated convulsion activity using background
approach of detecting epileptic seizures so that you can electroencephalogram (EEG) data collected from both
enhance the remedy and prognosis of people with medically epileptic and control patients. The planned theme is based
resistant epilepsy. on individual rippling remodels (DWT) and energy
estimation at each node of the deconstruction tree, followed
An encephalogram, or the electrical life of the brain, is by the use of probabilistic neural networks (PNN) for
used to encode synchronized vegetative cell firing in the classification. Up until the sixth level using DWT, ordinary
cerebral mantle. For the localization and identification of as well as epileptic graph epochs were transformed into
convulsions, the identification of recorded convulsion approximation and details parameters [9].
activity in an encephalogram segment is essential. Under this
study, we aim to show that time-frequency analysis is a good To describe the certainty of the epileptic activity at
method for classifying encephalogram signals for intervals between the records of graph data, estimated
convulsions with fewer electrodes than other previous approximate energy (EDA) values of the ripple factors at
techniques. The unpredicted occurrence of synchronous the least-bit nodes of the down-sampled tree were employed
vegetative cell firing within the cerebral mantle causes as a feature vector. Denary cross-validation was imposed
epileptic seizures, which can be recorded using an within the trained model to show the classification accuracy
encephalogram, the live recording of brain electrical activity. of the intended probabilistic neural network. Clinical graph
The identification of recorded convulsion activity in the data from both conventional and epileptic participants was
encephalogram section is essential for the localization and used to evaluate the effectiveness of the new theme. It was
classification of convulsion. In this project, we want to show discovered that, while using the intended theme, the
that time-frequency analysis is more effective at classifying detection is 90.93% accurate, with sensitivity and
encephalogram signals for convulsions with fewer electrodes specificity coming in at 90.96% and 99%, respectively. In
than other existing methods [7]. We use time series analysis underdeveloped nations where there is a severe lack of
using frequency estimation with the FFT approach to educated medical specialists, the projected approach will be
examine EEG signals. EEG uses electrodes attached to the widely used [9, 10].
scalp to record the electrical activity of the brain; as a result,
the results reflect variations in brain activity that are used to REAL-TIME METHODOLOGY FOR EPILEPTIC SEIZURE
assess patients with known seizure conditions and to DETECTION:
categorize different seizure types. In order to diagnose epilepsy, automatic analysis of
encephalogram recordings began in the early '70s.
The listed details are downloaded from PHYSIOBANK Computer-based analysis today focuses on two main
ATM INPUT DATABASE:CH-MIT scalp EEG database issues: 1) interracial event detection 2. analysis of
• RECORD: chb01/chb01_edf convulsions. Numerous algorithms for spike detection are
• SIGNALS: all anticipated, along with rule-based and mimetic-based
• ANNOTATIONS: seizure start and methods, frequency-domain techniques, ripple transforms,
end annotations (seizures) artificial neural networks (ANNs), freelance element
• OUTPUTLENGTH:10sec analysis, support vector machines, data mining, example
matching, and topographical classification. Convulsion
• TIME FORMAT: time/date
analysis, on the other hand, refers to methods for:
• DATAFROMAT: Standard
• TOOLBOX: export signals csv 1) Convulsion detection;
The signals are loaded in MATLAB and code is 2) Convulsion prediction;
written for normal and abnormal EEG signals and 3) Automatic focus channel identification.
extracted the frequency values for detecting
• Alpha Machine learning is actively putting forward ideas for
• Beta improved seizure detection. Machine learning has been
• Gamma extensively used to extract sensible and important patterns
• theta from a variety of domain datasets. on brain datasets,
The same way is done for abnormal EEG signal machine learning applications for seizure detection,
and extracted and plotted. epilepsy lateralization, discriminating seizure sates, and
localization can be observed.
Several cutting-edge feature extraction algorithms
utilized in offline epileptic seizure detection are compared to Epileptic seizures in encephalogram recordings have
the effectiveness of the suggested method. The comparative been identified using traditional temporal and frequency
evaluations' findings demonstrate that the proposed method analysis techniques. Numerous studies focus on the
performs better in terms of classification accuracy than rival quantitative characterization of the underlying nonlinear
methods. There are the wide variants of these approaches systems backed by evidence of the dynamics of the
based on the taxonomy of statistical features and machine encephalogram's established value. It has been suggested
learning during the last few years. The learning environment to use entropy and correlation dimension exponents as
as it is now. The cutting-edge techniques and concepts complexness indicators of the underlying encephalogram
discussed will provide a thorough understanding of seizure dynamics. The prevalence of seizures will subsequently be
detection, categorization, and future research prospects [8]. determined by combining these measurements with a
classifier [11, 12]. A, B, C, D, and E are the data sets that
For the past 20 years, signal process approaches have are obtained for the length of twenty three and are included
been a crucial area of investigation. A special technique was in the publicly available graph datasets. In order to detect
used in the gift research to quickly and accurately detect

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 225


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

epilepsy, a single channel is used out of one hundred. The Alpha (8–12 Hz): In occipital head area of awake normal
recorded graph data sets A and B are from traditional EEG recordings, posterior dominant alpha rhythms typically
people who are in the state of having their eyes open, while found. It is what distinguishes the typical adult EEG
the recorded graph data set C comes from hemisphere pre- background beat from other rhythms. When a healthy person
processing [13, 14]. is three years old, their posterior timing reaches the alpha
range of 8Hz and does not start to slow down until they are
ninety years old. Normal populations exhibit fast variations
III. RESULTS AND DISCUSSION in the background alpha rhythm.
It is discovered that, in contrast to seizure detection,
seizure localization has not seen widespread use of machine
learning classifiers. When compared to seizure location, AI
classifiers have not been widely used to restrict seizures.
However, there is some writing on this subject. These
meticulous works' authors failed to identify the precise region
at the flaps, such as the occipital, front-facing, parietal left
and parietal right, or to determine the level of the region of
the brain affected by a seizure [15, 16]. While reviewing the
related published research, which isn't our primary objective
in this survey paper, we discovered some intriguing clues for
seizure confinement. This abundance of seizure location
discoveries raises hardly any captivating exploratory research Fig.1: Non-Epileptic waveforms.
issues, for example, choosing sensible demonstrable
elements and AI classifiers to take minimal computation time
as set of data has a high volume with high dimension, and so
the most important missing information from machine
learning algorithms.
A. Normal EEG Waveforms:
The electroencephalogram (EEG), which displays the
electrical activity taking place at the surface of the brain, was
developed. Waveforms of varied frequency and amplitude
recorded in voltage represent this activity on the EEG
machine's screen (specifically micro voltages). The
frequency, amplitude, and duration of EEG waves are Fig.2: Non-Epileptic Frequency Differentiated waveforms.
typically in shape waveforms as well as the places on the
Beta(13–30Hz): The most common beat in standard
scalp where the waveforms are recorded. Frequency of the
adults and children is the beta rhythm. It is most noticeable
EEG wave form is used for the most popular classification
in the frontal and central head zones and gradually fades
(eg, alpha, beta, theta, and delta). It is crucial to use a
posteriorly. The peak value of beta activity is typically 10
methodical process while deciphering Before starting the
to 20 microvolts, rarely exceeding 30 microvolts.
analysis, it is crucial to be aware of a number of confounding
factors, including the patient's age, degree of awareness, state Theta (4–7Hz): It is the rhythm caused by drowsiness as
of physical and psychological activity, and the presence of well as early stages of sleep such as N1 and N2. Because of
numerous biological, environmental, and pharmaceutical early drowsiness, it is most dominant in the fronto-central
chemicals that could impact the waveforms [17]. head zones and gradually migrates backward, replacing the
Among the most often studied waveforms are the alpha rhythm. In children and young adults, elevated
waveforms delta (0.5 to 4 Hz), theta ( 4 to 7 Hz), alpha ( 8 to emotional states can also improve frontal rhythmic theta
12 Hz), sigma (12 to 16 Hz), and beta (13 to 30Hz). There rhythm. Focal theta activity during awake states is suggestive
are additional waveforms that are beyond the usual clinical of Cal cerebral dysfunction.
EEG bandwidth, like ultra-slow oscillations (ISO) (less than
0.5Hz) and high-frequency oscillations (HFOs) (higher than B. Epileptic EEG waveforms:
30Hz), but have lately gained clinical significance with the
introduction of digital signal processing. The usual In an EEG recording abnormal waveforms include
bandwidth for clinical EEG focuses on the analysis of waves epileptic form and non-epileptic form disorders. To do so,
between 0.5Hz and 70Hz [18]. The EEG recordings are band Understanding the regular EEG waveform in various
pass filtered as part of this analysis. Clinical physiological conditions in both children adults will help
neurophysiologists and researchers have examined a wider readers recognize abnormal waveforms in EEG. Depending
EEG bandwidth, and they have discovered that it can be on a number of variables, even normal EEG waveforms may
clinically meaningful in some circumstances. Several be regarded possibly abnormal. For instance, alpha waves,
significant physiological and pathologically significant which are thought of as the posterior back ground rhythm,
characteristics of brain activity are lost when the lower (ultra- are discernible over the back of the head in a usual person.
slow) and upper (infra-slow) frequency spectrum ranges of However, diffuse alpha activity (also known as an alpha
the EEG are deleted from normal EEG. comma) in some forms of comato seness may be
pathognomonic. Although very young toddlers and people
who are sleepy can both exhibit delta waves, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 226


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

emergence of focused delta activity can be aberrant(see epilepsy diagnose is the stimulation of IEDs, which can be
below).The brain's frontal areas have beta activity, which either localized or widespread in distribution. Patients with
might expand posteriorly during the first stages of sleep epilepsy may display generalized or focal slowing of the
Focal beta activity (generalized fast activity/GFA) is background. It is important to carefully distinguish IEDs
occasionally observed in structural lesions as well as in a from benign versions or regular brainwaves.
number of epilepsies. Benzodiazepines and phenobarbital,
which are sedative drugs, frequently generate diffuse beta Furthermore, On rare occasions, people without
activity. epilepsy or clinical seizures show epileptic form behavior
on interictal recordings. This could prompt the clinician to
start antiepileptic drug therapy, which could expose
patients without epilepsy to unjustified and hazardous side
effects. However, nobody's seizure count shouldn't be used
to judge the worth of monitoring in people with refractory
epilepsy. Clinical epilepsy care aims to assist a patient in
becoming seizure-free without suffering from adverse
treatment effects. The objective is to reduce patient
morbidity and improve quality of life by lessening the
frequency of medically and socially debilitating seizure
events. Inaccurate epilepsy diagnosis or incorrect seizure
type diagnosis are two factors that contribute to inadequate
seizure control. A precise identification of the patient's kind
Fig.3:Epilepticwaveforms of seizure is made possible by seizure recording, allowing
for the most effective pharmacological therapy and
estimating the likelihood of upcoming vagal nerve
stimulator (VNS) therapy or surgery for epilepsy. Video-
EEG recording is frequently used to establish a different
diagnosis, such as psychogenic episodes, for which
Automated External Defibrillator (AED) medication is
useless. The distinction between epileptic seizures and
psychogenic nonepileptic seizures is the most challenging
and crucial differential diagnosis for which VEM is
utilized. By conducting a clinical examination during the
habitual episode, reviewing video records, or doing both, it
is simple to identify many additional nonepileptic illnesses.
Fig.4:EpilepticFrequencyDifferentiatedwaveforms. However, in the majority of these cases, the VEM results
just support the clinical impression drawn from historical
On an EEG, various waveforms or activity may be and other data and are not diagnostic in and of themselves.
considered normal for some persons while not being
considered normal for others. Sharp waves and spikes are The EEG backdrop may be sluggish during the postictal
phrases that regularly appear in EEG data. These might not interval, which follows a seizure. But interictal background
be noteworthy if they only happen infrequently or at EEG frequencies that are slower than expected for age
specific periods of the day. They may signal the presence generally point to epilepsy that is symptomatic (ie, epilepsy
of a seizure activity adjacent area if they happen frequently secondary to brain insult) The electroencephalography (EEG)
or in particular areas of the brain. EEG findings might be is a crucial part of the assessment of epilepsy. The EEG is
misleading when phrases allude to the possible origin or necessary for the diagnosis of particular electro clinical
spread of seizure activity. Brain signals that affects both disorders because it gives crucial information about the
regions of the brain is referred to as "generalized activity." background EEG and epileptic form discharges. A diagnosis
It may or may not be capable of reporting the starting point of this nature offers crucial prognosis information, directs the
of an action. Specific parts of the brain are regions that choice of antiepileptic medicine, and indicates when to stop
indicate a specific location are referred as (such as taking medication. Essential idiopathic e pilepsies, which are
temporal, frontal, parietal, or occipital). Once more, just frequently hereditary in origin, normally have normal
because a certain brain location is described, it does not neurologic examination and imaging results.
mean that seizures start there. It might signal that this C. Discussion
region is somehow implicated and that more testing is
necessary to establish for sure. The superior performance of this method when compared
to other detection techniques indicates its potential for
The primary purpose of an EEG is to evaluate patients accurately identifying seizure events.
with known seizures in order to accurately identify the
seizure type and epilepsy syndrome such that appropriate Table 1: EEG Frequency range of a normal person
therapy can be directed, in addition to evaluating focal or
generalized cerebral function, or to diagnose unidentified Waves Normal Range Epileptic Range
(Hz) (Hz)
paroxysmal spells that may be seizures. Although the Theta 8.00 18.00
baseline EEG is typically normal in people with epilepsy,
abnormal interictal EEG manifestations may include non- Alpha 16.00 24.00
epileptic form irregularities and interictal epileptic form
discharges. The most helpful diagnostic finding backing an

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 227


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Beta 32.00 56.00 complex physiologic signals.‖Circulation,vol.101,no.23,pp.E215–


20,jun2000.
Gamma 49.00 118.00 [12] X.Xinnian Chen, I.Solomon, and K.Chon,―Comparison of the Use of
Approximate Entropy and Sample Entropy: Applications
Delta 4.00 6.00 to Neural Respiratory Signal,‖in 2005 IEEE Engineering in Medicine
and Biology 27th Annual Conference, vol. 4. IEEE,2005,pp.4212–4215.
[13] C.Bandt and B.Pompe,―Permutation Entropy: A Natural Complexity
Measure for Time Series,‖Physical Review Letters, vol.
As a result, even when patients are experiencing the same 88,no.17,p.174102,apr2002.
type of seizure, each seizure activity is not always preceded
or accompanied by the identical signal transition. [14] U. R. Acharya, H. Fujita, V. K. Sudarshan, S. Bhat, and J.
E.Koh,―Application of entropies for automated diagnosis of epilepsy
Additionally, various seizure types may have varying effects using EEG signals: A review,‖ Knowledge-Based Systems, vol.
on non-seizure EEG signals. In conclusion, incorrect 88,pp.85–96,2015
detections may be unavoidable for all currently used [15] A.Sharma, - Epileptic seizure prediction using power analysis in beta
automatic techniques. The normal frequency range and band of EEG signals,‖International Conference on Soft Computing
epileptic frequency range of EEG is given in the Table1. Techniques and Implementations (ICSCTI). IEEE,2015

IV. CONCLUSION [16] Ling Guo; Daniel Rivero; Julián Dorado; Juan R.; Rabuñal; Alejandro
Pazos, "Automatic epileptic seizure detection in EEGs based online
In this overview, we provide an overview of epilepsy length feature and artificial neural networks", Journal of Neuroscience
detection by highlighting the first detection-limiting problem, Methods, ELSEVIER, Vol:191, Issue 1,15August2010.
techniques that allow us to observe epilepsy data from [17] Vivekanandam, B. "Automated Multimodal Fusion Technique for the
different states of EEG knowledge. A brief background on Classification of Human Brain on Alzheimer’s Disorder." Journal of
pattern recognition in epilepsy recognition is provided in Electrical Engineering and Automation 3, no. 3 (2021): 214-229.
order to establish the meaning of the numerous pattern [18] Rohit Bose; Sawon Pratiher; Soumya Chatterjee, "Detection of epileptic
recognition scheme components. This review describes and seizure employing a novel set of features extracted from multifractal
spectrum of electroencephalogram signals", Vol: 13,Issue2,April2019.
evaluates more research in the area of epilepsy detection done
by another author. Impact on increasing epileptic seizure
detection accuracy was studied in this literature review in a
completely different pattern recognition subject. Based on the
preceding discussion, it is discovered that the number of leads
can be reduced and optimized, which is also portable and user
friendly. It can be further designed based on the low cost by
reducing the number of leads used.
V. REFERENCES

[1] F.Mormann, R.G.Andrzejak, C.E.Elger, and K. Lenhnertz,- Seizure


prediction: The long and the winding road,‖Brain, vol.130,no.2,pp.314–
333,2007.
[2] T. P. Exarchos, A. T. Tzallas, D. I. Fotiadis, S. Konitsiotis, and
S.Giannopoulos, EEG transient event detection and classification using
association rules,‖ IEEE Trans. Inf. Technol. Biomed., vol. 10, no. 3,
pp.451–457, Jul.2006.
[3] J.Gotman,-Automatic detection of seizures and spikes,‖J.Clin. Neuro
physiol., vol. 16,no.2,pp.130–140,1999.
[4] N.McGrogan,―Neural network detection of epileptic seizures in the
electroencephalogram,‖ Ph.D. dissertation, Oxford Univ., Oxford, UK,
Feb. 1999.
[5] E.Waterhouse,-New horizons in ambulatory electroencephalography,‖
IEEE Eng. Med. Biol. Mag., vol. 22,no.3,pp.74–80,May/Jun.2003.
[6] M.Patricia O.Shafer,RN,―About Epilepsy: The Basics— Epilepsy
Foundation,‖pp.4–5,2014.
[7] D.Hirtz, D.J.Thurman, K.Gwinn-Hardy, M.Mohamed, A. R.Chaudhuri,
and R.Zalutsky,―How common are the‖common‖neurologic
disorders?‖Neurology,vol.68,no.5,pp.326– 337,jan2007.
[8] P.Kwan and M.J.Brodie,―Definition of refractory epilepsy: defining
the indefinable?‖ The Lancet. Neurology, vol. 9, no. 1, pp.27– 9,jan2010.
[9] H.Blumenfeld,―Impaired consciousness in epilepsy.‖The Lancet.
Neurology, vol. 11, no.9,pp.814–26,sep 2012.
[10] A.e.a.Szucs,―Sudden death and mortality in epilepsy.‖vol. 59,no.9-
10,pp.321–8,sep2006.
[11] A.L.Goldberger, L.A.Amaral, L.Glass, J.M.Hausdorff, P. C.Ivanov,
R.G.Mark, J.E.Mietus, G.B.Moody, C.K.Peng, and
H.E.Stanley,―Physio Bank, Physio Tool kit, and Physio Net:
components of a new research resource for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 228


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Robustness Trend of Power Transmission and


Transformation Monitoring System based on
Multidimensional Data Anomaly Detection
Algorithm
Wei Zhang*13 、 Yubo Zhang13 、 Chengwei Huang2 、Yubin Feng1
1.Electric Power Research Institute of Guangxi Power Grid Co.,Ltd. NanNing Guangxi 530000
2.Power Supply Bureau of Guangxi Hezhou Power Grid Co. Hezhou Guangxi 542899
3.Guangxi Key laboratory of Intelligent Control and Maintenance Power Equipment Nanning Guangxi 530000
zhang_w.sy@gx.csg.cn

Abstract—A data anomaly detection method based on fuzzy equipment fault diagnosis technology can detect faults at an
isolated forest algorithm is proposed. By selecting some valuable early stage, so as to reduce or avoid the occurrence of safety
attributes and building them into isolated forests, starting from accidents. 2006 [5], the US National Funding Committee first
multiple dimensions, the membership degree of the detection proposed the concept of information physical system
results of each dimension attribute is judged. The influence of (Cyber.Physical.System, CPS) [6].
several key factors on CPPS was investigated. The proposed weak
interdependence model considers protection mechanisms such as Subsequently, related research on CPS has attracted
realistic redundancy backup, which makes the model more close extensive attention from industry and academia, and its purpose
to the actual system operation. Great trend of change. is to build a more intelligent modern infrastructure network.
Subsequently, the strategy of edge-break protection is further Data flow anomaly detection technology can be divided into
proposed to improve the robustness of the power grid, and the data flow anomaly detection methods based on supervised
simulation results are shown by computer graphics, which show learning and data flow anomaly detection methods based on
that it has practical value for the analysis of optimal control unsupervised learning according to whether the label data is
systems with accurate mathematical models. used [7]. The supervised anomaly detection method refers to the
need for labeled data in the training process, and the objective
Keywords—Robustness Trend, Power Transmission,
function is approximately solved by optimizing the model,
Transformation Monitoring System, Multidimensional Data, Data
which is difficult to meet the information requirements of
Anomaly Detection Algorithm
intelligent manufacturing [8]. The traditional information
I. THEORETICAL BASIS system overemphasizes the importance of a certain enterprise
or link in the information system, and it is mandatory for the
The so-called anomaly is a data pattern with different data upstream and downstream nodes to share information, resulting
characteristics, which is different from the normal situation. in the lack of a virtuous circle of interaction between
The research and analysis based on this abnormal situation is stakeholders. For IoT, this means that an important aspect to
called anomaly detection technology [since the 1960s, in the develop and consider is high-level information processing [9],
world [1] several electrical accidents have aroused widespread
concern in the power industry of various countries, but the Anomaly detection and one-way communication to
physical and mechanical impact of natural disasters on the designated locations. The semantic meaning of "Internet of
power grid has not received due attention. 2 The GPS Things" is represented as a global network of uniquely
navigation system is the only source of positioning information addressable interconnected objects [10]. That is, it refers to
for the airborne ADS-B device [2]. predictive methods that employ dynamic models or process
characteristics of the objects under study, such as methods
Reference [3] stated that aircraft and avionics specific errors based on physics principles, Kalman filtering, particle Filtering,
were found in airborne GPS data. These errors include GPS etc. can be classified into this category [11]. Such diagnostic
clocks, location update intervals, and location jumps. The methods are based on a full understanding of the failure mode
infinite-time state regulator problem in optimal control theory process of physical models, device components or operating
occupies an important position in the LQR problem, and has a systems. Ding Jie et al. [12] proposed a correlation coefficient-
wide range of practical application value [4]. It can also be based abnormal behavior detection method. An automatic
extended to the analysis and design of infinite-time output detection system of abnormal behavior based on autocorrelation
regulators to avoid safety events. Under the promotion, the model is realized, which has strong expansibility [13].
technology and system for on-line monitoring and fault
diagnosis of equipment operation have attracted the attention of Huge social impact and economic losses warn us that
major industrial countries. On the one hand, the development of although the probability of natural disasters, especially large-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 229


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

scale severe weather [14], is relatively small, the mechanical The end of the program loop process is realized by judging
damage caused by it has a more serious impact on the power whether the system is stable under the current parameters, and
grid than electrical accidents. When availability is low, large- the loop is terminated when the system is closed-loop unstable
scale flight loss or generation is prone to occur. The ghost flight for the first time. Feature selection can be expressed as the
injection attack is to inject a non-existent flight with a specific process of selecting k best features from a feature set containing
flight trajectory or state. This attack mode is more flexible and m dimensions , because the m-dimensional features are not
practical [15]. independent, but there are complex associations. Therefore,
This paper introduces a software implementation method selecting the k best features can be regarded as a search problem.
that uses Matlab to design the optimal state feedback for the Traditional information systems mainly rely on manual input
controlled system, and provides a software implementation data to passively perceive the internal and external environment
method for dynamically calculating the phase angle margin and of the enterprise. The data has defects such as small amount,
amplitude margin of the system under the condition of various delay, difficult access, and incompleteness, which cannot
parameter perturbations [16], in order to improve the operation effectively support individuality. Emerging formats of
efficiency and economy of the power grid. Benefit, CPPS is intelligent manufacturing such as customized customization,
bound to be one of the main trends in the development of the remote active operation and maintenance, and industrial cloud.
power grid in the future [17]. The wireless node is in the perception layer of the gateway
The deep coupling between the information network and the system, and mainly completes the collection of sensor
power network not only improves the efficiency of the entire information and communicates with the gateway node.
CPPS operation, but also increases additional risks. Compared The wireless node platform mainly includes the main
with the power grid itself. In the single-dimensional sequence control chip STM32, wireless nodes (CC2530, WIFI and
S, since there is only one feature information [18], the research Bluetooth) and sensor nodes. Fuzzy comprehensive evaluation
focuses on how to effectively mine the salient patterns and the [13~14] is a comprehensive evaluation method based on fuzzy
main order relationships in the single-dimensional sequence. mathematics. Specifically, the fuzzy comprehensive evaluation
However, in the multidimensional sequence scenario, we not is Using fuzzy mathematics and the principle of fuzzy
only need to mine the transition relationship between the states relationship synthesis, some difficult to quantify expressions. In
in the multidimensional sequence. order to automatically learn the feature expression of ADS-B
data from the data, an ADS-B based on Long Short-Term
II. THE PROPOSED METHODOLOGY
Memory Variational Autoencoder (LSTM-VAE) is proposed.
A. Multidimensional Data Anomaly Detection Algorithm Data anomaly detection methods, using a large number of
Finally, according to the longest common subsequence normal data samples for training, using variational inference to
matching method, the similarity between the frequent pattern learn the underlying distribution of feature vectors,
and the current newly added time series data is measured, and B. Power Transmission and Transformation Monitoring
the abnormal pattern of the newly added data is found out, System
which solves the efficiency of the traditional abnormal segment
The Spring Framework consists of seven layered modules,
detection method in processing incremental time series. low which are well defined and can be used alone or in combination
problem. Under normal circumstances, the flight trajectories of with one or more other modules. As an open source architecture,
a certain route are similar, but some emergencies, such as the Spring framework adopts a layered architecture. Reference
avoiding objects or losing detection data, may cause abnormal [34] proposes a modification to the dependency network: this
trajectory data, causing the flight trajectory to deviate from the model considers that not all nodes have coupling edges in the
normal trajectory. It may lead to a large difference in the actual coupled model. Therefore, a "partially dependent
trajectory similarity. coupling model" is proposed.

Fig. 1. Multidimensional Data Anomaly Detection Algorithm

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 230


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

automatically analyze, process, warn, store, and query the data


locally and remotely in real time.
(
eij = a si −1, h j ) (2)

Therefore, remote inspection can be realized. In the research


work of CPPS robustness optimization, it can be roughly
divided into two optimization methods: network topology [11-
26] and operation mechanism. Network topology optimization
abstracts CPPS into a graph, simplifies the differences between
nodes and focuses on the topological connections of nodes.
Concept drift detection methods based on detection rate are
widely used in data flow classification scenarios. However, in
unsupervised scenarios, due to There is no labeled data, so the
concept drift detection method based on detection rate is not
suitable. Due to the rapid development and maturity of
disruptive technologies such as the Internet of Things, mobile
Internet, social media, cloud computing, etc., the scale has
Fig.2. Power Transmission and Transformation Monitoring System exploded, the most notable of which is the generation of data
floods. At present, the scale of data has grown to a state in
Literature also proposed a new and improved model. As a
which a large number of physical entities distributed in
model of complex systems, complex networks can describe the
cyberspace and physical space are generated with high
statistical characteristics of the system network topology and
frequency in various forms.
reveal the potential relationship between these statistical
characteristics and system performance. Simulate and analyze And driven by instances, instances in this study refer to
complex systems in the fields of nature, society, and economy. orders. To complete each order, these tasks need to be
The gateway system supports the access of multiple wireless performed in the specified order, and the tasks are represented
nodes. In order to solve the problem of insufficient as transitions in the figure, such as the task of the representative
communication serial ports, a USBHUB module is designed. reviewing the order in the figure. The start and end of the task
This module adopts the USB2.0 high-speed control chip FE2.1, are represented as warehouses in different wireless sensor
which provides one uplink port and four downlink ports. port, devices generally use different communication protocols for
the upstream port goes through HOST_DM. data transmission. This gateway is connected to different sensor
(− E (h(x ))) modules. It needs to be able to break the communication
barriers of different sensor devices and support Different
s(x, n) = 2 c(n) (1) communication protocols, in order to solve the heterogeneity of
different sensor data.
From the perspective of service, the server system and the
communication network are modeled as a whole and examined. Ti = (s1 , s2 ,..., sn ) (3)
Compared with point-form exceptions, point-form exceptions
can exist in any form of data collection, while sequence-form III. EXPERIMENT
exceptions only occur when data instances are related. will
happen. Sequence form anomalies are anomalous Multidimensional data anomaly detection algorithm is
manifestations with ordinal dependencies under certain shown in the figure.
circumstances. In the process of data transmission, in addition
to ensuring the accuracy of the data, it is also necessary to
ensure that the data can be transmitted to the control center in a
complete and timely manner. FDIA is aimed at the accuracy of
the data, and does not consider the timeliness and completeness
of the data. However, the phenomenon of delay and packet loss
often occurs during the transmission of measurement data.
C. Robustness Trend of Power Transmission and
Transformation Monitoring System
In this paper, this method is used to optimize the isolated
forest algorithm, that is, the anomaly detection score value of
the isolated forest is not judged abnormally, but the
membership degree of the detection result of the isolated forest
algorithm is judged, and then the operator and the fuzzy matrix
are used for fuzzy calculation. Get the final evaluation result.
The monitoring center is equipped with a data server and an
information processing server, a large monitoring screen and a Fig. 3. Multidimensional Data Anomaly Detection Algorithm
central management software developed by us, which can

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 231


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The accuracy changing with different time scale is shown in REFERENCES


the figure. [1] Hu Min, Bai Xue, Xu Wei, et al. Overview of Multidimensional Time
Series Anomaly Detection Algorithms [J]. Computer Applications, 2020,
40(6):12.
[2] Ding Ting, Yan Dengcheng, Zhang Yiwen, et al. Gas Anomaly Detection
Algorithm Fusion of Coal Mine Multidimensional Time Series Data [J].
Computer Integrated Manufacturing System, 2020, 26(6):9.
[3] Tang Haixian, Li Guanghui. Semi-supervised online anomaly detection
algorithm for sensor data stream based on C-LSTM [J]. 2021.
[4] Zhan Peng, Chen Lin, Cao Luhui, et al. Network Abnormal Traffic
Detection Algorithm Based on Feature Symbol Representation [J]. Journal of
Zhejiang University: Engineering Edition, 2020, 54(7):8.
[5] Gu Guoqing, Li Xiaohui. An exponentially weighted smoothing prediction
model based on boxplot anomaly detection [J]. Computer and Modernization,
2021, 000(001):28-33.
[6] Song Fu, Zhao Zhe, Chen Guangke. An adversarial sample detection
method based on sample robustness differences: CN112381150A[P]. 2021.
[7] Wang Peipei. A data-driven random subspace bridge health detection
method based on time series data [D]. Beijing University of Civil Engineering
and Architecture, 2020.
[8] Zhao Wanlei, Chen Runqing, Wang Hanzi. An Unsupervised Anomaly
Detection and Robust Trend Prediction Method for Operation and Maintenance
Data: CN111913849A[P]. 2020.
[9] Wang Weigang, Wang Bingwei, Zhang Yunwei. TDFF: A Robust Smoke
Image Detection Algorithm [J]. Advances in Lasers and Optoelectronics, 2021.
[10] Liu Yun. Research on crowd density detection algorithm based on
Fig. 4. The accuracy changing with different time scale.
contour analysis [D]. Dalian University of Technology, 2020.
[11] Li Qian, Han Bin, Wang Xuxiang. Anomaly detection method for
IV. CONCLUSION multidimensional data based on fuzzy isolated forest algorithm [J]. Computer
and Digital Engineering, 2020, 048(004):862-866.
This paper proposes an anomaly detection method based on [12] Xie Xiaochuan, Zhou Shaojun, Li Li, et al. Anomaly detection algorithm
fuzzy isolated forest, which introduces the concept of fuzzy on for smart city edge data based on time series correlation [J]. Computer
the original basis. Using the membership function, starting from Engineering and Design, 2022, 43(7):11.
multiple dimensions, considering the membership of the data [13] Zhou Xurong, Zheng Jianli. Research on reconstruction anomaly
relative to the attributes, the real-time status information of the detection algorithm of industrial time series data based on XGBoost feature
screening [J]. Computer Science and Applications, 2022, 12(3):12.
tower collected by the sensor is stored in the database to realize
[14] Liu Rui, Qian Kun, Shi Keqin. Lidar Loop Closure Detection Algorithm
the analysis and early warning of the status of the tower, and Based on Semantic Segmentation in Dynamic Environment [J]. Industrial
realize a unified the web front end displays the tower Control Computer, 2022, 35(7):3.
information. In this way, remote inspection of power [15] Fu Letian, Li Peng, Gao Lian. Improved Least Squares Support Vector
transmission and transformation lines can be realized, and 24- Machine Algorithm Considering Sample Outliers [J]. Chinese Journal of
hour operating status monitoring can be performed. Finally, the Instrumentation, 2021.
proportion of nodes removed by initial faults, the coupling [16] Zhang Bowen, Liu Zhi, Sang Guoming. Anomaly Detection Algorithm
strength between networks, and topology of communication Based on Kernel Density Fluctuation [J]. Computer Engineering and
networks are robust to CPPS. Applications, 2021, 57(12):5.
[17] Liu Jie, Li Xiwang. Anomaly detection algorithm for industrial control
network based on graph neural network [J]. Computer System Application,
2020, 29(12):5.
[18] Li Jian, Chen Mengfu, Zhan Chongye. Methods and monitoring systems
for improving the robustness of temperature measurement systems:
CN111414967A[P]. 2020.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 232


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Miniaturized Semi-Hexagonal Aperture Shape


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Antenna with Elliptical Ground for C-V2X


Communication
Ramya Vasudevan Nagaraju V
Department of Electronics and Department of Computer Science and
Communication Engineering Engineering
Saveetha School of Engineering Saveetha School of Engineering
(Saveetha Institute of Medical and (Saveetha Institute of Medical and
Technical Sciences) Technical Sciences)
Thandalam, Chennai India Thandalam, Chennai, India
ramyav9035.sse@saveetha.com nagarajuv.sse@saveetha.com

Abstract—This paper presents a compact semi-hexagonal design to enhance gain and it was reported as 3 - 4dB. In [8],
aperture shape antenna (SHASA) with the modified elliptical a Coplanar antenna for V2X communication was proposed.
ground for a cellular vehicle to everything (C – V2X) Radiating elements are placed on a transparent glass substrate
application. The proposed antenna is designed using an FR4 with a dielectric constant of 5.5. The optimized design covers
substrate with a dielectric constant of 4.4 and a loss tangent of a maximum size of 50 x 17 x 1.1 mm3.
0.02. The performance of the antenna was measured in terms of
return loss, VSWR, Gain, Directivity, Radiation pattern, and The negative gain was observed in its desired frequency
Radiation efficiency. Based on the simulation results, the and the radiation efficiency was found below 15%. Dual-band
antenna achieves the resonating frequency of 5.8GHz with a rectangular slot with a 45° circular polarized antenna was
return loss of -63.6dB. The maximum gain and radiation proposed in [9]. Measured input reflection coefficients are
efficiencies are 2.31dB and 94.3%. The proposed antenna 26% (3.38GHz - 4.39GHz) and 56% (5.06GHz – 9.02GHz).
novelties utility in Intelligent Transportation Systems (ITS) for The optimal size was 39 x 46 mm2 and achieved a peak gain
vehicular communication using Cellular – V2X technology of 2dBi. The second band (5.06GHz – 9.02GHz) is used for C
comes under the IEEE 802.11p band. – V2X applications. In [10], a compact wideband microstrip
patch antenna for circular polarization was proposed. The
Keywords— Semi Hexagonal, Aperture shape, Cellular
overall size of the antenna meeting C-V2X requirements was
Vehicle-to-Everything, Elliptical ground, IEEE 802.11p.
30 x 30 x 0.8 mm3 and the simulated gain was larger than 3dBi
I. INTRODUCTION throughout the operating frequency. In all the above-reported
references [7]–[10]the use of high-profile substrates and
Road traffic accidents - the leading cause of death by injury antenna sizes are quite bulky which will not be suitable to
and the tenth-leading cause of all deaths globally - now make mount on a compact device. The main intent of this article is
up a surprisingly significant portion of the worldwide burden to design a low-profile, compact radiating patch that is suitable
of ill health. An estimated 1.2 million people are killed in road to place on any wireless device with improved radiation
crashes each year. A Blind connection is a condition where characteristics.
vehicles are incapable of seeing conflicting traffic [1].
Intelligent Transport Systems (ITS) embrace a wide variety of Compared with the aforementioned various antenna design
communications-related applications intended to increase methods, the proposed antenna is compact, and simple which
travel safety. Dedicated Short Range Communication (DSRC) consists of a microstrip line fed semi hexagonal aperture shape
and Cellular vehicle to everything (C-V2X) are two key radio antenna. In this design, an elliptical ground with a ring was
access technologies [2],[3]. V2X has the potential for introduced to improve the gain and radiation efficiency. In this
vehicular care and to reduce road smashes. For future smart article, a literature survey was done in the first session. In the
cities, communication technology, smart information, and second session, four stage analysis was made to obtain the
intelligent transportation solutions will be the core [4]. optimal parametric dimensions of the proposed antenna. In the
Microstrip patch antennas with the existing methods find third session, a parametric analysis was made to improve the
significant utility on account of their simple geometry, low- return loss, gain, and radiation efficiency. In the fourth session,
profile material, and compactness [5],[6]. the simulation results were explained. The fifth session
concludes that the proposed antenna is well used for C - V2X
Placing a compact and low-profile antenna inside a shark communication. Due to its compact size, the antenna can be
fin module, the results seem to be degraded. Various antenna mounted on a car window, on drones, on wireless
structures (single radiator, array radiator) are developed to communication sensors, and on wearable devices.
meet cellular vehicle standards which fall under IEEE
802.11p. In [7], an Electronically Switched Parasitic Array
Radiator (ESPAR) which operates at 5.9GHz was proposed.
Conducting elements are printed on Rogers R0-4725JKR
substrate. The maximum area occupied by the antenna was 37
x 32 x 0.78 mm3. Three monopole radiators are used in the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 233


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
II. A
DVD Part Number: NTENNA DESIGN
CFP22CB5-DVD: ISBN: 978-1-6654-6083-5 PA1 is the distance between the
outer and inner hexagonal
conductors. Table II. Show the parametric comparison from
A. Evolution of proposed semi-hexagonal antenna and
details of geometric parameters stages 1 to 3.
Figure 1 shows the evolution of the proposed antenna from TABLE I. DIMENSIONS OF THE PROPOSED ANTENNA
stage 1 to stage 4 which is printed on an FR4 substrate. Height
(h), dielectric constant (Ɛr), and loss tangent (tan δ) are 0.8mm, Symbols Dimensions in mm
4.4, and 0.02 respectively. Table 1. provides details about Radius of the outer circle (R1) 6.25
antenna geometry parameters.
Radius of the inner circle (R2) 5
1) Stage 1(Flow to obtain elliptical ground): In this stage,
three steps of analysis are explained. Initially, from the radius Radius of a circle (R3) 0.7
of the circular patch formula given in equations (1) and (2) Substrate length (Lsub) 20
below, two circular patches have been obtained [11].
Feed width (Wf) 2.5
F Length between outer and inner hexagonal
𝑅= (1) 1.25
2ℎ 𝜋𝐹 (PA1)
√{1+ [ln( )+1.7726]}
𝜋Ɛr𝐹 2h Starting point of feed from substrate left end
7.75
(L1)
Were,
Feed length (Lf) 8.2
8.791 𝑋 109
F= (2) Height of ground (Lg) 6
𝑓𝑟√ Ɛr

R = Circular patch radius in cm Substrate width (Wsub) 18

h = Height of the substrate in cm Ground width (Wg) 18

Length of outer hexagonal (HR1) 12.5


Ɛr = Dielectric constant
Length of inner hexagonal (HR2) 10
𝑓𝑟 = Resonating frequency Circular patch in GHz
In this article, the author fixed the lower-frequency
band and the upper-frequency band as 5.4GHz and 6.3GHz
respectively. Its center frequency band is 5.85GHz which is
suitable for C – V2X applications.
a) Step 1: From the above equation (1), for lower and
upper-frequency bands, the radius obtained is 6.31mm, and
5.21mm respectively. To make design easy, two Circular
patch radii (tentative values) ‘R1’ is fixed at 6.25mm (Lower
resonating frequency) and ‘R2’ at 5mm (upper resonating
frequency) are placed on a substrate with centered fed and at
the bottom, a full ground is placed. In this step 1 analysis
return loss is not up to the expectation.
b) Step 2: The antenna resonates at 2 different
frequencies (2.3GHz and 4.7GHz). 2.3GHz is considered an
unwanted frequency band and both bands are not suitable for
C – V2X applications.
c) Step 3: While introducing an elliptical half ground,
the unwanted frequency (2.3GHz) got suppressed and
obtained a single band whose resonating frequency is 4.7GHz
[12]. The flow for the evolution of elliptical ground is shown
in figure 1(a).
2) Stage 2(Hexagonal-shaped patch): In order to improve
the radiation characteristics [13], [14], two hexagonal patches
are replaced from circles R1 and R2. HR1 and HR2 are the (a) Stage 1 (Flow to obtain elliptical ground)
distance between the edges of the hexagonal patch which are
shown in figure 1(b). Radiation characteristics do not seem to
be good at this stage and the resonating frequency is 4.6GHz
which is not suitable for C-V2X application.
3) Stage 3(Formation of SHASA): By removing the top
half part of the hexagonal, a semi-hexagonal aperture-shaped
antenna is obtained as shown in figure 1(c). At this stage, the
antenna resonates at the desired frequency, and its lower,
upper, and center frequencies are 5.4GHz, 6.3GHz, and
5.8GHz. The gain and radiation efficiency at 5.8GHz are
observed as 1.8dB and 87.8% respectively. The gain and (b) Stage 2
radiation efficiency seem to be improved from stages 1 to 3.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 234


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

(c) Stage 3 (c)


Figure 1. Evolution of antennas from stage1 to stage 3 Figure 2. Simulation results for stage 1 to stage 3 antennas (a) Return loss
(b) VSWR (c) Gain
TABLE II. PARAMETRIC COMPARISON ON EACH STAGE
III. PARAMETRIC ANALYSIS AND GAIN ENHANCEMENT
TECHNIQUES
Reson Radiatio
Directi
ating S11 VSWR Gain n A. Parametric optimization.
Stages vity
freque (dB) (dB) (dB) efficienc
(dB)
ncy y (%) Parametric analysis was done on three Parameters PA1,
(GHz)
L1, and Wf shown in figure 1(c). Parameter PA1 changes by
1 4.7 -14 1.4 1.16 1.4 82.8% changing the radius value R1 and the analysis is made to get
2 4.6 -14.5 1.46 1.6 1.88 85.1% the optimal value of return loss. As radius R1 changes from
6mm to 7mm, its corresponding HR1 values will also change
3 5.8 -43.6 1 1.8 2.05 87.80%
from 6mm to 7mm. PA1 is the distance between two
B. Investigation of the proposed antenna at each stage. hexagonal conductors. This distance value will vary from
1mm to 2mm as the HR1 value changes. From figure 3(a), It
From the simulation results obtained, it seems to be a can be noticed that for radius R1 is 6.5mm the return loss is
minor difference for the Stage 1 and Stage 2 antennae shown
measured as -53.3dB. By keeping the PA1 value at 1.5mm
in figure 2(a) & (b). Stage 1 antenna resonates at 4.7GHz
next step of the analysis was made.
whose return loss and VSWR are -14dB, and 1.4dB
respectively. Gain, Directivity, and radiation efficiency were L1 represents the starting point of the feed from the left
observed as 1.16dB, 1.4dB, and 82.8%. Stage 2 antenna corner of the substrate as shown in figure 1. Fed can move
resonates at 4.6GHz. Its return loss, gain, directivity, and forward or backward by changing length L1. Distance L1
radiation efficiency are observed as -14.5dB, 1.46dB, 1.6dB, changed from 7mm to 8mm with an interval of 0.25mm. From
1.88dB, and 85.1%. After converting the antenna into semi figure 3(b), it is clear that for a distance L1 is 8mm the return
hexagonal aperture shape antenna, the performance of the loss is measured as -56.8dB. By keeping PA1 at 14mm and L1
Stage 3 antenna is better and also radiates at the desired value at 8mm next step of the analysis was made.
frequency as shown in figure 2(a) & (b). Figure 2(c) shows The third parameter Wf (feed width) has been chosen to
improvement of gain from stage 1 to stage 3. obtain the optimal return loss. Wf is the width of the feed
which is connected to an SMA connector. By changing the
value Wf from 1mm to 3mm with an interval of 0.5mm, it is
noticed that for Wf is 2.5mm the return loss is measured as -
58.3dB as shown in figure 3(c). By doing a parametric
optimization the optimal value return loss is obtained.

(a)

(a)

(b)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 235


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 5. comparison of stage 3 antenna and proposed antenna gain.


(b)
IV. RESULTS AND DISCUSSION
Semi Hexagonal Aperture Shaped Antenna (SHASA) is
designed for C- V2X application on an FR4 substrate with a
thickness of 0.8mm. In this article, antenna parameters are
computed and compared using commercially available full-
wave EM simulation software (HFSS 2022/R2). From the
simulation results, the proposed antenna is well-suitable for C
– V2X application due to its high gain, better radiation
efficiency, and good return loss. Table III summarizes the
simulation results of the proposed antenna and Table IV
compares the proposed antenna with the previously presented
(c) antenna.
Figure 3. Effects of S11 on changing (a) PA1 (b) L1 (c) Wf TABLE III. SIMULATED RESULTS OF THE PROPOSED ANTENNA
B. Gain enhancement technique. Radiat
Resonati Directi ion
Proposed

Different techniques are used to enhance gain. One of the S11 VSWR Gain
antenna

ng vity efficie
(dB) (dB) (dB)
techniques is by adding a conductor at the back side of the frequenc (dB) ncy
substrate, gain can be improved [15]. In the third stage, gain y (GHz) (%)
and directivity obtained at 5.9GHz are 1.8dB, and 2.05dB 5.8 -63.6 1 2.31 2.45 94.3%
respectively. In order to improve gain, a circle of radius R3 is
placed on the backside of the substrate which is shown in TABLE IV. COMPARISON OF THE PROPOSED ANTENNA WITH THE
figure 4(a). From the simulation results, for R3 is 0.7mm, the REFERENCE ANTENNA

gain is measured as 2.3dB at 5.9GHz as shown in figure 5.


From stage 1-3 antennas, the peak gain is measured equal to Overall
Radiat
Size
or below 1.8dB. After introducing a circle of radius R3 gain Ref Substr S11 ion
Size Gain reducti
ate (dB) Efficie
improved to 2.31dB. (mm3)
ncy
on (%)
(%)
Rogers 95%
32 x 37 x RO-
[7] -45 4.5 dBi 68.8%
0.78 4725J
XR
50 x 17 x 15% Negati
[8] Glass -25 69.1%
1.1 ve Gain
Not
39 x 46 x
[9] TLY -5 -20 Provid 2dBi 89.9%
1.6
ed
30 x 30 x 89%
[10] FR4 -20 3.5dBi 60%
0.8
(a) (b) Propos 18 x 20 x
FR4 -63.61 94% 2.31dB ----
ed 0.8

Figure 6 shows simulation results of return loss, VSWR,


Gain, radiation pattern, and current distribution at 5.8GHz
which are obtained using EM simulation software (HFSS).
From figure 6 (a), (b), and (c), the return loss, VSWR, and gain
were observed as -63.61dB, 1dB, and 2.3dB respectively.
Figure 6(d) shows the simulated 2D- radiation pattern of the
proposed antenna at 5.8GHz. At this frequency, the H – plane
radiation pattern presents omnidirectional behavior whereas
the E – plane radiation pattern is bidirectional. Additionally,
(c) the current distribution for the proposed antenna is obtained
Figure 4. Proposed Antenna (a) Top View (b) Bottom view (c) 3D view by simulation at 5.8GHz which is shown in figure 6(e). it is
observed that the current distribution is stronger at the feed
line and around the geometry of the patch and ground.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 236


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5 V. CONCLUSION
A semi-hexagonal aperture-shaped antenna is designed using
an FR4 substrate. This antenna is designed using HFSS
simulator version 22. The overall size of the antenna is 18 x
20 x 0.8 mm3 which is compact and suitable to place on a
compact device. The proposed antenna demonstrates good
impedance and radiation characteristics in the desired C –
V2X communication (5.85GHz – 5.925GHz). This antenna
covers a band from 5.4GHz to 6.3GHz which is suitable for
(a)
WLAN (5.2-5.8GHz) and WAVE(5.9GHz). A peak gain of
2.31dB and a maximum gain of 5dB is obtained which can
make used in C – V2X, and WLAN applications. Due to its
compact size, the proposed antenna can mount on the car
window, on drones, on wireless communication sensors, and
on wearable devices.
REFERENCES
[1] A. Mukhopadhyay and V. A. Bharadwaj, “V2X based road safety
improvement in blind intersections,” in 2020 Second International
Conference on Inventive Research in Computing Applications
(ICIRCA), Coimbatore, India, Jul. 2020, doi:
10.1109/icirca48905.2020.9183253 [Online]. Available:
(b) https://ieeexplore.ieee.org/document/9183253/
[2] D. J. I. Zong Chen and D. S. Smys, “Optimized dynamic routing in
multimedia vehicular networks,” September 2020, vol. 02, no. 03, pp.
174–182, Sep. 2020.
[3] X. Wang, S. Mao, and M. X. Gong, “An overview of 3GPP cellular
vehicle-to-everything standards,” GetMob. Mob. Comput. Commun.,
vol. 21, no. 3, pp. 19–25, Nov. 2017.
[4] G. Pau, A. Severino, and A. Canale, “Special issue ‘new perspectives
in Intelligent Transportation Systems and mobile communications
towards a smart cities context,’” Future internet, vol. 11, no. 11, p. 228,
Oct. 2019.
[5] D. A. Bashar, “Artificial intelligence based LTE MIMO antenna for 5th
generation mobile networks,” September 2020, vol. 2, no. 3, pp. 155–
162, Jun. 2020.
(c)
[6] H. Zhao, C. Li, Z. Chen, and J. Hu, “Fast simulation of vehicular
antennas for V2X communication using the sparse equivalent source
model,” IEEE Internet Things J., vol. 6, no. 4, pp. 7038–7047, Aug.
2019.
[7] D. K. Rongas, A. S. Paraskevopoulos, L. D. Marantis, and A. G.
Kanatas, “An integrated shark-fin reconfigurable antenna for v2x
communications,” Prog. Electromagn. Res. C Pier C., vol. 100, pp. 1–
16, 2020.
[8] J. I. Trujillo-Flores et al., “CPW-fed transparent antenna for vehicle
communications,” Appl. Sci., vol. 10, no. 17, p. 6001, Aug. 2020.
[9] J. Kulkarni, C.-Y.-D. Sim, A. K. Poddar, U. L. Rohde, and A. G.
Alharbi, “A compact circularly polarized rotated l-shaped antenna with
j-shaped defected ground strucutre for wlan and v2x applications,”
(d) Prog. Electromagn. Res. Lett., vol. 102, pp. 135–143, 2022.
[10] K. Saraswat and A. R. Harish, “A dual band circularly polarized 45°
rotated rectangular slot antenna with parasitic patch,” Int. J. Electron.
Commun., vol. 123, no. 153260, p. 153260, Aug. 2020.
[11] A. B. Sahoo, N. Patnaik, A. Ravi, S. Behera, and B. B. Mangaraj,
“Design of a miniaturized circular microstrip patch antenna for 5G
applications,” in 2020 International Conference on Emerging Trends in
Information Technology and Engineering (ic-ETITE), Vellore, India,
Feb. 2020, doi: 10.1109/ic-etite47903.2020.374 [Online]. Available:
https://ieeexplore.ieee.org/document/9077760/
[12] P. Kumar, S. Urooj, and F. Alrowais, “Design of Quad-Port
MIMO/Diversity Antenna with Triple-Band Elimination
Characteristics for Super-Wideband Applications,” Sensors , vol. 20,
no. 3, Jan. 2020, doi: 10.3390/s20030624. [Online]. Available:
(e) http://dx.doi.org/10.3390/s20030624
[13] S. Palanisamy, B. Thangaraju, O. I. Khalaf, Y. Alotaibi, S. Alghamdi,
Figure 6. Simulation results using HFSS at 5.85GHz (a) Return loss (b) and F. Alassery, “A novel approach of design and analysis of a
VSWR (c) Gain (d) Radiation pattern E – Plane and H - Plane (e) Current hexagonal fractal antenna array (HFAA) for next-generation wireless
distribution. communication,” Energies, vol. 14, no. 19, p. 6204, Sep. 2021.
[14] Lee, Kim, and Pyo, “Mesh-grounded monopolar hexagonal microstrip
antenna for artillery-launched observation round,” Electronics (Basel),
vol. 8, no. 11, p. 1279, Nov. 2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 237


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
[15] N. DVD
Bahari,
PartM. F. Jamlos,
Number: and M. M. Isa,
CFP22CB5-DVD: “Gain
ISBN: enhancement of
978-1-6654-6083-5
microstrip patch antenna using artificial magnetic conductor,” Bull.
Electr. Eng. Inform., vol. 8, no. 1, pp. 166–171, Mar. 2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 238


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Smart Water Flow Monitoring and Theft


Detection System using IoT
Varakumari Samudrala1,Ajay Reddy Yeruva2,Jayapal N3, T. Vijayakumar4,M.
Rajkumar5, Shaik Razia6

1
Department of Electronics and Communication Engineering, NRI Institute of Technology (A),
Agiripalli 521212, Andhra Pradesh, India, varakumari3@gmail.com
2
Department ofIP Engineering, Senior Software Engineer, Ritchie Bros. Auctioneers, 5667 Gibraltar
Dr Ste 200, Pleasanton, CA, 94588, USA.ayeruva@ritchiebros.com
3
Department of Electronics and Communication Engineering,Kongunadu College of Engineering and
Technology,Trichy 621215, Tamil Nadu, India, jayapal385@gmail.com
4
Department of Computer Science and Business Systems,Sri Eshwar College of
Engineering,Coimbatore, Tamil Nadu 641202,India,tvijay787@gmail.com
5Assistantprofessor Senior Grade 2,School of Information Technology & Engineering
VIT University, Vellore Campus,mrajkumarselvee@gmail.com
6
Department of Computer Science and Engineering,KoneruLakshmaiah Education
Foundation,Vaddeswaram – 522302,Andhra Pradesh, India, razia28sk@gmail.com
Abstract—Water is an essential and crucial resource in I. INTRODUCTION
the world. Without water, there will not be any
organisms, flora, and fauna on the planet. Water is most Water is a valuable resource for all organisms so
important for living organisms like humans, plants, and proper use of water is important for domestic, social, and
animals. Earth is covered by 71% of water bodies and economic development. Water is the main source for some
29% is covered by land. The human body is made up of sectors such as industry, agriculture, transport, and energy.
nearly 70% of water. There is no life when there is no Domestic usage like washing clothes, and utensils, cooking,
water. So, people should not waste water and use it bathing, and drinking. Recycle water will be used for
accordingly. For domestic use, people store the water in washing vehicles and gardening. When the water tank in the
their home tank which flows from the corporate tank or home and apartments are filled, there will be a flow of water
in a bore well. Either of the two there will be a water and leakage of water when there is a breakageof the pipe.
flow when the home tank is filled which leads to water These problems will lead to the wastage of water. To
wastage and there will also be a wastage of water when overcome this problem, the smart flow monitoring system is
there is a leakage of water or theft of water during the implemented. The flow sensor will measure the water flow
flow of water to the home tank. To control and avoid the to the tank. The data will transfer to the cloud through
overflow of water, a smart water flow monitoring system NodeMCU. When the sensor’s value is greater than the
and theft detection are implemented by using the threshold value, the cloud will send the alert message to the
Internet of Things (IoT). Sensors, NodeMCU, Solenoid user as there is a leakage in the flow. To prevent water
valve, and Global System for Mobile communication wastage, there is a need for a regular monitoring system of
(GSM) are used to implement this system. When there is water to reduce water wastage. The main reason for this
a flow above the threshold value and leakage or theft, the problem is the unawareness of administration and the
cloud will send the alert message to the user. society. Monitoring and controlling the water discharge by
using Arduino. This will control the discharge of water from
Keywords— Water, Sensor, IoT, Valve, Arduino IoT cloud, the pipe. Discharge time and water volume are inputted by
NodeMCU, GSM. the keypad, and the results are shown on a liquid-crystal
display (LCD). The values are transferred to the Arduino
from the keypad, the transmitter, and the water flow sensor,
then the value is correlated to the programming code which
is in the Arduino [1].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 239


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

distribution, the leakage is detected and monitored. The


In article [2], there are two parts water quality microcontroller used in this system is ATMEGA328 for
monitoring and water quantity monitoring system. The monitoring the leakage. The resistance detector is used in
quantity system is implemented to supervise the use of water this system to monitor the direction flow of water [6].In
in households. The quantity meter system will generate the paper [7], by using the tank’s sensor data and dimensions
billing for the consumed water. There is a need to check the the tank leakage is detected. The data is collected from each
purity of water and it is done by using the water quality house from the sensor in the tank and the data is saved and
meter system. This meter will check the five parameters of transferred to the cloud. From the main tank of the water
water conductivity, pH, dissolved oxygen, temperature, and gets supplied, the main tank data is also collected from the
turbidity. This will help to check the purity of water and sensor and to the cloud. In the cloud the data will analyze
gives the possibility to relieve health hazards. In real-time, the consumption of water from the main tank to the house
the monitoringsystem will display the value and send the tanks. The smart water grid manages and monitors the level
SMS to the concerned user or authority. Water is a priceless of water in the tank and helps to run the motor
resource that is from nature. It is a very important resource automatically. According to the dimensions of the tank, the
for all living organisms. Water is the main source and acts as leakage detection device is implemented in the tank. That
an input for many fields like industry, transport, agriculture, device is in inspection mode continuously when there is any
and energy. A low-cost smart water device is implemented. detection is detected, the cloud will analyze with the use of a
This will give the proper information on the possibility of GSM module.
leakage of the water to the house owners, apartment owners,
and the authority in real-time. The LCD will display the
consumed water in liters and the flow rate of the water II. PROPOSED WORK
which is measured using the flow sensor and also send the
SMS through the GSM to the users [3]. The major objective of this paper is to detect the
theft and leakage of the water and to monitor the water flow.
In paper [4], for a smart water management The amount of water flow is calculated by using the flow
system,the ZR16S08microcontroller is used. When the water sensor. The flow of water in the main tank and to the house
is distributed through the pipes, the water flow is monitored tank is measured by the water flow sensor. The data
and the quality of water is also examined. The water gets collected from the sensors are transferred to the cloud
pollutant if there is any leakage or holes in the pipes while through the microcontroller. The cloud will analyze the data
the water is in distribution condition. The Central Processing received by the microcontroller. If the data is not equivalent
unit (CPU), which is interfaced with the Raspberry Pi to the threshold value of the main tank and the house tank,
controls the collected information from the sensor and is then the leakage is detected. When the leakage is detected,
transmitted to the web server. The data collected from the the cloud will send the alert message immediately to the user
sensors is addressed by the CPU. According to the sensor via the GSM module. When the user gets the alert message,
nodes, operates at the frequency defined as 433MHz.Water the user can close the valve of the particular pipe or can take
leakage leads to the loss of water annually when the water is any other immediate steps to stop the flow of water through
distributed. The implementation of water leakage detection the damaged pipe and replace the pipe as soon as possible.
[5] is done by using the microcontroller in the distribution This system will be more useful to control the flow of water
networks. With the use of a flow device, the amount of detecting the leakage of water and saving water. Figure 1,
water flow is measured and calculated. When there is any shows the proposed method of the implemented system.
leakage in the pipes while the flow of water is in the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 240


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 1: Proposed method


Figure 1, displays the method implemented in this
paper. The water will flow from the main tank to the
different houses like substation 1, substation 2, and
substation 3. The flow sensor is placed after the flow of
water from the main tank and placed before the flow of
water to the substations. The flow sensors are connected to
the NodeMCU microcontroller. The data from the
microcontroller is transmitted to the cloud. If there is any
leakage is found, the cloud will send the alert message to the
mobile of the user through GSM. Considering, for one
person needs 145 liters. In one family considering 5
members, one family needs 725 liters. For one month the
family needs about 21,500 liters approximately. So, the
water flow is monitored in each house and when the water
flow doesn’t meet the threshold value of approximately
21,500 litersfor each house, then there is a leakage is
detected. When the leakage is detected, the clod of Arduino
IoT will alert the user by sending the alert message via GSM
to the user’s mobile phone.

Fig 2: Block Diagram

The above figure 2, shows the flow chart of the


proposed method. Initially, the flow sensors read the data of
the flow of water from the main station and the substations.
The readings of sensors are transmitted to the NodeMCU for
calculating the flow of water to the substations. In the
microcontroller, using the Arduino IDE platform the system
is programmed for calculating, monitoring, and controlling
the system. One substation approximately needs 21,500

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 241


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

liters of water. So, the transfer of water fromthe main station valve that is commonly used to control the flow of fluids.
and the substations should be a maximum of 21,500 liters. There is a movable core in the valve, which is called an
This is calculated by using the microcontroller. The armature. An electromagnetic field is produced around the
calculation of the difference between the main station and armature that helps to work the solenoid valve. This valve is
the substations is done by using the microcontroller. The connected to the NodeMCU microcontroller to control the
threshold value of the flow of water is 21,500 liters. When fluctuation of the valves.
the difference is greater than the thresholdvalue, it is
detected as the water is theft or leaked. When there is the C. NodeMCU
difference is less than or equal to the threshold, no theft is
detected, and the water flow is in good condition. The code NodeMCU microcontroller is an open-source IoT
for calculating the water flow from the sensors, and platform. This microcontroller boardcontains the Espressif
calculating the difference between the main station and the system’s Wi-Fi module [11]. The integrated Wi-Fi module
substations are done by the NodeMCU microcontroller is ESP8266. As this microcontroller contains the ESP8266
using the Arduino IDE platform. After calculating the module, it will act as wireless communication. The
difference and the threshold value, the values are transferred operating voltage of the NodeMCU is from 3.3V to 5V. The
to the cloud of Arduino IoT. If the leakage or theft is microcontroller is interfaced with the sensors and connected
detected, the cloud will analyze and send the alert message to the cloud as wireless. The data from the sensors are
to the user’s mobile phone via GSM. Then the user can calculated and sent to the cloud using the Wi-Fi module in
proceed with the solution according to the leakage problem. the microcontroller.

III. HARDWARE REQUIREMENTS D. GSM module

The required hardware components are a water GSM is a device that connects the mobile phone
flow sensor, solenoid valve, NodeMCU microcontroller, and network to the other network. GSM module links the device
the GSM module. The water flow sensors are connected to wirelessly to the networks. It helps to send, receive, and to
the microcontroller and near the main tank and the communicate the data to mobile networks [12]. From the
substation tank of the houses. The readings are collected microcontroller, the data is processed and sent to the GSM
from the sensor and transferred to the microcontroller. The module then this GSM module will send the data to the
GSM module will send the message to the user according to owner’s or user’s mobile phone. GSM will send the message
the information sends by the microcontroller to the cloud. as Short Message Service (SMS) [13].

A. Water Flow Sensor IV. SOFTWARE REQUIREMENTS

The amount of water flow [8] through the pipe is Arduino IoT Cloud is an online source platform
monitored by using the water flow sensor. To calculate and that is developed by the Arduino community in an IoT
measure the water flow rate and the amount of water platform.To make the projects simple and easy, this Arduino
flowing through the pipe, the water flow sensor is used. The IoT cloud platform gives an end-to-end solution to the users.
rate of water flow is measured in liters per hour. The flow This cloud can support more interaction platforms like
sensor contains a plastic valve to flow the water through the Representational State Transfer Application Programming
sensor to measure the flow rate. The rotor is also present Language (REST API), Hypertext Transfer Protocol
inside the sensor. The rotor will start to rotate when the (HTTP), JavaScript, WebSocket, command line tools, and
water is flowing through the valve. The principle of working Message Queuing Telemetry Transport (MQTT). In real-
of the water flow sensor is the Hall effect [9]. Water flow time, the cloud can be linked to multiple devices together.
sensors are connected to the NodeMCU microcontroller. The statistics and details can be sent, receive, and exchanged
The data from the sensors are transferred to the to the cloud and the networks [14]. The user can execute,
microcontroller. monitor, and control the data when the user interface allows
these actions. This cloud platform, it works on the Arduino
B. Solenoid Valve microcontrollers and it allows the compatible platforms to
work on it. The compatible platforms are ESP8266 and
A solenoid valve is an actuator that works ESP32 microcontrollers. This cloud can communicate toall
electrically. A solenoid valve converts electrical energy into the Arduino-based boards. To secure the data in the cloud,
mechanical energy. Solenoid valves act as a controlling unit the Arduino IoT cloud for encryption uses the Secure
that allows the fluid to flow or will decline the flow of fluid Sockets Layer (SSL) protocol. The user can log in to the
through the pipe or tube. A solenoid valve is also called a Arduino IoT cloud in the web browser or the user can
proportional valve [10]. The microcontroller controls the download the mobile application of the Arduino IoT cloud
function of the valve in this paper. A solenoid valve is a and login into the mobile application to monitor the data

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 242


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

quickly and easily. In this paper, the cloud is interfaced with sensor measures the rate of water flow and provides an
the NodeMCU microcontroller with the help of the Wi-Fi accurate reading of the volume of water being moved. The
module. The microcontroller will transfer the data to the flow sensor monitors the volume of water entering and
cloud. Arduino IoT cloud will analyze the data from the leaving the main tank and the home tank. Using the
microcontroller and sends the alert message as Short microcontroller, the data from the sensors is uploaded to the
Message Service (SMS) to the user’s mobile. cloud.The cloud will analyze the data received by the
microcontroller. If the data is not equivalent to the threshold
V. RESULTS AND DISCUSSIONS value of the main tank and the house tank, then the leakage
is detected. When the leakage is detected, the cloud will
The primary goals of this journal are to check water send the alert message as SMSquickly to the user’s phone
flow and identify any water stealing or leakage. The flow via the GSM module.

Fig 3:Water limit by substation 1 and before buying the extra tank of water
Above given figure 3, shows the flow of water graph increases and decreases corresponding to the rate of
limits to the tank of substation 1 from the main station and flow of water to the substations. In substation 1, the amount
also displays before buying the extra water for the tank. In of water level in substation 1 is 21542.225 liters. The
the cloud, the user can monitor the system for the past 15 amount of water is reached near the threshold value of
days, past 7 days, past 1 day, for an hour and the user can substation 1, so the valve of substation 1 is closed when the
view the graph also in live. This figure shows the amount of water reaches the threshold value. In substation 2,
monitoring of the water flows from the main station to the the water reaches only 19202 liters so the valve is opened
substations. In this paper, the given figure is taken in live until the amount of water reaches its threshold value of
mode. The main station water flow graph shows the 21500 liters. In figure 4, substation 2’s tank is yet not
monitoring of the water flow to the substations.The graph reached the threshold value. So, valve 2 is opened for
shows the flow of water is increasing and decreasing substation 2. The example data is the buying of water to fill
according to the rate of water flow measured by the sensor. the tank, if the user needs extra water, then the user can buy
Similarly, the substation 1 and substation 2 water flow water by paying a certain amount for certain liters of water.
graphs are displayed in figure 3. This graph demonstrates The cloud displays buy the water as 1000L, 2000L, and
the rate of flow of water received from the main tank. The 5000L of water.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 243


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 4: After buying the extra tank of water

Figure 4, displays the flow of water of the main In substation 2, the amount of water is not reached the
station and the substation and shows the graph after buying threshold value so the valve of substation 2’s valve 2 is
the extra water. The main station water flow graph shows opened until the water reaches its threshold value. The user
the rate of water flow to the substations. Corresponding to of substation one needs an extra amount of water so the user
the water flow the graph will increase and decrease. In the can choose the amount of water by using the button. If the
substation 1 water flow graph after the flow of water for the users are not using the buttons, then the extra amount of
past 15 days, there is no flow of water the graph is stable at water buttons is in OFF condition. If the user needs extra
one point so there is no water flow. The user of substation 1 water, then they turn the button to ON condition. Substation
needs the extra water to flow through the tank so the user 1’s user wants 2000L of extra water so the user can buy the
can buy the amount of water by paying the amount for water by paying the amount for 2000L of water and turning
certain extra water. After buying the extra amount of water, ON the 2000L button to flow the water. As substation 1’s
the flow rate increase that shown in the substation 1 graph. user chose the extra water the valve of substation 1’s valve 1
After the rate of extra flow of water, substation 1’s amount is opened.
of water is 22072.810. Substation 2’s water flow is 19202.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 244


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES

[1] JanhaviSawanth V, Lourd Mary J, MadduletiVidya, Mounika D V,


“Smart Water Flow Control and Monitoring System”, International
Journal of Engineering Research & Technology (IJERT) NCESC, 6.13,
2018, DOI: 10.17577/IJERTCONV6IS13071.
[2] M. Kumar Jha, R. Kumari Sah, M. S. Rashmitha, R. Sinha, B. Sujatha,
and K. V. Suma, "Smart Water Monitoring System for Real-Time Water
Quality and Usage Monitoring," 2018 International Conference on
Inventive Research in Computing Applications (ICIRCA), 617-621,
2018, DOI: 10.1109/ICIRCA.2018.8597179.
[3] Sithole, Bheki, and Rimer, Suvendi and Ouahada, Khmaies and Mikeka,
Chomora and Pinifolo. J, “Smart water leakage detection and metering
device”, 2016 IST-Africa Week Conference, 1-9, 2016, DOI:
10.1109/ISTAFRICA.2016.7530612.
[4] M. R. Machado, T. R. Júnior, M. R. Silva and J. B. Martins, "Smart
Water Management System using the Microcontroller ZR16S08 as IoT
Solution," 2019 IEEE 10th Latin American Symposium on Circuits &
Systems (LASCAS), 169-172, 2019, DOI:
10.1109/LASCAS.2019.8667571.
[5] G. Gosavi, G. Gawde and G. Gosavi, "Smart water flow monitoring and
forecasting system," 2017 2nd IEEE International Conference on Recent
Trends in Electronics, Information & Communication Technology
(RTEICT), 1218-1222, 2017, DOI: 10.1109/RTEICT.2017.8256792.
[6] S. Thenmozhi, K. Sumathi, A. Asokan, B. Priyanka, R. Maheswar and P.
Jayarajan, "IoT Based Smart Water Leak Detection System for a
Sustainable Future," 2021 Sixth International Conference on Wireless
Fig 5: Alert Message Communications, Signal Processing and Networking (WiSPNET), 359-
362, 2021, DOI: 10.1109/WiSPNET51692.2021.9419456.
Figure 5 shows the alert message from the Arduino [7] Kumar, S., Yadav, S., Yashaswini, H.M., Salvi. S, “An IoT-Based Smart
IoT cloud to the user. When the difference between the main Water Microgrid and Smart Water Tank Management System”,
Emerging Research in Computing, Information, Communication and
station water and substation water is greater than the Applications, 906, 2019, DOI: 10.1007/978-981-13-6001-5_34.
threshold value, then leakage or theft of water is detected. [8] Farah, E., Shahrour. I, “Leakage Detection Using Smart Water System:
As the theft is detected, the microcontroller triggers the Combination of Water Balance and Automated Minimum Night
cloud to send the alert message to the user. Then the Flow”, Water Resources Management, 31.15, 4821–4833, 2017, DOI:
10.1007/s11269-017-1780-9.
Arduino IoT cloud sends the alert SMS to the user’s mobile [9] Tahir, Muhammad,” Measuring water Flow Rate and Volume using
as water theft or leakage has occurred on specific Arduino and Flow Sensor”, Department of Irrigation \& Drainage Faculty
substations. As soon as the user receives the alert message, of Agricultural Engineering,2021.
the user can solve the issue of water theft and saves the [10] Anisha, R. A. Menon, and A. Prabhakar, "Electronically controlled water
flow restrictor to limit the domestic wastage of water," 2017 International
wastage of water. Conference on Microelectronic Devices, Circuits and Systems
(ICMDCS), 1-6, 2017, DOI: 10.1109/ICMDCS.2017.8211591.
VI. CONCLUSION [11] Pasika, Sathish and Gandla, Sai Teja, Smart water quality monitoring
system with cost-effective using IoT, Heliyon, 6.7, e04096, 2020, DOI:
10.1016/j.heliyon.2020.e04096.
Leakage of water leads to the loss of water when [12] Gaikwad, Y. Bagul, A. Sarap, and S. Swami, "IOT based Smart Flow
the water is distributed from the main tank to the sub tanks. Meter for Smart Cities," 2020 IEEE Pune Section International
The implementation of monitoring the rate of water flow Conference (PuneCon), 2020,138-141, 2020, DOI:
10.1109/PuneCon50868.2020.9362468.
and water leakage detection is done by using the [13] M. Saravanan, A. Muthukumar, R. Ramya, K. K. Rashika and S.
microcontroller in the water distribution pipes. With the use Saravanan, "Smart Water Leak Controller in Metro Water Supply Lines,"
of a water flow sensor, the amount of water flow is 2019 5th International Conference on Advanced Computing &
measured and calculated. When there is any leakage in the Communication Systems (ICACCS), 110-113, 2019, DOI:
10.1109/ICACCS.2019.8728400.
pipes while the flow of water is in the distribution, the [14] Oton, Cyprian, and Iqbal, Tariq, “Low-Cost Open Source IoT-Based
leakage is detected. The microcontroller used in this system SCADA System for a BTS Site Using ESP32 and Arduino IoT Cloud”,
is NodeMCU for monitoring the leakage. The flow of water 0681-0685, 2021, DOI: 10.1109/UEMCON53757.2021.9666691.
to the substations is monitored continuously in the cloud by
the user. When there is any leakage in the pipes while the
flow of water, the user gets the alert message as SMS to the
user’s mobile phone from the Arduino IoT cloud by
specifying in which substation the theft occurred.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 245


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IoT based Solar Technology Monitoring and Cleaning


System
H.Vidhya U.Akshaya M.G.Keerthana
Assistant Professor UG Scholar UG Scholar
Electrical and Electronics Engineering Electrical and Electronics Engineering Electrical and Electronics Engineering
Sri Ramakrishna Engineering College Sri Ramakrishna Engineering College Sri Ramakrishna Engineering College
Coimbatore, India Coimbatore, India Coimbatore, India
vidhya.karthik@srec.ac.in akshaya.1803005@srec.ac.in keerthana.1803042@srec.ac.in

T.Dhivyanandhini
UG Scholar
Electrical and Electronics Engineering
Sri Ramakrishna Engineering College,
Coimbatore, India
dhivyanandhini.1803023@srec.ac.in

the sun and conversion of such solar energy into useful


electrical energy.
Abstract - Today’s world is being ruled by Internet of Things
(IoT) in various applications. The proposed work involves the
II.LITERATURE REVIEW
supervision of solar panel to increase its productivity. This
paper describes the technique involving IoT, used for Even though the performance of amorphous silicon cells is
monitoring and cleaning the solar panel. Since the output power good at high temperatures, it has comparatively less
in solar system is depending on the intensity of light falling on it, efficiency than other types of silicon cells [1]. Due to the
when these modules are utilized in dusty environment, there demand of energy from the consumer side and due to the
occurs a tidy piece of dust on the solar panel which will try to depletion of conventional energy sources, it is better to have
reduce its efficiency and productivity. This problem can be a approach towards using renewable energy sources such as
avoided by having suitable cleaning system for the panel. The solar, tidal, wind, etc.[2]. In order to conserve energy, there
proposed work provides automatic tracking of solar light using is a need of manipulating the energy sources for effective
light intensity diode and directs the panel according to it and if
production of electrical energy [3]. The technologies which
there is any dust or dirt present in the panel, automatic cleaning
system is used for cleaning purpose. This technique will lead to use CdTe, CIGS, Amorphous Thin-Film Silicon (a-Si, TF-Si)
increased output power. Suitable sensors are used for detecting in the fabrication of solar cells are known as thin film
the dust and this arrangement is connected to the controller. photovoltaic modules. These thin-film solar cells are
Based on the output from the controller, the operation will be relatively cost-effective than the solar cells of crystalline
executed in the developed prototype. silicon [4]. Photovoltaic cells are arranged in solar panel in a
way that it generates electric energy by exciting electrons
Keywords: Node Microcontroller Unit, solar panel, motor driver,
inside the solar cells. The amount of energy generated
cleaning mechanism
normally depends on the light intensity of the sun [5]. Solar
I.INTRODUCTION cells can be fabricated from the materials other than silicon.
The cost of such solar cells is slightly expensive than silicon,
Hence, Silicon is the best material that could be used for
Interne of Things is a modern technology which makes the
solar cell fabrication [6]. Solar tracking using single axis can
system smarter. It is a machine-machine interface. With IoT
be considered as one of the best solutions for small-scale
technology, the user can easily get the data and do control
photovoltaic power plants. Different configurations like
operation from wherever he/she is. Electricity is being one
South-North axis and East-West axis could be used for single
of the greatest demands today. In our modern civilization,
axis tracking [7]. Cell temperature and MPPT plays an
on day to day life people are being ambitions and full of
important role in the determination of solar cell efficiency
desires where the need for energy seems to be high.
[8]. The proposed work explains the different types of tracker
Thinking about the present scenario, the energy is being
such as Horizontal Single Axis Tracker (HSAT), Horizontal
extinct. In future, there may be scarcity of energy which
Single Axis Tracker with Tilted Module (HTSAT), Vertical
may also lead to no energy situation. There are two sources,
Single Axis Tracker (VSAT), Tilted Single Axis Tracker
from which electricity can be generated. They are
(TSAT) [9]. The three different modules present in solar
renewable and non-renewable energy sources. Since non-
tracking system are the mechanism, the driving motors and
renewable energy sources creates pollution, people started
the tracking controller. The prototype of the proposed system
depending on the renewable energy to meet out the required
is made durable enough to withstand unfavorable weather
demand. Among renewable energy sources available, solar
condition [10]. More than 50% of the people live in rural
is the most economical. More power can be generated with
areas. They usually meet out electricity problem due to
this source because solar energy is available in abundance.
insufficient sources. The author depicted the performance of
The proposed work is based on using solar energy
the electrical sources to provide power to the people without
monitoring system. The execution of the proposed work
any interruption. Solar energy is used to generate power in
needs devices like Light Detector Resistor module, Direct
this case [11]. The author insisted that the solar panel will
Current engine, photovoltaic cells etc. The main objective
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 246
deliver high output power when it is cleanly maintained. In
of the work is to have maximum utilization of energy from
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
order toDVDmaintain cleanliness, a monitoring system is
Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
employed along with the system. IoT is also a part of the
proposed work which is used to store data in the cloud
[12]. Suitable design concept for monitoring and cleaning
the solar power plant has been clearly explained by the
author. Cleaning brushed are used with at most care such
that it does not affect the performance of the system
while carrying out its work [13]. The proposed work by
the author includes a comparative analysis of incremental
conductance and Fuzzy logic controller, in order to
improve the efficiency of solar system. The simulation
has been carried out using MATLAB/Simulink model
and the results are validated. The author concluded that
based on validated results, it is observed that fuzzy logic
controller outperforms incremental conductance
algorithm [14]. The author investigated the
manufacturing technology used for both first- and
second-generation solar cells. Since the cell has to look
like conventional glass, the solar system uses an observer Fig. 1 Block Diagram
which absorbs solar radiation in a wavelength that is not
visible to the human eye. Electrodes containing indium
are used to capture charge from the available solar cells
[15].

III.EXISTING SYSTEM
An assortment of advances and tests are right now
accessible to extricate vitality from sun and change over
it into deliberate work. At first, there is a steady sun
powered framework which extricates sun-based energy
and change over into electrical energy which paves way
for future utilization. Node microcontroller unit is
utilized with the sun-oriented board. And day by day, as
the innovation develops up, in addition to
microcontroller, LDR is also utilized for implementing
the project.

IV.PROPOSED SYSTEM
In accordance with the above system, the project is planned
with cleaning mechanism and monitoring system using IOT
technology. The equipment model is composed of distinctive
electronic devices, and basic materials utilized for the
mechanical part and in expansion, program are additionally
utilized for the effective usage of the prototype model. This Fig. 2 Flowchart of Solar
paper has proposed a suitable method for monitoring the Power Monitoring
cleanliness of the solar panel and removes the dirt or dust
present in the solar panel for effective absorption of sun light. The components like Node MCU, LCD, a motor driver for
According to the direction of the sun, the solar panel is turned positioning solar panel, a servo motor for cleaning solar panel,
for its operation. When the sun sets down, the sun powered are required for the implementation of hardware prototype.
board will come to the reset position. Automatic cleaning Node MCU is type of microcontroller with Wi-Fi built in it.
system using brushes is empowered in the proposed work. With the help of Node MCU, all the data will be sent to the
The brushes are turned using servo motor. The voltage and cloud. It is used to integrate data and transfers the same with
current values are also shown using LCD. Additionally, this some Wi-Fi protocols. Arduino Integrated Development
information is exchanged to the cloud using IoT. Here, Node Environment is used as a software platform and Embedded C
MCU plays major role in monitoring the data and sharing the (supported by Arduino IDE) is used for coding. The coding
data to the cloud. All the parameters are observed employing helps in fetching the data from sensors. The block diagram of
a computer program application and all the information are the project is depicted in Fig1. The working of the project
put away in cloud. involves tracking, monitoring and also cleaning the panel.
Node MCU plays an important role and also performs multiple
V.HARDWARE IMPLEMENTATION functions, like controlling, monitoring and storing data in
cloud. Here 6V solar panel is used. LDR is used detect the
Solar panel consists of number of arrays for absorbing
light intensity level. When the light falls on the solar panel,
solar power to generate electricity. The aim of the
Node MCU sends data as signals to motor driver to turn solar
proposed work is to continuously monitor the array output.
panel accordingly. Voltage sensors sense the level of the
If the efficiency seems to be less, an alert is generated
voltage. BMS module is used to obtain the constant voltage in
from the Node MCU, according to which DC Motor is
the battery. Based on the dust and dirt on the panel, the servo
used to turn the solar panel according to the sun’s
motor is utilized such that brushes are used to clean the panel.
direction.
Solar panel is associated to battery in order to 247
978-1-6654-6084-2/22/$31.00 ©2022 IEEE
supply to the
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
load. Ubidots is used as IoT platform. Ubidots turns the
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
6.3 Microcontroller
output of the sensor into information to increase the
economy. It is user friendly environment that is used to set Node MCU is used as microcontroller. It is an open source
some type of alarms to the user in the form of e-mails, software and hardware development environment. The Wi-Fi
buzzer, messages etc. The ultimate aim of the proposed module used here is ESP-8266. The programming is done using
work is to monitor the efficiency of the solar panel. Also, very simple language.
the work aims at optimizing the efficiency by having
suitable cleaning mechanism.
The flowchart model for the proposed work is shown in
Fig 2. It is evident from the flowchart that continuous
monitoring of power obtained solar system is done. If the
power during peak hours seems to be less, then it can be
concluded that it is due to the dust or any dirt content
present on the panel. Hence, using servo motor system Fig. 6 Mode MCU
available, the dust present on the panel is cleaned using
6.4 DC Motors
brush.
VI. HARDWARE COMPONENTS USED Two small capacity DC motors are used for having mechanical
movement of panel and the cleaning brush. When the solar panel
6.1 Solar Panel is not in accordance with the sun’s direction, one motor is used to
turn the panel according to sun’s direction and when there is any
A 6V solar panel is used which is shown in Fig 3. This panel dirt or dust is present on the panel, a servomotor is used to move
is used to absorb light energy from the sun and convert into the brush for cleaning.
electrical energy. The proposed work involves the monitoring
and cleaning of this panel. VII.PROTOTYPEMODEL

The prototype which was developed for the implementation of


the proposed work is shown in the Fig 7. The model was
developed in reference to the block diagram represented in the
above section.

Cleaning brush
Fig. 3 Solar Panel

Solar Panel
6.2 Sensors

LDR is used to detect the light intensity level of the sun.


Voltage and current sensors are used to detect the voltage and
current from the panel. The obtained signal can be either
analog or digital signal. The following Fig 4 and 5 shows the
voltage and current sensors.

Driving Circuit

Control
Module
Fig. 4 Voltage sensor

Fig.7 Prototype model

Here, the solar panel is automatically tilted according to the


light rays from the sun and the cleaning is automatically done
Fig.5 Current Sensor when any dirt materials are present on the panel. When the dirt
or dust is automatically cleaned, there is possibility of high-
power generation using solar technology as the source by the
solar panel. According to the design of solar panel, the cleaner
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 248
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
is designed and mounted on the solar plant. Node MCU
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
gives commanding signal to start the cleaning mechanism.
Brush with soft bristles are used so that it does not affect the
physical part of the solar panel. The brush s moved both
horizontally and vertically using servomotor. It will move at
high speed such that dust is thrown off from the panel. The
tilting of the solar panel according to the sun’s direction is
shown in the Fig 8.

Fig.11 Setting up Node MCU -Installing Library

IX.RESULTS
The solar panel is tilted according to the direction of sun
and after 10secs, the panel is directed to be turned
according to sun’s direction. The dust present in the panel is
cleaned using servo motor. The Node MCU sends the pulse
signals to motor drive and the voltage is received by
connecting mobile hotspot through Ubidots explorer app.
The message received in the mobile is shown in the Fig 12.

Fig.8 Prototype Model

VIII.SOFTWARE DESCRIPTION
The algorithm is designed using Arduino IDE. The upload
speed of the setup is set to 9600 and the setup id is
connected to COM5, ESP8266 board.

Fig.12 Voltage shown in Ubidots Explorer

Table I. Output Voltage (dusted and clean panel)

S.No Time Output from Output from


(Hrs) dusted Solar Clean Solar Panel
Panel (V) (V)
1 0630 0.276 0.277
2 0730 0.504 0.509
Fig.9 Setting up Node MCU-Port Connection 3 0830 1.757 1.933
4 0930 1.631 1.783
5 1030 1.798 1.900
6 1130 2.910 2.969
7 1230 1.990 1.995
8 1330 1.890 1.990
9 1430 0.976 0.985
10 1530 0.892 0.945
11 1630 0.594 0.824
12 1730 0.128 0.758

The above Table I shows the output obtained from both


dusted and clean solar power panel. It is obvious from the
table that dusted panel delivers less voltage when compared
Fig.10 Setting up Node MCU -Upload Speed
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 249
Proceedings of the International Conference on Automation, Computing andInternational
Renewable Systems
Journal of(ICACRS 2022)
Core Engineering & Management, October, 2014.
with clean solar panel.
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5 [7] C. Chang, “Tracking solar collection technologies for solar heating and
X.ADVANTAGES OF THE CLEAN SOLAR SYSTEM cooling systems”, Advances in Solar Heating and Cooling Woodhead
Publishing, 2016. (Book Chapter)
[8] R.Z. Wang, T.S. Ge, “Advances in Solar Heating and Cooling,”
• Trackers produce more power than their stationary Woodhead Publishing, 2016.
partners due to expanded coordinate presentation to sun- [9] Kamrul Islam Chowdhury, Md.Iftekhar-ul-Alam, Promit Shams Bakshi,
“Performance Comparison Between Fixed Panel, Single-axis and Dual-axis
oriented beams. Depending upon the location of the Sun Tracking Solar Panel System,” BRAC University, Department of
system, the change in increase can lie between 10% to Electrical and Electronic Engineering, 2017.
15%. [10] Juan Reca-Cardeña, Rafael López-Luque, “Design Principles of
Photovoltaic Irrigation Systems”, Advances in Renewable Energies and
Power Technologies Elsevier Science, 2018.
• Many diverse sorts of sun-oriented trackers can be [11] Aravind Hanmanthaiah, M.L.Liya, Chandni Arun, M.Aswathy, “ IoT
utilized to track the sun light. The sun-oriented trackers based Solar Power Monitor and Controller for village electrification”, 9 th
depend on number of factors such as neighborhood International Symposium on Embedded Computing and System Design
(ISED,2019).
climate, degree of scope and electrical system. [12] Maisagalla GopaL,T.Chandra Prakash,N.Venkata Ramakrishna ,Bonthala
Prabhanjan Yadav, “IoT based Solar Power Monitoring System”, International
• Solar trackers usually produce more amount of energy. Conference on Recent Advancements in Engineering and Management
(ICRAEM-2020).
• In certain states, a few utilities offer Time of Utilize [13] Ashwini Burade, Sonali Bhajipale, Rahi Gajbhiye, Shivani Gawande,
Nilam Gore, “Solar Power Plant Monitoring and Cleaning System”,
(TOU) rate plans for sun-oriented control, which implies International Research Journal of Engineering and Technology (IRJET),
the utility will buy the control produced amidst the crest Vol.7, Issue.4, 2020.
time of the day at the next rate. In this case, it is [14] Harshini Siva, and Sujatha Balaraman. "Step Incremental Conductance
advantageous to create a more prominent amount of MPPT for Solar PV System Based on Fuzzy Logic Controller." Journal of
power amidst these crest times of the day. Employing the Trends in Computer Science and Smart Technology 4, no. 1 (2022): 23-29.
required framework makes a difference which maximizes [15] Karuppusamy, P. "An Overview of the Solar Cell Technology and its
the energy and these crest time periods. Future Challenges." Journal of Electrical Engineering 4, no. 2 (2022): 77-85.

• Advancements in innovation and unwavering quality in


equipment used and mechanics have definitely
diminished long-term upkeep concerns for the
frameworks

XI. CONCLUSION

The proposed methodology of cleaning the dust present on


the solar panel allows it to produce more power than the
dusted solar panel. Also, it allows the direction of solar panel
to turn along the direction of sun thus making best utilization
of renewable energy. In terms of day by day vitality era, the
solar panel gives about 30% more energy than other
resources. The monitoring and cleaning of Solar panel is
clearly depicted through the proposed work. The monitoring
process has been carried out using real time IoT with
controller management. As we know that prevention is better
than cure. Hence, cleaning mechanism prevents the storing of
dust on the panel before it affects the efficiency of the solar
power panel. So, it is very evident from the proposed work
that there is a huge possibility of producing more power from
a clean solar panel.

REFERENCES

[1] Scott J Hamilton, “Sun-Tracking Solar Cell Array System,” B.Sc


thesis, , Department of Computer Science and Electrical Engineering
University of Queensland,1999.
[2] Ying-Tung Hsiao, China-Hong Chen, “Maximum Power Tracking
for Photovoltaic Power System,” 2002 IEEE Industry Applications
Conference,13-18 Oct, 2002.
[3] M. A. Panait, T. Tudorache, “A Simple Neural Network Solar
Tracker for Optimizing Conversion Efficiency in Off-Grid Solar
Generators”, International Conference on Renewable energies and
Power quality (ICREPQ), march 12-14, Santander, 2008.
[4] Furkan Dincer, Mehmet Emin Meral, “Critical Factors that
Affecting Efficiency of Solar Cell,” University of Yuzuncu Yil,
Department of Electrical and Electronics Engineering, Van, Turkey,
2010.
[5] Levent Bas, “Thin Film vs. Crystalline Silicon PV Modules,”
December, 2011.
[6] Mayank Kumar Lokhande, “Automatic Solar Tracking System,”
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 250
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Ensuring Safety for School Children using IoT

Daniel NareshKumar.M Aneeshraj P B Balaji A Doguparthy Dhanush


Assistant Professor, Final Year Bachelor of Final Year Bachelor of Final Year Bachelor of
Department of Electronics Engineering, Engineering, Engineering,
and Communication Department of Electronics Department of Electronics Department of Electronics
Engineering, and Communication and Communication and Communication
R.M.K. Engineering Engineering, Engineering, Engineering,
College,Kavaraipettai, R.M.K. Engineering College, R.M.K. Engineering College, R.M.K. Engineering College,
Chennai, Tamil Nadu, India. Kavaraipettai, Kavaraipettai, Kavaraipettai,
Chennai, Tamil Nadu, India. Chennai, Tamil Nadu, India. Chennai, Tamil Nadu, India.

Abstract— As crime and accidents have increased, parents are associated with the hub MCU by means of Wi-Fi through
increasingly concerned about their children's safety at school. Arduino Uno. The area is refreshed by the geographic
Many children end up trapped inside a school bus in the bus directions of the school transport outfitted with SKG13 GPS.
parking lot after falling asleep on the way to school, missing the The fingerprint scanner gets the student's ID as soon as the
bus, or leaving at the incorrect station. The proposed student gets on the bus. The transport unit utilizes the hub
model detects and supervises children on school buses as they MCU to push the information to the data set. School unit. The
travel to and from school using radio frequency identification school unit adds a set of student information to the created web
(RFID) technology. Individual RFID tags are effective for
application. By doing whatever it may take, kid wellbeing will
tracking and monitoring children. The bus, the parent, and the
be accomplished all through the armada [1].
school are the three components of the system. Using an RFID
card, the bus unit detects when a child enters or exits the bus. IOT based school bus monitoring and security system, Dr
This information is shared with the parent and school entities in M.V.Vyawahare, Shriya Lambat , Mayuri Belsare, Kritika
charge of detecting the presence of children. Here, Internet of Latwe , Richa Vairagade(2019 march) [2]. An automobile
Things (IoT) technology is used to track the school bus. tracking device is applied for monitoring the motion of a bus
from any vicinity at a selected time. The proposed device
Keywords— RFID, Internet of Things (IoT), Safety, MQTT
employs a generation that mixes clever smartphone software
with a microcontroller. A tool is located in the automobile
I. INTRODUCTION which determines the placement of the bus and the usage of
School buses transport a huge number of young people to Global Positioning System (GPS) generation. Users could be
nations all over the planet every day. Although there are many capable of constantly revealing the transferring automobile on
problems parents may be concerned about when it comes to the call for the usage of the software. This scheme makes use of an
safety of their children's travels, this paper audits school bus alcohol sensor and a panic transfer for the protection of the
access security through a bus tracking system that helps school children. In case of emergency, the repute of the bus is
children move more safely and securely. understood to the faculty employer in addition to parents.
Monitoring the regularity of students getting on and off the RFID based embedded system for vehicle tracking and
bus is difficult for the driver to control and puts the safety of prevention of road accidents, J.P. Frederik, Diederichs, Betina
the child at risk. One of the challenges faced by young people weber (2018) [3]. RFID plays an important role in automated
is oblivion on the bus. This has become more and more ID applications such as contactless RFID smart cards used in
common in recent years. bus drivers, supermarkets, textiles and logistics chain
management. GSM Circuit Switched Data is one of the most
As a result of the derivers' lack of attention, many students important evolutionary steps to solve ongoing pace information
have died as a result of asphyxia. This initiative strives to administrations.
provide a suitable environment for students and their families
by using boarding and alighting records to comply with a set of Adhoc network-based tracking, Yuichiro mori, Hideharu
school bus safety guidelines. Also In this project, fire sensor, a Kojima, Eitaro Kohno (2015) [4]. The proposed system
MEMS sensor, an IR sensor, and an alcohol sensor is used. consists of a remote LAN gadget and an Android device
equipped with a Bluetooth gadget with specially appointed
correspondence work. Our framework uses autonomous
II. LITERATURE SURVEY clustering technology to manage groups of Android devices.
IOT based smart school bus monitoring and notification
system, A Sai Aishwarya, Keerthana MS, Samyama S,
Sukrutha S, Ragavendra M (2020). In this research work, the
GPS unit and finger impression sensor component are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 251


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. EXISTING SYSTEM HARDWARE CONNECTION


GSM/GPRS modules with microcontrollers are used in the
current system. When a query has been imitated, the geo-
coordinates will be given as output. Text messaging is used to
convey the information to the user. These are costly, while
being efficient and real-time. Not economically viable.
Each student's attendance is taken using a finger print
sensor for identification.
The main downside of the finger print sensor is that it is
ineffective for schoolchildren and that there is a high risk of it
malfunctioning. For example, if a student's finger is wounded,
he or she will be unable to take attendance.

IV. PROPOSED SYSTEM


Radio Frequency Identification Technology (RFID) is used
in our suggested system to track each student's attendance.
The system continuously sends SMS to parents, including
the child's longitude, latitude, and presence status, over Wi-Fi.
It also uses sensors such as infrared sensors to identify
objects approaching the transport, MEMS sensors to identify
that the bus is tilted, and alcohol sensors to detect if the driver
is drunk. And use the fire sensor to detect the fire in the bus.
The outputs are a buzzer and a MY MQTT application.
This would allow parents to monitor all SMS regarding
location and student attendance status.

Fig 2: Proposed Hardware

Fig 3: Software Platform Used

Fig 1: Proposed Model

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 252


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

as conceivable all over the planet through an internet browser


and web association.

REFERENCES
[1] Shriya Lambat , Mayuri Belsare , Kritika Latwe , Richa Vairagade.,"IOT
Based School Bus Monitoring and Security System", International
Journal of Innovative Science and Research Technology, volume-4,
issue-3, march-2019.
[2] RFID based embedded system for vehicle tracking and prevention of road
accidents,J.P. Frederik, Diederichs, Betina weber(2018).
[3] Adhoc network based tracking, Yuichiro mori, Hideharu Kojima, Eitaro
Kohno(2015).
[4] Saranya, J.; Selvakumar, J., "Implementation of children tracking system
on android mobile terminals," Communications and Signal Processing
(ICCSP), 2013 International Conference on, vol., no., pp.961, 965, 3-5
April 2014.
Fig 4: Mobile Application Screenshot [5] H.BEN & Abdullah.k, “Smart tracking system for school buses using
passive rfid technology to enhance child safety”.traffic and logistics
engineering-,vol.1, No.6,pp3-5,2012.
[6] Kumar, “RFID based embedded system for vehicle tracking and
prevention of road accident”.International Journal of Engineering
Research-, Vol.1, No. 6, pp3-5, 2012.

Fig 5: Data Entry Log

V. CONCLUSION
The finished framework meets every one of the details and
gives every one of the functionalities recognized in the plan
stage. Utilizing this framework guardians can without much of
a stretch track the school transport and guarantee it is moving
at safe rates, consider the school specialists responsible for
postponements or deviations, be refreshed on the progressions
in timetable and contact drivers or specialists if fundamental.
Working guardians can relax knowing when their children
arrive at securely despite the fact that children aren't permitted
telephones.
In the future, we plan to add live video streaming
capabilities to the system to allow parents and relevant
authorities to watch real-time video of the vehicle's condition.
We will also work on the awareness and nature of tension
cushion gadgets. Since we mainly use our own materials to
manufacture pressure cushion gadgets, they are prone to
malfunction after long-term use. To address this issue, try a
variety of long-lived materials and see vehicle sensors and
other data in real time, while keeping material expenses as low

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 253


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

IoT and Artificial Intelligence-based Low-Cost


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Smart Modules for Smart Irrigation Systems


V. Anand Kumar A.Renaldo maximus S.Vishnupriyan
Assistant Professor, Dept of ECE Assistant Professor,Dept of ECE Associate Professor,Dept of BME.
Sri Eshwar College of Engineering Government College of Engineering Kings college of Engineering,
Coimbatore, India Tirunelveli, India Chennai, India
anand.kkr@gmail.com renaldo.ece@gmail.com rsv.priyan@gmail.com
K. Sheikdavood P.Gomathi
Assistant Professor,Dept of ECE Assistant Professor,Dept of ECE
M.Kumarasamy College of Engineering Selvam College of Technology
Karur, India Namakkal, India
sheikdavoodece@gmail.com gomathipr16@gmail.com

Abstract— Most people in India depend on agriculture as and instructions are given to farmers via software. W ireless
their main source of income. Using the latest technology is a sensor networks, also known as wireless sensor and
must to protect valuable water resources. Besides being the participant networks, are distributed spatially autonomous
cornerstone of Industry 4.0, IoT also enhances its capabilities sensors that monitor and report environmental or physical
in smart agriculture. The research aims to create a low-cost conditions, such as temperature, pressure, noise, humidity
cutting-edge technology for smart irrigation. IoT can be used and share this information to key location networks [6-8].
to enable self-talk and connectivity between system devices.
User-involved management modes, one-time settings for Each node in a WSN is connected to a sensor,
calculating irrigation schedules, timers for remote data and each sensor network node typically includes several
monitoring using the BLYNK server and event-based pump components, including a radio transceiver with internal and
control are some of the features. The proposed project aims to external antennas, a microcontroller, a power source (e.g.,
enable real-time pollination of modern agricultural systems circuits), and a battery. Hu mid ity is responsible for plant
using IoT protocols. IoT has been developed for the water loss and temperature management. For high-humidity
environmental monitoring of agriculture and farmland. The environment, the spread will be less and less, while the water
system is designed to monitor temperature, humidity and soil in the leaf area will be saturated. As a result, the leaf's porous
moisture using an Android phone. S olar panels from area will undergo a growth and formation of only bacteria [9-
renewable energy. Different nodes in different places are 11].
connected through the Internet of Things, the Internet of
Things transmits and receives data in the nodes, and the Advances in technology have made it possible to
condition of the agricultural land is sent to the user (blynk implement the latest technology at significantly lower costs.
server) through the Internet of Things to control the pumping Wireless sensor networks (IOT) can be used for such
system. The system uses MQTT and HTTP to allow users to systems to enhance their monitoring capabilities by
understand current crops even from a distance. Smart, cheap, deploying sensors throughout the site and monitoring
portable and other advantages, suitable for greenhouses,
environmental parameters remotely [12]. The Internet of
farms, etc. Things consists of small nodes that operate independently
Keywords— Internet of Things (IoT), Sensors, Prediction
and are embedded with sensors. They gather data and send it
Algorithm, Irrigation Management, Precision agriculture. wirelessly to a centralized system that gathers and processes
information fro m all nodes. In this project, an IoT -based
I. INT RODUCT ION agricultural monitoring system is developed for automation.
Temperature, humidity and moisture measurements were
Agriculture has been a significant occupation from the
considered for the study.
dawn of human civilization, and technology has advanced
over time. Good farming practices are still an art [1]. These Temperature and humidity are measured by
environmental changes are too great for traditional farming integrated sensors, while hu mid ity is measured and
practices to handle. Controlling environmental factors such calibrated by a conductivity-based sensor. The Zigbee
as temperature, humidity and moisture is essential for plant protocol is used for field data collection at the central node,
growth. Many plant processes, including pollination, while the user interface uses the Global System for Mobile
germination and others, are affected by temperature. Higher Co mmunications (GSM) service as it is reliable and easily
temperatures have been shown to speed up respiration and accessible to most people[13]. The collected data is stored in
reduce the sugar content of fruits and vegetables [2-4]. Lo w local memory for future analysis. Consumer electronics,
temperatures slow down photosynthesis. Many strategies computer accessories, smart agriculture, building
have so far been developed to reduce water usage. A state- automation, security systems, personal care, and industrial
based approach to monitoring water status, based on plant monitoring and control are just a few examp les [14]. Much
canopy temperature, captures high or low irrigation water of the development and experimental imp lementation of IoT
volume through thermal imaging. Another approach is to use tends to be imp lemented in cit ies. However, there are some
dielectric mo isture sensors to regulate actuators and conserve studies reporting results deployed in vineyards, sharing the
water by using information about soil volumetric water technology with people in rural areas. Belo w is a list of
content rather than scheduling irrigation to run at specific various contributions to our article.
times of the day [5]. The above mechanism only opens the
The system is demonstrated and evaluated in a real
valve and supplies water to the plants when the soil volu me
reaches a certain level. The study uses a second technique, environment, starting with the hardware at the
sensor/actuator nodes at the bottom and going up to the
where sensors are placed based on the water supply in fields

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 254


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

management subsystem at the top. The goal of the research is used to receive high-quality, noise-free data through a
work is to improve the design so that all nodes can interact Kalman filter (KF) with predictive analysis [15].
with each other, while improving the communicatio n
This approach reduces data transfer costs while
stability of wireless sensors through better hardware and
software design. In particular, an intelligent irrigation control improving data quality for analysis of WSN applications.
Agriculture is the most populous economic sector and plays
system based on wireless sensor network is constructed,
which uses real-time humidity data and expert data to make an important role in India's overall socio-economic structure.
Agriculture is primarily dependent on soil properties and
irrigation decisions.
water for irrigation. Traditional farming systems based on
Different alternatives have varying levels of old ideas have failed to produce better results due to
efficiency. In certain circumstances, specialized forms must changing weather and climate conditions. Proper irrigation is
be utilized for specific crops. The specific watering method necessary for better results. Recent developments in this
there are many different sorts of them, but we may categorize technology have had a major impact on agriculture. This
them as follows: Water distribution options include: (i)flood article focuses on work done in M L and IoT. In this article,
irrigation, (ii) sprinkler irrigation, and (iii) drip irrigation,(iv) we discuss the use of IoT for remote monitoring of soil
Irrigation with a sprayer. We can have the following in the properties, which has the potential to change agricultural
presence of a sensor system: (i)Irrigation When the amount practices. There is also a machine learning model that
of water is not determined or predicted, (ii) plan without predicts crops based on soil characteristics, leading to high
concern. Irrigation, in which water is delivered based on yield productivity [16]
predicted demand over a given time, (iii) Ad the amount of
To maximize the use of water for crops, an automatic
water is co mputed based on sensor measurements for
temporary irrigation. irrigation system was created. In the plant root zone, the
system has a wireless network of soil mo isture and
Target temperature sensors. Gateway devices also process sensor
data, activate actuators, and pass information to web
The project provides a crop monitoring and automatic
applications. To regulate water flow, a microcontroller-based
irrigation system that:
gateway was designed with algorithms for temperature and
•Interact with users and collect comprehensive soil moisture limits. The system is powered by solar panels,
information on crop cultivation. and it features a duplex co mmunication link based on a
mobile internet interface that allows for programming of
• Estimate irrigation schedules throughout the season in irrigation scheduling and web-based data control. In a 136-
advance. day test in a sage field, the automated technology saved up to
• Obtain environmental and ground statistics. 90 percent more water than traditional methods compared to
conventional agricultural irrigation techniques. The
• Evapotranspiration and irrigation decision-making automated method has been successfully utilized elsewhere
based on neural networks. for 18 months in three copies. The system has the ability to
• Inform irrigation equipment to activate zonal irrigation. work in remote locations due to its low cost and energy
isolation. The automated process has been used successfully
Transfer sensor data to a MQTT broker to enable remote for 18 months, in trip licate, in other places. The system is
data monitoring. cheap and energy independent, which allo ws it to work in
It can correctly detect and display the temperature and remote areas where water is scarce with limited water
humidity of the greenhouse and accurately reflect the resources [17].
temperature and humidity values in real-time, according to An automatic irrigation system was created in order to
the temperature and humid ity management and water-saving maximize the water availability of the crops. A wireless
watering system. Temperature and mo isture time data may distributed network of temperature, hu mid ity and soil
be presented on the system display screen; for water saving, mo isture sensors is part of the system. Wireless Sensor
the system can automatically decide whether to irrigate or Networks (WSNs) help to develop technology, with the rapid
spray water based on the temperature and humidity value and development and change of technology, automation plays an
stop when the target value is reached. As a result, important role in hu man life. Thanks to automation, we can
temperature and humid ity control and water-saving irrigation control gadgets automatically. In addition to providing
systems, water, or spray plants stimulate growth while comfort, it uses less energy, works more efficiently and saves
conserving water. time. This article aims to build an Android app that monitors
plant growth using various factors, sprays fertilizer when
II. RELAT ED W ORK needed and automatically manages water motors. The main
The use of Internet of Things (IoT) devices enables goal is to understand data transmission over wireless media
efficient communication between different things. The use of using wireless sensor networks and monitoring systems [18].
IoT in agriculture is critical to simplify ing the process.
Around the world, smart farming systems have been The system uses an automated irrigation system to
maintain crop health and yield, and is designed to promote
developed using the concepts of the Internet of Things and
Wireless Sensor Networks (WSN). Within this approach, a effective water management techniques to maximize water
use. Each sensor node will have soil mo isture, temperature
branch called precision agriculture emerged. For various
agricultural tasks, many researchers have created monitoring and humidity sensors installed in the field. Batteries are used
to power these WSNs. To collect sens or data, base stations
and automation systems. Data collection and transmission
between IoT devices installed in the farm can be easily done will use radio frequency transceivers. To regulate the amount
of water applied based on pre-determined thresholds; an
through WSN. In the proposed method, a cluster-based WSN
algorithm was designed to monitor soil moisture and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 255


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

temperature. For various applications, Ramalingam et al. analyze the data they collect. Here, an agricultural
proposed the Blynk IoT server-based efficient data intelligence platform has been established to address this
transmission method [19]. A wireless sensor network and issue. Through the development of a smart agriculture
Blynk were used to create an intelligent Internet of Things platform, commun ication and multifunctional sensor
(IoT) device by Ven katramanan et al. Th is intelligent components are integrated. System performance can be
Internet of Things device has been used to gather and send affected by packet loss in communication between nodes and
data into the cloud [20] [23]. Using this IoT hardware design actuators. Actuators and node units have high power
as a foundation, we create a low-cost smart device for requirements.
missing person detectors.
The DC pu mp is activated if the humidity level is low. As
V. Su ma et al. [21] presented an overview of Predictive indicated in Fig. 2, the sensor is placed outside the sensor
Analytics, Internet of Things (IoT) devices with cloud platform, with the sensor probe in direct contact with the
management; mu lticultural security unit farmers' previous environment. In the deep location of the agricultural
experience is taken into account in the agriculture sector. It platform. This section details the design and implementation
also demonstrates the difficult ies and issues that might be of controlled environment agriculture (CEA). The CEA
expected when incorporating contemporary technologies into system provides a program for automatic control and
traditional farming practices. better based on statistics and monitoring. This proposed work aims to provide ease of use.
quantitative methodologies revolutionary changes to the Efficient and reliable control system. It helps reduce the
current agriculture system. Abul Bashar et al. [22] proposed amount of water and energy required. The system will
the solution provided in this document emp loys an Android increase farmers' yields at moderate and affordable costs.
application to automate agricultural machines via IoT. The
machine's automation ensures that the work is comp leted
automatically and without the need for human intervention.
This procedure is repeated until the crops are harvested.
Problem Statement:
System performance can be affected by packet loss in
communication between nodes and actuators. Actuators and
node units have high power requirements. Different crops
require different amounts of water depending on other
factors such as soil type, temperature and other factors.
While making irrigation selections, the system only measures
soil moisture measurements.

III. PROPOSED M ET HOD


AI assists the design of farmland data monitoring system.
This section includes home appliances and lights controlled Fig.2. Circuit Diagram [24]
using Wi-Fi for IoT and communication devices. This
section contains solar panels used to generate energy fro m An Arduino large development kit lin ked to a light sensor
sunlight. Here voltage sensor and current sensor are used to to gauge light intensity and an ambient temperature/humidity
measure the voltage and current generated by the panel and sensor to determine the ambient temperature and humidity is
will be displayed on the LCD display with the help of used to model the proposed system. Additionally, the system
Arduino. can be utilized to continuously assess temperature, water
level, and the quantity of light hitting the plants —all of
A. BLOCK DIAGRAM which are necessary for greenhouse systems. Analyzing the
environment around plants requires temperature and
humidity measurements. Different plant species have
different ideal temperature and humidity ranges. Check and
control plant temperature and humidity in drought and
extreme temperatures.
In addition, light sensors are crucial for measuring the
light level informat ion received by crops. The system
includes various sensors. The built-in microprocessor in the
Arduino mega development kit allows us to combine all the
sensors, display the sensor values and use them as inputs. A
touchscreen user interface is used to collect input from it.
Fig.1 Proposed Block diagram for IOT The system also has an IoT module that uses a wireless
B. WORKING PRINCIPLE network to transmit sensor information to a server. In
addition, users can view sensor data at any time through the
Fig.1 shows a proposed AI-driven IoT architecture for server.
agriculture. Today, a variety of sensors are used to collect
agricultural data, including soil moisture, air temperature C. Advantages of IOT
and humidity. However, due to the lack of an integrated  Suitable for inaccessible places such as sea,
computing platform, such sensors can only monitor the mountain, countryside, deep forest, etc
environment and collect data; they cannot effectively use or

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 256


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

 Flexible in random situations requiring additional F. Environment from Data


workstations
 The price of implants is cheap.
 Avoid extensive wiring.
 Flexible physical division
 Can be accessed through centralized monitoring
D. Applications
 IoT applications involve tracking, monitoring and
control. IoT is primarily used for traffic and habitat
monitoring, object tracking, nuclear reactor
management, and fire detection.
 Area surveillance is a particularly popular use of
IoT, which is created where certain events can be
observed, such as a battlefield, where many sensor
nodes may be deployed to detect enemy intrusio ns
rather than using landmines.
 Wireless sensor networks can also be used to
regulate greenhouse humidity and temperature
levels.

E. MODULE DESCRIPTION - IOT ENVIRONMENT Fig.3. Proposed Hardware block diagram


One strategy to alleviate agricultural problems and
increase the quality and quantity of agricultural production is The DHT11 Hu midity and Temperature Sensor measures
to employ sensor technologies to make farms "smarter" and humidity in percent and temperature in degrees Celsius. The
more linked through "precision agriculture," also known as light sensor LM393 measures light intensity in candela. The
"smart agriculture." We created modules that sense soil FC-37 Rain Sensor measures precipitation in millimeters and
mo isture, temperature and humidity, rainfall frequency and calculates the frequency of precipitation.
light intensity. Through an interface, it advises farmers Fig. 2 illustrates the microcontroller components of the
which seeds are suitable for the farm. The architecture of the proposed system and the components of all of them. This
system consists of sensors such as humidity, hu midity and microcontroller handles data collection using integrated
temperature sensors, Wi-Fi modules, etc. The software sensors, which make up the system's hardware. The
consists of an IoT platform that includes setting irrigation microcontroller is responsible for interacting with the cloud
profiles based on seasons or daily and weekly patterns. The storage, and it includes a built-in Wi-Fi module with a Wi-Fi
software sends messages to the main module to turn the range of 300 meters to facilitate information dissemination in
system on/off. the network.
The sensor converts the analog value to a digital value Many more microcontrollers than the few operate on any
after detecting all physical factors. Use te mperature and "variant" of the "Arduino board family," but the Arduino
humidity sensors to estimate the humidity and temperature at board family.
the location. Sensors combine in a module and collect data in  Provides a standard IDE that is extremely simple to use
real t ime. This informat ion is then sent to the IoT network.  Has extensive peripheral support - including third-party
The data is then transferred to the IoT platform using the support
Wi-Fi module (cloud) over the IoT network. The database  It contains a large number of sample applications to get
will be in the system's cloud. The data obtained fro m the started with
IoT network will be maintained by it. The proposed system G. Cloud and Network Storage
is schematically represented in Fig. 3 and 4 proposed
architecture and flow d iagram. The FC-28 Soil Moisture The real t ime environ mental data can be monitored
Sensor measures soil mo isture content as a percentage and through IoT using MQTT protocol. The NodeMCU has
determines how much mo isture is present. This sensor inbuilt Wi-Fi and low power consumption module for IoT
primarily uses capacitance to determine soil water content application. The network is responsible for sending the data
(dielectric permittivity). This sensor works by putting it into to cloud storage, which analyzes and calculates the collected
the dirt, and the status of the water content in the soil is sensor data, and then displays it on the IoT interface as raw
provided as a percentage. data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 257


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

input/output pin is 40 mA, DC Current


for 3.3V Pin is 50 mA, Flash Memory
is 32 KB, SRAM is 2 KB
Relay Normal Voltage is 5V DC, Normal
Current is 70mA It includes 5-pins &
designed with plastic material,
Operating time is 10msec
Node MCU GPIOs D0-D10, PWM functionality,
IIC and SPI communication, 1-Wire
and ADC A0 etc. all in one board,

Fig..4 IoT Architecture IoT based interface

There are two ways to connect hardware components to


the cloud: one is to use an MQTT broker that uses the MQTT
protocol, and the other is to use an HTTP module that uses
the HTTP protocol. Since MQTT is message-driven and
HTTP is document-driven, it can be more reliable than
HTTP.
IoT integration is all about APIs, applications use logical
connectors to communicate with each IoT device. APIs
expose data, enabling these devices to pass data to
applications and act as data interfaces. They also allow your
application to control the device and act as a functional
interface.
H. Hand held Device Fig.5 Transmitter hardware prototype
Web-based or mobile applications can be used to monitor
data. These applications act as user interfaces and display
data collected from sensors. Cell phones and other portable
devices with LCD screens can run these applications.

IV. RESULT ANALYSIS


The system consists of Arduino, soil moisture sensor, soil
temperature sensor, DHT -22 sensor, ESP32, LCD, GPS. FC-
28 Soil mo isture sensor-The required voltage for working is
5V. DHT 11 sensor- he required voltage for working is 3-5V.
The temperature range of the DHT11 is 0 to 50 degrees
Celsius with a +-2 degree precision. The DHT11 has a
sampling rate of 1Hz, which means it takes one reading
every second.
T ABLE 1 .HARDWARE DESCRIP TION

Hardware used Description


FC-28 soil Operating voltage 3.3V-5V,PCB size: Fig.6 Receiver hardware prototype
moisture 3.2cm x 1.4cm
DHT11 3 to 5V power and I/O, 2.5mA max Fig 5, 6 shows the transmitter and receiver hardware
Temperature current use during conversion (while prototype. The previous section describes the system
and humidity requesting data), No more than 1 Hz architecture and hardware details.
sensor sampling rate (once every All sensors (temperature sensor, DHT11 sensor, and soil
second),Body size 15.5mm x 12mm x mo isture sensor) were deployed in the field to evaluate the
5.5mm proposed system's performance. The data is sent to the edge
Arduino uno The operating voltage is 5V, The server via GSM module and Android app, and farmers can
recommended input voltage will range view the results as well. The user can then perform an action
fro m 7v to 12V , DC Current for each to open or close the valve.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 258


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In general, packet loss reduces the speed or throughput of Fig. 8 and 9 show temperature, humidity, and soil
a particular connection. This can often result in a loss or mo isture data for the selected dates. Similar values can be
degradation in quality for latency-sensitive protocols or found for any date during the plant's growing season.
applications, such as streaming video or voice-over IP, when
accuracy is less critical. Packet loss will still have modest
consequences since it may increase the CPU burden to
process the extra network overhead.

Fig. 8 Measure data Soil moisture and soil temperature

Fig.9 measured data for temperature and humidity

Fig.7 Final output in display V. CONCLUSION


In this work, the IoT based smart agriculture irrigation
Fig. 7 depicts the system's results section. The numbers system has been developed. It is made up of three modules:
represent soil mo isture values, temperature and humidity an irrigation unit (IU), a sensor information unit, and a low -
sensor readings, and pump status. Every instant value from cost smart Internet of Th ings (IoT) module (SIU). USP first
the sensors is sent to the IOT server, which is in charge of spends some time in management mode before switching to
reviewing the data (three sensor values every 30 seconds) one-time installation mode to compute evapotranspiration
and applying a model to predict the value for water and irrigation schedules. During this time, data on the crop,
consumption. This is the central idea behind the planting date, and soil are collected. Finally, it switches to
introduction of edge computing. It makes use of the trained continuous monitoring mode, delivering sensor data to the
model to forecast the amount of water needed and send the SIU while processing data using the NN and sending
result to the server. The user receives this value and can use decisions to the IU. For all modules, this document includes
the app to view the outcome on his or her phone. For thorough results with sample test benches. Compared to the
effective data collection, the water resource has been conventional way, the system saves 67% more water
efficiently utilized. overall. Therefore, smart solutions are accessible for people
liv ing far fro m farms and in water-scarce locations with
T ABLE 2 : COLLECTED DATA SET: STATISTICAL ANALYSIS effective water usage and continuous monitoring. The usage
Rang of this automatic device is justified by the requirement to
Ma Media
Dataset Min Mean Std e protect this natural resource. It is perfect for a variety of
x n
people due to its simplicity, cost, and practicality. For
Air indoor vegetation, greenhouses, and other indoor
17.0 32.
temperat 25.15 24.81 3.45 15.64 environments, it is useful due to its versatility, adaptability,
5 7
ure and mobility.
82.
Humidity 19.1 55.94 57.41 16.16 64.11
79 REFERENCES
Soil 7.55 11. 0.878 [1] Ramya Venkatesan and Anandhi Tamilvanan, “A Sustainab
9.158 9.026 4.306
Moisture 8 86 3 Agriculture System Using IOT” ,International Conference on
Communication and signal processing, April 6-8,2017
[2] Nikesh Gondchawar, Prof. Dr. R.S.Kawitkar, “IoT Based Smart
Agriculture”, International Journal of Advanced Research in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 259


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Computer and Communication Engineering (IJARCCE), Vol.5, Issue [23] K. Suganyadevi, “Internet of Things (IoT) Based Smart Kitchen
6, June 2016. Pantry”, Irish Interdisciplinary Journal of Science &amp;
[3] M.K. Gayatri, J. Jayasakthi, Dr. G.S. Anandhamala,“Providing Smart Research,vol.4, issue. 3,2020.
Agriculture Solutions to Farmers for Better Yielding Using IOT”, [24] https://github.com/Akilageeth/multiplesensors_thingspeak
IEEE International Conference on Technological Innovations in ICT
for Agriculture and Rural Development
[4] A.Anusha , A.Guptha , G.Sivanageswar Rao ,Ravi Kumar Tenali,”A
Model for Smart Agriculture using IOT”, International Journal of
Innovative T echnology and Exploring Engineering ISSN:2278 -
3075,April-2019
[5] Prathibha S R ,Anupama Hongal , Jhothi M ,” IOT Based Monitoring
System in Smart Agriculture” ,International Conference on Recent
Advances in Electronics and Communication Technology,2017
[6] Dr.Sanjay N Patil, Madhuri B Jadhav,”Smart Agriculture Monitoring
System using IOT” ,International Journal of Advances Research in
Computer and Communication Engineering,April-4,2019
[7] Prof. K A Patil,N R Kale,A Model for Smart Agriculture using IOT”
,International Conference on Global Trends n signal processing
,Information Computing and Communication,2016
[8] P Lashitha Vishnu Priya,N Sai Harshith,Dr.N V K Ramesh ,”Smart
Agriculture Monitoring System using IOT”, International Journal of
Engineering and Technology,2018
[9] Rajalakshmi.P and S. Devi Mahalakshmi, “IOT Based Crop Field
Monitoring and Irrigation Automation”, 10th International conference
on Intelligent systems and control (ISCO), 2016
[10] K.Lokesh Krishna, Wasswa Fahad Malende “Internet of Things
Application for implementation of Smart Agriculture System”
International conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud) I-SMAC 2017.
[11] G. Merlin Suba, Y M Jagadeesh, S Karthik and E Raj Sampath,
“ Smart Irrigation System Through Wireless Sensor Networks”,
ARPN Journal of Engineering and Applied Sciences, vol. 10, pp.
1,no. 17, september 2015.
[12] Vangala, A.; Das, A.K.; Kumar, N.; Alazab, M. Smart Secure Sensing
for IoT-Based Agriculture: Blockchain Perspective. IEEE Sens. J.
2020, 21, 17591–17607
[13] Ayaz, M.; Ammad-Uddin, M.; Sharif, Z.; Mansour, A.; Aggoune, E.-
H.M. Internet -of-Things (IoT )-Based Smart Agriculture: Toward
Making the Fields T alk. IEEE Access 2019, 7, 129551–129583
[14] S. Darshna, T.Sangavi, Sheena Mohan, A.Soundharya,
SukanyaDesikan, “Smart Irrigation System”, IOSR Journal of
Electronics and Communication Engineering (IOSR-JECE), Volume
10, Issue 3, Ver. II (May - Jun.2015), pp 32-36.
[15] Udutalapally, V.; Mohanty, S.P.; Pallagani, V.; Khandelwal, V.
sCrop: A Novel Device for Sustainable Automatic Disease Prediction,
Crop Selection, and Irrigation in Internet -of-Agro-Things for Smart
Agriculture. IEEE Sens. J. 2020, 21, 17525–17538.
[16] Soeparno, H.; Perbangsa, A.S.; Pardamean, B. Best Practices of
Agricultural Information System in the Context of Knowledge and
Innovation. In Proceedings of the 2018 International Conference on
Information Management and Technology (ICIMT ech), Jakarta,
Indonesia, 3–5 September 2018; pp. 489–494.
[17] Subahi, A.F.; Bouazza, K.E. An Intelligent IoT-Based System Design
for Controlling and Monitoring Greenhouse T emperature. IEEE
Access 2020, 8, 125488–125500.
[18] S. Murugesan, S. Ramalingam, P. Kanimozhi, Theoretical Modelling
And Fabrication Of Smart Waste Management System For Clean
Environment Using WSN And Iot, Materials Today: Proceedings,
Volume 45, Part 2, 2021, Pages 1908-1913,
[19] S. Ramalingam, K. Baskaran and D. Kalaiarasan, "IoT Enabled Smart
Industrial Pollution Monitoring and Control System Using Raspberry
Pi with BLYNK Server," 2019 International Conference on
Communication and Electronics Systems (ICCES), 2019, pp. 2030 -
2034,
[20] Venkataramanan, C., Ramalingam, S., and Manikandan, A. ‘LWBA:
Lévy-walk Bat Algorithm Based Data Prediction for Precision
Agriculture in Wireless Sensor Networks’. 1 Jan. 2021 : 2891 – 2904.
[21] Suma, V. "Internet -of-Things (IoT) based Smart Agriculture in India-
An Overview." Journal of ISMAC 3, no. 01 (2021): 1-15.
[22] Bashar, Abul. "Agricultural machine automation using iot through
android." Journal of Electrical Engineering and Automation 1, no. 2
(2019): 83-92.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 260


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Designing and Implementation of Cellular Network
Based LPG Monitoring and Alert System
S.Ramalingam B.Sakthi Kumar K.Prabhu
Assistant Professor,Department of ECE Assistant Professor,Department of ECE UG Student, Department of ECE
Sri Eshwar College of Engineering Sri Eshwar College of Engineering Sri Eshwar College of Engineering
Coimbatore, India Coimbatore, India Coimbatore, India
ramece74@gmail.com b.sakthi2004@gmail.com prabhukcbe@gmail.com

C P.Prashanth E.Petersam
UG Student, Department of ECE UG Student, Department of ECE
Sri Eshwar College of Engineering Sri Eshwar College of Engineering
Coimbatore, India Coimbatore, India
prashanthcp03@gmail.com sam2676882@gmail.com

Abstract— Continuously monitoring and tracking of LPG automatically send SMS alerts to users when a minimum
consumption can be a daunting task at home and industries. threshold is reached [9]. This proposed project will trigger
However, some people require a regular monitoring so that the sound alarm. Throughout its life cycle, Arduino has
they can refill it when it is necessary, in order to maintain the powered thousands of projects, from everyday bodies to
continuous supply of LPG. Now the world is evolving with complex scientific mechanisms. A global community of
technology, so it is necessary to use technology, if possible, in academics, performers, programmers, and professionals has
every case. As we now founded out the problems faced by LPG come together around this opensource project. Their
gas users so we come up with the solution that can meet some
knowledge of the above issues has contributed significantly
requirements of them, If the LPG gas is consumed to certain
to helping society in this field. The amount of gas can be
level, we made our system to notify the user by SMS and by
alarm. This approach uses sensor that will detect the gas level
determined by weighing the gas cylinder [8].
and transmit the information to the microcontroller. On the
basis of that information, the Arduino makes a decision and Load cells: weight sensors are used to measure weight.
then displays the message on the display and the message will Continuous cylinder weight measurement. The system uses a
be sent to the user via GSM and the buzzer will be activated. weight sensor to measure the cylinder's weight, and the LCD
On this approach Arduino is used as microcontroller, provide display shows the corresponding weight. The system is
a suitable platform for implementing an embedded control
completely controlled by a "powerful" Arduino Uno board.
system and it is possible to modify it to meet our future
The Arduino Uno board continuously monitors all sensors.
requirements easily and quickly. Incorporating these functions
enables remote monitoring and makes life more comfortable. LPG is used all over the world. It is widely used in
As a result, the LPG monitoring is done effectively and households for such things as cooking and heating. We are
effortlessly. thrown into a lot of difficulties when the cylinder runs out of
gas. So, in a busy world, we need to detect a reduction in
Keywords: Arduino UNO, Load cell, Global System for Mobile cylinder weight [6].
module, Inter-Integrated Circuit, Liquid Crystal Display, Buzzer
and HX711 module. II. RELATED WORK
On an industrial level, several LPG detectors have been
developed. In 2008, Liu Zhenya and Wang published the
I. INTRODUCTION article "Smart Home Based on a single chip microcomputer,
LPG cylinders play an important role in our daily lives. a security alarm and remote-control system. This white
Liquefied petroleum gas is an odourless propane and butane paper's goal is to create a burglary, hazardous gas leak, and
gas mixture. Both saturated and unsaturated hydrocarbons fire alarm system for homes. Based on the 89c51
are present. Ethanethiol adds scent to odourless LPG. microcontroller, this system was made. The system can
Liquefied petroleum gas Moderate pressure replaces any automatically alert you to unwanted activity in your
traditional fuel sources used in homes and businesses. It is environment. The power of the house can also be controlled
explosive, nonetheless, and one of the most often utilised from the telephone system [11]. Then, in 2013, a small
fuels [1]. The range is between 1.8% and 9.5% of the air's group of individuals created the suggested home security
gas volume. LPG is applied in that it is used to replace design. The device locates LPG leaks and sounds a buzzer
chlorofluorocarbons, which seriously harm the ozone layer. to notify the LPG leaks. An ARM version 7 microcontroller
processor was used to create the project, and Keil software
According to the law, LPG is divided into three groups: was used to simulate it. It is usually liquefied petroleum gas
Weight of LPG for home, commercial, and industrial use in and consists of liquefied petroleum hydrocarbons and
a bottle. household cylinders for liquefied petroleum gas. commercial alkanes. It is a composition of gas, it is a
14.2 kilogramme of LPG were included in the cylinder. The chemical, like adding an odorant to facilitate leak detection.
commercial and industrial LPG cylinder categories are LPG often used for home heating and cooking [4].
similar. They contain 19kg and 35kg of LPG, respectively. A new kitchen security system was created a year later.
In the cylinder above, LPG was only filled to 85%. The The MQ-5 gas sensor is used by the system to continuously
country is home to 40% of the population and has check for gas leaks in the kitchen. The system's built-in
approximately 300 million LPG users. The purpose of the GSM module will send the user an SMS as soon as an LPG
proposed system is to continuously weigh gas cylinders and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 261


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

leak is discovered.[2] To help individuals take the apart from sound alarm and SMS alert will also be send to
appropriate action as soon as gas is detected, the system also the user. The system has the following units as shown in the
includes LEDs, a buzzer, and an LCD display. Mr. below block diagram. It comprises of Arduino UNO, load
Shivalingesh and B.M. Puja first proposed the concept of cell, GSM module, HX711 Dual-Channel 24-bit A/D
weighing gas. The device automatically reserves cylinders Conversion Module, buzzer and I2C 16x2 LCD display unit
and identifies gas leakage. The Arduino Uno R3 is the and power supply board [4]. The proposed system is also
microcontroller utilized in this project. The Arduino Uno, an easy to install. Arduino UNO is an open-source electronics
ATmega328-based platform, has three versions, the most platform based on the easy-to-use software and Hardware.
recent being the R3.A 32Kbyte microcontroller controller is
Arduino UNO can able to read input - weight on a sensor
the ATmega328 (0.5K bytes is occupied by the
and turn that into an output – activating the buzzer and to
bootloader).[5] In addition, there are I/O pins, an AVR
microcontroller chip, a power connector, USB connectivity, send message through the GSM module. Initially gas
an in-system programming (ICSP) header, and a reset cylinder is placed on the system that we have created, on
button. SRAM and EEPROM that can be read and written as turning on the power supply, the Arduino continuously
an EEPROM library are also present. That is, connect it to monitor the gas for every three seconds with help load cell.
your computer via a USB cable. The Arduino has a clock At first the calibration factor of the load cell is calculated.
speed of 16 MHz, so it performs certain tasks faster than Then the weight is calculated with the help of data from
other processors and controllers.[3] HX711 module and calibration factor calculated earlier.
The AVR chip will continuously run at 16 MHz no
matter what your code does. Therefore, the current
The advantages of the proposed system are
consumption is essentially unrelated to the code being run.
(2016) (Dr. Bayan M. Sabbar, AI Ali) Activate an SMS- • Real-time monitoring of LPG consumed
based alarm system and send 3 SMS (3 alert messages) to 2 • Buzzer alert
distinct cellphone numbers (entered inside the Arduino • SMS alert
program). Using the (162) LCD module, show the status on
the LCD. Liquefied petroleum gas (LPG) is highly
flammable chemistry. A mixture of hydrocarbon gases
(LPG). It is used as a combustion fuel in households and
industry. LPG is used as domestic fuel, industrial fuel and
for heating soon. Heaters and gas sensitive resistors are part
of it. To avoid internal components of the sensor used errors
that lead to false alarm indications. Alarm triggered when a
certain gas concentration is reached over steam. This device
is for display only early warning of problems to ensure
public safety. Liquid gas and gas sensors are used in the
field of safety, health and material.
This embedded system is used to detect dangerous gases
and send warnings to users SMS. (A. Shiyana, R. Deepa,
October 2017).[12] The microcontroller used for the project
is Arduino Uno R3. Arduino Uno is a microcontroller Board
based on ATmega328. ATMega328 A single 32K byte
microchip controller (uses 0.5 Kbytes occupied by the boot
process) loader). Also, SRAM and Read/write EEPROM
Libraries, I/O Pins, AVR Microcontrollers Chip, power
jack, USB connection, ICSP (In Circuit System
Programming Header), and reset button. Simply connect to
your computer via USB cable. The Arduino clock speed is
16MHz. So, it does certain tasks faster than others processor
or controller. AVR chip is continuous clocked at 16MHz Fig 1. Block Diagram
regardless of code performance, it never stops. So, the
current consumption is essentially code independent it will A. Hardware Requirements
run. (Dr. Bayan M. Sabha, AI.
However, June 2016). Microcontroller based LPG gas • Arduino Uno R3
leak detector was used in this system using the GSM • Sim 900A GSM Module
module Sensors, GSM modules, microcontrollers. • Load Cell
Concentration rises, gas sensor detects gas leak, then send to • HX711 Load Cell Amplifier
the microcontroller. Then connect the GSM module to the • Power Supply Board
microcontroller giving commands Stop the main supply. • Buzzer
System is very reliable Tamper-proof and secure. In the long
• I2C 16x12 LCD display unit
run efficient maintenance cost. Very accurate. (A.sood,
B.Sonkar, A.Ranjan, Herr A.Faisal, Juni 2015).[16]
B. Software Requirements
III. PROPOSED METHOD
In our paper we propose a system which is able to • Embedded C
monitor gas in real time and help the customer to lessen the • Arduino IDE
burden of doing that job [1]. On the detection of low LPG,
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 262
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

G. Software Explanation
The developed system consists of three main modules:
The below flow chart will explain the step-to-step
functionality of this proposed system [3]. At first the load
C. Control Section: cell is calibrated and calibration factor is noted. The
Control section consist of a sensor. It will control program at first initializes the system and check the weight
all the functionality of the system [13]. A load cell is an and display the weight. If the cylinder is not placed, it
electronic sensor that is used for measuring the weight and displays “Kindly place the cylinder” message. Once the
force. The load cell is also known as transducer which cylinder is detected and if the weight of the cylinder is less
converts the force into measurable electrical output quantity. than the minimum value then the Arduino will turn on the
The output produced by load cell will be in the range of buzzer for 5 seconds and then sends SMS through GSM
millivolts, so we require an amplifier to convert the low module.
output signal into a level that can be later transform into a
digital signal to process it. Therefore, we use HX711
amplifier sensor. That includes a HX711 chip with the
analog-to-digital conversion capability in 24-bit accuracy.
The HX711 amplifies the low-voltage output from the load
cell and sends it to Arduino, so that the Arduino can
calculate the weight from this data. On detection of low
LPG, microcontroller gets commands from the weight
sensor, and it will give the alert message by turning on the
buzzer and sending SMS to the user.
D. Weighing Section :
This section is mainly designed to measure weight
of the gas cylinder. The 40Kg is the maximum capacity of
load cell used in this project [13-16]. Between the upper
base and lower base of the proposed work the Load cell is
placed.
E. Display Section:
Display is used to provide the real time information
to the user [13-16]. I2C 16x2 LCD is used in this proposed
work. It is placed in the front side of the stand. It will show
all the data like real time weight and “Kindly place the
cylinder” message if the gas cylinder not placed.
F. Hardware Environment
In this proposed system the Arduino and GSM
module is powered through power supply unit. The
Arduino powers the I2C 16x2 LCD display and the HX711
Conversion Module. The HX711 module’s DT and SCK
pins are connected to the pin6 and 5 of the Arduino
respectively [9]. Buzzer is connected to pin 4 in the
Arduino board. The Tx pin of GSM module is connected to
Fig 2. The Main Loop Flowchart
Rx pin of the Arduino and the Rx pin of the GSM module
is connected to Tx pin of the Arduino. I2C 16x2 LCD H. Working Principle:
display’s SDA and SCL pin is connected to analog pin 4 Initially the proposed system checks whether the
and 5. The connection between load cell and HX711 unit cylinder is placed or not by measuring the weight. The
done as below. weight is measured for once every 3 seconds. When the
Cylinder is placed on the stand the weight of the cylinder
will be measured with the help of load cell and the output
of the load cell will be amplified with the help of HX711
module and it is given to Arduino. If the cylinder weight is
lesser than the minimum value, then the Arduino turn on
buzzer for 5 seconds and sends the “low weight” message
SMS through the GSM module to the user’s cell phone.
And this process is repeated till the power supply is turned
on. The total working of the proposed system requires only
12 volts for its operation. Since the overall working
principle is very simple the entire cost for building this
system is also very low. The entire working principle is
very user friendly. Due to this working principle, we can
able to monitoring the gas in real time and help the
Table I: Connection between HX711 module and load cell customer’s burden to be reduced.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 263


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. HARDWARE DESCRIPTION C. Buzzer


A. Arduino The buzzer is used to sound an audible alarm to
indicate and warn surrounding workers of danger. The
Microcontroller Arduino UNO is employed. The central buzzer is the system output. The buzzer beeps to indicate
unit in the Arduino UNO board, all components are danger.
externally interfaced and programmed according to the
function it works synchronously. This is an electronic
prototyping platform or board that support Atmega-328 D. I2C LCD
which is 8-bit, 16 MHz enabled during the serial I2C LCD is an easy-to-use display module that
communication, there is 14 digital input, output pins (6 of makes it easy to display. Using I2C LCD can reduce the
which are PWM) and 6 analog input pins. Works with 5v. difficulty, so that creators can focus on the work. We have
All pins contain a specific function that they control. used the Arduino library for I2C LCD, users only need a
few lines of code to realize the complex graphic display
function. You can replace the Arduino serial monitor
somewhere you can get running information without a
computer. More than that, you can also use dedicated image
data conversion software which is now available to
Windows, Linux and Mac OS PC platform. Through
bitmap conversion software, we can display our favorite
image on I2C LCD, no complex programming required.

Fig.3 Arduino

It is non-volatile storage and have EEPROM. The main


comparison of non-volatile storage and EEPROM is
indisputable fact that non-volatile storage can be erased.
Unlike an EEPROM, the entire device can be erased. Where
you can delete based on Byte and section. Availability of
non-volatile memory, during which the contained block is
divided so that part is erased block by block, while the Fig.5 I2C LCD
option of not erasing EEPROM bytes is provided. Non-
volatile storage performed in the system board socket. PCB E. Power Supply Board
BIOS ROM is the update that is mostly used. A DC-DC converter is an electronic circuit or
electromechanical device that converts direct current (DC)
B. GSM SIM900A power from one voltage level to another. It is a power
GSM module is used to send SMS and alert on gas level converter. Power levels range from very low (small
detection. The GSM is understood as a device used for voltage) to very high (high voltage power transfer).
exchanging the information. 5-volt DC is supplied required
by the GSM for its operation. The modem needs only three
connections (transmitter, receiver, ground) to interface with F. Load Cell
the Arduino Atmega-328 controller uses external power Load cells convert forces such as tension,
supply. The Arduino is connected with the receiver pin to compression, pressure or torque into electrical signals that
the device. Arduino provides information to the GSM can be measured and normalized. It's a force transducer.
device. The GSM will send an output to the number written The electrical signal changes proportionally as the force
in the code through the SIM inserted in the SIM card slot to applied to the load cell increases. The common types of
alert the user when the LPG level is below the minimum load cells are pneumatic, hydraulic, and strain gauges. In
value. The AT commands are used to communicate with this proposed system strain gauge load cell is used. It
the GSM module. consists of four strain gauges connected in the form of a
Wheatstone bridge it works according to the strain gage
principle. When force is applied to the caliber, it becomes
strained or compressed, causing the length of the strain
gauge cable to change. As the resistance of the wire is
inversely proportional to length, the electrical resistance of
the load cell changes. East the change in resistance is
proportional to the force applied in caliber. The available
electrical signal output from a load cell is usually on the
order of mv. So HX711 is used to amplify small voltages.
HX711 has two analog input channels A and B. When the
Fig.4 GSM SIM900A 5v power supply is connected to the VDD of the HX711,
channel A can be programmed for a gain of 128 or 64 and
channel B for a gain of 32. The cables from the load cell
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 264
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

are connected to E+, A-, E-, and A+. The amplified output
is taken from the series data from HX711 and delivered to
the microcontroller.

Fig .6 Load Cell

V. RESULT ANALYSIS
In this application the monitoring is done continuously
and the alerting is done when it is necessary. The
monitoring is done by the Arduino and the user can also
monitor the real time gas level through the display. The
alerting is done by the buzzer and the GSM module for this Fig.9 SMS Output
application. The load sensor is used along with Arduino to
The above figure shows SMS notification on user mobile
continuously measure the weight in order to have an
phone. The picture above is the picture taken by the user's
effortless monitoring and controlling of system for this
mobile phone when the GSM module integrated in the
application. A prototype of the system has been built and all
system sends a short message to the registered mobile phone
modules of the system are working as expected. If the
when the weight is low. Any mobile phone that supports the
cylinder is not placed in the system, it displays the “Kindly
SMS service can be used for this implementation.
place the cylinder” message. The proposed system also
continuously measures the gas level in the cylinder, if the VI. CONCLUSION
weight of the cylinder falls under the minimum level, it
sends an alert text message to the user and turns on the Security as a core and integral part of human
buzzer, which turns off after 5 seconds. Some experiments existence is crucial in promoting a healthy and sustainable
are carried out to examine the capability and efficiency of environment. Achieve a peaceful and harmonious existence
the proposed system. Below is an example of such an between the individual and his society while ensuring
experiment. seamless interactions in specific habitats, especially when it
concerns life and property. Problems encountered by the
conventional type of old-fashioned security methods (such
as using dogs) have been modified or improved by alarm
systems. As we shorten the problems faced by LPG
consumers, we have come up with solutions to meet the few
requirements they have on them, as we made our system to
notify the user by SMS and by an alarm. The main goal of
our project is to measure the gas present in the cylinder,
when the weight of the cylinder is below a fixed load, this
can be done using a weight sensor. The homeowner
(consumer) receives a message about the status of the LPG
in the cylinder. After the execution of this project, it can be
concluded that the detection of LPG gas is incredible in the
Fig.7 Gas Level Monitoring System project system. The simple procedures and Arduino UNO
Microcontroller are used to build the system. Therefore, the
system we have developed will help LPG consumers to a
certain extent to live a comfortable life.
REFERENCES
[1] Ms.A.Preethi Vinnarasi M.E 1 , Elumalai R M2 , Jerry
Jenish3 Karthik Raj.T , “LPG Gas Monitoring System Using
Arduino”, April 2021| IJIRT | Volume 7 Issue 11.

[2] Rhonnel S. Paculanan, Israel Carino, “LPG Leakage


Detector using Arduino with SMS Alert and Sound
Alarm”,Volume-8, Issue-6C2, April 2019.
Fig.8 System Hardware
[3] Syeda Bushra Shahewaz 1, Ch. Rajendra Prasad, “Gas
leakage detection and alerting system using Arduino Uno”
,11 December 2020.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 265


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[4] R.Naresh Naik 1 , P.Siva Nagendra Reddy 2 ,S.Nanda


Kishore3 , K.Tharun Kumar Reddy, “Arduino Based LPG
gas Monitoring & Automatic Cylinder booking with Alert
System”, Volume 11, Issue 4, Ver. I (Jul.-Aug .2016)

[5] Rohith Naidu V, Rakshith S Gowda, Prathapa , Ashwini D


S.” Smart LPG Gas Level Detection and Safety System using
IOT “International Journal of Engineering Research &
Technology (IJERT) ISSN:2278-0181 NCCD-2020
Conference Proceedings.

[6] Juvanna, N. Meenakshi “Gas Level Detection and Leakage


Monitoring System using a Specific Technique “.
International Journal of Computer Science and Mobile
Computing ISSN 2320-088X February 2014.

[7] BalwindersinghLakha (Center for Development of Advanced


Computing) “Designing and implementation of smart LPG
trolley with home safety October 2016DOI:
10.1109/NGCT.2016.7877412.

[8] Siva Nagendra Reddy “Arduino Based LPG gas Monitoring


& Automatic Cylinder booking With alert System”. April -
2016 DOI:10.9790/2834-1104010612.

[9] Ayesha Siddika, Imam Hossain “LPG Gas Leakage


Monitoring and Alert System Using Arduino”.International
Journal of science and Research (IJSR) ISSN:2319-
7064,SJIF(2018).

[10] Mr. Siva prasad Lebaka, M.Ganga Rami Reddy,” Gas


Leakage Detection Using GSMI Module & Arduino with
SMS Alert “ (ISSN-2321-5941(2022).

[11] Rhonnel S. Paculanam,IsrarelCarnio “ LPG Leakage


Detector using Arduino with SMS Alert Sound
Alaram“(IJITEE)ISSN:2278-3075,April-2019.

[12] Syeda Bushra Shahewaz, Rajendra Prasad Ch “Gas Leakage


Detection and alerting System Using Arduino
Uno”.December-2020 DOI:10.30574/gjeta.2020.5.3.0109.

[13] Ajay Kumar, Mukesh Kumar, Balwinder Singh “Designing


and Implementation of Smart LPG Trolley with Home
Safety” 2016 2nd International Conference on Next
Generation Computing Technologies (NGCT-2016).

[14] Sharma, R. Rajesh. "Gas Leakage Detection in Pipeline by


SVM classifier with Automatic Eddy Current based Defect
Recognition Method." Journal of Ubiquitous Computing and
Communication Technologies (UCCT) 3, no. 03 (2021):
196-212.

[15] Madhura, S. "IoT based monitoring and control system


using sensors." Journal of IoT in Social, Mobile, Analytics,
and Cloud 3, no. 2 (2021): 111-120.

[16] MS.A.Preethi Vinnarasi M.E,Elumalai R M,Jerry


Jenish,Karthik Raj.T ”Lpg Gas Monitoring System Using
Arduino”.April 2021(IJIRT ) SSN:2349-6002.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 266


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Comparative Study on Machine Learning based


Cross Layer Security in Internet of Things (IoT)
K.Saranya, Dr.A.Valarmathi,
Full Time Research Scholar, Assistant Professor,
Dept. of Information and Communication Engineering, Department of Computer Applications,
UCE-BIT Campus, Tiruchirappalli UCE-BIT Campus, Tiruchirappalli
Anna University, Chennai Anna University, Chennai
saranyaokk@yahoo.com valar1030@yahoo.com

Abstract - The Internet of Things is a developing technology that are vitally important to the network and the devices
that converts physical objects into virtual objects connected to come up. As the internet is used, the IoT network design
the internet using wired and wireless network architecture. Use inherits a centralised and hierarchical architecture [4].
of cross-layer techniques in the internet of things is primarily However, the proliferation of IoT devices is also bringing up
driven by the high heterogeneity of hardware and software
capabilities. Although traditional layered architecture has been
a number of new difficulties. First, there are not enough
effective for a while, cross-layer protocols have the potential to universal standards for IoT platforms. Second, the
greatly improve a number of wireless network characteristics, expansion of IoT devices may outpace the capacity of the
including bandwidth and energy usage. Also, one of the main current network infrastructures. Last but not least,
concerns with the internet of things is security, and machine consumers of IoT continue to have serious concerns about
learning (ML) techniques are thought to be the most cutting- security and privacy [6].
edge and viable approach. This has led to a plethora of new
research directions for tackling IoT's growing security issues.
In the proposed study, a number of cross-layer approaches
A. The Motivation of this Paper
based on machine learning techniques that have been offered
in the past to address issues and challenges brought on by the The constant progress and ever-increasing demands of
variety of IoT are in-depth examined. Additionally, the main the present developments frequently push scientists and
issues are mentioned and analyzed, including those related to researchers to create new standards. We'll see more big data,
scalability, interoperability, security, privacy, mobility, and cloud computing, WSN, and IoT in the future. Therefore, in
energy utilization. light of the current situation of ongoing advancements in the
field, research into the actual capabilities and functions of
Keywords - Internet of things, Cross layer design, Security,
contemporary IoT concepts was essential. This study
Privacy, Energy efficiency, Interoperability, Machine Learning.
emphasizes the core IoT principle and the need for cross-
I. INTRODUCTION layer IoT architecture.

IoT is seen as a network of real-time, embedded The structure of this paper as follows.
systems in nature as well as a dispersed system that is The Internet of Things was briefly discussed in Section 2
connected to the internet. There are wireless and wired along with its evolution, architecture, numerous
means of communication. The network is made up of communication protocols, and IoT applications. IoT
tangible, inanimate objects from the real world that have Security and Machine Learning were extensively explored
been given network connectivity, electronics, and software in Section 3. Cross-layer architecture for Internet of Things
implants. These devices can collect, infrequently process, challenges based on machine learning approaches was
and exchange data because of its constrained computation, explored in Sections 4 and 5, along with the conclusion and
storage, and networking capabilities [1]. By enabling one future research.
layer to access data from a different layer, the cross-layer
approach removes strong boundaries between the levels to II. IOT AN OVERVIEW
permit an innovative integration technique is used to
construct a cross-layer authentication protocol under the In the context of modern cellular telephony, the
distributed authentication architecture [2]. IoT devices pose Internet of Things is a revolutionary technology that is
serious security concerns for the overall network rapidly growing. The Internet of Things (IoT) can be
environment, including information leakage and a lack of thought of as a network of interconnected things, but smart
security protection. In the meantime, the IoT apps' lack of sensors enable wireless connection. Without human
security management makes it more likely that devices will assistance, IoT can communicate. The term Internet of
be attacked. Because privacy leaking is such a major issue, Things (IoT) refers to a group of items that may interact and
several security researchers have inferred their own communicate with one another thanks to RFID chips and
approaches and viewpoints [3]. other comparable technologies [8]. It is also feasible to link
a number of real things. Security and privacy of physical
When wireless sensor technology and the Internet of devices, which serve as the IoT's cornerstones, are crucial
Things are combined under a cross-layered design, issues for both the technology and its applications. Six unique

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 267


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

properties of physical IoT devices make security and This layer securely transmits data to the perception
privacy challenges more difficult [9]. These traits include layer from the middleware layer. The transmission layer is
resource limitations, high heterogeneity, multi-identity the name of the layer. It aids in managing network service
cohabitation, spatial-temporal irregularity, dynamics, and centres, information services, and network administration.
social awareness. The most popular network, IoT, draws in Application Layer
all users and enables intelligent user communication. In both The top tier of the three-layer architecture is really
human-to-human and human-to-machine engagements, it responsible for serving customers [5]. From the middleware
transfers data without the assistance of a human [10]. layer to the perception layer, this layer safely transports
data. It is in charge of offering services to users.
A. IoT's evolution
At the Massachusetts Institute of Technology (MIT)
Auto-ID Laboratories in the early 1990s, Kevin Ashton
coined the phrase "Internet of Things". The tracking and
detection systems that support RFID are where the phrase
"Internet of Things" initially appeared. IoT integrates RFID
and sensors, allowing for the growth of industrial services as
well as the expansion of service deployment in new
applications. A greater variety of "things" can now be
connected to the Internet of Things because to
advancements in sensor networks, low-energy wireless
networking, and smart sensors since 2010. Sensing and the
internet are combined in the Internet of Things (IoT)
movement, and all networked objects must be flexible,
intelligent, and sufficiently self-sufficient to offer the
required services.

B. IoT Architecture
Over the past few years, a lot of Internet of Things
(IoT) projects have emerged, and numerous versions of
architectures have been developed based on the individual
requirements and project scope. Limited interoperability
across the systems was caused by a variety of architectures
that used a variety of components and protocols as a result
of the substantial heterogeneity in the application areas and
approaches to an architectural requirement that varied
between projects [4].

• Three-Layered Architecture
The fundamental architecture, which is also the most Fig. 1. IoT Architecture
popular IoT model, is made up of the application layer, the
network layer, and the perception layer [11]. The Internet of • Five-Layer Structure
Things' architecture assists to define the idea. The next
subsections discuss the three and five layered architecture Stunning Layer
seen in Figure 1. In the three-layered design, the third layer functions
The following Figure.1 illustrates the layered identically to the first two levels [12]. The data from the
architecture of IoT [4]. sensors is implemented using the perception layer.
Sensational Layer System Layer
The Physical Layer and Sensing Layer are other names The Transmission layer is another name for the
for the Perception Layer. With the help of sensors and Network layer. The Middleware layer transmits data to the
actuators, it gathers data from the physical environment Perception layer through this layer [12].
around it [11]. It converts analogue impulses into digital The Middle Layer
signals and records data that is universally useful. The The processing layer in IoT architecture is a common
subsequent layers receive these digital data for further name for the intermediate layer. Analysis, archiving, and
processing. ZigBee, RFID, and other technologies are used processing is done on the large amounts of data that are
to connect IoT devices to the internet [4]. transmitted from the Network Layer.
Network Layer Application Layer
The layer's primary duty is to communicate and route This layer manages a large application based on the
data to various IoT devices over the Internet that has been data processing at the Middleware layer [12].
collected from various IoT sensors [5]. Specific Business Layer
communication protocols, like HTTP/HTTPS, are required The system as a whole is managed by the business
for this tier. layer. This tier's primary duty is business, financial, and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 268


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

application model governance and regulation [12]. analyzing from transmission lines, distribution substations,
C. Wireless Communication Technologies for IoT and applications.
Many wireless communication methods have been
developed in the recent past for use in Internet of Things
applications. There are benefits and drawbacks to every kind
of communication [17].
• RFID
Radio Frequency Identification, or RFID, is a key
component of the Internet of Things (IoT), which uses it to
effectively identify a variety of things in our surroundings.
RFID technology was used in the development of the
Internet of Things (IoT) concept for automatic
identification, authentication, and tracking.
• Near Filed Communication (NFC)
NFC, a sort of 13.23 MHz short-range wireless
technology, typically requires a distance of 4 cm. By
making it easier to complete transactions, trade digital
content, and link electronic gadgets with a touch, this
technology improves people's quality of life. It becomes
possible to initialise wireless networks quickly. The setup
for RFID and near-field technology is very similar.
• Bluetooth
The Special Interest Group (SIG) for Bluetooth is Fig.2. IoT Applications
in charge of developing Bluetooth. It is inexpensive and
typically used for data transmission across short distances • Smart City
between devices. To prevent cohabitation, it empale "Smart cities" are a complex IoT paradigm that
frequency hopping spread spectrum (FHSS). tries to handle public affairs by incorporating ICT
• Z-wave technologies. It can employ public resources in a more
Z wave is widely used in business and smart home effective manner, improving the standard of services offered
applications. It consists of two types: slave and device to citizens and significantly lowering operational expenses
control. Slave node attributes are low-cost devices that are for public administration [5].
unable to send messages on their own. • Smart Agriculture
• ZigBee Smart farming is another name for IoT.
IEEE 802.15.4 is the foundation of the well-known Modernizing farming practices, harvesting, weather
wireless communication technology ZigBee. ZigBee forecasting, water conservation, wildlife control, and other
supports communication ranges of 10 to 100 meters for IoT processes require farmers to use technology.
devices. It is a type of technology that uses less energy and
is very effective. III. IOT SECURITY AND MACHINE LEARNING
• LoRaWAN
The LoRaTM Alliance just created LoRaWAN. In Several machine learning methods will be
particular, it outlines the LPWAN standard for IoT discussed in this part, along with examples of how they
applications. processing data at speeds ranging from 0.3 might be used in Internet of Things applications. Machine
kbps to 50 kbps. learning categories has shown in Figure. 3 [1].
D. IOT Applications
These IoT applications can improve our lives in a wide A. Algorithms for Machine Learning
range of situations and domains.The different IoT Reinforcement learning, unsupervised learning,
applications in the aforementioned fields are depicted in semi-supervised learning, and supervised learning are the
Figure 2. The following application areas can be used to four subcategories of machine learning algorithms.
categorize IoT applications. • Supervised learning
When specific goals are defined with the intention
In Figure.2 various applications of IoT are showcased [5], of receiving a specific set of inputs, supervised learning is
utilized. In this sort of learning, after the data has been first
• Healthcare labeled, training is conducted using labeled data that has the
Utilizing wearable sensors to measure things like necessary inputs and outputs.
body temperature, calories, and heart rate, IoT is utilized to • Unsupervised learning
provide medical services. The medical sensors could be The environment just provides inputs; there are no
body-implanted, wearable, or portable. desired goals. Without requiring labeled data, it can divide
• Smart Grid the data into several groups and take into account
A "Smart Grid" of electrical infrastructure was similarities between unlabeled data.
developed with the primary objective of gathering and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 269


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

• Semi supervised Learning • Attack Detection and Mitigation


In the first two kinds, either all observations have IoT devices are the ideal target for attackers due to
labels or no labels are included in the dataset for any their heterogeneity and lack of available attributes.
observations. This is where semi-supervised learning comes Attackers typically use the IoT device's known weaknesses
in. Because qualified human experts are required to label on both networks.
goods, labeling can be very expensive [1]. • DoS and Distributed DoS (DDoS) Attacks
• Reward-Based Learning (RBL) Attacks like DoS and DDoS are among the most
The agent learns by feedback after interacting with well-known and challenging to defend against in an IoT
the environment using the reinforcement learning technique; context. Effective remedies against the attacks are difficult
no specific results are required. Based on the reward to come up with for a number of different reasons [1]. These
received, it does various activities and makes choices. factors include the sheer amount of Internet-connected
Internet of Things (IoT) devices, heterogeneity, inadequate
security measures caused by the IoT devices' resource
restrictions, cross-platform communications, enormous scale
communications, and others.

Fig. 3. Machine Learning Categories

B. IOT Security Mechanisms • Anomaly/Intrusion Detection


Here, discuss several ML algorithms with a focus IoT intrusion detection and mitigation methods
on the concerns about security and privacy in IoT networks. currently used It is noteworthy that conventional behavior-
• Authentication based and signature-based methods failed to identify zero-
One of the most important IoT security day incursions. As a result, intrusion detection systems
requirements is authentication. To use IoT applications and employ a variety of artificial intelligence techniques (IDS).
services, users must be legitimate. Data communication In IoT networks of all kinds, a variety of machine learning
across various stages is the foundation of IoT applications (ML)-based algorithms have been used to spot anomalies
and services. Before being sent to a decision-support system and intrusions [18-19].
for interpretation, data from IoT devices is analyzed [1]. • IoT malware analysis
Depending on the underlying IoT architecture, different One of the most well-known attack domains is the
operations might be different, but the data flow in various execution and injection of malicious code into IoT devices
systems might be the same. Without restriction, whenever a leveraging such devices' documented security flaws.
user or application needs data from an IoT device, they must Application security, authentication, and permissions issues
first authenticate with IoT. may lead to malware injection vulnerabilities [1]. To

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 270


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

mention a few, viruses, trojans, adware, spyware, bots, In this kind of attack, the hole that is being attacked
ransomware, and spyware are examples of prevalent serves as a effective node, attracting everything to it and
malware types. being chosen as a communication or data-routing
forwarding node by other nearby nodes and devices.
C. IoT Security Challenges
Although the number of IoT-connected devices is • Security challenges in the Application Layer
growing daily and the IoT layers are experiencing a number The application layer establishes the parameters for
of security concerns, some of which will be covered in the all IoT-related apps and environments. The primary threats
sections that follow. this layer confronts include attacks based on software. These
Application Layer assaults include a number of others.
• Security challenges in the Physical Layer Phishing attack
Hardware attacks are the most common hazards. In such assaults, the attacker forges the data of
The majority of attacks are directed at sensors like RFID legitimate users in order to get their usernames, email
[13] and wireless sensor networks like ZigBee because they addresses, and passwords. A phony email or website is
can be physically targeted if they are left stationary for an created by the attacker, and when the real person logs in
extended period of time. IoT devices that collect data through it, their data is stolen [16].
include security systems, smart TVs, smart appliances, and Cross-site scripting
wearable health metres. Some hackers might access or share This type of attack, known as an injection, allows
these data for illegal purposes. The following are typical an attacker to put a client-side script, such as JavaScript,
physical layer security risks: into a reliable website that other users may access. By doing
Eavesdropping this, a hacker can use the original data to his detriment and
An intrusion in which someone attempts to steal completely alter the application's contents to suit his
information that devices broadcast is known as an requirements.
eavesdropping attack often referred to as a sniffing or Malicious virus/worm
snooping attack. It accesses the sent and received data by The self-propagating attack known as a virus or
taking advantage of insecure transmission [14]. worm that tampers with user data is a major challenge for
Replay Attack the Internet of Things devices. Malicious viruses that forge
When a hacker listens in on a communication personal information include worms, horses, and Trojans.
between a sender and a recipient and takes critical Firewalls and virus detection methods must be utilized to
information from the sender, it is a specific kind of attack. provide to these viruses [16].
Such an assault frequently takes place during the
authentication process in order to invalidate legitimate IV. CROSS-LAYER DESIGN (CLD)
certificates. [15].
Timing Attack Cross-layer design is thought to be the most
It is frequently applied to technology with limited effective and imminently promising design that requires a
computational power. By estimating the duration, it takes to quicker data transfer rate to attain the highest probable
execute the cryptographic methods, the hacker could throughput. Cross-layer design has been shown in Figure. 4
discover the encryption key [7]. [4] to considerably boost network performance. Cross-layer
design aims to increase the layered design's security as well
• Security challenges in the Network Layer as the framework's flexibility and, above all else, the quality
The networking layer's ultimate objective is to of service.
provide data to the channel that has been gathered from
physical objects via sensors. It serves as a link between the Without going against the tiered architecture, CLD allows
Application Layer and Physical Layer. Accessibility, each layer to share data with any other layer in the network
confidentiality, and privacy of the data are thus the main model. Additionally, depending on the data obtained or
security issues with this layer. Among the security concerns received by the other levels, it can allow each layer to
with the network layer are: decide how to perform its role and exchange its data.
Denial of service (DoS) attack
Customers may notice service delays as a result of A. Cross-Layer Design in IoT
this specific type of attack, in which the attacker bombards The Internet of Things (IoT) is an ICT concept that
an IoT device with service requests until it is unable to is constantly expanding and having more uses. The strongest
handle the volume of data. In order to prevent some or all information masking function is offered by cross-layer
real users from using the targeted devices or network architecture, which makes it more appropriate for IoT. As a
resources, it is typically carried out by flooding them with result, cross-layer communication has numerous advantages
redundant requests [16]. for the IoT sector. The three-level cross-layer technology is
RFID spoofing crucial for enhancing the functionality of IoT platforms. The
The purpose of RFID spoofing attacks is to send Sensing layer, Network layer, and Application layer are the
harmful data into the IoT system after gaining access to it. layers of CLD [13].
RFID spoofing, IP spoofing, and other spoofing attacks are
examples of spoofing in IoT systems. In network layer architectures, a growing trend is
Sinkhole attack the CLD (cross-layer design). Additionally, it frequently
entails deep relationships between several layers. To achieve

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 271


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

good performance, this study maintains CLD as opposed to proliferation of linked devices across a variety of industries,
a single layer. The primary problem that directly affects the including smart home and building automation, smart
performance and lifespan of distributed WSNs is collision energy and retail, healthcare, and transportation [4].
during packet transmission [20]. Thanks to an architectural Network providers can switch between various wireless
idea known as the cross-layer design method, a network can access networks because to interoperability.
operate more effectively, use less energy, survive longer, • Energy Efficiency Issues
and provide Quality of Service (QoS) in real-time The main challenge for IoT technologies was to
communications. develop components and sensors that were energy-efficient
because IoT networks are made up of low-power
B. Cross-Layer Design Issues in IoT components. The performance of Internet of Things devices
There are several key problems with cross-layer is impacted by power consumption. Reduced power usage is
architecture in IoT that are still being studied. IoT said to indicate greater efficiency [5]. IoT devices are
applications must scale to a high number of devices, which thought of as emerging technology and offer several
is challenging to deploy owing to schedule, memory, benefits.
processing, and energy constraints. Regarding delay, energy
use, and dependability, distinct Quality of Service criteria • Mobility
may apply to various things. In ad-hoc networks, node moves are frequent;
therefore, the node movement-related events, such as
channel switching and route changes, must be identified and
resolved to ensure that communication is not disrupted.

V. CONCLUSION AND FUTURE WORK

The internet of things is a leading-edge technology


that is quickly gaining traction. IoT is a technology that
makes it possible to connect people to people and other
people to other things obtaining through internet. Numerous
applications exist the use of IoT in industrial, health care,
and public transportation, services, and administration.
Along with those benefits of IoT applications include
improved data security to be a significant issue and one of
the key factors to be centered on. Additionally, IoT devices
gather a massive amount of data and the possibility of
organizing this data issue. Cross layer design network is a
promising technology candidate for creating an IoT
platform. However, cross layer in IoT also raises several
concerns, such as security and energy efficiency and trust
management. A number of cross-layer approaches based on
machine learning methods that have been put out in the past
Fig. 4. Cross Layer Design
to address problems and challenges brought on by the
variety of IoT are thoroughly reviewed in the present study.
• Security Issue
IoT security is the key area of concern. Weak codes
Future Work
or non-encrypted systems have caused data loss and
IoT is the technology of the future, according a
breaches for many additional purposes in IoT applications.
recent investigation. However, there are challenges that
Therefore, it is necessary to increase the internal and
must be resolved in order to build a system that is
external security of IoT applications [4]. Security measures
significantly more effective. We will successfully use
must be used at every layer and whenever data is transmitted
blockchain technology, AI techniques, and lightweight
from one device to another.
cryptosystems to construct a smart IoT security architecture.
• Privacy Issue To employ a novel dataset and an ensemble model
IoT's major problem is privacy. The vast amount of that is suitable for the IoT scenario. By incorporating deep
data that is saved in the cloud shouldn't be accessible to learning models, this method may also be enhanced in the
anyone else. Every system has a privacy setting, and every future. In the future, we would like to give a static analysis
IoT application and piece of infrastructure must enforce method based on the collection of n-opcode features to
privacy. These attacks pose a severe threat to the internet of discover mobile malware and suggest considering
things because of the sensors, actuators, and wireless cryptography-based data protection solutions.
communication present in all of the gadgets.
• Interoperability of cross-layer design REFERENCES
In the past, network transmissions have been used
[1] Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, and Ekram
to assess interoperability. A broader definition that takes
Hossai “Machine Learning in IoT Security: Current Solutions and
into account the cross-domain influence of interoperability Future Challenges” IEEE April 2020
on system-to-system performance is required due to the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 272


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[2] Yonggu Lee 1 , Jiseok Yoon 2 , (Graduate Student Member, IEEE), [12] J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A
Jinho Choi 3 , (Senior Member, IEEE), And Euiseok Hwang 4 , Survey on Internet of Things: Architecture, Enabling Technologies,
(Member, IEEE) “A Novel Cross-Layer Authentication Protocol for Security and Privacy, and Applications,” IEEE Internet Things J., vol.
the Internet of Things” ,IEEE October 2020 ,Volume 8. 4, no. 5, pp. 1125–1142, 2017.
[3] Dan Yu , Haoguang Xin, Yongle Chen , (Member, Ieee), Yao Ma, [13] H. Suo, J. Wan, et al., “Security in the internet of things: a review,” In
And Junjie Chen , “Cross-Layer Protocol Fingerprint for Large-Scale 2012 international conference on computer science and electronics
Fine-Grain Devices Identification “ IEEE October 7,2020 Volume 8 . engineering IEEE, pp. 648–651, IEEE, 2012
[4] Sowmya Chintalapudi “Cross-Layer Design in Internet of Things [14] B. Ibrahim Hameed “An overview of internet of things (IoT):
(IOT)-Issues and Possible Solutions “ April 2021, Research Gate . Definitions, architecture, security, applications and future directions,”
[5] Sultana Parween, Syed Zeeshan Hussain, Md Asdaque Hussain “A International Journal of Engineering in Computer Science, vol. 1, no.
Survey on Issues and Possible Solutions of Cross Layer Design in 2, pp. 16–26, 2019.
IOT”, IJCNA, 28 August 2021,Volume 8,Issuse 4. [15] S. Prabhakar, “Network security in digitalization: Attacks and
[6] An Wang ,Aziz Mohaisen ,Songqing Chen “XLF: A Cross-layer defence,” Int. J. Res. Comput. Appl. Robot, vol.5 no. 5, pp. 46–52.
Framework to Secure the Internet of Things (IoT)” July 2021 [16] I. Andrea, C. Chrysostomou, G. Hadjichristofi, “Internet of Things:
[7] Mohamed Litoussia,∗ , Nabil Kannoufb, Khalid El Makkaouic,a, Security vulnerabilities and challenges,” In 2015 IEEE Symposium
Abdellah Ezzatia , Mohamed Fartitchouc “IoT security: challenges on Computers and Communication (ISCC), IEEE, pp. 180–187, 2015.
and countermeasures” EICN 2020 ,Pg No: 503–508. [17] J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H.
[8] B. TORGUL, L. Sagbanşua, and F. B. Balo, “Internet of Things: A Kargupta, “In-network outlier detection in wireless sensor networks,”
Survey” Int. J. Appl. Math. Electron. Comput., no. March, pp. 104– Knowledgeand Information Systems, vol. 34, pp. 23–54, Jan 2013.
104, 2016. [18] M. A. Alsheikh, S. Lin, D. Niyato, and H. Tan, “Machine
[9] H. Ning, H. Liu, L.T. Yang, Cyberentity security in the internet of learning in wireless sensor networks: Algorithms, strategies, and
things, Computer 46 (4) (2013) 46–53 applications,” IEEE Communications Surveys Tutorials, vol. 16, pp.
1996–2018, Fourthquarter 2014.
[10] Shakya, Subarna. "A Perspective Review of Security Issues in IoT
with Cloud Environment." Journal of IoT in Social, Mobile, [19] Mashal, Ibrahim, Osama Alsaryrah, Tein-Yaw Chung, Cheng-Zen
Analytics, and Cloud 4, no. 2 (2022): 84-93. Yang, Wen-Hsing Kuo, and Dharma P. Agrawal. "Choices for
interaction with things on Internet and underlying issues." Ad Hoc
[11] O. Said and M. Masud, “Towards internet of things: survey and future Networks 28 (2015): 68-90.
vision,” International Journal of Computer Networks, vol. 5, no. 1,
pp. 1–17, 2013. [20] Faleela Farzana, M., Valarmathi, A.,”Secure architecture to
circumvent collision using RSSI measurement in WSN: a cross layer
design approach” 2020, 79(13-14), pp. 8969–8984.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 273


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Currency and Fake Currency Detection using


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Machine Learning and Image Processing - An


Application for Blind People using Android Studio
Vaishak B Hoysala S Pavankumar V H
Electronics and Telecommunication Electronics and Telecommunication Electronics and Telecommunication
Engineering Engineering Engineering
RV College of Engineering® RV College of Engineering® RV College of Engineering®
Bangalore, India Bangalore, India Bangalore, India

Mohana
Computer Science & Engineering
(Cyber Security)
RV College of Engineeringg®
Bangalore, India

Abstract— Any development in technology is made with the power and camera availability of current smartphones make
intention of solving the difficulties in that field. One such them a suitable candidate for currency recognition. But We
identified problem is blind people were unable to make out the can't say all these methods are 100% perfect. While testing
type of currency. The proposed model efficiently identifies the
type of currency. The converse of this leads to the printing and
of currency many factors influence the image quality and
scanning of currencies and releasing them into the market, this may lead to wrong interpretation. Hence an android can
which not only affects the economy but also reduces the value be used in this context that can help the identification of
for money. This further causes some conflicts and a great threat currencies. Proposed model can recognize the Indian
to the country. Thus, a need for efficient currency and fake currencies of types (10, 20, 50, 100, 500). Figure 1 shows
currency detection methods is required. Finding fake currencies the currency with identification marks. Another major point
is done by any ways. The proposed work identifies the is the result of the currency detected is connected to a voice
currency’s originality by examining its images. The code
simulated using MATLAB extracts the features of currencies.
system that speaks out the actual result. Here mobile
Machine learning models are used for mapping the extracted speakers are used so that they need not depend on other
feature to its standard value, it is able to identify the fake people. For this, the user had to install this application in
currencies efficiently. his/her mobile phone.

Keywords—Computer vision, Machine Learning, Currency


Detection, Teachable Machine, Android Studio, Image
processing, Edge detection, ROI extraction.

I. INTRODUCTION
In the modern world require a methodology or a solution
that works on automation system which we can be used for
currency recognition. It has different applications in real
world including banknote counting machines, money
exchange machines, electronic banking, currency
monitoring systems, assisting blind persons etc. This type
Fig.1. Currency with identification marks
of automation applications can be used to help physically
challenged people like blind and visually impaired people, II. LITERATURE SURVEY AND RELATED WORK
as they can't see anything it is difficult for them to recognize
any currency. This might be used as an advantage by other Karthik K et al. [1] have proposed a paper “Recognition
people. In order to avoid this type of problems and their of Fake Currency Detection using Machine Learning” the
dependency on others, there is a requirement of a system method described detection of counterfeit currency using a
that can help them to identify currency in any possible deep convolution Neural Network based fake currency
orientation. According to census of WHO, 28.5 crore people detection. Ketaki Bhoyar et al. [2] have proposed an idea of
around the world are visually impaired. Among these, 3.9 currency detection and verification by using image
crore of them were blind and others have low vision. Many processing. M. Laavanya et al. [3] gives an idea of all
thoughts/ideas have come across to avoid this, but in vain. possible methods to identify fake Indian currency for fraud
Many technological systems have been adopted which are detection. Santhiya Irulappasamy et al [4] proposed SSIM
designed by analysing various features of notes currency as a method to find the currency is real/fake. Surendra Singh
paper. Few currencies are sensitive to light and the rest do Chouhan et al [5] has proposed a paper on “A study on
not. While for others we need to have a stable environment Indian fake currency detection”. used image processing,
and a proper background to take capture the image and the edge detection techniques for the fake currency
same had to check for its originality. The computational identification process.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 274


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Priyanka Dhapare et al [6] has proposed a paper on “The those methods which are speed and accurate in currency’s
detection of Counterfeit Currency using Image Processing originality are adopted.
Techniques”. This paper has proposed a way to get rid of
such scams by using image processing and SVM feature
extraction. Niketa Gandhi et al [7] has proposed a paper on
“Recognition and verification of Indian currency notes
using digital image processing”. The designed system
implemented using image processing techniques focuses
Fig.3. Implementation Methods
more on extracting denomination values. Pandian, A.
Figure 3 shows the different implementation methodologies
Pasumpon et al [18] proposed convolutional neural
adopted to identify the currency type and its
technique in currency identification for visually impaired
originality[11][12][13].
people. Ranganathan G et al [19] proposed article outlines
A. Traditional Method-The very first proposed method is the
the design of an economical robotic arm which is used to
traditional method where a common man employs the below
visualize the chess board and play with the opponent using mentioned features like Security thread, Serial Image, Latent
visual serving system. Although many systems have been Image, Watermark, Identification mark, Fluorescence,
implemented, but for blind people android based technique optically variable ink, Micro lettering, Intaglio printing etc. in
guides them in a way to identify the currency and make them identifying fake currencies. All of these features can be clearly
not to depend on others[15]. identified by an ordinary person. This method would not
III. DESIGN AND IMPLEMENTATION assure 100% accuracy. Hence, we move on to scientific and
mathematical based technique. In our current model, we had
The following software’s are used in proposed used MATLAB for simulation purpose.
implementation. B.Digital Image Processing Method- The proposed system
MATLAB: It is a programming and numeric computational works on the image of currency notes captured by a digital
platform used to analyze data, develop algorithms, and create camera. The very first step involved is inputting an image
models. done either by scanning or by capturing through a camera with
Teachable-Machine: It is an AI based tool that is quick good resolution. The captures / scanned image is a R-G-B
enough to train or expertise a model to solve real-life (color) image which will be converted to a grayscale image
problems / to manage real-life situation. for ease in feature extraction[8][9][14]. Now only those
Android Studio: It is an IDE where one can create an android regions of the currency which we are interested to analyze
application based on the knowledge of some programming (ROI – Region of Interest) will be cropped and segmented.
language, based on IntelliJ IDEA. From each segmented slice features like intensity are
calculated. If the standard conditions are satisfied, then the
currency note is considered as original otherwise fake[10].

Fig.4.Steps of currency detection


Figure 4 shows the different steps involved in currency’s
originality detection using digital image processing method.
Image Acquisition- It is the process of capturing an image
from a hardware-based source like scanner. The image
captured is completely a raw image which has to be processed
in the further steps.
Pre-processing-Image pre-processing is done to strengthen
Fig.2. Flow chart of Implementation or intensify some of the features of image for future analysis
Figure 2 shows the model design and flowchart of and processing. 1. Noise Removal: Noise from the image is
implementation. It gives the detailed view of working model eliminated using median filter. Median filter strengthens the
of Currency detection as well as to check its originality. brightness of the image, then the obtained smooth image is
various methods which one can adopt to identify a currency stored.2. Aspect Ratio: Another pre-processing adopted was
and to check its originality. Although many methods have Aspect Ratio which is defined as the ratio of the width of the
been discussed in the past to identify a fake currency, but only note to the height of the note, which is standardized as (66mm

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 275


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

X 166mm) 3. Gray-Scale Conversion: The image is then


converted to grayscale image is usually sufficient to
distinguish edges as the adjacent segments are compared with
each other. 4. Image Binarization (image thresholding): It is
the process of taking a grayscale image and converting it to
black-and-white to reduce the information contained within
the image shade range.
Image Segmentation- It is a method in which a digital binary
image is broken down into various subgroups called Image
segments which helps in ease extraction of features in further
Fig.5. Model training and import files
steps. Here we have employed a Global Threshold based
segmentation i.e., based on the threshold value on pixel Android Application development
intensity of edge detected image. A Global threshold-based Here in project model, we will be creating an application that
segmentation is a segmentation technique where in which we could effectively identify the currency. For this, we are using
employ a binary image i.e., the image with only two intensity Android Studio[16]. We had got an application based
levels (0 & 1). Here the background image is assigned with repository in GitHub Depository.As an additive we had used
intensity 0, hence gives a black outlook, while the image is an online voice recorder, we had recorded the mp3 files for
assigned with intensity level 1, hence have a white outlook. sounding of different currencies which we had used in our
Feature Extraction-Feature extraction is the process of model[17].
extracting the features like pixel intensity/ spacial or texture
attributes or any other parameter from the region of interest
(ROI) as a compact vector component. It uses an object-based
that gathers the data of above-mentioned features.
Comparison-The features extracted from the input currency
images enables us to differentiate fake notes from the real
ones. To compare the performance, we have segmented the
image and then we compare the two images and store the
difference. Based on the pixel intensity difference obtained
from each slice, the currency can be considered as a fake
currency if it does not meet the standards, Otherwise the
currency is a real one.
C.Android Based Currency Detection-The proposed system
works on the real-time image of currency note taken from the
camera activity of an application created to detect the
currency. The algorithm flow can be observed at 3 different
which is applied here is as follows: 1. Collection of Data 2.
Teaching the machine 3. Application Creation
Collection-of-Data-Here the images of different
Fig.6. Data collection, model training and application development
denominations of the currency notes are taken either directly
through the camera from the mobile or by showing the Figure 6 shows the data collection of various classes includes
10,20,50,100,500. Training the model in Teachable Machine
currency to the webcam. The images of the currency to be
and building an application using Android Studio.
taken in all different denominations. Images of the currency
denominations to be taken from all sides. Proposed work, The application software used in detecting the currency type
teachable machine/images are used. The collected data to be capable of detecting currency type effectively which uses the
classified and the same to be uploaded on different classes concept of image recognition, and model produces as audio
i.e., different denominations. As we increase the number of output expressive the currency type. This is done by means
of audio mp3 files downloaded using the online voice
samples / images, the accuracy of the algorithm or our system
recorder and the same are used in the application design.
increases, thus we will end up with higher efficiency.
Teaching / Training the model-Here in this phase , we had
opted for the option called “Teach Model” as shown in the
figure with default setting of Epochs, Batch Rate & Learning
rate. Upon doing this, all the images of each class will be
learned by the machine and accordingly the teachable Fig 7: Region of Interest [ ROI] recognition.
machine provides tensorflow.js, TensorFlow & TensorFlow Figure 7 shows the ROI recognition code where the different
lite files (Floating / Quantized type as in figure 5), which we identifiable regions of the currency are extracted and are
will be using in Android studio in creating an application of compared with standard values.
interest. In the process of teaching the model, the epochs,
Batch size & the learning rate is to be set a s per figure 5(a)
and once the model training is done, we need to export
floating as well as the quantized files under TensorFlow Lite. Fig.8. Media player source files
The same are using integrating with the application software
in android studio.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 276


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 8 shows the different media-player source files efficiently. Obtained results shows that with an efficiency of
accessing which are downloaded from online voice recorder 95% and above. Also, the currencies are classified into
are used enabling the audio output once the currency is different denominations with more than 90% efficiency.
detected among the selected denominations. Based on the intensities of the sliced section of ROI extracted
image which when compared to the standard intensities of the
IV. SIMULATION RESULTS AND ANALYSIS currency notes, identified the currency’s originality. The
proposed model has low processing time and is cost effective.
Hence it is very reliable for real-time applications.
REFERENCES
[1] Karthik K, et al. “Fake Currency Detection Using Machine Learning”,
Research gate.
[2] Ketaki Bhoyar et al. “Detection of Fake Currency using Image
Processing”, International Journal of Engineering Research &
Technology, Vol. 9 Issue 09, 2020.
[3] M. Laavanya et al. “Real Time Fake Currency Note Detection using
Deep Learning”, International Journal of Engineering and Advanced
Technology (IJEAT), Vol. 9, 2019.
Fig.9. Teachable machine output [4] Santhiya Irulappasamy et al. “Research on Fake Indian Currency Note
Detection using Image Processing”, IJSDR Vol. 6, Issue 3,2021.
Figure 9 shows the Intermediate output on Teachable
[5] Devid Kumar et al. “A Study on Indian Fake Currency detection”,
Machine – Currency Type Detection Here for a real-time IJCRT Vol. 8, Issue 3, 2020.
currency of Rupees 10, the model gives an accuracy of 99%. [6] Priyanka Dhapare et al. “Detection of Counterfeit Currency using
Image Processing Techniques”, International Conference for
Convergence in Technology (I2CT), 2019.
[7] Sahana Murthy et al. “Design and Implementation of Paper Currency
Recognition with Counterfeit Detection”, IEEE Online International
Conference on Green Engineering and Technologies, 2016.
[8] Sandhya R. Shinde et al. “Experiments on Content Based Image
Classification using Color Feature Extraction”, International
Conference on Communication, Information & Computing Technology
(ICCICT), 2015.
[9] Mahendra Kanojia et al. “Recognition and verification of Indian
currency notes using digital image processing”, Journal of Information
Assurance and Security, Vol. 13, 2018.
Fig.10. Currency detection App [10] Megha Thakur et al. “Various fake currency detection techniques”,
International Journal for Technological Research in Engineering, Vol.
Figure 10 shows the currency detection application. 1, Issue 11, 2014.
Application taking 10 rupees as an input image and output [11] Ratna Jyothi et al. “Paper Currency recognition for color images based
results with voice as well as percentage of output 81.57%. on Artificial Neural Network”, International Conference on Electrical,
Electronics, and Optimization Techniques (ICEEOT), 2016.
[12] Suman Pahade et al. “A Study of Different Counterfeit Note Detection
Algorithm”, International Journal of Advanced Research in Electrical,
Electronics and Instrumentation Engineering, Vol. 7, Issue 5, 2018
[13] Vidhika D. et al. “Recognition of the Old and Soiled Indian Paper
Currency using Image Processing”, European Journal of Molecular &
Clinical Medicine, Vol. 7, Issue 2, 2020.
[14] M. R. Nehashree et al. “Simulation and Performance Analysis of
Feature Extraction and Matching Algorithms for Image Processing
Fig.11. Currency’s originality detection Applications,” International Conference on Intelligent Sustainable
Figure 11. shows the currency’s originality detection with Systems (ICISS), 2019, pp. 594-598.
edge detection and feature extraction output floating window. [15] C. V. Krishna et al. “A Review of Artificial Intelligence Methods for
Let the result of the experiment be considered at two different Data Science and Data Analytics: Applications and Research
Challenges,” 2nd International Conference on I-SMAC (IoT in Social,
stages, one yields in detecting currency type and the other in Mobile, Analytics and Cloud), 2018, pp. 591-594.
determining its originality. The image acquisition is a [16] https://developer.android.com/studio
common step for both above mentioned stages, then it has [17] https://online-voice-recorder.com/
two diversions’ i.e., android based currency type detection & [18] Pandian, A. Pasumpon. “Recognition Aid for Visually Challenged to
other the MATLAB based currency originality detection. Fig Make Out Indoor Environment.” Journal of Artificial Intelligence and
9 and 10 corresponds to the currency type detection. Fig 11 Capsule Networks(2020), no. 1: 11-19.
gives the output of currency’s originality detection. If the [19] Ranganathan, G. et al. “An Economical Robotic ArmPlaying Chess
accuracy level is less than 95%, then it indicates that we Using Visual Servoing." Journal of Innovative Image Processing (JIIP)
2, no. 03 (2020): 141-146.
collect and had to feed it to the teachable machine. By doing
this able to get a higher accurate design model.
V. CONCLUSION
Currency and fake currency detection is proposed for Indian
paper currency system. Using this model, blind people can
use this application to identify the currency effectively &

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 277


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Recent Advancements of Internet of Medical Things
(IoMT): Challenges and Future Opportunities with
Emerging Technologies
Divy Tushar Shah Akash Patel Aishwariya Budhrani
Department of Information Technology Department of Information Technology Department of Computer Science and
Devang Patel Institute of Advance Devang Patel Institute of Advance Engineering
Technology and Research Technology and Research Devang Patel Institute of Advance
(DEPSTAR),Faculty of Technology and (DEPSTAR),Faculty of Technology and Technology and Research
Engineering (FTE), Charotar Engineering (FTE), Charotar (DEPSTAR),Faculty of Technology and
University of Science and Technology University of Science and Technology Engineering (FTE), Charotar
(CHARUSAT) (CHARUSAT) University of Science and Technology
Changa 388421, Gujarat, India Changa 388421, Gujarat, India (CHARUSAT)
divyshah2102@gmail.com akashpatel.dit@charusat.ac.in Changa 388421, Gujarat, India
aishwariyabudhrani.dcs@charusat.ac.in
Khushi Patel
Department of Computer Engineering
Devang Patel Institute of Advance
Technology and Research
(DEPSTAR),Faculty of Technology and
Engineering (FTE), Charotar
University of Science and Technology
(CHARUSAT)
Changa 388421, Gujarat, India
khushipatel.ce@charusat.ac.in

Abstract— Internet of Medical Things (IoMT) is one of the technology have made our lives easy in each and every way
thriving areas of current era which focuses on the digitization of by utilizing the creations made using science and technology.
healthcare services by connecting hospitals, medical resources, One of the best inventions of science and technology till now
healthcare professionals and patients over Internet. Internet of is the Internet. We all know that nowadays the internet is a
Things (IoT) plays important role in IoMT to connect medical
devices with each other for the communication of data between
necessity for daily routine work of human beings for a better
doctors, medical staffs, hospitals and patient for offering efficient and comfortable lifestyle. One of the most rapidly expanding
and reliable medical services. Currently, IoMT offers various areas of IT is IoT which links various sensors, actuators,
services like patient data management, diagnosis of diseases, commuting devices, and other technologies together over the
remote healthcare monitoring, tele-surgery, etc. In this paper, the Internet to make human life easier and relaxed. Nowadays,
IoMT is covered with respect to its applications, use cases and case many IoT based applications and devices are available using
studies. The analysis shows that the IoMT is one of the most which humans can carried out their work without moving
growing fields of Information Technology (IT) which uses the from their place. Various thriving areas of IoT are smart city,
various sensors, equipment, and devices to sense the health-related smart grid, smart agriculture, smart healthcare, smart homes,
data of humans and share the data with hospitals, doctors and
healthcare professionals for remote diagnosis and treatments.
etc.
However, IoMT is being adopted widely to offer tele-surgeries,
real-time health monitoring and diagnosis of various diseases by Smart healthcare is the most growing area of IoT which
integration of various technologies, still many challenges such as connects various devices using communication technologies
Interoperability, privacy and security, Energy Consumption, to offer remote healthcare services. The devices
network latency, etc. need focus of researchers for better and (objects/things) used in medical field like pulse checking
accurate outcome. Here, the major challenges of IoMT are sensor, biometric cybersecurity scanners, temperature sensor,
covered which will be helpful to the researcher and medical blood oxygen saturation sensor, air checking sensor, So2
professional for improvement in healthcare domain.
level checking sensor, ECG/EEG/EMG, blood pressure
Keywords—Internet of Medical Things (IoMT), Smart sensor etc. are connected over internet to offer medical
healthcare, Tele-surgeries, Remote Health Monitoring (RHM), diagnosis, treatment and services can be identified as Internet
Challenges, Future trends of Medical Things. Overall, the medical professionals,
hospitals, and patients are connected over a network along
I. INTRODUCTION with medical devices, machines and software applications to
support various healthcare services known as IoMT. IoMT
The fundamental requirement of human’s health is being allows wireless and remote devices to work securely over the
physically, mentally and socially fit. For humans their health Internet to do analysis of medical data very quickly. In the
is very vital to lead their lives smoothly and peacefully. The survey taken by Deloitte, the IoMT market is estimated to
process of ameliorating health by preventing and diagnosing grow ₹13 trillion from ₹3 trillion by the end of 2022 from
diseases on time called Healthcare [1]. Science and 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 278


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In this article, the next section covers basic details regarding the work. Some day-to-day examples of IoT are Alexa,
IoT which uses various sensors in real-time to sense the data Chromecast, Siri, Google Assistant etc.
and process the data for the required outcome and
technologies in IoMT which uses IoT devices to automate the Technologies used in IoT are Edge Computing, Cloud
healthcare services. The next section covers emerging, Computing, Mobile Computing and Machine Learning.
applications and use cases of IoMT, and challenges with
IoMT to facilitate the researchers. B. Internet of Medical Things (IoMT)

II. BACKGROUND THEORY IoMT is the interconnection of healthcare professionals,


various IoT devices and hospitals through communication
A. Internet of Things (IoT)
technology. IoMT is the platform where medical devices are
connected with each other and monitored by healthcare
The term is originated in 1999 by Kevin Ashton to define an
professionals to diagnose and treat diseases. It processes the
interconnection of the physical world through devices like
medical signals and communicates the data over the network.
sensors, RFIDs (Radio Frequency Identification), actuators,
It is a platform used by medical professionals for decision
etc. over the Internet. Kevin Ashton is the British technology
making according to the requirement of diseases with the use
pioneer and also one of the founders of Auto-ID Centre at
of various AI techniques [4].
MIT. The things inculcated with various sensors and other
technologies for the communication with other devices or
The IoT in healthcare has improved the life of diseased
systems in real-time over the Internet are known as IoT [2].
patients. The invention of IoT in the medical sector has
In general, it is the network of billions of physical devices
decreased the charge of visiting doctors from distant places
connected over the Internet used for exchanging or storing the
and has reduced the workload of doctors and nurses in
data. It’s a technology that has slowly and gradually procured
momentum and is now quietly carving the better future. It is surgeries and operation theatres. By referring to the past
the result of human’s intrigue and determination to lead cases, data stored in databases and also availability of real
time health data of patients enables doctors, physicians and
appropriate and connected lifestyles, reducing human work
surgeons to observe abnormal diagnosis at an earlier stage
and mistakes.
that helps in reducing the risk of patient’s life. IoMT helps in
communication and collaboration between distanced doctors
and experts. The rapid growth of IoT in healthcare has
encouraged medical centers to apply it in order to gain
competitive advantages and to be special over rivals [5].

Fig. 2. Layers of IoMT


Fig. 1. Applications of IoT in different sectors
There are generally 4 layers in the architecture of IoMT
The various sectors which are using IoT and its applications which are Perception Layer, Gateway layer, Database Layer
are healthcare, industrial, banking, automobile, tourism, and Application Layer [6].
fitness, personal care, agriculture, research, shopping,
mobile, television, space and research, hotels, cosmetics and The perception layer is the lowermost layer which consists of
many more. data sources. The sensor and the actuators are used to collect
the patient’s data such as heart rate for stress predication,
Due to the IoT the lives of people have become very fast and pulse rate, blood glucose level, body temperature, lung
easy going. Applications of IoT are mainly classified into volume, urine examination with the help of various devices,
consumer and business. Some applications of IoT are home smart phones and smart watches (wearables). The database
automation, smart wearables, smart meters, smart warehouse layer comes in the function when the data collected from the
etc [3]. Fields like agriculture, medical, industries and wearables are sent to the cloud database. The technologies
automation use the applications of IoT the most. Some other used to store the data are Cloud Computing, Fog Computing,
applications of IoT are Smart Cities, Wearables, traffic Edge Computing or Mobile Cloud Computing. The data
monitoring, Fleet-Management, Water supply etc. The collected from the sensors are sent to the cloud database using
increasing use of IoT devices and its applications have Wi-Fi or other network interface. These sensors are
reduced the human errors and has increased productivity of continuously used to monitor the patient all the time. At the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 279


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

gateway layer using the internet the data stored in the using the AI for precision medicine advanced diagnostics
database layer is sent to the hospitals and doctors where they with real time and historical data analyzing [9].
can monitor the condition of the patients. The Application
layer consists of doctors, hospitals, nurses, healthcare experts B. Blockchain in IoMT
etc. where the data from the database is continuously
monitored. The technologies used in application layer are Blockchain technology offers the security of the data by
Artificial Intelligence, Blockchain, Machine Learning etc. using distributed ledger technology by offering transparency,
integrity and immutability of data [11]. Blockchain uses
C. Smart E-healthcare decentralized and peer to peer connection which offer
reliability in terms of data as data is replicated among the
United Nations Sustainable Development Goal No. 3 (SDG – nodes. It is a system of collecting the information in a very
Goal 3) has suggested that continuous and efficient healthcare secure way that makes it impossible to change the data by
monitoring is required for sustainable development as it integrity breach. Healthcare patient information is the most
guarantees the health and welfare of humans across all ages. critical information which requires a higher level of privacy
Smart healthcare connects patients, medical professionals and security. The main purpose of using blockchain
and hospitals on the single platform through which the technology in the IoMT is the security and transparency of
doctors can monitor the daily human activities to diagnose the data among patients and healthcare professionals.
and get updates regarding health of the patient from remote Blockchain provides high level security to the database layer
locations using IoMT [7]. so that no one can mutate the data of the patients.

Smart healthcare was discovered by IBM from the concept of C. Machine Learning in IoMT
“Smart Planet” which was put forward in 2009. Smart Planet
provides a platform to process the data coming from sensors Machine learning is an important part in the prediction
using IoT, cloud computing and devices with high of treatment procedures suitable to specific disease and its
configurations [8]. success rate on the basis of medical history and current
reports of the patient which is known as precision medicine.
The technologies used in smart healthcare are IoT, cloud Supervised learning, Neural networks and Deep Learning are
computing, artificial intelligence, machine learning, mobile the main pillars of machine learning which works very well
internet, big data etc. These technologies are extensively used in the field of healthcare for automation in healthcare record
in making the whole smart e-healthcare system efficient and management, decision making, medicine suggestions,
reliable. Wearable devices are used to monitor patients' health telesurgery, etc. [8].
throughout the day [8]. Many AI based solutions like robots
and support systems are available to use in diseases diagnosis, D. Cloud Computing in IoMT
tele-surgeries, patient health records management and,
appointment booking. They promote collaboration and Currently cloud computing is booming technology used
networking across boundaries, and promote the growth of in healthcare by offering services for data management
remote medicine and self-service healthcare, and ultimately anywhere-anytime over the internet. Cloud computing is
make individualized healthcare services omnipresent. intended to offer and utilize the enormous number of
Moreover, it also decreases the charge and risk of procedures computing services on the web for healthcare. The main
through the use of these technologies in the medical sector. purpose of using this technology is to manage and store the
huge amount of patient’s data among hospitals, patient and
III. EMERGING TECHNOLOGIES IN IOMT healthcare professionals.
Artificial Intelligence, Blockchain, Physically Unclonable IV. APPLICATIONS OF IOMT
Function (PUF), Software Defined Networking (SDN),
Machine Learning, 5G Internet, Cloud Computing, Edge The main and important role of IoMT is in the Remote
Computing, Mobile Cloud Computing (MCC), Fog
Healthcare Monitoring (RHM) system. Nowadays, RHM is
Computing are some emerging technologies which plays
being used widely for the monitoring of patient’s health in
important role in IoMT to offer security, privacy,
non-clinical environments such as homes or remote locations
performance to improve the services offered by current e-
by the medical professionals which is also referred as Remote
healthcare systems [9]. Patient Monitoring. The role of IoMT in RHM is to sense the
patient’s health related data such as blood pressure, heart rate,
A. AI in IoMT sugar level through wearable sensors/devices, store them in
the cloud databases and used for real-time analysis for
AI performs significant role in the adoption of IoMT in the medical professionals [12][13]
world of healthcare and medical sector by offering various
benefits which has increased the adoption of IoMT in the field
of medical science. The integration of AI with IoMT offers a
number of benefits like automated patient health record
management, managing and scheduling appointments,
managing lab tests, treatment plans, medications, surgical
treatment [10, 20]. The critical conditions can be handled by

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 280


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3. The architecture of Remote healthcare Monitoring (RHM) [14]

Remote Healthcare Monitoring system is the application of


IoMT. The RHM totally works on IoMT. The architecture of
RHM includes patient, wearables/smartphones, wi-fi, cloud
database, doctor, hospital and caretaker(nurse). The patient is
at his/her home and he/she is connected with the sensors
using wearables or smartphones. The data of the patient is
constantly monitored by the sensors and this data is sent to a
Fig. 4. Applications of AI in IoMT [15]
cloud database via Internet (Wi-fi) and there the patient’s data
is stored. The stored data is also sent to the hospital, doctor B. Application of Cloud Computing in IoMT
and caretaker(nurse). This whole way RHM does work on the
application of IoMT.
Cloud Computing offers the facilities for storing,
maintaining, managing and processing the data over the
Some other famous applications of IoMT are surgical robots,
Internet which can be accessed anywhere-anytime. Cloud
collection of vital signals such as pulse, blood pressure, SpO2
computing uses a distributed environment to offer services.
count and many more.
Cloud Computing has a lot of applications in the medical
V. CASE STUDIES sector as most computing services done by the medical sector
are done through cloud platforms.
Here we will be going to see some emerging technologies and
their application in the field of healthcare.

A. Application of AI in IoMT

The integration of AI with IoMT is offering the medical


sector many benefits and providing a large number of
applications to the medical personnel to diagnose the patient
more accurately [4].

Surgery using robots, maintaining and managing medical


records of patients, precision medicine, X-Rays, CT scans,
digital consulting, virtual nurses, drug creation, health
monitoring etc. all are the applications of AI in the medical
sector.
Fig. 5. Layers of Cloud Computing in IoMT [16]
Medicine is the most promising application area for AI as
researchers and developers have proposed and developed Cloud computing in IoMT has basically three layers which
many clinical decisions support systems. AI is also helping in are cloud layer, fog layer and sensing layer. The main role of
interpreting ECGs, diagnosing the diseases, choosing the sensing layer is to gather all the data of patient from the
appropriate treatment by backtracking patients’ history. sensors (devices) and the collected data is sent to the cloud
database for the storage using Wi-Fi or other network
AI has leveraged machine learning methods like supervised interface. The sensing layer is the bottom layer which
learning, neural networks and deep learning to account for provides the data of patients to the fog server through the
complex interactions and to identify patterns from the data. sensors and actuators over the internet. Then the fog layer
manages the data and sends it to the cloud layer through
gateways where the data is stored. In any emergency, the data
stored from the fog layer directly sends the message to the
hospital server for the requirement of the ambulance. The
data stored in the cloud layer is accessed by medical
personnel to examine the patient’s progress and its history
helps to diagnose the patient in real time.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 281


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Moreover, Fog computing plays an important role with IoT large amount of data is passed from one device to the other
devices for real time data processing. Fog Computing for the real time analysis and due to which data traffic occurs
generates various distributed nodes which reduce the traffic which sometimes slows down the particular medical device
and latency issues to provide computing and storing services resulting in waiting for the diagnosis of the patient by the
along with secure communication and higher Quality of medical personnel. In the case of RHM if the network latency
service. occurs there will be delay in the data sending of the patient to
the hospital and which leads to the delay in the treatment of
Edge computing and Mobile Cloud Computing (MCC) are the patient.
also important parts of IoMT. Using the edge computing
doctor can access the stored data of patients in real time. CONCLUSION
Medical staff do not need to send patients data to remote With the increasing awareness and consciousness
servers, by establishing an edge data center they can easily about the health of human beings, IoMT is also getting focus
process and store the patient’s data [18]. of human in their daily life for health monitoring. The
integration of various technologies with IoMT to improve the
The mobile cloud based IoMT system helps for quick quality of services to the patients, professionals and hospitals.
response to the change in physical signs of patients by giving With the increasing demand of IoMT, it also opens challenges
access to the clinical services over the Internet. The MCC like interoperability of various devices and communication
provides the tracks of medication and progression of medical technologies. Moreover, increased usage of sensors also
treatment [19] [22]. increases the power consumption for constant monitoring of
data. The data sensed by the sensors are analyzed by cloud
VI. CHALLENGES IN IOMT service providers where security and privacy of the patient
records need to be maintained. The security of patient data is
A. Interoperability the most critical area which demands focus. Many
Interoperability in medical means the ability to securely, researchers are working on the challenges of IoMT but doors
more cautiously and more efficiently transfer data and use the are still open for the researcher for wide adoption of IoMT.
information and instructions among all other connected
devices to work effectively. Lack of interoperability can REFERENCES
cause the increase in the cost as the devices, machines, [1] Vishnu, S., SR Jino Ramson, and R. Jegan. "Internet of medical things
software, applications etc. won't be able to communicate or (IoMT)-An overview." In 2020 5th international conference on
devices, circuits and systems (ICDCS), pp. 101-104. IEEE, 2020.
exchange the data properly among them.
[2] K. Patel, S. Vyas, V. Pandya and A. saiyed, "IoT: Leading Challenges,
B. Privacy and Security Issues and Explication Using Latest Technologies," 2019 3rd
International conference on Electronics, Communication and
One of the major challenges for IoMT is the data security Aerospace Technology (ICECA), 2019, pp. 757-762, doi:
and data privacy [17] [21] as in medical sector hospitals have 10.1109/ICECA.2019.8821970.
enormous amounts of health data and private information [3] Yeo, Kiat Seng, Mojy Curtis Chian, and Tony Chon Wee Ng. "Internet
regarding the patients in their databases. Due to the evolution of Things: Trends, challenges and applications." In 2014 International
Symposium on Integrated Circuits (ISIC), pp. 568-571. IEEE, 2014.
of the computer science and technology field, cyber-attacks
[4] Bohara, M.H., Patel, K., Saiyed, A., Ganatra, A. (2021). Adversarial
on IoMT such as flooding, replay attack, SQL injection, Artificial Intelligence Assistance for Secure 5G-Enabled IoT. In:
Ransomware, side-channel attack, man-in-the-middle attack, Tanwar, S. (eds) Blockchain for 5G-Enabled IoT. Springer, Cham.
eavesdropper, false data injection, etc. have increased and https://doi.org/10.1007/978-3-030-67490-8_13
due to which the privacy and security of the patient’s data are [5] Shehabat, Issa M., and Noor Al-Hussein. "Deploying Internet of
Things in Healthcare: Benefits, Requirements, Challenges and
at risk as hackers might hack the hospital’s server and misuse Applications." J. Commun. 13, no. 10 (2018): 574-580.
the patient’s data. IoMT sensors are very tiny in terms of [6] Dwivedi, Ruby, Divya Mehrotra, and Shaleen Chandra. "Potential of
computation power and memory due to which the existing Internet of Medical Things (IoMT) applications in building a smart
security protocols or encryption algorithms can not be used healthcare system: A systematic review." Journal of oral biology and
directly with the sensors. Many researchers have proposed craniofacial research (2021).
the security solutions based on machine learning using which [7] Lee, Yong Kyu. "Review of the Role of the Internet of Things (IoT) on
the Consumer Market: Focusing on Smart Tourism, Healthcare, and
the attack can be detected on the basis of their behavior. IoMT Retailing." In Examining the Socio-Technical Impact of Smart Cities.
uses the combination of cryptography, machine learning, and edited by Annansingh, Fenio, 180-198. Hershey, PA: IGI Global, 2021.
lightweight techniques for authentication and authorization. https://doi.org/10.4018/978-1-7998-5326-8.ch009
[8] Tian, Shuo, Wenbo Yang, Jehane Michael Le Grange, Peng Wang, Wei
C. Energy consumption Huang, and Zhewei Ye. "Smart healthcare: making medical care more
intelligent." Global Health Journal 3, no. 3 (2019): 62-65.
Energy consumption is the biggest challenge for IoMT as
[9] Razdan, Sahshanu, and Sachin Sharma. "Internet of Medical Things
almost all the medical devices, applications, machines work (IoMT): overview, emerging technologies, and case studies." IETE
with the help of either electrical energy or solar energy. For Technical Review (2021): 1-14.
the continuous monitoring of the patient, sensors are used and [10] Al-Dhaen, Fatema, Jiachen Hou, Nripendra P. Rana, and Vishanth
for the efficiency of the data, sensors containing devices are Weerakkody. "Advancing the Understanding of the Role of
connected to the energy sources all the time Responsible AI in the Continued Use of IoMT in Healthcare."
Information Systems Frontiers (2021): 1-20.
D. Network Latency [11] Patel, K., Ramoliya, D., Sorathia, K., Bhut, F. (2022). Comparative
Study of Blockchain-Based Voting Solutions. In: Raj, J.S., Shi, Y.,
Network Latency means the time taken by one data packet Pelusi, D., Balas, V.E. (eds) Intelligent Sustainable Systems. Lecture
to travel from the source place to the designated place. The Notes in Networks and Systems, vol 458. Springer, Singapore.
https://doi.org/10.1007/978-981-19-2894-9_51

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 282


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[12] S. Sudevan and M. Joseph, ―Internet of Things: Incorporation into Electrical Engineering, vol 875. Springer, Singapore.
Healthcare Monitoring, ‖ in 2019 4th MEC International Conference on https://doi.org/10.1007/978-981-19-0284-0_45.
Big Data and Smart City (ICBDSC), pp. 1-4, 2019. [18] Sun, Lanfang, Xin Jiang, Huixia Ren, and Yi Guo. "Edge-cloud
[13] M. Cornacchia, et al., ―A survey on activity detection and computing and artificial intelligence in internet of medical things:
classification using wearable sensors, ‖ IEEE Sensors Journal, vol. 17, architecture, technology and application." IEEE Access 8 (2020):
no. 2, pp. 386-403, 2017. 101079-101092.
[14] Nimra Dilawar, Muhammad Rizwan, Fahad Ahmad and Saima Akram, [19] Nguyen, Dinh C., Khoa D. Nguyen, and Pubudu N. Pathirana. "A
“Blockchain: Securing Internet of Medical Things (IoMT)” mobile cloud based iomt framework for automated health assessment
International Journal of Advanced Computer Science and Applications and management." In 2019 41st Annual International Conference of
(IJACSA), 10(1), 2019. the IEEE Engineering in Medicine and Biology Society (EMBC), pp.
http://dx.doi.org/10.14569/IJACSA.2019.0100110 6517-6520. IEEE, 2019.
[15] Kamruzzaman, Muhammad. “Architecture of Smart Health Care [20] S. Vasoya, N. Patel, D. Ramoliya and K. Patel, "Potentials of Machine
System Using Artificial Intelligence.” 2020 IEEE International Learning for Data analysis in IoT: A Detailed Survey," 2020 3rd
Conference on Multimedia & Expo Workshops (ICMEW) (2020): 1-6. International Conference on Intelligent Sustainable Systems (ICISS),
[16] Naresh, Vankamamidi Srinivasa, Suryateja S. Pericherla, Pilla Sita 2020, pp. 291-296, doi: 10.1109/ICISS49785.2020.9316074.
Rama Murty, and Reddi Sivaranjani. "Internet of Things in Healthcare: [21] Joby, P. P. "A Review on Data Securing Techniques using Internet of
Architecture, Applications, Challenges, and Solutions." Comput. Syst. Medical Things." Journal of Ubiquitous Computing and
Sci. Eng. 35, no. 6 (2020): 411-421. Communication Technologies 3, no. 3 (2021): 150-163.
[17] Pandya, V., Saiyed, A., Patel, K. (2022). Recent Advancement in Fine- [22] Raj, Jennifer S. "Optimized Mobile Edge Computing Framework for
Grained Access Control and Secure Data Sharing Scheme for IoT based Medical Sensor Network Nodes." Journal of Ubiquitous
Distributed Environment. In: Singh, P.K., Kolekar, M.H., Tanwar, S., Computing and Communication Technologies (UCCT) 3, no. 01
Wierzchoń, S.T., Bhatnagar, R.K. (eds) Emerging Technologies for (2021): 33-42.
Computing, Communication and Smart Cities. Lecture Notes in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 283


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Solar Tree based Smart City Street Light Control


System using IoT BLYNK Platform
S.Dhanasekaran P.Gomathi A.Renaldo maximus
Assistant Professor,Dept of ECE Assistant Professor,Dept of ECE Assistant Professor,Dept of ECE
Sri Eshwar College of Engineering Selvam College of Technology Government College of Engineering
Coimbatore, India Namakkal, India Tirunelveli, India
dhanselvaraj@gmail.com gomathipr16@gmail.com renaldo.ece@gmail.com

Thiyagarajan Krishnan B.Kannan


Assistant Professor,Dept of ECE Assistant Professor,Dept of ECE
PSG College of Technology Ramco Institute of Technology
Coimbatore, India Rajapalayam, India
krishthiyagu.rajan@gmail.com emailtokannanb@gmail.com

Abstract— Street lighting uses a lot of electricity around the lights from a distance while also taking the necessary
world. Street lights in most cities are only managed regularly measures to lower energy consumption through power
and the quality of service is very low. The worst levels will be conditioning and control. It is necessary to attach the street
caused by constraints on available resources, very limited light controller to the light pole. It consists of a
equipment instrumentation, inappropriate system operation,
microprocessor, a few sensors, and a wireless module. The
and poor network maintenance. The goal of the current
street light controller installed on the street light pole will
research is to build and develop a highly IoT-dependent smart
city based on ESP8266. Its main goal is to create a subway IoT pass the information between each street light and manage
system that contributes to the development of smart cities and the LED Street light according to the traffic flow. To
uses online cloud computing to solve real-time problems. monitor the system, data from street lighting controls can be
Thanks to the Internet of Things, street lighting and water wirelessly transmitted to the base station. The system can be
management are now two factors that are automatically controlled automatically or manually [2]. The control
managed in smart cities and rural areas. In our current work, system regulates the lighting's on and off times as well as its
we tend to focus more on using Internet of Things (IoT) devices brightness to suit the situation. The studied light sources on
to remotely control street lighting. IoT will allow access to real-
the side of a road or path that are lit or illuminated at
time street lighting data (on/off status) anytime, anywhere. IoT
specific times each night have several different names,
is nothing more than a network that uses software, sensors,
and connectivity to control and monitor data anytime, including street light, lamp post, street light, light standard,
anywhere. The central office can conduct observations from or light standard. Increased safety and accident prevention
anywhere. Data that is continuously stored in the cloud via are two important benefits of street. For the purpose of
BLYNK local servers and efficient client-server connections is increasing the business' efficiency and accuracy, an
visible to us in real time. Such automated systems will work automated system known as "Street Light Monitoring and
more efficiently than manual systems, saving manpower and Control" was developed. This paper outlines a novel,
increasing the accuracy of the system. Electricity prices workable method for designing street lighting control
continue to rise as more and more energy is wasted. Saving
systems. Additionally, the system has a client-server
energy is now absolutely necessary. To improve efficiency, a
architecture that enables users to connect directly with the
technology called street lighting monitoring to automatically
control street lighting was created. The main reason for the web-based application to control street lights from any area
work is to save energy. from a single location.

Keywords—Internet of thing (IoT), Street light, Light-


emitting diode (LED), Solar panel, Embedded C software

I. INTRODUCTION
One of the biggest energy costs in the city is street
lighting. Municipal street lighting costs can be reduced by as
much as 50% to 70% using smart street lighting systems.
Smart street lighting systems automatically classify
pedestrians, cyclists and vehicles and adjust light output
based on usage and occupancy [1]. The Smart Street
Lighting Program suggests setting up wireless devices to
monitor and regulate the real energy consumption of street Figure: 1 Diagram for Street Light Control System

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 284


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Numerous street lighting management systems can also be controlled automatically. Throughout this piece,
have been developed to monitor and manage the energy LEDs are employed (LEDs). The fundamental flaw of this
consumption of metropolitan Public Street lighting systems technology is the inability to alter the street lighting array.
[3]. It has a street light monitoring system as well as a single Only drive on Single Street.
light with a network operating protocol. Most types of lights In paper [7], A server, a graphical user interface
require hardware compatible with a specific protocol. The (GUI), and nodes, which are micro-control processing units
street light systems used today are not suitable. Most with built-in sensors that detect various parameters, make up
controls are manual, although some are automated the system. Each network node uses a protocol to establish a
depending on environmental factors. Location management connection to the master server. The sensor converts the
in remote areas is a big problem. Electricity is wasted due to received analog data into digital form, which is then
human error [4]. analyzed by the microcontroller and transmitted to the
server. The master is in command of each slave. The master
A. GOALS AND OBJECTIVES
node receives and collects data from other nodes and sends
Every city must have street lights to be considered
it to concentrators and servers, where it can be monitored
a smart city. The time when our street lights were on all day,
and processed to switch nodes on and off devices based on
though, was when we actually felt it. We can use this
fundamental changes. The system can also detect many
method to manage some street lights. We will try to use this
characteristics, such as outdoor temperature, fog, carbon
method to control street lights from a remote server.
dioxide emissions and noise levels, and recommend
Creating an efficient street lighting system was the main
remedial measures. Every street light requires a GSM
goal are, it requires a server that can be used to track all
modem to function, which automatically adds to the cost. It
street lights in the city and remote access is possible using
also includes some network issues.
low cost internet technology.
Each street light can be fitted with an infrared
B. PROJECT MOTIVATING FACTORS sensor for vehicle motion detection. There is a car passing
Build a smart lighting system that is cost-effective by and the lights are on. This can reduce power usage and
and self-regulating on the street while saving energy. help save some energy. It has a solar panel that allows
Develop a smart lighting system that saves energy by sunlight to charge it. However, this is problematic because
combining controls and sensors. By using a modular this sensor only turns on when a car passes by, but street
approach, you can create scalable and scalable smart lighting is useful for pedestrians crossing the road. It's also
lighting systems. Build intelligent lighting systems that are expensive since every street light requires an expensive
scalable and compatible with other commercial applications infrared sensor [8].The management and efficiency of the
and automation systems, going beyond simple lighting proposed street lamp remote control system can be
systems. improved [9]. This system uses Zigbee network. It has a
smaller range than a wireless network. Zigbee's range is
II. RELATED WORK extremely limited. Due to the small range of the ZigBee
Their goal is to track the monitoring back to the network, it is very expensive to use and has range issues as
control station and check the health of the streetlights. The it requires a lot of hardware in this article to control and
transmission module, microcontroller module and light monitor street lights.
dependent resistor (LDR) module are all inside the lamp The proposed system relies on solar energy. Street
module. The light modules will use Zigbee to wirelessly lighting is powered by solar energy during the day and runs
interact with the control station. Two LDRs are provided in out at night. The sensor automatically turns on throughout
the LDR module. To check the day/night status mode, the the night and turns off during the day. The street lighting
LDR is mounted on top of the street light. To monitor and switches to the RTC controller when the battery is low.
assess the health of the lights, another LDR is placed under There is not enough sun energy to charge the solar cells if
the street lights. After the microcontroller receives the signal the weather changes. Therefore, it will cause the street light
from the LDR, it processes the data and sends it to the to glow uncomfortably [10]. The goal of the study was to
transmission module. Wireless ZigBee in the develop innovative built-in technologies to save energy in
communication module transmits data wirelessly to the street lighting. The street lights currently operate on a
control center. The control center will track the condition of manual manner, turning on the night before sunset and
each street light and manage how the lights are used [5]. turning off the next morning once it is sufficiently light
In paper [6] is to build an innovative embedded system for outside [11]. The best moment to activate these lights,
energy efficient street lamps. Many people are so busy these though, is when it is completely dark. As a result, part of the
days that they don't even have time to turn off the lights power is wasted. The work provides a remedy for wasted
when they don't need it. The best ways to address electrical electricity [12]. Additionally, there is no longer any manual
waste can be found in this document. The lighting system lighting system control at all. The suggested system offers a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 285


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

means of lowering energy usage. In order to do this, them from remote locations. The suggested work includes a
vehicles are detected and approached using a combination of reset switch to allow for a manual reset of the entire unit. A.
IR transmitters and receivers. The sensor sends data to the Sathesh et al .[19] presented an ideal evaluation technique
microcontroller after detecting motion, which also causes that takes environmental criteria into account and can be
the light to turn on [13]. Likewise, the status (on/off) of utilised in future energy policy A decision tool is used to
street lighting can be accessed anytime and anywhere via evaluate lighting tenders and lighting designs while
the Internet. Once the vehicle or obstacle is moved aside, the analysing the significance of these criteria. The optimal
light will go out. The idea uses built-in smart technology to option reduces CO2 emissions and saves 75% of energy,
manage streetlights in response to detection of vehicles or according to simulation data.
other roadblocks. When an obstruction is detected on the
III. PROPOSED METHOD
street within the specified period, the light will
automatically switch on or off depending on the obstacle The system is designed to implement an efficient
detection, and the same information may be accessed online. street lighting control system. Connected together using
Users can access the real-time status (ON/OFF) of the street esp8266 sensors. As shown in Figure 1, the information and
light through the internet at any time and from any place. data collected by the sensors are passed to the nodemcu,
Today, road safety is significantly affected by which can pass the information to the Blynk application.
street lights. Street lighting uses a lot of electricity. The IOT system also has a BLYNK mechanism that allows
Therefore, it is important that we save as much energy as users to view street lights in all locations from a single
possible. Electricity prices continue to rise as more and location by directly interacting with the IOT Android app.
more energy is wasted. Saving energy is now absolutely When we need to turn the light on or off, the server can
necessary. A technology called streetlight monitoring that notify the IoT controller that the necessary action is
automatically controls streetlight switches was created to required. The IoT controller can receive the data, decode it
improve efficiency. In this work, a new street lighting and identify the specific light that will be set using the relay
control system is presented. The base server manages street circuit. After receiving the message, it overwrites the data
lighting only by sending messages using the wireless and uses the relay circuit to identify the corresponding light
network. Client-server applications make up the system. that needs to be turned on or off. The entire street lighting
Saving energy is the main reason for executing this work system is connected to the relay driver circuit. Figure 2
[14]. An elevated source of light on the edge of a road or contains a schematic diagram of the design system.
path that is turned on or illuminated at a certain time each
night is known as a street light, lamppost, street lamp, light
standard, or lamp standard. Two of the main advantages of
street lighting are the decrease in accidents and the
improvement in safety. Many street light management
systems have been developed to manage and reduce the
energy consumption of a town's public lighting system. To
manage a circuit of street lights or specific lights, for
example, these contain specific ballasts and network
operating protocols. These might involve high-frequency
transmission over the low voltage supply, wireless
communication, and sending and receiving instructions via Figure .2 Proposed block diagram
separate data networks. A wide range of protocols and
appropriate hardware have been developed for the majority A. Working Principle
of lighting kinds [15]. The Arduino receives the control signal from the
In order to transmit data efficiently for a variety of ESP8266 and uses it to turn the solenoid valve on and off.
applications, Ramalingam et al. proposed the Blynk IoT As shown in Figure 3, the ADC unit transfers the digital
server [16]. Using Blynk and a wireless sensor network, data it converts from the analog data to the "Nodemcu". The
Venkatramanan and Ramalingam created a smart Internet of NodeMCU (Node microcontroller unit) is an open-source
Things device for real-time applications. Data has been software and hardware development environment built
collected and sent to the cloud using this intelligent IoT around an inexpensive System-on-a-Chip (SoC) called the
device [17]. Based on this IoT hardware design, we create a ESP8266. The NodeMCU is available in various package
low-cost smart device for identifying missing people. P. K styles. Common to all the designs is the base ESP8266 core.
aruppusamy et al. [18] proposed IoT-based monitoring Designs based on the architecture have maintained the
systems allow users to examine the status of connected standard 30-pin layout and operates in 3.3v. The relay
electrical equipment from anywhere globally and control circuit is connected to street lighting. The microcontroller is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 286


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

connected to the relay circuit. This relay's primary function The device's purpose is to enable effective
is to change the state of the street light from off to on and operations while allowing human control of the machine and
vice versa. The street light has been controlled and sensor information feedback. The database stores and organizes
data sent to cloud via IoT using MQTT protocol. The data using specialized software. Information created during
microcontroller is connected to the IoT nodemcu device. It operation is also stored. The job of the communication
works in the BLYNK cloud environment. Android manager is to facilitate internal and external web server and
smartphones are equipped with the Blynk app. With Blynk embedded system communication. It is Wi-Fi compatible.
Cloud, the surroundings of the street lights are also An electric working switch is a relay circuit. The primary
monitored. The Blynk Cloud platform controls the on/off server, which manages the junction's whole record of street
status of street lights. lights, runs Java Web Applications. A server notifies a
controller to turn on or off a certain street light. After
receiving such data, the street light controller will decode it
and use a relay circuit to turn on or off a specific street light.
The relay driver circuit is connected to each individual street
light bulb.
B. Module Description

Figure 3. Circuit diagram for Street light control.

There are many more microcontrollers than the few that run
on any "version" of the "Arduino board family," but the
Arduino board family.
• offers a standard IDE that is incredibly easy to use;
• has comprehensive peripheral support, including third-
party support; and
• includes a huge number of sample applications to get you
started.
An automated system called "Street Light
Monitoring and Control" was created to increase the
company's efficiency and accuracy through automatically
timed, controlled street lighting. This idea provides a new,
economical approach to street lighting control systems.
Control circuits, internet and electrical equipment make up
the control system. The system also features a client-server
architecture that enables users to communicate directly with
web-based applications to monitor street lights remotely Figure.4. IoT communication flow diagram
from anywhere. A Java web application that manages all
street lights in a country, state or city will run on the Using sensing technology to make farms more
underlying server. When a street light needs to be turned on "smarter" and more closely connected through the practice
or off, the server will notify the street controller, which will of so-called "precision agriculture", often referred to as
then take the appropriate action. The street light controller "smart agriculture," is a way to solve agriculture-related
receives the information, decodes it, and then uses a relay problems and improve the quality and quantity of
circuit to identify the specific street light that will turn on or agriculture. We are developing a module for measuring soil
off. Once the message is received, the process will be moisture, temperature, humidity, rainfall frequency and light
repeated again. A relay driver circuit is connected to each intensity. It advises farmers on the best seeds through one
individual street light. An IoT that tracks all the street lights interface. The system's design includes a Wi-Fi module and
in the city will run on the base server. temperature, humidity, and humidity sensors. The software
is an Internet of Things (IoT) platform that allows setting

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 287


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

irrigation profiles based on seasons or daily and weekly


patterns. The program notifies the main module that the There are two approaches to set up the network
system is being turned on or off. between the hardware components and the cloud: either
All physical parameters are sensed by sensors that using MQTT agents and the MQTT protocol, or using an
convert their analog values into digital values. Humidity and HTTP module and the HTTP protocol. Due to the fact that
temperature sensors are used to estimate the humidity and MQTT is message-driven and HTTP is document-driven, it
temperature of the location. Capacitive soil moisture sensors is recommended over HTTP. IoT integration is all about
immersed in the soil are used to calculate the moisture APIs; applications use logical connectors to connect to and
content of the soil. Put together a module to get data from communicate with different IoT devices. The information
sensors in real time. After that, the IoT gateway receives this provided by the API allows these gadgets to send data to the
data. The IoT gateway then uses the Wi-Fi module to program and act as a data interface. They also allow your
transmit the data to the IoT platform (cloud). The cloud in program to take over the device and act as a functional
the system will contain a database. The database will interface. Both web-based and mobile applications can be
maintain the data received from the IoT gateway. Figure 1 is used to monitor data. These programs act as the user
a schematic diagram of the proposed system, which consists interface and display sensor data. These programs run on
of six modules, viz. Data acquisition from environment, portable devices, such as mobile phones, which have LCD
microcontroller assembly, network, cloud storage; IoT- screens to display data.
based interfaces and handheld devices.
B. Blynk IoT platform
C. Data from Environment Created an IoT based Android application for
The DHT11 measures humidity and temperature; street light control system. The proposed hardware
the sensors' readings are in percent and degrees Celsius, components use Wi-Fi gadgets to connect to the Internet
of Things. The Blynk IoT application server continuously
respectively. The LM393 light sensor measures light
monitors hardware output behavior and events. The
intensity in candela. Sensed data are transmitted to cloud Blynk Android app can monitor vibration levels and
storage using API authentication key. All sensor operating detection as notifications. IoT is used to control the street
voltage is 3.3v. The maximum current rating of DHT 11 light.
sensor is 0.3mA.
V. RESULT ANALYSIS
D. Microcontroller Table.1 shows the utilization of power for street light
The hardware component of the system, this
Load No.of Powe Total Use Energ
Microcontroller Assembly, controls how data is acquired
loads r (W) Power Hours y need
using the sensors that are built into it. The embedded Wi-Fi (W) (h) (Wh)
module in the microcontroller, which has a Wi-Fi range of Street 5 15 75 6 450
up to 300 metres and is used to communicate with cloud light
storage, aids in the dissemination of information throughout LED
the network. Lamp

IV. SYSTEM ARCHITCTURE The table 1 shows the utilization of power for street light.
The components with specification used in proposed system
A. Network and Cloud storage are listed in Table 2 below
The network is responsible of transferring the data Table.2 shows the hardware specification
to cloud storage, which uses the received sensor information
S.NO COMPONENTS TECHNICAL
is in the form of raw data—to analyse and execute SPECIFICATION
computations before displaying it on the IoT interface. 1 SOLAR PV 5KW, 12V DC
2 Wind model 12V
3 BATTERIES 12V-700Ah
4 Communication IoT module-ESP 8266
5 Proposed system WIFI network and IOT
mobile app
6 Converter DC-DC 12v
7 Controller Raspberry pi4,
8 Sensor DHT11voltage sensor
9 DHT 11 sensor 3 to 5V power and I/O,
2.5mA max current use
during conversion, no more
than 1 Hz sampling rate
Figure 5: AC712 circuit diagram

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 288


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 6. Implementation hardware for street light using IoT


Figure 6 depicts the proposed system's hardware
configuration. Solar panels use direct current to store solar
energy in batteries. As a result, we will use a DC light bulb
as our power source. For power, one end of the bulb is
connected to the battery. To read the current, the other
terminal is connected to the current sensor. Complex circuits Fig.7 BLYNK APP Output
are built on breadboards. It can also be used to construct Figure 7 depicts the results of the IoT-based street light
voltage dividers. Figure 9 graph shows the voltage sensor control system.
data of light which is sensed by the voltage sensor if the
sensed value is less than 50 then the LED should turn on
using MQTT protocol.
The monitoring data is stored separately in the
fields of the cloud. The individual graphs for each field are
displayed, as seen in Figs. 8 and 9. The battery voltage can
be monitored and visualized using Thinkspeak IoT platform.
The solar-powered led street lights turn on from twilight to
sunrise. The LED street light comes on automatically at
dusk and off at dawn. Figures 8 and 9 in the image above
show the street light's current output status and the voltage
of the solar panel that the LDR sensor senses. If the voltage Fig.8 Current output of street light
is less than 50, the LED should turn on. The battery voltage
value is displayed in third figure.9. Graphs highlight the key
message, strengthen the data's credibility, and give users a
condensed view of the information. For current, voltage,
power, and energy value with respect to date, graphs are
plotted. Anywhere in the world can access these graphs via
the internet

Fig.9 Solar panel battery voltage

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 289


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VI. CONCLUSION Street Lights Using IoT”, International conference on


applied and Theoretical Computing and Communication
Using the cloud-based IoT platform BLYNK, the Technology,2017.
proposed water level and street light control system was put [9]. M. Kokilavani, and A. Malathi, “Smart Street Lighting
into use. In this work, we designed a system to track water System using IoT”, International Journal of Advanced
flow for daily use by residents. The system is expected to Research in Applied Science and Technology, Vol.3, No.11,
2017.
use a Raspberry Pi as the main controller and a number of [10]. Parkash, Prabu V, and Dandu Rajendra, “Internet of Things
additional sensors to track water flow. Water boards often Based Intelligent Street Lighting System for Smart City”.
receive updates on water flow observations to help them International Journal of Innovative Research in Science,
gradually observe the effective availability of daily water Engineering and Technology, Vol. 5, No. 5, 2016, pp. 7685-
7691.
use. The main purpose of this article is to keep most of it. Its [11]. Kusumayogo, E.; Wibawa, U.; Suyono, H. Analisis Teknis
main purpose is to effectively protect the facility. Sensors Dan Ekonomis Penerapan Penerangan Jalan Umum Solar
are used to save energy without wasting any energy. Safe Cell Untuk Kebutuhan Penerangan Di Jalan Tol Darmo
street lighting calms car traffic. The research work Surabaya. J. Mhs. Tek. Elektro Univ. Brawijaya 2014, 2, 1–6
[12]. Soledad Escolar, JesúsCarretero, Maria-Cristina Marinescu
"Intelligent Smart Lighting System for Smart City Based on and Stefano Chessa “Estimating Energy Savings in Smart
IoT" can be the most practical, safe and cost-effective Street Lighting by Using an Adaptive Control System”
energy-saving solution. With this system, you can get International Journal of Distributed Sensor NetworksVolume
information about the status of the light at any time. The 2014, Article ID 971587
[13]. Somefun, Tobiloba & Awosope, Claudius & Abdulkareem,
DHT11 is a composite sensor with calibrated digital signal Ademola & Adeleye, Daniel & Somefun, Comfort. (2019).
output for temperature and humidity. It has strong Deployment Of Smart Street Lighting System Using
dependability and long-term stability. This solution Sensors. International Journal Of Electrical Engineering And
addresses the energy efficiency issues of conventional solar Technology. 10. 10.34218/Ijeet.10.4.2019.001.
[14]. Shichao, Chen & Xiong, Gang & Xu, Jia & Han,
cell systems. In future development, we need to deploy the Shuangshuang & Wang, Fei-Yue & Wang, Kun. (2018). The
system using LORA transceivers with IOT. Smart Street Lighting System Based on NB-IoT. 1196-1200.
10.1109/CAC.2018.8623281
[15]. S. Murugesan, S. Ramalingam, P. Kanimozhi, Theoretical
REFERENCES Modelling And Fabrication Of Smart Waste Management
[1]. Archana. G, Aishwarya N, Anitha J “Intelligent Street Light System For Clean Environment Using WSN And IoT,
System” International Journal of Recent Advances in Materials Today: Proceedings, Volume 45, Part 2, 2021,
Engineering & Technology, Vol-3, Issue-4, 2015. Pages 1908-1913,
[2]. Akshay Balachandran, Murali Siva, V. Parthasarathi, Surya [16]. S. Ramalingam, K. Baskaran and D. Kalaiarasan, "IoT
and Shriram K. Vasudevan “An Innovation in the Field of Enabled Smart Industrial Pollution Monitoring and Control
Street Lighting System with Cost and Energy Efficiency” System Using Raspberry Pi with BLYNK Server," 2019
Indian Journal of Science and Technology,Vol-8, August International Conference on Communication and Electronics
2015 Systems (ICCES), 2019, pp. 2030-2034, doi:
10.1109/ICCES45898.2019.9002430.
[3]. Fox, G.; Kamburugamuve, S.; Hartman, R. Architecture and
measured characteristics of a cloud based internet of things. [17]. Venkataramanan, C., Ramalingam, S., and Manikandan, A.
In Proceedings of the 2012 International Conference on ‘LWBA: Lévy-walk Bat Algorithm Based Data Prediction
Collaboration Technologies and Systems (CTS), Denver, for Precision Agriculture in Wireless Sensor Networks’. 1
CO, USA, 21–25 May 2012; pp. 6–12. Cloud Computing Jan. 2021 : 2891 – 2904.
(MCC’12), Helsinki, Finland, 13–17 August 2012; pp. 13– [18]. P., Karrupusamy. (2020). A Sensor based IoT Monitoring
16. System for Electrical Devices using Blynk framework.
[4]. Zaidi, S.; Imran, A.; McLernon, D.; Ghogho, M. Enabling Journal of Electronics and Informatics. 2. 182-187.
IoT empowered smart lighting solutions: A communication 10.36548/jei.2020.3.005.
theoretic perspective. In Proceedings of the 2014 IEEE [19]. Sathesh, A. "Assessment of Environmental and Energy
Wireless Communications and Networking Conference Performance Criteria for Street Lighting Tenders using
Workshops (WCNCW), Istanbul, Turkey, 6–9 April 2014; Decision Support System." Journal of Electronics and
pp. 140–144 Informatics 2, no. 2: 72-79.
[5]. DeepanshuKhandelwal, Bijo M Thomas, Kritika
Mehndiratta, Nitin Kumar “Sensor Based Automatic Street
Lighting system” International Journal of Education and
Science Research Review Volume-2, Issue-2 April- 2015.
[6]. Mohd. Saifuzzanman, and Nazmun Nessa Moon, Femaz
Narin Nur. “IoT Based Street Lighting and Traffic
Management System”. IEEE Region 10 Humanitarian
Technology Conference (R10-HTC), 2017.
[7]. R.Sarojini, G.Sheebha and S.Ramalingam,” IOT based
Smart City Water Management And Street Light Control
System Using Blynk Server”, Journal of Information and
Computational Science, Volume 9 Issue 7 - 2019
[8]. Lakshmana Phaneen manguluri, Yashwanth Sri Venkatesh
sorapalli, Lokesh kumar Nakkala, and Venkat Tallari,“Smart

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 290


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IoT and Image Processing based Smart Door


Locking System
B Jayaram1, D. Abdus Subhahan2, Sakthivel B3, T. A. Mohanaprakash4,
Sunita Joshi5, M Jogendra Kumar6
1
Department of Computer Science and Business Systems, RMK Engineering College, Kavaraipettai, Tamil
Nadu 601206, India. jayaramb05@gmail.com
2
Department of Computer Science Engineering, B V Raju Institute of Technology, Narsapur 502313,
Telengana, India. abdus777@gmail.com
3
Department of Electronics and Communication Engineering, Vivekanandha College of Engineering for
Women, Elayampalayam, Tiruchengode, Namakkal 637205, Tamil Nadu, India.
4
Department of Computer science and Engineering, Panimalar Engineering College, Chennai 600123,
Tamilnadu, India.
5
Department of Computer Applications, Manav Rachna International Institute of Research and Studies,
Faridabad 121004, Haryana, India.
6
Department of Computer Science and Engineering, Koneru Lakshmaiah education foundation,
Vaddeswaram,Andhra Pradesh, India.
Abstract— An effective home security system improves the traffic issue. The term IoT refers to physical items or groups
standard of living by making the home a safer place to live in of physical objects that connect and exchange data with other
general. In recent years, smart door locks have become devices and systems via the internet or other communication
increasingly popular as an integral component of home security networks [3]. Installation of a smart, personalized door lock
systems. Locking and unlocking a door with a smart door lock
system requires authentication. Unfortunately, several break-in
using IoT technology is just one way a smart house can
attempts have been made when the invader tried to bypass the improve its tenants' sense of security. It can be difficult for
locks. In this work, Internet of Things (IoT) and image the owner of a multifamily home or commercial complex to
processing can be used to strengthen the safety of Smart Door restrict access to authorized personnel if he has multiple keys
Lock systems. The camera is triggered after the motion detector for each unit, car, and gate. Even if the keys are misplaced,
has determined that a human has entered the area. The camera there are still safety concerns due to the high costs associated
picks up a clear picture of the visitor standing by the entrance. with key manufacturing, replication, and dissemination. This
Using image processing methods, the image is delivered to the study describes how smartphone communication technology,
microcontroller and compared with the registered users. A door image processing, and the IoT can be utilized to remotely
will open automatically if the person's face is in the database.
Otherwise, a notification and a photo of the person will be sent
unlock and shut doors via authentication. There are currently
to the user's mobile app via IoT. In the designed mobile app, digital door lock systems that use cameras, digital keypads
the user may view the individual's face and issue commands to for password authentication, fingerprint detection, smart
the system, such as opening and closing doors. Using the cards, and proximity or position detection. Smart locks
developed methodology, the safety of the house will be enable homeowners to lock and unlock their doors with or
increased, and unauthorized visitors will be prevented. without a physical key, regardless of where the guest is.
Access doors from anywhere using a smartphone or other
Keywords— Home Security, Sensor, Smart system, Internet Internet-connected device and a sensor given by an IoT-
of Things, Image processing. enabled smart lock [4]. A sensor, in the broadest definition,
is a device, module, or sub-system that detects motion or
changes in its surroundings and transmits the information to
I. INTRODUCTION
other electronics, primarily a computer processor.
People's quality of life will surely increase as the
world moves toward "smart cities." When addressing "smart" When it comes to smart home security, the door
cities and families, smart security and surveillance are also lock system is crucial, and the advice in the article [5] is the
important [1]. For every possible security application, an way to go. The door locks in a building may be controlled by
expensive, sophisticated, and bandwidth-hogging internet- the owner's smartphone via Bluetooth and an Arduino UNO,
based monitoring system is not required. While advanced, ensuring the safety of everyone inside. A user's credentials
existing closed-circuit television (CCTV) camera-based (username, password) are checked against a centralized
security and surveillance systems require human supervision database when they have installed an Android app on their
to achieve real-time capabilities and have a considerable device (tablet, smartphone, laptop, etc.). A buzzer will sound
energy footprint [2]. Furthermore, there will be other and SMS notification will be sent to the building owner if the
challenges related to smart cities, such as increased internet credentials are invalid, making the building more secure.
usage. This problem is caused by a variety of devices that Using other forms of wireless connection, this technology
require internet connectivity. It is critical to solving the issue might be expanded to encompass commercial applications
of real-time home security while also addressing the internet like ATMs, vending machines, and so on. In [6] A

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 291


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
biometrically authenticated, internet-connected, automated Many novel technical and conceptual solutions have been
door lock was created. Facial recognition technology restricts incorporated into the design, which collectively increases the
entry to authorized personnel only. Passcode-based access product's utility, practicality, and durability. The purpose of
and authentication system have also been implemented. The this [10] project is to develop a system for monitoring and
proposed door lock puts the convenience of its users first by controlling household appliances from mobile devices using
doing away with the necessity of using keys or RFID cards. the IoT in a hybrid (local and remote) fashion. As such, this
In addition to gathering information, an outward-facing project seeks to apply IoT -based design and manufacturing
alerting system is introduced. In their work [7], the authors methods to an existing smart house prototype to improve
suggest a voice-password and biometric-based security upon it. In this project, we showcase the planning and
system for automated door locks in the home. Instead of execution of a smart house equipped with a variety of
using a key or lock, a fingerprint scanner connected to a sensors and smart devices used in home automation, such as
mobile phone can be used to securely lock and unlock doors. smart fans, smart lights, smart doors, fire sprinklers, and so
Everyone who tries to get in will be recorded. The brains of on. To manage these intelligent gadgets and sensors, the
the business are Raspberry Pi 3 B+ computers. This voice- Cayenne IoT platform makes use of the MQTT protocol for
recognition job is done with the help of the program. In some data publication and subscription. To make this work, you'll
cases, a user's voice pass word and thumb impression can be need the NodeMCU-ESPS266 microcontroller, which has
used to unlock the door. Neither of these triggers will allow Wi-Fi built right in. NodeMCU inexpensive price and strong
the door to open; instead, a buzzer and/or SMS message will performance have contributed to its rise in popularity as a
be delivered to the appropriate individual. controller of choice.
Through the use of a smartphone app, the Blynk
cloud server, and an Arduino microcontroller, the study [8] The research tries to solve the insecurity in
demonstrates how to build a smart garage door system. The conventional door locking systems using IoT and image
Blynk cloud server, reachable via Wi-Fi or a 3G/4G network, processing. The recent studies on smart door locking system
also enables users to remotely access and manage the smart (Part I), Proposed system design architecture and working
garage door using this mobile app. This automated garage (Part II), Hardware and IoT platform requires to implement
door may be controlled by voice commands through Google the suggested system (Part III), Image processing technique
Assistant. Iterated and tested to ensure it can perform the to identify the person’s face (Part IV), Working of the
necessary core functions of a smart garage door system. This suggested system using Blynk app (Part V), and finally
study [9] investigates the development of a smart door concludes the system design with its merits (Part VI).
application for the IoT that is tailored to the needs of people
with disabilities, namely those who have trouble opening a II. PROPOSED SMART STICK DESIGN
standard front door. Disabled people and pandemics are The smart door locking system is designed by
given additional care. This ground-breaking program was joining hands with IoT and image processing. The system is
created with the tenets of universal design in mind. composed of input, output, and controller. The inputs used in
Everything is laid out, from the original idea for an this work are the camera and motion sensor. For opening and
innovative and sustainable design of the application itself to closing the door, the solenoid valve is used and it is not
the analysis of the needs of a wide range of potential users, possible to activate the solenoid valve by Arduino’s output
the various technical implementation possibilities (including voltage. To solve this issue the relay is connected between
all levels of communication, from proximity to the 5G the valve and controller.
network), and the analysis of the application's sustainability.

Fig. 1. Proposed smart door locking system architecture

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 292


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
The first step of the suggested system is to sense 2. A relay is a sort of electrical switch that can be
whether any human movements are present near the door or activated by passing a small current via its signal pin. While
not using a motion sensor. If the sensor activates, the camera the switch is turned off, the "NC" and "C" pins on the load
gets activated. The camera captures the human present near side are linked, but the "NO" and "C" pins are connected
the door. And the image is processed and matched with the when a modest current is passed through the signal pin. In
templates already given by users. If the face is registered the event of a power outage, one relay switches the circuit to
already, the relay activates and the door opens automatically battery backup, while the other two are used to manage the
using a solenoid valve. In case, a new person comes near the lock through the mobile app or captured image.
door, the camera captures the image and sends a notification
to the user via the Blynk app. The user will decide whether 3. Espressif Systems is in charge of assembling the
the door should be opened or closed. The architecture and ESP32. Aside from its utility, the system is also highly
working of the suggested system by flow chart are shown in robust [12]. This device is essential for online interaction
Figures 1 and 2. since it can be handled remotely from a user's smartphone
using a mobile app accessed via the cloud. When a user
launches the app, they are offered a view of the lock as it
currently stands next to the door. When the app sends a "1"
to the cloud, the cloud may transfer that information to the
ESP 32 through the internet, at which point the ESP 32 will
open the lock according to its predetermined programming.
When the button is pressed again, it sends a value, this time
"0," which the ESP-32 gets via the internet and uses to turn
off the relay and lock the door.

4. When the signal is received, the solenoid valve


mechanism pulls the iron rod and activates the lock by
transmitting electricity via the coil. A spring holds the lock
in place, so when the current is taken off, the lock returns to
its original position and locks the door.

5. When a person approaches a camera, the image


from the camera is relayed to an Arduino, which then does a
facial recognition comparison with the database. If the face
matches the one recorded by the user, the Arduino sends a
strong signal to the relay, which unlocks the lock several
times before closing it again. However, if the user does not
enter the face into the system, an error will be created. The
Arduino alerts the user if the door is open or closed after
getting instructions from the user in the Blynk app.

6. The platform for IoT [13] Blynk works with both


iOS and Android devices. It is Internet-ready and compatible
with a wide range of microcontrollers, including the
NodeMCU ESP8266, Arduino, Raspberry Pi, and ESP32. It
is divided into three major sections: Blynk is an app that can
be used to manage gadgets and display information in
widgets. The Blynk server is a cloud service that allows
Fig. 2. Proposed system working
mobile devices and IoT devices to interact with one another.
A device can efficiently transfer data received from a sensor
using the Blynk libraries so that it can be displayed on a
III. HARDWARE REQUIREMENTS AND IOT mobile application in a range of formats and with a range of
interfaces, like a push button, graphic formats, alerts, and
This section explains the physical components of the smart timekeeping. The Blynk app is designed specifically for a
door lock system as well as the IoT platform used in this smart door locking system and it is given in figure 3. The
study. Blynk app contains a video screen that shows the person’s
face, a button for giving commands like opening and closing
1. Six of the board's fourteen digital links can be the door, and lastly the notification icon for giving an alert
configured as PWM outputs, for a total of sixteen digital message to the user.
links. On the board, there are six analogue connections. An
ATmega328p microcontroller [11] is included on the PCB.
The proposed system is built around an Arduino board that
serves as the controller.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 293


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
1) Because the image is black and white, each
histogram will only have 256 values (0-255) to represent the
pixel intensities.
2) After that, a new, larger histogram is formed for
each newly established histogram. If the grids are 8x8, the
final histogram will have 16,384 positions. Finally, the
histogram represents the true properties of the image.
B. Face Recognition
Before the process is complete, a face must be
identified [15]. We need to create a face database for
automatic recognition. Each person gets many images taken
of them, from which differentiating features are classified
and stored on file indefinitely. Each face class's features are
compared to the features retrieved from each input image,
and the results are kept in a database. The person captured by
the camera is compared with the database.
V. RESULTS AND DISCUSSION
The smart door locking system is designed and its
working is discussed in this section. First, the registered user
is given the camera and checked the working of the
suggested system. The system automatically opens the door.
Next, the new user image is given to the camera. The camera
captures the image and sent the image data to the controller.
The image processing model deployed in the controller
analyses the image and identifies that the given user is not as
same as the registered image data. Next, the designed system
sends a notification to the user’s mobile app which is shown
in the right-side image of figure 4. Next, the working of the
mobile app is shown in the left side image of figure 4. This
image shows that the designed cloud app shows the
Fig. 3. Mobile app home app
information near the door, and it holds the button option for
opening and closing the door based on the user’s interest.
IV. IMAGE PROCESSING
Image processing is necessary to identify whether
the person is new or trustable. For that, the image is fed into
the camera as input. After that, the image is read and
converted to grayscale. The frontal face module of HAAR
Cascade is used to recognize any human faces in the image.
The Local Binary Patterns Histograms (LBPH) method [14]
is used to forecast the faces in the image. The processing
phase, which includes procedures such as face detection and
alignment, and the recognition phase, which includes
operations such as feature extraction and matching, are the
two main phases of facial recognition.
A. Face Detection
The main purpose of this stage is to detect and
position any human faces in the supplied image. Patches that
correspond to each face in the input image will be generated
as a result of this process. To create a facial recognition
system that is both reliable and easy to implement. The sizes
and angles of these spots can be normalized using a
technique known as "facial alignment." After detecting a
face, a human face patch is extracted from the image.
Following that, the face patch is converted into a vector by Fig. 4. IoT-based Mobile app working
utilizing either a specified set of coordinates or a series of VI. CONCLUSION
landmark points. The image captured in the preceding phase
is divided into many grids using the Grid X and Grid Y Now more than ever, it is crucial to have a safe and
parameters. The image can be used to generate the histogram secure home. The use of thick, difficult-to-break-into metal
as follows: locks does not guarantee safety, as people still face risks like

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 294


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
key loss and theft. In recent years, numerous innovations Facial Recognition. International Journal of Engineering Research
and. V9. 10.17577/IJERTV9IS030122.
have appeared to address the shortcomings of conventional
[15]. G. Singh and A. K. Goel, "Face Detection and Recognition System
door locking systems. These options not only aid in home using Digital Image Processing," 2020 2nd International Conference
security but also make it possible to unlock the door from on Innovative Mechanisms for Industry Applications (ICIMIA),
afar with the push of a button. The IoT is one technology that 2020, pp. 348-352, doi: 10.1109/ICIMIA48430.2020.9074838.
has made life simpler by addressing these sorts of issues. In
this work, we explore the integration of image processing
and the IoT to deliver a complete home security system. To
determine whether a user has proper authorization, an image
processing method is used. The image is communicated to
the mobile app using IoT technology if the individual is not
in the database, otherwise, the door will open. Both the
visitor's face and the door's locking mechanism can be
viewed and controlled on the user's mobile device.
REFERENCES
[1]. Anitha, A. “Home security system using internet of things” Materials
Science and Engineering Conference Series, vol. 263, no. 4, pp.
042026, 2017, doi:10.1088/1757-899X/263/4/042026
[2]. Keat, L. H., & Wen, C. C. “Smart Indoor Home Surveillance
Monitoring System Using Raspberry Pi”, JOIV: International Journal
on Informatics Visualization, vol. 2, pp. 299-308, 2018, doi:
10.30630/joiv.2.4-2.172
[3]. Kassem, Abdallah & Murr, Sami & Jamous, Georges & Saad, Elie &
Geagea, Marybelle. “A smart lock system using Wi-Fi security”, 3rd
International Conference on Advances in Computational Tools for
Engineering Applications (ACTEA), pp. 222-225, doi:
10.1109/ACTEA.2016.7560143.
[4]. Adiono, Trio & Fuada, Syifaul & Anindya, Sinantya & Purwanda,
Irfan & Yusuf, Maulana. “IoT-Enabled Door Lock System”,
International Journal of Advanced Computer Science and
Applications, vol. 10, 2019, doi: 10.14569/IJACSA.2019.0100556.
[5]. M. Shanthini, G. Vidya and R. Arun, "IoT Enhanced Smart Door
Locking System," 2020 Third International Conference on Smart
Systems and Inventive Technology (ICSSIT), 2020, pp. 92-96, doi:
10.1109/ICSSIT48917.2020.9214288.
[6]. A. Saroha, A. Gupta, A. Bhargava, A. K. Mandpura and H. Singh,
"Biometric Authentication Based Automated, Secure, and Smart IOT
Door Lock System," 2022 IEEE India Council International
Subsections Conference (INDISCON), 2022, pp. 1-5, doi:
10.1109/INDISCON54605.2022.9862840.
[7]. K. Umamaheswari and P. Mahitha, "Smart security system for door
access based on unique authentication," 2021 Fifth International
Conference on I-SMAC (IoT in Social, Mobile, Analytics, and
Cloud) (I-SMAC), 2021, pp. 1474-1477, doi: 10.1109/I-
SMAC52330.2021.9640855.
[8]. M. I. Mohamed Ariff, F. D. Mohamad Fadzir, N. I. Arshad, S.
Ahmad, K. A. Salleh, and J. A. Wahab, "Design and Development of
a smart garage door system," 2022 IEEE International IoT,
Electronics and Mechatronics Conference (IEMTRONICS), 2022, pp.
1-6, doi: 10.1109/IEMTRONICS55184.2022.9795768.
[9]. N. Bjelčić, M. Blažeković, and D. Švelec, "Smart door as a solution
for the independent life of people in need," 2021 44th International
Convention on Information, Communication and Electronic
Technology (MIPRO), 2021, pp. 513-518, doi:
10.23919/MIPRO52101.2021.9596848.
[10]. S. H. Tayef, M. M. Rahman and M. A. B. Sakib, "Design and
Implementation of IoT based Smart Home Automation System," 2021
24th International Conference on Computer and Information
Technology (ICCIT), 2021, pp. 1-5, doi:
10.1109/ICCIT54785.2021.9689809.
[11]. Louis, Leo. (2018). Working Principle of Arduino and Using it as a
Tool for Study and Research. International Journal of Control,
Automation, Communication, and Systems. 1.
10.5121/ijcacs.2016.1203.
[12]. Babiuch, Marek & Foltynek, Petr & Smutný, Pavel. (2019). Using the
ESP32 Microcontroller for Data Processing. 1-6.
10.1109/CarpathianCC.2019.8765944.
[13]. H. Durani, M. Sheth, M. Vaghasia and S. Kotech, "Smart Automated
Home Application using IoT with Blynk App," 2018 Second
International Conference on Inventive Communication and
Computational Technologies (ICICCT), 2018, pp. 393-397, doi:
10.1109/ICICCT.2018.8473224.
[14]. Bussa, Sudhir & Mani, Ananya & Bharuka, Shruti & Kaushik,
Sakshi. (2020). Smart Attendance System using OPENCV based on

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 295


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Smart Blind Stick for Visually Impaired People


using IoT
Rajanish Kumar Kaushal1, K. Tamilarasi2, P. Babu3, T. A. Mohanaprakash4,
S. E. Murthy5, M Jogendra Kumar6
1
Department of Electrical Engineering, Chandigarh University, Mohali 140413, Punjab, India.
rajnish.nitham@gmail.com
2
Department of Computer Science and Engineering, VIT University, Chennai 600127, Tamil Nadu, India.
3
Department of Information Technology, PSNA College of Engineering and Technology,
Dindigul 624622, Tamil Nadu, India.
4
Department of Computer Science and Engineering, Panimalar Engineering College, Chennai600123, Tamil
Nadu, India.
5
Department of Electrical and Electronics Engineering, Knowledge Institute of Technology,
Salem 637504, Tamil Nadu, India.
6
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation,
Vaddeswaram 522302, Andhra Pradesh, India.

Abstract— The existing assistive device used by the visually autonomy is essential for realizing one's potential and
impaired, a stick, is insufficient for allowing them to live achieving one's life goals. Those who are visually impaired,
independently. Getting from one place to another, whether on the other hand, need the assistance of others to complete
indoors or outside, is a huge issue for persons who are visually daily duties. When going out alone, people who are blind or
impaired. And the traffic conditions make their everyday
journeys more onerous. Consequences such as falling over
have considerable vision loss frequently insist on taking
stationary objects, relocating barriers, or missing a traffic light dangerous routes. Millions of people worldwide are blind or
can only be avoided if they maintain a constant state of visually impaired and will always require the aid of others.
vigilance. For the visually challenged, technology can solve The standard walking stick has been a well-known
these problems. The proposed method employs the Internet of component of blind people's navigation for many years, and
Things (IoT) paradigm to serve as a link between the visually it has been recovered with the addition of remote sensors
handicapped and their surroundings. An ultrasonic sensor may after much effort. Blind people have a tough time navigating
be used to scan the surroundings for possible obstacles, while an metropolitan surroundings using a traditional cane while
ESP32 camera collects the traffic signal image. An Artificial having high liver sensitivity. In many ways, an electronic
Neural Network (ANN) model is particularly tailored for the
task to detects the traffic signal. The speaker is permanently
device will make life easier for a blind person. The capacity
attached to the controller's output and can alert the user about to move around in an unknown environment poses
obstacles and traffic signals. The next step is to confirm considerable difficulties for the visually impaired and blind.
whether the person is roaming within the nearer area or not. If When walking outside the house, users of the white stick
the person is navigating a long distance away from the house, tend to stick to well-trodden trails. Furthermore, many
the system will send a text message to the registered mobile individuals are concerned that they will be powerless against
number. The suggested smart blind stick is both simple to use the constant flow of cars and other road users. As a result, it
and cost-effective due to the incorporation of several types of is suggested that alternative solutions to existing
sensors and modules with IoT. technological problems be provided. In this research, we
suggest designing and developing a smart stick for
Keywords— Blind stick, Cloud, Sensors, ESP32 Camera,
the visually handicapped to use for navigating in both public
ThingSpeak, Message.
and private environments. Several cutting-edge technological
solutions are used in this study to help blind individuals
I. INTRODUCTION navigate freely. The past research works done on designing
the smart blind stick are detailed below.
Even with normal eyesight, those who are visually
impaired are unable to detect even the smallest features. The author of article [1] suggests a solution that
Blind people cannot discriminate between things from 6 feet uses the IoT concept to act as a bridge between visually
distant and have a horizontal visual field of less than or equal impaired persons and their surroundings. A variety of
to 20 degrees with both eyes open. Those who are blind or sensors can detect abnormalities such as stairs, damp ground,
have other visual problems require assistive technology. 10% and other obstructions. This article discusses a functioning
of the visually impaired have no functional vision at all, prototype of a low-cost and simple-to-use smart blind stick.
according to. Walking in the street can be especially Furthermore, this technology allows concerned parties to be
dangerous for those with visual impairments since they have alerted of the user's current location. A software tool is also
difficulty detecting obstacles in their path. A sense of being created to assist the blind's friends and family with

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 296


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
setting the stick, such as adding or removing phone numbers and motors, and a mobile application. The recommended
to which alarm messages must be sent. It's equally as system [6] by the magazine is intended to be a time-saving
aggravating to lose the stick inside the house. This cure also solution to this challenge. Ultrasonic sensors are utilized in
resolves the problem. To make the blind stick more capable, this arrangement to detect possible threats, while infrared
the researcher [2] combined cutting-edge technologies such sensors help identify higher surfaces such as stairs. They also
as gadgets. This technology makes strolling sticks intelligent, use ISD1820 to send out verbal alerts in the event of a
and its varied applications include an on-foot stick indicator problem. In the event of an emergency, the user can press a
that emits a beeping noise if the user loses their stick, panic button to notify their designated emergency contacts.
allowing them to find their way home if they become The user's GPS location is relayed to the specified
disoriented. A vibration sensor warns them of impending emergency contact via SMS. They have created a smart blind
danger, and they may listen to the tour guide's instructions on stick for persons who are visually impaired with the hopes
their headphones wherever they go. To identify the blockage, that it would be a lightweight, portable, responsive, and cost-
the camera uses an ultrasonic sensor positioned on the staff. effective aid. The research work [7] is concerned with the
The image is sent to a microprocessor, which uses it to problem of the blind, who rely on walking sticks to get
identify the object and then delivers a spoken message over around. To assist these people, they created a "smart stick"
the Raspberry Pi's microphone. The precise position is that detects and alerts its user to potential hazards such as
determined by attaching a Global Positioning System (GPS). stairs, fire, and water. Ultrasonic sensors can detect a variety
The study [3] advises modifying ordinary sticks with an of items, including pits, walls, drainages, autos, individuals,
ultrasonic sensor, buzzer, and vibration motor to detect and others. He can use Bluetooth to remind the stick every
potential threats and notify the user. This stick will include a time he forgets it by speaking to it from his phone, and it will
GPS and GSM module to assist visually challenged people in respond with a voice that says something like "you forgot me
finding their way around in an emergency. Furthermore, RF here." Aside from these considerations, there is always the
wireless home automation that can be managed remotely has possibility of an accident occurring when they connect a
been integrated. This research focuses on the functioning and vibrating sensor to a source of vibrations that is substantially
design of the proposed smart stick. The author of article [4] stronger than usual. If the Arduino board's vibrator sensor
proposes adding an ultrasonic sensor into the blind stick to detects an accident at the previously specified frequency, a
assist the visually handicapped. After detecting impediments message will be sent to the user's friends and family via the
at a range of four meters, the infrared device is discarded, but GPS and GSM modules. The Smart shoe concept, which was
it is still effective for detecting objects at closer ranges in published in the journal [8], provides a permanent solution
front of visually impaired persons. The smart stick's built-in for blind persons to walk independently on motorways. The
buzzer allows the user to pinpoint its location through radio smart shoe allows the blind person to travel independently.
frequency transmission and reception. The smart stick has a The shoe will be furnished with a Microcontroller and a
vibration motor inside of it that gets activated whenever the multitude of sensors, thanks to the IoT technology. If the
device encounters an obstruction. The brains of this concept wearer approaches an obstruction while wearing the shoes,
are an Arduino UNO. The limb can identify any obstructions the shoe will emit a warning buzz. Smart glasses with built-
in the path of the user. In addition to being user-friendly and in sensors may recognize items across a broader range as part
responsive, the smart stick consumes little power, is of the IoT, enhancing productivity. The two-way
lightweight, and can be folded up for easy storage. communication between the smart shoe and the smart glasses
clears the user's path of any threats.
The author of article [5] proposes a walking stick
design to help the visually impaired go to and from work.
The proposed approach allows the blind to "talk" to their II. PROPOSED SYSTEM
surroundings by utilizing the IoT. This prototype, which is The proposed architecture for constructing a smart
usable even by the visually impaired of the middle class, blind stick is detailed in this section with the help of figure 1.
comprises an ESP8266, a power supply for the control board

Fig. 1. Proposed system architecture


The smart stick uses two advanced technologies like the person about the obstacles and the traffic signal. To
IoT and AI. The designed stick helps to detect and intimate detect the traffic signal correctly the ANN model is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 297


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
employed. If the person is out of the limit or far away from B. Controller
the house than the threshold kilometre the automatic message
Because NodeMCU is a mix of the Wi-Fi module
will send to the registered person’s mobile via GSM
and Arduino, it makes it simple to connect sensors to
technology. The message comprised the location name with
microcontrollers. We can control and supervise a wide range
latitude and longitude values. The IoT is used to store the
of gadgets wirelessly from anywhere on the planet by using a
ANN model for identifying the traffic signal and visualizing
Wi-Fi module. The open-source NodeMCU development
the obstacle distance. To detect the obstacle and location, the
board, which also includes a Wi-Fi transceiver, is built
three sensors like ultrasonic, GPS and ESP32 cam are used.
around the Esp8266 microprocessor. Here planned to
If any obstacles present or a red signal appeared on the road,
implement IoT and ANN in the smart blind stick, to achieve
the speaker fixed at the output side of the controller gives a
this NodeMCU is identified as the best option from the
voice notification.
literature survey.
C. Output devices
III. HARDWARE REQUIREMENTS The road sign is read and told to the visually
impaired person using the speaker. The first stage of Text to
The hardware required to build the smart blind stick
Speech is pre-processing, often known as normalization.
is detailed in this section. The hardware part is composed of
devices like input, controller, and output. Here, we'll tell the ESP32 camera to interpret the traffic sign
by converting it to text. After the text has been normalized, it
A. Input devices is time to convert it into phonemes or phonetic transcripts.
As the last step, phonemes must be synthesized into a
1) Ultrasonic sensors, like sonar and radar, assess a
human-sounding voice. This level can be attained in a variety
target's features by analyzing the echoes of sound waves.
of ways, including synthesizing basic sound frequencies and
Ultrasonic sensors detect things by emitting high-frequency
stacking them as phonemes, or simulating the human
sound waves and analyzing the returned signal [9]. Sensors
speaking process for various words and phrases. In blind
determine the distance to an obstacle by measuring the time
stick, the speaker is used to generate the speech.
it takes the signal to go there and back.
2) The ESP32-CAM development board features an
ESP32-S processor, an OV2640 camera, a microSD card IV. ARTIFICIAL INTELLIGENCE
slot, and a plethora of general-purpose input/output (GPIO) Many scientists have discovered fruitful ground for
ports. A small camera module powered by the widely their research in the subject of biology. The ANN is one such
available ESP32 microcontroller [10]. It includes an OV2640 technology that is based on the same principles as the human
camera, many GPIOs for connecting peripherals, and a brain and hence draws inspiration from biology. An ANN
microSD card for image storage. The camera is used to simulates the behavior of neurons in the brain by being built
capture the traffic signal. as a network of dendrites, nodes, synapses, and neurons
connected by arcs. Each arc is assigned a certain amount of
3) AI-Thinker invented and manufactured a mobile
weight. As inputs are provided, an activation function is used
communication modem known as the GSM. GSM is an
for these arcs to fine-tune the weights and generate the
acronym for "global system for mobile communication,". In
desired outputs. Simply explained, a neural network is a
1970, Bell Labs came up with the basic idea for GSM. It
computational model that implements machine learning.
dominates the mobile messaging market worldwide.
Using an ANN to accomplish perceptual and recognition
The GSM is an open, digital cellular technology that operates
tasks saves time [12]. To define the target inputs, the neural
on the 850MHz, 900MHz, 1800MHz, and 1900MHz
network takes advantage of the problem's non-linearity. In
frequency bands to provide smartphone and information
machine learning, neural networks play an important part in
services. This GSM is used to send messages to the user via
realizing a better categorization approach, and they are used
mobile phone.
in a wide range of scenarios [13]. An ANN is typically
4) Every 24 hours, the 24 satellites that comprise the composed of three separate layers:
GPS complete two rotations of the Earth [11]. These • The input layer contains the data that is fed into
satellites broadcast three bits of information: the satellite's the network. Because this is new information, it
identification number, the satellite's location in space, and may appear unsophisticated at first.
the time of transmission. These signals are picked up by the • The hidden layer's principal role is to convert data
GPS receiver and used to pinpoint the specific location. Here from the input layer into a format that the output
the GPS is used to locate the person, and send the location layer can understand. An ANN's underlying
details to the mobile, whenever the person is out of the structure may include one or more hidden levels.
limited surroundings. • The output layer processes input from the hidden
layer to produce the desired output.

In this work, the AI model is created with a single


input, three hidden and an output layer. The three colors of
the traffic signal are collected from google and given to the
model for training. The collected image is of different sizes,
so it is important to convert the images to the fixed size of
210*210. The number of neurons selected for the input layer

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 298


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
is 44100, and the number of neurons in the output layers is 3.
After training, the model is tested and it provides an
accuracy rate of 97.24%.

Fig. 3. Cloud working

The second goal of the work is to make sure


whether the person navigates in the particular surrounding. If
the person crosses the threshold limit from their house, then
the GPS is used to track their location. The GSM is used to
Fig. 2. ANN model for signal identification
send the location details to its respective family members or
friends via message. The working of GSM and GPS is tested
V. WIRELESS TECHNOLOGY
and the screenshot of the message is delivered to the person
To publish the observed data to the web via IoT, the which is shown in figure 4. The message gives the details
cloud service ThingSpeak is employed. If interested in like how long the person will be far away from the house.
collecting, visualizing, and analysing cloud-based data The latitude and longitude of the person's location are also
streams in real-time, ThingSpeak is an IoT analytics platform displayed.
solution we should look into. Using the web service Twilio, a
smart blind stick may upload data from its own devices to
ThingSpeak, visualize real-time data, and deliver alarms
[14,15]. The ESP32 module serves as the camera,
transmitting the picture it captures to the cloud via
NodeMCU and kicking off the speech processing in response
to sensor input. Through the use of ThingSpeak, can keep
tabs on all of this action remotely. All of this sensor data is
also possible to be available through the Telegram app and
the bot's application programming interface.

VI. RESULT AND DISCUSSION


The prototype of the smart blind stick is constructed
successfully with the required hardware and software. The
working of the smart stick is detailed in this section. The first
main goal is to detect the obstacle and read the traffic signal.
The ThingSpeak cloud is employed to visualize the observed
data. The screenshot of the ThingSpeak cloud is given in
figure 3. The first chart in the upper left of the figure shows
the obstacle distance from the visually impaired person. If
the obstacle shows a distance of zero, there is no obstacle
present in front of the person. The ultrasonic sensor used in
this work can able to detect the obstacle up to 3 meters. Then
if the obstacle is very nearer to the person, the speaker
present in the smart stick will notify the person through its
speech. Next, the three LEDs present in figure 3 show the
traffic signal. With the help of the ESP32 cam, the traffic
signal image is captured and sent to the cloud. The ANN
model already deployed in the cloud helps to identify the
traffic signal and its result is shown in the cloud with the
help of three LEDs. Each LED is used to notify the
corresponding traffic signal. After the signal identification,
the speaker also notifies the signal color to the person.
Fig. 4. Alert message to the registered mobile number

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 299


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
VII. CONCLUSION [12]. R. Lippmann, "An introduction to computing with neural nets,"
in IEEE ASSP Magazine, vol. 4, no. 2, pp. 4-22, Apr 1987, doi:
Modern technologies and discoveries are 10.1109/MASSP.1987.1165576.
overwhelming the world. Every region of the world is [13]. Jürgen Schmidhuber, “Deep learning in neural networks: An
accepting technology to increase their productivity and overview”, Elsevier, vol. 61, pp. 85-117, 2015, doi:
10.1016/j.neunet.2014.09.003
influence in recent years. In the case of a person suffering [14]. Nettikadan, David & Raj M S, Subodh, “Smart Community
from blindness, all visual information is lost. The inability to Monitoring System using Thingspeak IoT Plaform”, International
move around independently and freely has been a long- Journal of Applied Engineering Research, vol. 13, pp. 13402-13408,
suffering for the visually challenged and the blind 2018
[15]. Zohari, M. H., Bala, V., & Abd Ghafar, A. S, “Server monitoring
community. This study mainly seeks to provide a smart stick based on IoT using ThingSpeak”, Journal of Electrical Power and
used by visually impaired people to aid and develop a Electronic Systems, vol. 1, no. 2, 2019
comfortable and safe atmosphere for the blind population.
Two rapidly developing technologies, IoT and Neural
Network, formed the basis of the developed model.
Information about obstacles and traffic lights is gathered,
processed, and transmitted using the IoT. The NN is then
utilized to determine which color traffic signal it is. The
system has a speaker that will sound an alarm and describe
the obstacle and traffic light. After that, if the person is
outside of their home, the GPS and GSM are used to keep
track of them. The designed IoT-enabled smart stick
helps the visually impaired to navigate around more freely,
both indoors and outdoors.
REFERENCES
[1]. V. Kunta, C. Tuniki and U. Sairam, "Multi-Functional Blind Stick for
Visually Impaired People," 2020 5th International Conference on
Communication and Electronics Systems (ICCES), 2020, pp. 895-
899, doi: 10.1109/ICCES48766.2020.9137870.
[2]. T. S. Aravinth, "WiFi and Bluetooth based Smart Stick for Guiding
Blind People," 2020 3rd International Conference on Intelligent
Sustainable Systems (ICISS), 2020, pp. 317-320, doi:
10.1109/ICISS49785.2020.9316084.
[3]. V. Mohan Tiwari, M. Dheeraj and G. Yadav, "Design Of Smart
Walking Stick Combined With Home Automation For Blind
People," 2022 2nd International Conference on Advance Computing
and Innovative Technologies in Engineering (ICACITE), 2022, pp.
1895-1898, doi: 10.1109/ICACITE53722.2022.9823608.
[4]. N. Loganathan, K. Lakshmi, N. Chandrasekaran, S. R.
Cibisakaravarthi, R. H. Priyanga and K. H. Varthini, "Smart Stick for
Blind People," 2020 6th International Conference on Advanced
Computing and Communication Systems (ICACCS), 2020, pp. 65-67,
doi: 10.1109/ICACCS48705.2020.9074374.
[5]. S. Barathi Kanna, T. R. Ganesh Kumar, C. Niranjan, S. Prashanth, J.
Rolant Gini, and M. E. Harikumar, "Low-Cost Smart Navigation
System for the Blind," 2021 7th International Conference on
Advanced Computing and Communication Systems (ICACCS), 2021,
pp. 466-471, doi: 10.1109/ICACCS51430.2021.9442056.
[6]. P. Abhang, S. Rege, S. Kaushik, S. Akella and M. Parmar, "A Smart
Voice-Enabled Blind Stick with An Emergency Trigger," 2020 5th
International Conference on Computing, Communication and
Security (ICCCS), 2020, pp. 1-6, doi:
10.1109/ICCCS49678.2020.9277202.
[7]. C. Ramisetti et al., "An Ultrasonic Sensor-based blind stick analysis
with instant accident alert for Blind People," 2022 International
Conference on Computer Communication and Informatics (ICCCI),
2022, pp. 1-13, doi: 10.1109/ICCCI54379.2022.9740786.
[8]. T. Chava, A. T. Srinivas, A. L. Sai and V. Rachapudi, "IoT based
Smart Shoe for the Blind," 2021 6th International Conference on
Inventive Computation Technologies (ICICT), 2021, pp. 220-223,
doi: 10.1109/ICICT50816.2021.9358759.
[9]. Harish Kumar N, Deepak G, Nagaraja J, “An IoT based Obstacle
Detection and Alerting System in Vehicles using Ultrasonic Sensor”,
International Journal of Engineering Research & Technology
(IJERT), vol. 5, Issue 20, 2017, doi: 10.17577/IJERTCONV5IS20002
[10]. R B Salikhov, V Kh Abdrakhmanov, I N Safargalin, “Internet of
Things (IoT) Security Alarms on ESP32-CAM”, Journal of Physics:
Conference Series, vol. 2096, no. 1, pp. 012109, 2021, doi:
10.1088/1742-6596/2096/1/012109
[11]. Priyanka, Sonam & Dutta, Sandip & Chakraborty, Soubhik. “Human
Tracking System Based on GPS and IOT (Internet of Things)”, 2020,
doi: 10.1007/978-3-030-24643-3_61.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 300


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Implementation of a Smart Garbage Monitoring


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

System using GSM


B. Rubini S. Pradeep Kumar M.Suganiya
Department of Electrical and Electronics Department of Electrical and Electronics Department of Computing Technologies
Engineering Engineering SRM Institute of Science and Technology
Vels Institute of Science, Technology, and Vels Institute of Science, Technology and Chennai, India.
Advanced Studies Advanced Studies suganiya11@gmail.com
Chennai, India. Chennai, India.
rubini77@gmail.com pradeep88.se@velsuniv.ac.in
Abstract— Recent population crises have increased pollution situation, we can develop an advanced level of intelligent
in urban areas due to garbage overflow. Garbage collection has garbage systems. The internet allows communication between
recently become a significant issue in urban areas. However, devices, which provides information to municipal officials.
collecting and segregating garbage is a complicated process. The information must be obtained and transmitted by a sensor
Because of population growth, every individual, animal, and or transducer. Sensors are small devices installed anywhere.
bird should impact the environment. People use an excess of This work focused on further improving previous work[4]. To
polythene bags and medical and chemical waste outside complete the design, garbage overflow indicators, sensors,
dustbins; they are not properly disposing of their waste. Because GSM, app development, and an IoT platform must be
of the garbage system harms the environment, resulting in foul
developed[5].
odors and unsanitary conditions in people's surroundings. As a
result, the proposed system explains how to solve this problem III. SYSTEM ARCHITECTURE
using an intelligent dustbin monitoring system. On the top of the
dustbin, ultrasonic sensors are to be installed to measure the fill
level. When the dustbin overflows, the GSM modem is activated
and connected to an Arduino Uno board with an ultrasonic
sensor via a microcontroller-based platform. In this intelligent
dustbin, the threshold level is high. When this level reaches
ultrasonic sensors, activate, until the garbage collection dustbin
is empty GSM Modem is continuously alerted to the appropriate
authorities.

Keywords—Global System for Mobile, Ultrasonic Sensor,


Adriano Uno.

I. INTRODUCTION
Overflowing garbage cans and spilled garbage spread Fig. 1. Blog diagram of garbage system
disease throughout the community. Solid waste management
is a significant issue in urban areas, and garbage collection and IoT platforms can connect the most innovative processes
segregation must take up as much space as possible. It is more to the web for device-to-device interaction and user-to-user
difficult in urban areas to deposit such a large number of interaction. [6]Sensors convert physical and digital signals
segregation plants and works. Polluting the public and transmit them to the management center. In the garbage
environment is a significant concern for waste materials and bin cap, install an ultrasonic sensor for level detection; signals
food products. In today's world, some countries are are sent to Adriuno's controller circuit if garbage reaches that
implementing a zero-waste management system in all sectors level.[7] Adriuno set up a GSM connection to send signals to
to address this issue. This action should consider reducing the municipal office whenever the dustbin reached the margin
water scarcity in industries and managing soil and air pollution level. Buzzer to show the level indication alarm, website to
issues. To avoid the complications of garbage collection, this show the area of the dustbin which one has filled shows in
paper developed an intelligent garbage monitoring system. In updating position using IoT platform. System requirements
this proposed paper, garbage dustbin overflow sends signals are considered to be 3 ways.
to garbage collection trucks, the municipality office, and
office heads. The dustbin was overloaded as soon as the call A. Ultrasonic sensor
arrived, and clearing the overloaded dustbin was time- Sonar is used to compute the distance of objects. Sonar
consuming. also provides excellent non-contact range detection with
stable reading and high accuracy in a user-friendly package
II. LITERATURE REVIEW ranging from 2cm to 400cm.[8] This sensor classifies into two
Garbage problems breed more viruses, bacteria, insects, types: piezoelectric transducer or crystal, stimulated by a
and mosquitoes, among other things. [1]. These elements signal to produce a pulse, and electrostatic transducer, used in
contribute to a polluted environment. In[2], degradable and this chapter to produce a sonic impulse. It has two pins, one
bio-degradable waste is separated with PH sensors. To avoid for sending and one for receiving signals. The speed of sound
fire accidents inside the garbage bins, they use PH sensors to waves in the air is approximately 341 meters per second.
measure the PH value of garbage. This work emphasizes the Technical specifications are Power supply 5v DC supply,
importance of separating waste using a conveyer belt. [3]The current 15mA, and quiescent current <2mA, effective angle
dustbin's waste level must be detectable so an intelligent waste <15°, Ranging distance 2cm-400cm, resolution 0.3cm,
collection system in the IoT Platform can perform. This work measuring angle 30°. Estimation details are worked out using
uses Zigbee and GSM module communication. In the present codes c.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 301


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

over which it can communicate. This modem communication


is computing via USB, Serial, or Bluetooth. It is also
connected to the microcontroller via the MAX 232 port and
can send SMS alerts and transmit/receive data[12].

Fig. 2. Ultrasonic sensor

B. Arduino UNO Evaluation details


Arduino is an open-source electronics platform used to
create electronic studies[7]. Arduino develops both a physical
and a virtual component. Programmable circuit board or
Fig. 4. GSM network
microcontroller, as well as a software IDE (Integrated
Development Environment), installed on the computer. It is to
IV. HARDWARE IMPLEMENTATION
create and distribute computer code. The actual board intends
the creation of interactive works. Adruino's features are
several in-built functions that make programming
straightforward, easy to create and upload code to the physical
board, and Works on Linux, Windows, and Mac operating
systems. Arduino makes it into an IoT product by adding an
ESP8266 wifi module. Arduino IDE can be used with any
Arduino board and easily converted for IoT applications[9].

Fig. 5. Garbage system hardware fixed with dustbin [16]

The design model of the intelligent dustbin setup is shown


in fig.5.Whenever a dustbin gets overflows ultrasonic sensor
is fixed on top of the dustbin to detect the level of the dustbin
and connected to the GSM modem to alert the authorities.
A. Test Result
Fig. 3. Adriano Uno microcontroller

The datasheet for the ATmega328p-based


microcontroller board implements in this work. It has 14
digital pins (6 PWM outputs, six analog inputs, a ceramic 16
MHZ resonator, a USB connection, a power connector, an
ICSP header, and a reset button). It contains all the
components required to support the microcontroller; connect
it to a computer via a USB cable or power it on with an AC-
to-DC converter or battery to start. Arduino board designs
make use of a diverse set of microprocessors and controllers.
The panels connect with digital and analog input/output (I/O)
pins connected to various expansion boards (shields) and
other circuits. The boards include serial communications Fig. 6. Test setup
interfaces, including Universal Serial Bus (USB) on some
models, used to load programs from personal computers. A When motion is detected, the dustbin opens the lid using
play with UNO without worries and change the chip for a few a servo motor and a PIR sensor. The ultrasonic sensor collects
dollars without worrying about doing something data on the waste in the dustbin. The status is transferred to
wrong[10][11]. the municipal authority when the waste level exceeds a
certain threshold[13]. Limitations of this waste management
C. Web applications
consider public attitude toward waste management, waste
GSM modems are connected to other devices on the collection, need for more landfill areas, separation of waste
network. The network operator determines the network range

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 302


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

management, and method of dumpsites covering an only [7] A. Agarwal, K. Ray, B. K. Pradhan, and V. Kumari, “GSM Based
solution based on requirements is a challenging one in the Smart Digital Wireless Electronic Notice Board,” J. Inf. Technol. Digit.
World, vol. 4, no. 3, pp. 144–152, 2022.
environment[14][15].
[8] A. Nikam, N. Thakur, and S. Patil, “Intelligent Waste Collection
System,” vol. 4, no. 11, pp. 4–6, 2016.
V. DISCUSSION
[9] I. Hong, S. Park, B. Lee, J. Lee, D. Jeong, and S. Park, “IoT-Based
The Automatic Garbage Fill Alerting System aids in Smart Garbage System for Efficient Food Waste Management.
pollution reduction. The garbage bin is often overflowing, Scientific World Journal. http://doi.org/10.1155/2014/646953sed,”
and animals, dogs or cows, roam around or enter inside the Sci. World J., vol. 2014, no. 1, pp. 1–13, 2014.
dustbin. Some birds are also attempting to remove garbage [10] M. Saeed, M. Ahsan, M. H. Saeed, A. Mehmood, and S. El-Morsy,
“Assessment of Solid Waste Management Strategies Using an Efficient
from the trash can and this situation can be avoided Complex Fuzzy Hypersoft Set Algorithm Based on Entropy and
furthermore, the message can be delivered to the cleaning Similarity Measures,” IEEE Access, vol. 9, pp. 150700–150714, 2021.
vehicle rather than the contractor's office directly. Aside from [11] L. K. Sibanda, N. Obange, and F. O. Awuor, “Challenges of Solid
that, there is a distinction between dry and wet trash bins, Waste Management in Kisumu, Kenya,” Urban Forum, vol. 28, no. 4,
which collect plastic dry waste and biodegradable waste, pp. 387–402, 2017.
respectively. Methane and odor sensors have been [12] S. Shakya, “A Self Monitoring and Analyzing System for Solar Power
implemented to accomplish this and aid in separating waste Station using IoT and Data Mining Algorithms,” J. Soft Comput.
at the source, reducing the need for a workforce. Our Paradig., vol. 3, no. 2, pp. 96–109, 2021.
automated system is used to pick up waste in and also around [13] E. Kombiok, K. A. Nyamekye, R. Adjei, and L. Danquah,
“Determinants of Unsafe Plastic Waste Disposal among Households in
the bin, segregate it, and deposit it in appropriate bins. the Tamale Metropolitan Area, Ghana,” J. Environ. Public Health, vol.
2021, 2021.
VI. CONCLUSION
[14] G. Salvia et al., "The wicked problem of waste management: An
Real-time implementation of this garbage monitoring attention-based analysis of stakeholder behaviors," J. Clean. Prod., vol.
system is highly beneficial to maintaining a clean 326, no. December 2020, p. 129200, 2021.
environment. Manufacturing costs are low. Including a [15] R. Khan et al., “Machine Learning and IoT-Based Waste Management
Model,” Comput. Intell. Neurosci., vol. 2021, 2021.
weight, the sensor will increase the cost. When the dustbin
was filled, an SMS alert was sent to the area workers and [16] Pardini, Kellow, Joel JPC Rodrigues, Ousmane Diallo, Ashok Kumar
Das, Victor Hugo C. de Albuquerque, and Sergei A. Kozlov. "A smart
higher officials. An SMS was sent to area sweepers and waste management solution geared towards citizens." Sensors 20, no.
higher-ranking officials. This system also helps monitor and 8 (2020): 2380.
maintain fake reports, reducing corruption in the overall
management system. This record should keep track of the
total number of garbage collection vehicle trips, allowing for
a reduction in overall garbage collection costs. The need for
more concentration in separating waste-management systems
is a significant issue in resolving the separation.
REFERENCES
[1] M. K. A, N. Rao, and P. S. B, “Smart Dustbin-An Efficient Garbage
Monitoring System,” Rev. Int. J. Eng. Sci. Comput., vol. 6, no. 6, pp.
7113–7116, 2016.
[2] D. C. Wilson and C. A. Velis, “Waste management - Still a global
challenge in the 21st century: An evidence-based call for action,”
Waste Manag. Res., vol. 33, no. 12, pp. 1049–1051, 2015.
[3] M. S, D. G, C. B, and D. D, “IoT Based Monitoring and Control System
using Sensors,” J. ISMAC, vol. 2, no. 2, pp. 111–120, 2021.
[4] M. S. Singh, K. M. Singh, R. K. Ranjeet, and K. K. Shukla, “Smart Bin
Implementation for Smart City,” Ijarcce, vol. 6, no. 4, pp. 765–769,
2017.
[5] M. J. Zapata Campos and P. Zapata, “Switching Managua on!
Connecting informal settlements to the formal city through household
waste collection,” Environ. Urban., vol. 25, no. 1, pp. 225–242, 2013.
[6] C. Engineering et al., “Gsm Based Garbage and Waste Collection Bin
Overflow,” Ijariie, vol. 3, no. 2, pp. 2235–2240, 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 303


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Android based Integrated Parking System for


Real-Time Parking
RAJI C.G.
ADIL BIN ABOOBACKER
Department of Computer Science Computer Science & Engineering,
Assumption Autonomous College, MEA Engineering College,
Changanacheri, Kottayam, Kerala Perinthalmanna, Kerala
rajicg80@gmail.com amadil1820@gmail.com

ANFAS MUHAMMAD JAMSHIDHA K


Computer Science & Engineering, Computer Science & Engineering,
MEA Engineering College, MEA Engineering College,
Perinthalmanna, Kerala Perinthalmanna, Kerala
anfasporora@gmail.com jamshidha2000@gmail.com

JISHANA SHEMEEM
Computer Science & Engineering,
MEA Engineering College,
Perinthalmanna, Kerala
jishanashemeem@gmail.com

Abstract— The lack of parking spaces is getting worse as the Parking is quickly becoming one of the most serious
number of vehicles on the road rises daily. Finding a
issues currently facing cities, and it is becoming cost-
parking spot can be difficult, especially in big cities or places
where athletic or cultural events are planned. An integrated prohibitive. As a result, Parking is scarce in major cities
parking system is suggested as a solution to this problem. worldwide, including universities and tourist attractions.
Despite the fact that there has been a tonne of research on Finding a parking space during big events, for example, can
the creation of smart parking systems, much of it does not be difficult. Commuters waste time and fuel having a look
deal with the problem of in-the-moment detection of for open parking areas. For drivers, finding a parking place
incorrect parking and automatic collection of parking fees. in a parking area can be extremely frustrating. This
The proposed system combined a real-time parking frustration can occur when parking places are difficult to
reservation system with a smart payment method for the locate or when another driver takes the parking place before
beneficial to the society.
they would reach it. The ability for customers to schedule
Keywords— Slot reservation, QR scanning, online convenient spots and prepay fees was the integrated parking
payment, automatic barricade. system's primary design goal. Through the same app, also
provide space booking at the parking zone.
I. INTRODUCTION
II. REVIEW OF EXISTING SYSTEMS
As the population and economy grow, so does the
number of vehicles on the road. Vehicles cruising for
parking are estimated to account for more than 40% of Students from Siddaganga Institute of Technology in
total traffic density in metropolitan regions. Tumakuru, India, Abhijeet Anand, Abhinav Kumar, A N
Continuously cruising in a specific area, causes traffic Mukunda Rao, Anupam Ankesh, and Ankur Raj suggested a
congestion and air pollution. An integrated parking Smart Parking System (S-Park) in 2020 [1]. Under this
system, in this case, resolves these issues by approach, the driver must first register at the building's
intelligently utilizing the parking station. The majority entrance gate. The driver receives a one-time registration
of smart parking systems proposed in recent years in the card, and the registration data is stored in the Raspberry Pi
literature provide solutions for the layout of parking database (RFID Card). To check the availability of parking
space data systems, car park booking services, spots in various parking zones, use the website or the
accommodation management and prevention of parking Android app. Using the admin login for the website, the
spaces, real-time transportation within the parking operator makes a parking space reservation.
space, and so on. Even so, very few efforts have focused
on real-time and automatic detection of parking
illegally.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 304
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Based on the driver's preferred parking location, a III. PROPOSED SYSTEM


one-time customized parking token (RFID tag) is
provided. The driver may utilize SPARK to navigate to
The proposed system is made up of three distinct
the proper parking area using Google Maps (Android
modules. These are Admin module, User module, Location
App). Unauthorized parking is prevented by opening the
Manager module, and lastly the Payment Gateway and
parking area barriers with the parking token provided at
automatic barricade system as shown in Fig. 1. Here Admin
the entrance gate. Finally, you return the parking token
and Manager modules are developed as web applications
to the entrance gate when you exit the building. Using
and user modules as android applications.
wireless sensor technology and networks, Robin Grodi,
Danda B. Rawat, and Fernando Rios-Gutierrez
suggested a smart parking system in 2016 [2]. Parking A. Admin
space statuses (occupied or vacant) are detected and If the administrator's username and password are both
transmitted to a database using a wireless sensor genuine, they will allow them to view the registered users.
network (WSN). Users can access this data via a The administrator can then approve the registered locations
website or a mobile app to get real-time updates and view the locations that were declined or blocked.
(application). While the WSN allows for flexible sensor Additionally, the administrator has access to user concerns
location, this system should give customers almost rapid and can respond to them.
information on parking space availability. If smart
parking is successfully implemented, the time and
money costs of traffic bottlenecks, wasted petrol, and B. User
time spent looking for parking spaces due to inefficient In this system, as soon as the user inputs his user ID and
parking would be significantly reduced. password, the software checks the user login information
In order to cut down on the time spent looking for against the database. If it is accurate, it then downloads all
parking, Y. Rahayu and F.N. Mustapa proposed a of the user's information and stores it in a global variable.
Secure Parking System based on Short Message The customer can then choose a parking space and confirm
Services (SMS) in 2014 [3]. By sending an SMS, the it by making a payment. They can read the administrator's
user of this system may quickly reserve a parking space. responses and file complaints, if necessary.
A micro-RTU, a wireless communication device,
manages the SMS (Remote Terminal Unit). This micro- C. Manager
RTU provides the user with a booking confirmation and
reservation information, including a password and spot If the admin enters a valid login and password for
number. The provided password is required to enter the Location Manager, they will be able to view the registered
parking area and is only valid for a short period of time. users. They can add parking spaces, check the status of such
This method's main flaw is that it prevents consumers spaces, approve bookings, and see the progress of those
from choosing a place. Consequently, it is not a user- bookings. They can also examine responses from admin and
friendly solution. An Automated Parking System with other users to complaints.
Bluetooth Access was suggested in 2012 by H. Singh,
C. Anand, V. Kumar, and A. Sharma [4]. When
Bluetooth is used in a parking system, security is
increased and an autonomous system is provided,
eliminating the need for manual intervention. A
Bluetooth reader is a feature of this parking system that
enables user authorization and identification. Users
must turn on their mobile Bluetooth in this mode in
order to sign up and identify themselves [5].
Bluetooth must be restarted when the session is
over [6]. Through the use of an ARM microprocessor,
which controls the mechanical engines to park the
vehicle in the proper parking area, the space
management and automation are carried out. The
advantage of a Bluetooth-enabled automatic parking
system is that paper payments are no longer necessary
[7]. The system's 10-meter range is its primary
shortcoming.
Fig. 1. Block Diagram

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 305


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

D. Payment Gateway
The technology known as a payment gateway is After approval the QR will generate at the user
what collects and sends payment information from the interface which will define the details of booking. At
customer to the acquirer before sending the payment exit/entry point there will be an automatic barricade system
acceptance or decline back to the customer. A payment with respect to Quick Response scanner. By showing the
gateway securely verifies the card information of the QR to the scanner the barricade will open automatically.
customer, confirms that the funds are available, and Location manager can supervise the reservation manually.
eventually permits businesses to receive payment. At exit point with the help of same QR scanner by scanning
Between a merchant's website and its acquirer, it serves user will come to know whether time period exceeds. If it
as an interface. It secures the transmission of sensitive exceeds then the user is supposed to pay the remaining to
credit card information from the customer to the open the barricade or if we exit before the reserved time, the
acquiring bank via the merchant. balance amount will get refund to our account.

E. Automatic Barricade
In order to provide smooth entrance and leave, an
automated gate system normally comprises of a
combination of automatic barriers and bollards
connected to a vehicle access control system.

IV. IMPLEMENTATION

The Android App and Website were created with


the primary goal of providing information on available
parking spaces in various parking zones. The app is
developed with Android Studio and Java, while the Fig. 3. Website
website is built with HTML and CSS [8].

Through web app, the admin can add the managers for
particular zones and also can view the details of managers
and the registered users. The administrator can then approve
the registered locations and see the locations that were
declined or banned. Both managers and admins have access
to the complaints made by users and can respond to them.

Fig. 2. Android App

Through the user mobile app, user can login by


entering their username and password and they can pre- Fig. 4. Admin Interface
book the respective slots for particular time period by
selecting the view space option on the side bar. After
choosing the slot and the time, the payment request will The manager may add parking spaces, view parking
be sent. Once payment is succeeded, booking will be slot status, authorize bookings, and view booking status
approved by the admin. User can check the booking through the same website using his login information.
status on view booking tab. They may read the Additionally, they have the ability to email customer service
administrator's responses and file complaints, if complaints and observe user responses.
necessary.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 306


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

E. Bootstrap
Bootstrap is a free and open-source front-end
programming framework for creating websites and online
apps. The Bootstrap framework simplifies the creation of
responsive, mobile-first websites and apps by utilizing
HTML, CSS, and JavaScript (JS) [14].

F. Java
Java is an object-oriented programming language and
software platform that is used on billions of devices,
including notebook computers, mobile devices, game
consoles, medical devices, and more. Java's ideas and
Fig 5. Manager Interface
grammar are based on the C and C++ computer languages.

V. TOOLS AND TECHNOLOGIES


G. MySQL
MySQL is a relational database management system
In this system, we used python language, Flask as (RDBMS) created by Oracle that is based on structured
framework and tool as PyCharm for the backend query language (SQL).
development of the website. For frontend development,
we used bootstrap, HTML, CSS, and JavaScript [9]. For
Android development, we used Java, XML, and the H. Adobe Photoshop
tool android studio. And for database creation, we used For raster image manipulation, graphic design, and
MySQL and SQL Yog. Adobe Photoshop is used for UI digital art, Adobe Photoshop is frequently used. Layering is
design [10]. used to provide the design and editing processes depth and
flexibility, as well as powerful editing tools that, when used
together, can do practically anything.
A. Python
Python is an interpreted, dynamic, high-level
programming language that is free and open source. It is VI. RESULTS
compatible with both object-oriented and procedural
programming [11]. The system displays the views formed and the
outcomes of the Integrated Parking System as the
framework is continuously implemented. To show this task,
B. Flask
we log in to the android app “Parkify.in” and reserve our
Flask is a simple and lightweight Python web convenient parking slot. Through the view space option, As
framework provides handy tools and functionalities for illustrated in fig, we can check the availability of vacancies
constructing Python online applications. It provides and select our slot. The colors green and red indicate vacant
developers with flexibility and is a more accessible and occupied parking slots, respectively as shown in Fig. 6.
framework for new developers because it allows you to
easily build a web application using only a single
Python file [12].

C. PyCharm
An excellent environment for Python, web, and data
science development is provided by PyCharm, a Python
Integrated Development Environment (IDE), which
offers a variety of crucial tools for Python developers
that are closely integrated [13].

D. Quick Response
A Quick Response (QR) code is a type of barcode
that can be swiftly scanned by a digital device that
encodes information as a sequence of pixels in a square- Fig. 6. Slots view
shaped grid. The user interface will produce the QR
code after the reservation.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 307


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Then the payment request will be sent. Once A. Comparison with Existing Systems
payment is succeeded, the booking will be approved by
the manager. And we can check the booking status on Table 1. Comparison Table
the view Booking option. If our booking is completed, Paym
Rese Space
Methodol ent
the status will be "approved". For check-in, we can click Paper rvati manag
ogy Gatew
the blue arrow mark and can scan the QR code on ement
ay
displayed on the barricade. So the status will be Yan et al.
changed to "check-in" which is shown in Fig. 7. Finally RFID tag No Yes No
[1]
when we checkout, the above same process should be Abhinay Micro
No No No
repeated. We should scan the same QR code and the Kumar [2] RTU
status will be changed to "checkout". ARM
Lee et al.
Microcont No No No
[3]
roller
Wireless
Abu et al.
sensor No Yes No
[4]
network
ARM
Proposed
microcont Yes Yes Yes
System
roller, QR

The proposed system rectified all the limitations of existing


system by providing reservation, space management and
payment option which is shown in Table 1.

CONCLUSION

In the proposed system, an integrated parking system


prototype is presented that offers a new parking
management solution for a variety of parking facility sites
around the city, including malls, theatres, and other
Fig. 7. Booking Status locations. Drivers may learn about the availability of
parking spaces and book a space using a web-based
application. Additionally, by providing the motorist with
Then at the entry point of the parking space, convenient payment options, it enables the automated
while the user trying to check-in, the location manager collection of parking costs. This can reduce traffic
clicks on the Scan QR button present on the view congestion in cities like Mumbai while also saving user’s
booking panel of his interface. Hence the QR code is time and gas. In contrast to conventional parking tactics, this
generated for the specific user. By scanning this QR technology limits the driver's exertion in parking areas and
which is generated by the manager, the barricade will may reduce manual involvement in parking areas. People
open automatically. At the exit point when scanning the can use this application to address major parking concerns.
same QR, if we exit before the reserved time, the
balance amount of the parking charge will be refunded
to our account. If we exit after exceeding the reserved REFERENCES
time limit, we should pay the extra charge for that time
which is shown in Fig. 8. [1] G. Yan, W. Yang and S. Olariu, “Smartparking: A secure and
intelligent parking system,” in Intelligent Transportation Systems
Magazine, IEEE, vol. 3, no. 1, pp. 18–30, 2011.
[2] M. R. Abhinav Kumar, Ankur Raj, “Smart parking system (s-park) – a
novel application to provide real-time parking solution,” in IEEE,2020.
[3]S. Lee, D. Yoon, “Intelligent parking loot application using wireless
sensor networks,” in International Symposium on Collaborative
Technologies and Systems, PP. 45-57, 19-23 May 2008.
[4] Abu Asaduzzaman, Kishore K. Chidella, “A time and efficient parking
system using zigbee protocol,” in Proceedings of the IEEE Southeast Con
2015, April 9 - 12, 2015 - Fort Lauderdale, Florida.
[5] Robin Grodi and F. Rios-Gutierrez, “Smart parking: Parking occupancy
monitoring and visualization system for smart cities,” in Proceedings of the
Fig. 8. Automatic barricade IEEE SoutheastCon, 2015.
[6] Y. Rahayu, “A secure parking system using gsm technology,” in
International Journal of Future Computer and Communication, vol. 3, pp.
377-395, 2014.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 308
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[7] P. Tooraj Rajabioun, Brandon Foster, “Intelligent parking assist,”


in 1stMediter-ranean Conference on Control and Automation, Greece,
June 2013.
[8] C. S. H. Zhao, L. Lu and Y. Wu, “Ipark: Location-aware based
intelligent parking guidance over infrastructureless vanets,” in
International Journal of Distributed Sensor Networks, vol. 2012, 2012.
[9] Raji C G, Ayman Gafoor, Hijaaz Ahmed, Cijaz, Aneesh, WeGo:
An Efficient Travel Assistant Application using Android, ISMAC'20:
IEEE Third International Conference on IoT in Social, Mobile,
Analytics and Cloud, 7-9 October 2020 .
[10] Raji C.G, Vin ish Alikkal, Amrutha K. Drusya K. Munawara A.
Sarthaja, Brand Quality Detection Based on a Comparative Analysis
Lecture Notes in Networks and Systems, Springer 10.1007/978-981-
16-0666-3 4 7, 2021
[11] V. K. A. S. H. Singh, C. Anand, “Automated parking system
with bluetooth access,” in International Journal of Engineering and
Computer Science, vol. 5, pp. 275-315, 2012.
[12] P. Sadhukhan, “An iot-based e-parking system for smart cities,”
in International Conference on Advances in Computing,
Communications and Informatics (ICACCI) 2017.
[13] Kamel, Khaled, S. Smys, and Abul Bashar. "Tenancy Status
Identification of Parking Slots Using Mobile Net Binary Classifier."
Journal of Artificial Intelligence 2, no. 03 (2020): 146-154.
[14] Vivekanadam, B. "Smart Parking with Fair Selection and
Imposing Higher Privacy Constraints in Parking Owner and Driver
Information. "IRO Journal on Sustainable Wireless Systems 3, no. 1
(2021 ): 11-20.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 309


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IoT-based Automatic Manhole Observant for


Sewage Worker’s Safety
Rakesh Dronavalli Kalpana Seelam* Parthive Maganti*
Student, Dept. of EIE, Asst. Prof., Dept. of EIE, Student, Dept. of EIE,
V R Siddhartha Engg. College, V R Siddhartha Engg. College, V R Siddhartha Engg. College,
Vijayawada Vijayawada Vijayawada
rakeshdronavalli2000@gmail.com kalpanaseelam@gmail.com parthivemaganti@gmail.com

Jasmitha Gowineni Sai Deepthi Challamalla


Student, Dept. of EIE, Student, Dept. of EIE,
V R Siddhartha Engg. College, V R Siddhartha Engg. College,
Vijayawada Vijayawada
208w1a1079@vrsec.ac.in 208w1a1071@vrsec.ac.in

Abstract—With the rise in population growth in cities solve these problems we are going to fix system that can
IoT devices are being used in this automated world. update the condition of manhole which measure the
With increased population destruction, the temperature, humidity, harmful gases through sensors
probability of accidents increases due to improper inside the manhole and trace out position of the manhole
infrastructure of roads, drainage systems, and and send messages to manhole authorities. This project
manhole blocks. The proper manhole system should will implement using IoT applications.
use in cities. Proper manual monitoring of
maintenance holes by scavengers is a dangerous job II. LITERATURE REVIEW
in today’s polluted cities it may impact their health
and may lead to death. Without being well in, formed There have been many proposed systems so far,
the situation manholes may take a way to death. To but "Manhole Cover Intelligence and Detecting system
keep safe this proposed model, aim to provide an [1]" is one that can be used to keep an eye on the lid
automated manhole system that measures position of a manhole cover, provide real-time updates
temperature, humidity, and harmful gases using on any changes, and sound an alarm if anything seems
sensors and updates this information using IoT amiss automatically. Additionally, there is a system
applications. If there is any abnormal change in the called "Drainage Monitoring System Using IOT" [2] that
manhole here this change is measured by the sensors is used to gather and receive data from various sensors in
and transferred to the managing station in form of sewage pipes and to update them in real-time
messages to take further action. applications. Water level, temperature, and poisonous
gases are only some of the characteristics that can be
Keywords—Manhole Observant, MQ O2 sensor, MQ monitored with this kind of setup, and the data is relayed
135 sensor, Internet of Things, Global Positioning to a control room in another paper titled "Underground
System, Sewage workers safety. drainage and manhole monitoring system for smart
cities" [3]. IoT (Internet of Things)-based "Smart
I. INTRODUCTION Drainage Monitoring and Controlling System" [4] will
reveal data on water level, air temperature, poisonous gas
Maintaining cleanness in cities is necessary in levels, and other environmental factors. The technology
the current world. An important section for any city is appears to employ a machine that begins moving and
cleanliness in maintaining drain systems and manhole clearing stocking parts if it goes above a predetermined
blocks are most important when it comes to access threshold. Using IoT, the authors of "Development of
points. Monitoring regularity check is prominent. But Alerting and monitoring system for manhole
because of faulty function of manhole covers shows up management" [5] were able to create a system that
to suffer people from accidents, poor environmental monitored manholes and sent real-time updates on gas
issues, and dangerous gas leakage issues. Finally, to levels, temperature, water flow, and lid position to the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 310


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

control team. The system described in [6] is an Internet- from work station will be sent to managing stations
of-Things (IoT)-based early warning system for simultaneously some physical parameter values are
detecting blockages in sewage pipeline systems by updated in LCD display which is placed to pole
means of the transmission of signals via ultrasonic imminent to work station.
sensors. Another system designed based on MCU
MSP430G2553 processor is used to monitor the manhole IV. BLOCK DIAGRAM OF PROPOSED SYSTEM
cover separately [7]. Paper with title Underground
Drainage Monitoring System for Metropolitan Cities Fig. 1 shows the block diagram of the proposed
describes how to monitor the drainage system using work. The gas sensors, temperature sensor, IR sensor and
IoT[16]. Although information is provided on the state humidity sensor continuously monitors the manhole
of the lid, the sewage line, and the temperature of the parameters and the sensors are interfaced with the
gases within, little effort was made to show the state of Arduino UNO controller. The threshold values for
the manhole and whether it was open or closed. sewage workers to work in the manhole like temperature,
Therefore, both the open and closed states of the lid and humidity and hazardous gases are feed in the controller.
the manhole are governed by this work. When the sensor senses the parameters which crosses the
threshold value then it sends alert message to managing
III. PROPOSED SYSTEM—AUTOMATED MANHOLE station through GPS and GSM. The location of the
OBSERVANT problematic manhole is identified by the GPS and
The Automated Manhole Observant system necessary action is taken to control the parameters,
secured with a network is made up of various sensors, which create the problems to workers through coolants,
which put forward actual values of the environment that removing hazardous gases from manhole. All the data of

Figure 1: Functional Block Diagram

is concentration of gases and temperature up to point that the sensors are also stored in drive by using IoT.
does not harm human body and let you know the
workable conditions. In addition to providing safety V. WORKING PRINCIPLE
precautions to sewages our proposed system will have
record of sudden water level changes, humidity, In the proposed work total system is affixed to
temperature, hazardous gases in mobile app. If any manhole lid. As everyone knows that manhole lid
parameters crossing its threshold value the updated value leakage is the main concern, to rectify this IR sensor is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 311


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

attached to the inner shoulder of manhole. IR sensor may input/output pins (of which 6 can be used as PWM
use for two purposes one for lid state and water level outputs), 6 analog inputs, a 16 MHz ceramic resonator
detection. The main purposes of gas (MQ 02, MQ 135) (CSTCE16M0V53-R0), a USB connection, a power
sensors [9] to detect the gas rate value and save sewage jack, an ICSP header and a reset button. It contains
worker life from breathing issues. Due to climate everything needed to support the microcontroller; simply
changes temperature check is the main task for manhole, connect it to a computer with a USB cable or power it
it would helpful for worker to enter inside. Therefore, with an AC-to-DC adapter or battery. "Uno" means one
here we are going to monitor this data using DHT-11 in Italian and chosen to mark the release of Arduino
temperature sensor [10]. When system detects any Software (IDE) 1.0.
threshold values apparently microprocessor process data
and it will update it to mobile app and messages send to LCD Display:
managing station. This process will be done for every 15 In this work display, system is mainly useful to
seconds. To avoid confusions host can easily find display the situation of the manhole to pedestrians,
manhole location using GPS. This system reduces the travellers which is affixed to pole nearer to system
labour time required to check manhole condition. location. Digital pins from 2 to 7 are connected to the
Finally, this monitoring system is easily organized. main input to the LCD. The LCD receive the information
from the main controller and it updates the data on the
VI. HARDWARE DESCRIPTION LCD this makes people wide-awake.

Arduino Uno: MQO2 and MQ135 Sensors:


In the proposed work, Arduino Uno is the main In this work MQ 02 sensor detects the
heart of the system and it supports the microcontroller combustible gas these gases may harm sometimes for
AT mega- 328. The Arduino has many advantages like sewage workers and its value is displayed in LCD
open source in hardware, software and can operate on display in concentration scope range from 20 to 100psi.
any operating system [11]. The Arduino is connected to In this work MQ 135 sensor detects the carbon dioxide
the LCD display, GSM, GPS, IR sensor and ESP-015 gas this may harmful to environment, public to overcome
Wi-Fi module. Arduino consist of 15 digital pins. The from these our sensors are will measure the
digital inputs from 2 to 7 are connected to LCD display. concentration range from 200 to 1000ppm and it displays
Pins 9, GND are connected to Wi-Fi module from in LCD and update this information in mobile app and to
Arduino. Pins 11, 12, Tx are connected to SIM 8000L. managing station.
Rx, 13 pins are connected to GPS from Arduino Uno.
Power supply pin acts as 9th pin. Remaining 9, 10, and Infrared Sensor:
11 are connected to the IR sensor [12]. The board is In this work IR sensor used in two ways for
shown in Fig. 2. detect the water, lid position. The digital pins 9, 10, 11
are connected to the Infrared sensor it updates the
information about lid, water.

GPS:
To trace system location, we are going to fix
this GPS locator, here the digital pins Rx, 13th pins are
connected to the Global Positioning System. This block
updates the position of the system.

DHT11 Temperature Sensor:


For safety maintenance of manhole temperature
is the priority check. In order to save the sewage worker,
we must compassion the temperature inside the manhole
without compassion of underground temperature of
Figure 2: Arduino Uno R3 Board manhole, worker may cause suffocation these may result
to death. So, normal tolerance temperature rate for
Arduino Uno is a microcontroller board based
human body is acceptable 30 to 38.2 degrees for a
on the ATmega328P (datasheet). It has 14 digital
tolerance time 40 to 45 minutes inside the manhole.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 312


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Therefore, this sensor can read the temperature and gases. This system consists of in-built Wi-Fi module will
report it [13-14]. This sensor is used in the proposed process information sent by the sensors will displayed on
system to monitor the temperature in the manhole. LCD display and updates graphically in Thing free app.

The prototype is fixed at the real time manhole


Wi-Fi Module: and observed the flow level, lid position, hazardous
The main purpose of this module is to send data gases and the same values are updated in the things view
if app in error this module will send text messages to app which are shown in the following figures and each
mobile. Here digital pins 9th and ground are connected to figure is explained.
Wi-Fi module and pins 12, Tx, 11 are connected to the
GSM. Through with this module this system can update
the position of the system.

VII. SOFTWARE USED

1. Arduino Integrated Development Environment


(IDE):
Arduino Integrated Development Environment
this software used here for programming Arduino board.
In this proposed system we used C-language code using
AVR studio we dumped this program to Arduino Uno.
LCD, LED, Wi-Fi module is interfaced to the Arduino Figure 4: Experimental setup
board through the IDE software. The Arduino has many
In this work LCD display displays the digitized
advantages like open source in hardware, software and
values on display board where being collected this data
can operate on any operating system.
by the sensors. This display board will alert public and
to sewage workers to take further action which is shown
2. Thing View Free:
in Fig. 5.
Thing View enables you to visualize your Thing
peak channels in an easy way, just enter the channel ID
and you are ready to see the graphs that displayed in
mobile app [15-16]. The information which sent from the
controller is shown in the Fig. 3.

Manhole chamber

Figure 5: LCD Display


module
Figure 3: Manhole Module The Fig. 6 shows the updated result of the
manhole lid position in graphical way using Thing view
free mobile app. Here figure shows the value “1” it
VIII. EXPERIMENTAL RESULTS indicates that lid is in open condition when lid is open
state graph increases with red colour. If graph shows “0”
The experiment setup of the proposed system it indicates that lid is in closed condition in closed
“IoT based Automated Manhole Observant for sewage condition graph falls. Finally, this process going to be
workers safety” is shown in below Figure.3. When the record with date and time to maintain proper examine for
system is powered all the sensors, which are connected observer.
to the Arduino, are activated, and start sensing the
parameters of the manhole. The IR sensors sense the flow The Fig. 7 shows app result of temperature
level and lid position, gas sensors sense the hazardous value in graphical form the normal tolerance
temperature.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 313


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for sewage worker to work is 24 to 38 degrees


if it is greater than 38 no worker will be allowed to work
inside the manhole, we can rescue worker from
suffocation. If any temperature change occurs the graph
increases correspondingly it updated on LCD display,
mobile app.

Figure 6: Lid Position

Fig. 8 shows the app result of the combustible


gas range. The normal gas range is between 20 to 100
psi. If it is more than 100 psi it may cause under Figure 8: Smoke value
explosion. So, we should not allow workers above
100psi. The below graph shows the smoke value in
number and graphically it is also updated on display
and app. Fig. 9 shows the app result of humidity range.
The normal tolerance humidity range is 30 to < 74%. If
it is greater than 74% it may cause some breathing
problems, we should not allow to do work nside a
manhole at this situation our system will alert managing
stations through messages.

Figure 7: Temperature value

Figure 9: Humidity value

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 314


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

open manholes so that we can save pedestrian life from


dangerous situations. This work helps to reduce the
Fig. 10 shows the app result of the carbon problems of manholes under the aegis of sensors and
dioxide rate. This gas range is shown in a graphical helps to notify the inscribe mobile when harmful gases
figure. The normal carbon dioxide range is 200 to are detected. Finally, this system will pass the
1000ppm. If the value exceeds more than 1000pppm it information to the display unit, mobile app, and updated
may cause irritation, a rise in blood pressure to rescue situation of lid in route maps for travellers. By this
from this situation we used to display and update it on project, the manhole monitoring may easily assemble.
the app.

Figure 11: Latitude and Longitude value

Figure 10: Carbon Monoxide value


Future Scope:

Fig. 11 shows the app result of latitude and Further, we will contrivance this system in solid
longitude range of system location. To trace the system covers with vented types remains as a solution to prevent
location, we used to trace these longitude and latitude pressure build-up underground and reduce the damages
addresses in route maps to resolve the problem. caused by any overflow inside the manhole.

IX. CONCLUSION AND FUTURE SCOPE


X. REFERENCES
Conclusion:

Manhole monitoring is a challenging problem.


[1] Nathila Anjum. G, Saniya Kouser. K “To Design & Analysis of
The proposed work monitors and detects the vital Underground Drainage and Manhole Monitoring System for
problems of manholes. This work proposes alternative Smart Cities”, IJESC.
methods for tracking the situation of manholes. By [2] Xinru Fu North China Electric Power University, Beijing, China
“Manhole Cover Intelligent Detection and Management
sensing and tracking the manhole’s hazardous
System”.
parameters, we can save the life of sewage workers. In [3] Prof H. P. Rewatkar, “Smart Drainage Monitoring and
this work, we also introduce the manhole display boards Controlling System Using IOT”, IJRES.
attached to the poles so that in the rainy season [4] Aditya Patel, Parth Dave, Aatish Patel “Drainage Monitoring
System Using IoT ”, IJREAM.
pedestrians can observe it and can move away from the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 315


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[5] M. Venkata Sudhakar, “Development Of Alerting And


Monitoring System For Manhole Management Using Iot”,
IJAST.
[6] V. Suresh Kumar, S. Manikandan, K. Pradeep, S. Sugan Raj “Iot
Based Early Warning System To Detect Blockage In Sewer
Pipeline System Inhigh Rise Building”, International Journal of
Pure and Applied Mathematics.
[7] J. H. Shen and Y. Q. Yan: MSP430 MCU Principles and Practice
of Engineering Design (Beijing University of Aeronautics and
Astronautics Press, China 2008), p.54 (Language: In Chinese).
[8] Kesarkar, Shailesh and Damotharan, C. and Pawar, Vinayak and
Shinde, Pooja, “Underground Drainage Monitoring System for
Metropolitan Cities (April 28, 2020)”. 2nd International
Conference on Communication & Information Processing
(ICCIP).
[9] https://datasheetspdf.com/pdf/622943/Hanwei/MQ-2/1
[10] https://datasheetspdf.com/pdf/785590/D-Robotics/DHT11/1
[11] Arduino Uno Rev3. (n.d.). Arduino Online Shop. https://store-
usa.arduino.cc/collections/core-family/products/arduino-uno-
rev3
[12] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron
spectroscopy studies on magneto-optical media and plastic
substrate interface,” IEEE.
[13] MT Lazarescu, M.T., "Design of a WSN Platform for Long
Term Environmental Monitoring for IoT Applications,"
[14] Emerging and Selected Topics in Circuits and Systems, IEEE
Journal.
[15] Sang D. Mook Chang “Characteristics of humidity-temperature
change in the below-grade concrete structure by applying
waterproof materials on the exterior wall”.
[16] Prof Muragesh SK1, Santhosha Rao, “Automated Internet of
Things for Underground Drainage and Manhole Monitoring
Systems dor Metropolitan Cities.” International Journal of
Innovative Science, Engineering & Technology.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 316


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Municipality Water Management System using IoT


Perumal. B Nagaraj. P Esakki Raja. S
Department of Electronics and Department of Computer Department of Electronics and
Communication Engineering Science and Engineering Communication Engineering
Kalasalingam Academy of Kalasalingam Academy of Kalasalingam Academy of
Research and Education, Research and Education, Research and Education,
Krishnankoil, Virudhunagar, Krishnankoil, Virudhunagar, Krishnankoil,
India India Virudhunagar. India
perumal@klu.ac.in nagaraj.p@klu.ac.in 9919005063@klu.ac.in

Jaya Sunthari. S Keerthana. S Muthukumar. M. V


Department of Electronics and Department of Electronics and Department of Electronics and
Communication Engineering Communication Engineering Communication Engineering
Kalasalingam Academy of Kalasalingam Academy of Kalasalingam Academy of
Research and Education, Research and Education, Research and Education,
Krishnankoil, Virudhunagar, Krishnankoil, Virudhunagar, Krishnankoil, Virudhunagar,
India India India.
9919005088@klu.ac.in 9919005107@klu.ac.in 9919005146@klu.ac.in

Abstract- Over the decades, associate degree bumper and approaches evolved by the researchers [5]. In our
variety of articles and approaches was taking to boost the country, each urban and metropolitan areas do haven't
water management system. This Water Management property water for drinking and different functions. thanks
System (WAS) is employed to cut back water loss, work to poor water management techniques, vast pipeline run and
high running of water area unit in sure areas solely [6]. the
force usage, and waste matter utilization. It halts the barriers web of things [7] could be a device that communicates data
behind the municipality's water management. This water abstract thought from physical devices like sensors. It sends
management drawback was facing major problems in the whole knowledge exploitation the web, therefore it's
additional over the countries within the world. Some referred to as web of things. This planned system enquires
machine learning and self-learning algorithms facilitate to concerning the information concerning the flow of water and
resolve such issues quickly. Some ancient approaches assist RFID authorizations. This IoT-based Municipality's water
infrastructural pressure management, leak management, management system has associate degree economical thanks
to allot the water level of each corporation client. It avoids
and sensible water distribution system. This proposed work
collision between the corporation water users [8]. This
introduces some sensors to acknowledge leak identification planned IoT-based water management system acts
and water supply required identification. A sensible water proficiently and it types everyone with water property [9].
flow detector helps to spot the distributed water level at this The huge literature survey concerning IoT and municipality
time, exploitation the web of things transfers messages to water treatment are discovered within the following session.
alert the sufficiency and deficiency of the actual space. 2.Literature Review
Using RFID, the municipality workplace identifies the
distribution of water regional-wise. This IoT-based water The authors of [1] counsel Associate in Nursing
improved water management system for enhancing different
management system makes the water management system fuel management like hydrocarbon or chemical science. This
more adept and fewer wastage. methodology or approach is merely used for the varied
Keywords— Water management system, web of things, cooling lubrication applied, however it's a weaker show of
Water flow detector, RFID wastage of water management and outpouring management
[10].
1.Introduction
In [2] the scientist unconcealed the problems of water
Every year, the expansion of the population rate has earned management in chemical industries. Here, the author
immense in over. it should cause water deficiency and introduced the sensible Water Management System
increase pollution because of each industrial and agricultural (SWME) for the purification of water. This research work
usage. Earth has some water resources like groundwater, helps to cut back two hundredth of water wastage. it'll
river, lakes, and water wetlands. All on top of the water increase the economical setting in eco-manner [11].
resources depends upon the monsoon season rainfalls solely
[4]. So, water harvest management is a lot of necessitating Authors [3] exposed water management for industrial usage
treatment for the WAS. Municipal firms embrace their data and energy conservation functions. The model is integrated
to diminish the water deficiency downside. when the with interval two-stage random programming for reflective
inclusion of firms, they have some helpful techniques to system uncertainties. These uncertainties area unit related to
handle water abundance for his or her customers. In recent the commercial production feature and therefore the
decades varied numbers of water management techniques decision-making method. For the water-energy nexus, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 317


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

energy proposed is principally targeted on the consumption As shown in fig.1, the water flow detector evaluates the
intensity of water purification and transportation from number of waters flowing at a specific time or amount. Fig.
completely different water sources [12]. It also use the two describes the regulation of the research work. This RFID
variety of real time applications in different discipline [16- module is employed to authorize the individuals by their
35] name, door no, and address. that is employed to tag the actual
one that consumed water per day or week. This 4x4 input
3.Proposed System device is employed to approve the person by a word. It
A typical power offer is given to the Arduino UNO guarantees avoiding collision between the peoples and water
microcontroller. The empire-embedded sensors like water satisfies all the peoples in an equal manner. once the users
flow and RFID module area unit synchronal with the end their authorization, the motive force units offer the water
Arduino UNO microcontroller. This 4x4 input device is for the actual client. This paper conjointly interfaces with the
employed to position the corresponding security key by the LCD, that is employed to take in the number of waters
user [13]. liquid crystal display demonstrates the present distributed to a specific client. victimization the web of
water consumption and its knowledge concerning the things, this proposed module sends the message regarding
consumption level. Driver and therefore the DC pump act as the client detail to Municipal Corporation [15].
associate degree output terminal and area unit primarily
5.Results and Discussion
based upon the line of the RFID module. This RFID decoded
each shopper and its shows the licensed user and their Arduino UNO microcontroller is performance as a pivot with
address [14]. This effective diagram is shown in Fig.1 the detector and output units. approved water distribution
infixed C program embed with the Arduino microcontroller.
The water flow detector and RFID module square measure
biased by the microcontroller and it senses the quantity of
water content and approved person as a designed program
dependency. The time of the water flow are controlled by the
users and it monitors the extent victimization the web of
things. every one encompasses a distinctive water-smart card.
that helps to authorization of individual folks. This 4x4 input
device is employed to write and rewrite the user id and secret.
At the time of water flow, users place that RFID card into the
device and that is activate the actual motor. the quantity of
water distribution is displayed on the mounted alphanumeric
display. Fig. three indicates the authorization of the client that
displays the IoT model.

Fig. 1 Block Diagram Water Management System


4.Working Principle
This planned economical IoT-based municipality water
management system has been with success put in with the
Arduino UNO microcontroller and effective sensors.

Fig. 3 Display the Customer Authorization


Fig. 3 displays the customer’s authorization and
information. And also fig. 4 to 7 displays the flow rate
and distribution level of water.
Fig. 2 Flow Chart and Working Principle Water
Management System

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 318


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 7 For low rate 1 increases and total distribution


Fig. 4: For flow rate 0 and total liters increases of values changes accordingly
Table.1 infers the customer’s information and the amount
of water distribution in a précised time duration.
Table 1: Municipality Water Management System
Model Description

Fig. 5 Soil Dry Moisture Output


S. Name of the House Flow Total
No. customer number rate distributio
n
1 S. 10/12 0 8697mL
JAYASUNTH
Fig. 6 Humidity Output ARI
2 S. ESAKKI 132/4 1 7109mL
Soil dampness sensor detects the ong RAJA
3 S. 536/2 3 2637mL
KEERTHAN
A
4 M. V. 106/8 10 9384mL,
MUTHUKUM
AR
Fig 5. For flowrate increases, total liters of value
change accordingly 6.Conclusion
The research work of sensible water management system
was heightened with the assistance of the web of things. it
absolutely was reducing hands, moderator loss, and
population collision in a very hot manner. it absolutely was
simpler apart from self-learning algorithms. the web of
things is employed to store a life history within the house of
the cloud. This session of results and discussion was show
off the outstanding performance over some ancient
approaches. This proposed work has well and smart to
handle the leak management system and water distribution
system. The flow meter or device and RIFD module
facilitate to equal water distribution for the approved folks.
It helps to scale back the wastage of water. within the future,
this research work makes over additional compact and tinier.
it's additional values in any scale of a network in water
distribution.
REFERENCES
Fig. 6 For flowrate increases, total liters of value
1. Singh, R., Oberoi, A.S. and Singh, T., 2022. Factors influencing the
increase accordingly performance of PEM fuel cells: A review on performance

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 319


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

parameters, water management, and cooling techniques. IEEE.


International Journal of Energy analysis, 46(4), pp.3810-3842. 21. Nagaraj, P., Muneeswaran, V., Sudar, K. M., Ali, R. S., Someshwara,
2. Cook, H. and Williamson, T., 2022. Water management within the A. L., & Kumar, T. S. (2021, May). Internet of Things Based Smart
English landscape. capital University Press. Hospital Saline Monitoring System. In 2021 5th International
3. Bessarabov, A., Trokhin, V. and Stepanova, T., 2022. Ecological Conference on Computer, Communication and Signal Processing
system for water treatment in fine chemicals business enterprises. (ICCCSP) (pp. 53-58). IEEE.
Clean Technologies and Environmental Policy, 24(2), pp.721-728. 22. Sudar, K. M., Lokesh, D. L., Chowdary, Y. C., & Chinnasamy, P.
4. Yu, Y., Xie, Y., Ji, L., Zhang, J., Cai, Y. and Yang, Z., 2022. Water (2021, January). Gas Level Detection and Automatic Booking
management for industrial development, energy conservation, and Notification Using IOT. In 2021 International Conference on
subjective attitudes: a comprehensive risk-oriented model to explore Computer Communication and Informatics (ICCCI) (pp. 1-4). IEEE.
the tolerance of unbalanced allocation drawback. Journal of Water 23. Nagaraj, P., Muneeswaran, V., Pallikonda Rajasekaran, M.,
and temperature change, 13(1), pp.139-157. Muthamil Sudar, K., & Sumithra, M. (2021). Implementation of
5. Ochoa-Noriega, C., Velasco-Muñoz, J.F., Aznar- Carlos, J.A. and Automatic Soil Moisture Dearth Test and Data Exertion Using
López-Felices, B., 2022. Analysis of the Acceptance of property Internet of Things. In Emerging Technologies in Data Mining and
Practices in Water Management for the Intensive Agriculture of the Information Security (pp. 511-517). Springer, Singapore.
Costa Delaware Hermosillo (Mexico). Agronomy, 12(1), p.154. 24. Perumal, B., Nagarai, P., Venkatesh, R., Muneeswaran, V.,
6. Şamil Güneş, M., Yıldız, D. and Sevinç Kurnaz, F., 2022. A GopiShankar, Y., SaiKumar, A., ... & Anil, B. (2022, January). Real
Comparative Assessment of Municipal Water Use in Turkey. Journal Time Transformer Health Monitoring System Using IoT in R.
of Water Resources coming up with and Management, 148(2), In 2022 International Conference on Computer Communication and
p.05021033. Informatics (ICCCI) (pp. 1-5). IEEE.
7. Verma, P., Kumar, A., Rathod, N., Jain, P., Mallikarjun, S., 25. Durga, B. G., Kumaran, T. H. M., Devika, I. V., & Akshaya, M. J.
Subramanian, R., Amrutur, B., Kumar, M.M. and Sundaresan, R., (2022, August). Internet of Things based Weather and Water Quality
2015, October. Towards AN IoT primarily based water management Monitoring System. In 2022 3rd International Conference on
system for a field. In 2015 IEEE 1st International sensible Cities Electronics and Sustainable Communication Systems (ICESC) (pp.
Conference (ISC2) (pp. 1-6). IEEE. 998-1002). IEEE.
8. Rajurkar, C., Prabaharan, S.R.S. and Muthulakshmi, S., 2017, 26. Muneeswaran, V., Nagaraj, P., Rajasekaran, M. P., Reddy, S. U.,
March. IoT primarily based water management. In 2017 International Chaithanya, N. S., & Babajan, S. (2022, June). IoT based Multiple
Conference on Nextgen Electronic Technologies: semiconducting Vital Health Parameter Detection and Analyzer System. In 2022 7th
material to package (ICNETS2) (pp. 255-259). IEEE. International Conference on Communication and Electronics
9. Perumal, T., Sulaiman, M.N. and Leong, C.Y., 2015, October. net of Systems (ICCES) (pp. 473-478). IEEE.
Things (IoT) enabled water observation system. In 2015 IEEE fourth 27. Deny, J., Rajalakshmi, P., Muneeswaran, V., Sudharsan, R. R., &
international Conference on shopper natural philosophy (GCCE) (pp. Nagaraj, P. (2022, August). Automation of Glucose Control for
86-87). IEEE. Type-2 Diabetes Mellitus. In 2022 3rd International Conference on
10. Singh, M. and Ahmed, S., 2021. IoT primarily based sensible water Electronics and Sustainable Communication Systems (ICESC) (pp.
management systems: a scientific review. Materials Today: 79-83). IEEE.
Proceedings, 46, pp.5211-5218. 28. Deny, J., Perumal, B., Nagaraj, P., Alekhya, K., Maneesha, V., &
11. Manogaran, G., Alazab M., Shakeel, P.M. and Hsu, C.H., 2021. Reddy, S. A. (2022, May). Detection of Osteoarthritis by using
Blockchain aided secure knowledge sharing model for net of Things Multiple Edge Detections. In 2022 6th International Conference on
primarily based sensible industries. IEEE Transactions on Intelligent Computing and Control Systems (ICICCS) (pp. 581-588).
dependableness. IEEE.
12. Eskandari, M., Janjua, Z.H., Vecchio, M. and Antonelli, F., 2020. 29. Perumal, B., Deny, J., Devi, S., & Muneeswaran, V. (2021, May).
Passban IDS: AN intelligent anomaly-based intrusion detection Region based Skull Eviction Techniques: An Experimental Review.
system for IoT edge devices. IEEE net of Things Journal, 7(8), In 2021 5th International Conference on Intelligent Computing and
pp.6882-6897. Control Systems (ICICCS) (pp. 629-634). IEEE.
13. Abid, G., Shaikh, S.A., Shaikh, M.F., Rajput, S.H., Majeed, U.A. and 30. Muneeswaran, V., Nagaraj, P., Godwin, S., Vasundhara, M., &
Shaikh, A.M., 2020, January. IOT primarily based sensible Industrial Kalyan, G. (2021, May). Codification of Dental codes for the Cogent
panel for dominant Three-phase Induction motor. In 2020 third Recognition of an Individual. In 2021 5th International Conference
International Conference on Computing, arithmetic and Engineering on Intelligent Computing and Control Systems (ICICCS) (pp. 1387-
Technologies (iCoMET) (pp. 1-8). IEEE. 1390). IEEE.
14. Manoj, K.S., Mrudula, K., Maanasa, G. and Srinivas, K.P., 2020. net 31. Muneeswaran, V., Nagaraj, P., Sai, K. P., Kumar, E. A., & Chanakya,
of Things: observation and management of Agricultural Activities. S. R. (2021, August). Enhanced image compression using fractal and
Int. J. of natural philosophy Engineering and Applications, 8(2), tree seed-bio inspired algorithm. In 2021 second international
pp.01-08. conference on electronics and sustainable communication systems
15. Dixon, J., Moran, L., Rodriguez, J. and Domke, R., 2005. Reactive (ICESC) (pp. 1125-1130). IEEE.
power compensation technologies: progressive review. Proceedings 32. Nagaraj, P., Muneeswaran, V., Muthamil Sudar, K., Hammed, S.,
of the IEEE, 93(12), pp.2144-2164. Lokesh, D. L., & Samara Simha Reddy, V. (2021, May). An
16. a. Joby, P. P. "An Extensive Research on Acoustic Underwater Exemplary Template Matching Techniques for Counterfeit Currency
Wireless Sensor Networks (AUWSN)." IRO Journal on Sustainable Detection. In International Conference on Image Processing and
Wireless Systems 4, no. 2 (2022): 121-129. Capsule Networks (pp. 370-378). Springer, Cham.
17. Shakya, Subarna. "Unmanned Aerial Vehicle with Thermal Imaging 33. Sunethra, B., Sreeya, C., Dhannushree, U., Nagaraj, P., &
for Automating Water Status in Vineyard." Journal of Electrical Muneeswaran, V. (2022, April). A Systematic Parking System Using
Engineering and Automation 3, no. 2 (2021): 79-91. bi-class Machine Learning Techniques. In 2022 International
18. Vamsi, A. M., Deepalakshmi, P., Nagaraj, P., Awasthi, A., & Raj, A. Conference on Sustainable Computing and Data Communication
(2020). IOT based autonomous inventory management for Systems (ICSCDS) (pp. 221-226). IEEE.
warehouses. In EAI International Conference on Big Data 34. Nagaraj, P., Saiteja, K., Ram, K. K., Kanta, K. M., Aditya, S. K., &
Innovation for Sustainable Cognitive Computing (pp. 371-376). Muneeswaran, V. (2022, April). University Recommender System
Springer, Cham. based on Student Profile using Feature Weighted Algorithm and
19. Muneeswaran, V., BenSujitha, B., Sujin, B., & Nagaraj, P. (2020). A KNN. In 2022 International Conference on Sustainable Computing
compendious study on security challenges in big data and approaches and Data Communication Systems (ICSCDS) (pp. 479-484). IEEE.
of feature selection. International Journal of Control and 35. Sudar, K. M., Nagaraj, P., Ganesh, M., Yadav, D. A., Kumar, K. M.,
Automation, 13(3), 23-31. & Muneeswaran, V. (2022, June). Analysis of Seminary Learner
20. Muneeswaran, V., Nagaraj, M. P., Rajasekaran, M. P., Chaithanya, Campus Network Behaviour using Machine Learning Techniques.
N. S., Babajan, S., & Reddy, S. U. (2021, July). Indigenous Health In 2022 7th International Conference on Communication and
Tracking Analyzer Using IoT. In 2021 6th International Conference Electronics Systems (ICCES) (pp. 1117-1122). IEEE.
on Communication and Electronics Systems (ICCES) (pp. 530-533).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 320


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Random Forest, DT And SVM Machine Learning
Classifiers for Seed with Advanced WSN Sensor
Node

1Sachin D. Shingade 2Rohini Prashant Mudhalwadkar 3 Komal M. Masal

Departement of Technology DOT Dept. of instrumentation and Control Department of Technology


SPPU & MITAOE Govt. COEP SPPU & PICT
Pune, India Pune Pune, India
sachin.shingade@mitaoe.ac.in rpm.instru@coep.ac.in kmmasal@pict.edu

Abstract— Random Forest- RF, Support Vector Machine - temperature, atmospheric temperature, humidity, rain
SVM and Decision Tree - DT Machine learning classifiers conditions, soil pH, and plant water status, etc. The sink node
proposed and implemented to develop seed prediction model in will retrieve the data from farm sensor nodes from the local
Visual Studio code environment using python along with
advanced Wireless Sensor Network’s raino-meter sensor node. network. After that data will be transferred to web-based
Wireless sensor network's infrastructure consists of sensors and application or cloud via a wireless network. Based on this
nodes. Use of a wireless system has the potential for significant information, one can predict the crop.
savings of workforce, resources and time. By adding Soil pH, A data analytics approach with machine learning
Temperature, Humidity and Rainfall sensor in the network one technology significantly improves the prediction efficiency
can predict the crop seed to be cultivated in the current time by
analyzing the environmental conditions in the farm. Aim of this and can predict the best suitable crop seed accurately.
work is to develop model using data analytics and machine
learning techniques. Prediction model is trained on historic
II. RELATED WORK
environmental data of crops. Based on the history and current Agricultural crop recommendation systems which are
environmental data crop recommendation is proposed. Basic available on the marketplace considering variety of factors
data collection nodes with the sensor network provides the such as the weather conditions during plantation time, type of
required information about environmental parameters. soil, location (geological), atmospheric temperature of the
Random Forest- RF , Support Vector Machine - SVM and
location and so on. In this field variety of research work have
Decision Tree - DT Machine learning classifiers implemented
and results shows Random Forest is the best with 95.12 % been already completed and presented the subsidiary literature
accuracy, 94.94 % precision, 94.85 % recall and 95.12 % F1 and results of their end objectives even though the methods,
score. This system helps to provide the correct advice at the parameters taken into consideration are different but the
correct time. objectives are same.

Keywords—Smart farming, machine intelligence, sensor network, This connects GPS-coordinated sensors to the Internet that
seed prediction. can also be used to continuously analyze the crop [2-5]. The
work done in [6] confers the benchmarks and why they are
I. INTRODUCTION affecting into smart agriculture as a result of globalization.
Agriculture with advance techniques for smart farming Smart agriculture is farming that would help in water
used to improve the crop production as well as empowering conservation, soil nutrients maintenance, real time monitoring
farmers for facing critical environmental conditions. Smart and controlling despite the fact that precision agriculture has
farming, smart City, smart clinics uses internet of things – improved during the course of time some of the difficulties are
IOT.[1] In smart farming so many things have to consider like still exists. As previously said monitoring site-specific
water required for irrigation, workforce required and operations of such systems are necessary to get a better
resources [3]. Agriculture in India contributes major part in outcome. [7].
GDP. Agriculture help farmers for food security, nutritional Among the crops considered in the model for prediction in
security and for earning money. the study [10] were coriander, legumes, cotton, paddy,
sorghum, peanuts, sugarcane, bananas, and vegetables. When
The proposed model will consist of Wireless sensors projecting the crop characteristics like pH, depth, erosion,
network for data collection from farm field and arrangement permeability, texture, rain, water holding and soil color were
for collecting the data value information for further all taken into account. The technique employed was ensemble
processing , we will take ready database of different learning which combines the strength of two or more
parameters ( such as pH, Temperature, humidity, moisture independent models for improved prediction.
etc.) As an input for predictive algorithm. For current data In order to provide an accurate estimate of agricultural
collection, WSN based system will work to collect useful data yields the crops were evaluated and ranked according to the
for crop prediction. WSN collects data of soil moisture,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 321


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 1. Flow Diagram of the Proposed Study

findings of the evaluation. This categorization was found Presently there are number of models available for
through the application of a variety of data mining techniques. recommendation of crops. But some of the ML models needs
This article provides a summary of numerous different datasets with more number of sample readings to give
classification methods, such as the K-Nearest Neighbor and accurate output label. Few models shows poor performance
the Naive Bayes models [11]. for larger number of data samples, few shows over fitting
errors. Random forest model shows good results with all
In this work [12] exploratory data analysis is proposed and
performance metrics also it reduces over fitting problems for
numerous different types of prediction models are explored by
larger datasets so preferred for model building.
their implementation. In order to recognize and evaluate each
property a sample data set is utilized and various different
System presented in figure 1 is composed of several
regression algorithms are applied. Several types of regression
phases where the first phase is hardware part of wireless
analysis including multiple linear, linear, and non-linear
sensor network which is used for obtaining the values of
regression as well as polynomial, ridge and logistic regression
temp, humidity, rainfall and moisture from the farm field. The
are explained in this paper. This article provides a comparative
collected parameters from each sensor node are then sent over
analysis of various data analytics algorithms.
cloud for further processing. Collected parameters from
In this study [13], the researchers separated the soil type, sensor nodes are sent over cloud through internet connection
groundwater level, rainfall, water availability and temperature using Wi-Fi module which is inbuilt on Node MCU along
into two separate datasets. One of the dataset consist features
such as rainfall and temperature, while the other dataset
consist features such as potassium, phosphorus and nitrogen
values as well as fertilizers, soil pH and organic carbon value
etc. In order to get the dataset ready, some fundamental
preprocessing steps were performed. The Naive Bayes and
J48 classifiers were utilized in the process of crop
recommendation. The ultimate recommendation achieved by
applying association rules to the classifiers' output in order to
get the best results. In order to train the model ten different
cross validations were employed. During the course of testing
number of metrics including Precision, ROC Area, Recall,
Accuracy and F-Measure were utilized. [14] Decision trees
are capable of classifying both numerical and categorical data
sets.
III. PROPOSED SYSTEM
. In this piece of work a model is proposed that has the
ability to predict the crop seed by using parameters such as the
present temperature, Soil pH, humidity and the rainfall. The
representation of the full system is shown in figure 1 is a
Fig. 2. Sensor Node
systematic depiction of the system.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 322


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Wireless sensor network composed of different primary data


nodes and sink node for data receiving from each node. The
sample hardware node is represented in figure no 2. As shown
the node consists of Node MCU as a microcontroller for
receiving and processing the data from the sensors . Node
MCU board has inbuilt Wi- Fi module to send sensed data by
wireless link. Same node for pH sensor is also established. For
sink node Server Node MCU or raspberry pi is used as a server
to receive the data from all local nodes and further upload the
data to cloud. But for using Raspberry pi we need to connect
Wi-Fi module for wireless communication and respective
circuit.
Rain sensor – raino meter designed and fabricated for
sensing and measurement of rainfall in particular farmland.
For sensing rain in milli meter. Used Hall Effect sensor which
is continuously sense the tipping bucket moment, each tipping
bucket moment is calibrated for 2 ml water.
IV. RESULT
Fig. 3. Sensor Sensed Data
Local sensor nodes deployed in the farm will acquire the
with firebase platform which provides resources for recent information about temperature, humidity, rain and
moisture. The results obtained from the node are passed to
displaying and storing real time parameters and their values.
server node and then uploaded in real time to the cloud
Figure 3 shows the results of firebase cloud platform on
Interface. Figure 3 shows the results of firebase cloud platform
which the values of sensed parameters are displayed and
saved. on which the values of sensed parameters are displayed and
The second phase is data pre-processing[3] which consists saved.
of two steps. It is best to start by deleting every single missing A. Dataset Description
value from the original dataset . A dot in the dataset stands in The proposed model consist Wireless sensors network for
for a missing value and their presence might reduce the total data collection from farm field and arrangement for
worth of the data as well as they negatively affects collecting the data value information for further processing
performance. In order to solve this issue we swap out these , we will take ready database of different parameters ( such as
values for extremely negative numbers that the system will pH, Temperature, humidity, moisture etc.) ready database
consider as outliers. taken from kaggle as an input for predictive algorithm. For
The creation of the class labels constitutes the second current data collection, WSN based system will work to
phase. As we are employing supervised learning it needs to collect useful data for crop prediction. WSN collects data of
assign a class label to each entry in the dataset. Labelling soil moisture, temperature, atmospheric temperature,
dataset is nothing but adding target attributes to the data used humidity, rain conditions, soil pH, and plant water status, etc.
for training. Here we are using standard dataset with eight The sink node will retrieve the data from farm sensor nodes
attributes Temperature, Humidity, Rain, Soil pH, soil type, from the local network.
Nitrogen contents, Phosphorous contents, Potassium contents
and sensor data. This label is assigned during the
preprocessing stage of the data analysis using standard
labelled dataset with four attributes that are Temperature ,
Humidity, Rain and Soil pH. Which is an essential step prior
to the implementation of any algorithm for machine learning.
Data preprocessing involve tasks like data labeling, data
sorting, filling up data redundancy, data cleaning, splitting the
dataset for training and testing. Third Phase is application of
machine learning algorithm for training the sorted and refined
data. Once the algorithm is applied and the process of training
is over the result of this step is final trained model.
After feeding the dataset into machine learning algorithms
trained models get produced. The RF, SVM and decision tree
algorithms are used in our paper to propose a crop prediction
system. The information about soil parameters provided to
model. The program will look for a crop with a value that is
the most similar to the values entered. All of the crops that are
suitable for the input will be returned as an output. Based upon
the prediction result farmer can get the best suitable crop to be Fig. 4. Simulated Prediction
cultivated in their farm.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 323


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 5. Confusion Matrix of DT


After that data will be transferred to web-based
application or cloud via a wireless network. Based on this TP
information, one can predict the crop. Collected data Recall = *100 (3)
preprocessed, preprocessing helps to reduce time required for
TP + FN
model building [3]. A data analytics approach with machine
TP
learning technology significantly improves the prediction Precision = *100 (4)
efficiency and can predict the best suitable crop accurately. TP + FP
The hyper parameters selected at here are: Adam as Learning
Algorithm, at start Learn Rate is 00.01 %, minimum batch TP + TN
Accuracy = (5)
size is thirty, maximum epochs are hundred, weight decay TP + TN + FP + FN
parameter is one, min sample leaf value is 43.00, maximum
depth is thirty two, and number of trees are thirty one. P*R
F1score = 2 * *100 (6)
P+R
B. Performance Metrics
Prediction of the crop or crop recommended for the
specific input parametric values is shown in the figure 4. A
The prediction performance of proposed model is graphical user interface is created for manual input of the
analyzed by using confusion matrix and its sub parameters parameter values. First we need to select any one algorithm
like TP- True Positive, TN- True Negative, FP-False Positive from Random forest, Support Vector Machine and Decision
and FN-False Negative to calculate R-Recall, A- Accuracy, Tree Machine learning classifiers. Then after need to enter
F1 score and P- precision. values of Temperature, Humidity, Soil pH and rainfall .Then

Fig. 6. Confusion Matrix of Random Forest

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 324


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 7. Confusion Matrix of SVM

need to click on predict crop then it will predict best suitable


TABLE I. PERFORMANCE VALUES - DT AND RF CLASSIFIERS
crop seed for entered parameters values After entering the
values the selected algorithm predicts the crop and thus the DT RF
aim of crop prediction is archived. For temperature value 29, Prec Rec F1 Prec Rec F1
Crops ision all scor ision all score
humidity value 80, pH value 6.5 and rainfall value 50 % % e% % % %
algorithm predicted the Moong Bean. It takes 240 seconds to Cotton 84 95 89 96 97 97
predict crop. As data increases then time required for Lentil 97 99 98 97 100 99
prediction also increase. RF, DT and SVM algorithms are Maize 88 97 92 96 99 98
compared in terms of R-Recall, A- Accuracy, F1 score and P-
Millet 92 82 87 96 95 95
precision.
Moong bean 95 94 94 98 99 98
The DT algorithm can offer effective results in prediction Moth bean 90 87 88 97 97 97
and are faster than many other classifiers. But this algorithm Apple 99 99 99 100 100 100
is not suited for larger datasets and may result in Azuki bean 96 89 92 98 98 98
computational complexity and inefficiencies. Banana 90 97 94 94 100 97
The confusion matrix for the DT classifier is presented in Black gram 86 87 86 93 94 94
Fig 5. From the figure it is clear that the DT classifier provided Chick pea 80 84 82 95 92 93
optimal performance in predicting the suitable crop for Coconut 91 96 94 98 99 98
cultivation. The true positive rates offered by the DT classifier Coffee 58 83 68 56 78 65
are higher than the false positives. There are some Grapes 100 99 100 100 100 100
misclassifications seen in the matrix. This is due to the higher Groundnut 95 100 97 99 100 99
number of samples present in the dataset. The DT classifier is Jute 100 100 100
100 100 100
more optimal with smaller number of samples than with larger
Kidney bean 90 84 87 99 95 97
datasets. The tree structure in the DT classifier can accumulate
Mango 95 97 96 99 99 99
a particular number of samples and when the depth of the tree
is increased the accuracy of the classifier is degraded. The Muskmelon 93 97 95 95 100 97
overall accuracy attained by the DT classifier in crop Orange 97 97 97 99 97 98
recommendation is 91%. Papaya 98 89 93 98 98 98
Peas 92 93 92 96 96 96
The confusion matrix for the random forest classifier for
Pigeon pea 91 93 92 97 97 97
crop recommendation is presented in Fig 6. It is seen that RF
Pomegranate 100 100 100 100 100 100
classifier is best . This is because the Radom Forest classifier
Rice 92 88 90 98 97 97
is able to differentiate the input attribute values for the crops.
The overall accuracy in prediction of suitable crop by the Rubber 100 98 99 100 99 100
random forest classifier is 95.12 %. When the number of Sugarcane 98 94 96 98 97 98
samples are increased the accuracy in prediction is further Tea 67 36 47 60 35 45
reduced but comparably better. Compared to the DT and SVM Tomato 97 96 96 99 98 99
classifiers the RF provided better accuracy in prediction. Watermelon 92 87 90 98 92 95
Moreover the RF reduces computational complexities in the Wheat 92 89 90 98 95 96
training time and faster.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 325


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
The confusion matrix for the SVM classifier for crop [1] Nurzaman Ahmed, Debashis De , “Internet of Things (IoT) for Smart
recommendation is presented in Fig 7. It is seen that there are Precision Agriculture and Farming in Rural Areas ” IEEE Internet Of
more number of misclassifications among different crops. Things Journal, Vol. 5, December 2018.
This is because the SVM classifier is unable to differentiate [2] Sebastian Gutierrez , Israel Martinez , Jorge Varona , “Smart Mobile
LoRa Agriculture System based on Internet of Things ” IEEE, Dec.
the input attribute values for the crops. The overall accuracy 2019.
in prediction of suitable crop by the SVM classifier is only [3] Sachin D. S. , Rohini R.P. , “Hybrid deep Q elman neural network for
74%. When the number of samples are increased the accuracy crop prediction and recommendation based on environmental changes
in prediction is further reduced. Compared to the DT and RF ” Concurrency and computation:Practice and experience, April. 2022 .
classifiers the SVM provided lower accuracy in prediction. [4] Omer Gulec, Elif Haytaoglu , Sezai Tokat, “A Novel Distributed CDS
Moreover the SVM included computational complexities in Algorithm for Extending Lifetime of WSNs With Solar Energy
Harvester Nodes for Smart Agriculture Applications ” IEEE Access,
the training time.
April 2020.
Though the running time of the RF is high the accuracy in [5] Jobish John, Vinay Palaparthy and Shahbaz Sarik, , “Design and
classification is better than the other considered ML models. Implementation of a Soil Moisture Wireless Sensor Network ” IEEE ,
April 2017.
Performance values in percentage are summarized in table I.
[6] Lakshmi.N, Priya.M, Sahana Shetty, and Manjunath C. R, Crop
Among the crops the jute, pomegranate and grapes crops Recommendation System for Precision Agriculture, vol. 6 Reading,
achieved the maximum classification rate compared to the IND: International Journal for Research in Applied Science &
other crops. The experiments suggests that when the input data Engineering Technology, 2018. [Online] Available:
are discriminative, the results in prediction are high and when www.ijraset.com.Ding, W. and Marchionini, G. 1997 A Study on
Video Browsing Strategies. Technical Report. University of Maryland
more than 2 attributes are similar there are some at College Park.
misclassifications. There are still more experimental studies [7] Remi Schmaltz, “What is Precision Agriculture”, April 2017. [Online].
needed to be carried out with huge datasets or with big data to Available:https://agfundernews.com/what-is-precisionagriculture.html
identify the most effective classifier. [Accessed Feb.23, 2020]
[8] S.Pudumalar*, E.Ramanujam*, R.HarineRajashreeń, C.Kavyań,
T.Kiruthikań, J.Nishań. “Crop Recommendation System for Precision
TABLE II. COMPARATIVE STUDY OF SV, DT AND RF CLASSIFIERS Agriculture”, ,2016 IEEE Eighth International Conference on
Advanced Computing (ICoAC),2016
Accuracy Precision Recall F1 Score [9] Yogesh Gandge, Sandhya “A Study on Various Data Mining
Classifier Name % % % % Techniques for Crop Yield Prediction” International Conference on
SVM Classifier 74 .00 74.67 74.32 74.25 Electrical, Electronics, Communication, Computer and Optimization
Techniques (ICEECCOT), 20017
DT Classifier 91.00 91.45 91.16 90.96
[10] S. Pudumalar, E. Ramanujam, R. H. Rajashree, C. Kavya, T. Kiruthika
RF Classifier 95.12 94.94 94.85 95.12
and J. Nisha, "Crop recommendation system for precision agriculture,"
2016 Eighth International Conference on Advanced Computing
(ICoAC), Chennai, 2017, pp. 32-36. doi:
In table II, RF model shows best results and also RF model 10.1109/ICoAC.2017.7951740.
reduced over fitting problem for larger datasets. Hence, it is [11] R. Kumar, M. P. Singh, P. Kumar and J. P. Singh, "Crop Selection
preferred for model building. Method to maximize crop yield rate using machine learning
technique," 2015 International Conference on Smart Technologies and
V. CONCLUSION Management for Computing, Communication, Controls, Energy and
Materials (ICSTM), Chennai, 2015, pp. 138-145. doi:
10.1109/ICSTM.2015.7225403
The proposed system in this research would Predict the [12] T.R. Lekhaa, “Efficient Crop Yield and Pesticide Prediction for
most acceptable crop seed. This work focus on the use of Data Improving Agricultural Economy using Data Mining Techniques”,
analytics and Machine learning techniques. The overall International Journal of Modern Trends in Engineering and Science
(IJMTES), 2016, Volume 03, Issue 10.
experimentations suggest that the ML models are able to
[13] Viviliya, B. and Vaidhehi, V., “The Design of Hybrid Crop
handle the huge number of data samples more efficiently than Recommendation System using Machine Learning Algorithms”.
the other algorithms. Among the implemented ML models the International Journal of Innovative Technology and Exploring
RF classifier is more effective in recommendation. As Engineering, 2019, 9(2), pp.4305-4311.
Random Forest classifier able to differentiate input attributes, [14] “How Decision Tree Algorithms work” available at
it has less computational Complexity in training time so faster, dataaspirant.com/2017/01/30/how-decision- tree-algorithm-work
RF classifier shows 95.12 % accuracy, 94.94 % precision, [15] Chen, Joy Iong Zong, and Kong-Long Lai. "Machine Learning based
Energy Management at Internet of Things Network Nodes." Journal:
94.85 % recall and F1 score 95.12 % ; So Random Forest is Journal of Trends in Computer Science and Smart Technology
the best for recommending best suitable seed In future we September 2020, no. 3 (2020): 127-133
aim to develop a model integrating ML and data mining that [16] Haoxiang, Wang, and S. Smys. "WSN based Improved Bayesian
can suggest suitable crop for cultivation based on different Algorithm Combined with Enhanced Least-Squares Algorithm for
Target Localizing and Tracking." IRO Journal on Sustainable Wireless
parameters. Also we aim to evaluate the model in all the Systems 2, no. 2 (2020): 59-67
aspects to provide detailed interpretations. [17] Atharva Ingle, “https://www. kaggle.com/ datasets/ atharvaingle/crop-
recom mendation -dataset”2020. 4I.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 326


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Misbehaviour Detection based on Least Square


Twin Support Vector Machine in VANETs
H Summia Parveen S.V.Evangelin Sonia
Assistant Professor Assistant Professor
Department of Computer Science and Engineering Department of Computer Science and Engineering
Sri Eshwar College of Engineering Karunya Institute of Technology and Sciences
summiaparveen.h@sece.ac.in evangelinsonia.vs@gmail.com

Abstract— A great deal of study has not been done on adaptive and self-learn ing intrusion detection model might be
machine learning techniques to identify inappropriate created by merging BPNN with SVM , wh ich would cut
activities in Vehicular Adhoc Networks (VANETs). down on the dependency on duplicate data and characterize a
Unauthorized vehicles have the likely to send erroneous
wide variety of traffic occurrences. On the other hand, they
messages across VANET, which can lead to a difficult situation
that cannot be avoided. This article describes a machine did not go to great length on the input feature.
learning technique to classify misbehaviours in VANET. The The researchers [6] have utilized machine learning
proposed strategy is based on the Least S quare Twin S upport methods to detect a wormhole attack, which is a type of
Vector Machine (LS TS VM), which the authors developed. Two routing attack in which packets are tunnelled to another node
of the mechanisms developed are called data based trust and then replayed in the network afterwards. The kernel
models (DTM) and vehicle based trust models (VTM). The neural networks (KNN) with Support vector machines
data based trust model is responsible for identifying fraudulent (SVM) were utilized in the development of the models, and
messages by employing a LS TS VM-based classifier that the results of their application to a data set that the authors
evaluates message content in conjunction with vehicle
had constructed were favourable. In [7], the authors
characteristics. The message propagation behaviour of the
vehicle is evaluated by the LS TS VM-based classifier utilized by
developed a hybrid EHCA-M DS (context-aware
the local VTM, which evaluation determines whether or not misbehaviour detection system), which integrated a
the vehicle may be trusted. Then, using the Dempster–S hafer supervised classifier model with unsupervised-based online
theory, the trust authority (TA) VTM will compile several statistical classifiers, multip le non-parametric, which allowed
different trust assessment reports that pertain to the same the system to detect inappropriate behaviour in a hybrid
vehicle and provide a comprehensive trust value. Compared to environment.
base classifiers utilized for classification, the LS TS VM Khot et al. [8] made a machine learn ing (ML) basis
approach is more effective in classifying a wide variety of to predict where a vehicle will be in the network in the
inappropriate behaviours that can be discovered in VANET. future. They compared the predicted values to the locations
given by the BSMs. Then used SVM with Modified Fading
Keywords—Vehicular Ad Hoc Networks, Least Square Twin
Support Vector Machine, data trust model, vehicle trust model, Memory, abbreviated as SVM-MFM [9], to identify
trust authority and Dempster–Shafer theory inappropriate behaviour in VANET co mmunications.
Technology offers a feasible solution for RSUs that require a
large amount of computational labour. The authors of [10]
projected a hybrid intrusion detection system (IDS) that uses
I. INT RODUCT ION
ANN (Art ificial Neural Networks) to imp rove the system's
The great mobility, large scale, and frequent accuracy and performance. In [11], the authors employed
topological changes that describe vehicular networks make SVM and Nave Bayes feature inserting as intrusion detection
them unique. Increased levels of cross -communication can techniques.
contribute to increased levels of passenger safety. They produced fresh, high-quality data to the
Connectivity to the VANET can be used in various original features. In addition, they applied the framework to
scenarios, such as when a collision occurs and additional several different datasets. A vehicle-RSU duo approach with
vehicles are approaching the area. VANETs are susceptible a merged feature set from successive BSMs is utilized in the
to a wide variety of security threats [1], each of which can proposed methodology for position falsification detection,
potentially put VANET performance and maybe even users' which is distinct fro m other methodologies already in use.
lives at risk. An attacker node may, for instance, simulate Several distinct ML techniques are used to differentiate
traffic congestion by claiming to represent several vehicles between genuine vehicles and those that are harmful. The
simultaneously, allowing the attacker node to conduct a following are the most important contributions made by the
Denial of Serv ice (DoS) attack by interfering with the usual work:
data dissemination. • First, based on the fact that the LSTSVM algorith m
However, the distance between the sending and can successfully manage binary nonlinear
receiving vehicles, speed, and reputation of the sending
vehicle were all ignored in Zhang et al. [4]'s message filter classification and possesses the features of high
based on BPNN, which did not consider message accuracy and greater routine, recommend a data
forwarding. It was hypothesized by Liu et al. [5] that an based trust model that is based on an LSTSVM -

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 327


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Alert driver &


based classifier that can successfully assess whether forward message
Data trust model
or not the warning message is telling the truth Beacon and Feature vector LSTSVM
True
alert message message
depending on the communication content and from vehicle
for message
classifier message

vehicle attributes. Vehicle trust model


Verify
evidence
Feature LSTSVM
• Secondly, a local vehicle based trust component Input network model
Behaviour vector of vehicle Trust
report Update
behaviour classifier reputation or
that employs yet another LSTSVM -based classifier Trust Authority
withdraw
vehicles
is described, which module analyses the vehicle's Fuse evidence
based on DST

behaviour concerning communication propagation


to determine whether or not the vehicle can be
Fig.2. A framework diagram of Proposed LSTSVM-based
trusted. If it is determined that the vehicle can be misbehavior detection
trusted, this module then delivers a trust report to
the Trust Authority (TA) that is based on DST. Take into consideration the framework of a typical
• Finally, the strategy that was suggested for VA NET, represented in Fig. 2 and co mprises things like
identifying incorrect behaviour has been RSUs, TA, and intelligent vehicles. Wireless communication
demonstrated to be effective through simu lation and makes it possible for cars and RSUs to communicate with
one another and each other. The powers of computation and
extensive research.
storage that RSUs have are not present in vehicles.
Additionally, RSUs can communicate with one another. The
The remaining steps of this project are broken down
TA, has the most secretarial power and can connect through
as follows. In Section 2, the VA NET and attacker models
RSUs over a safe channel. It also can communicate with
and the proposed approach are presented to the reader. It
RSUs. In this strategy, k-nodes should be considered: The
discusses several criteria and the module for feature
LSTSVM classifier works by finding solutions to K-linear
extraction utilized to categorize undesirable actions in
equations and then producing K non-parallel hyperplanes,
VA NET. The experimental design and the results are broken
one for each class. It generates k-binary LSTSVM classifiers,
down and discussed in the third section. In the final section,
again with ith LSTSVM classifier taking into account positive
we provide some closing observations and suggest directions
class labels for the ith class and negative class labels for the
for further research.
supplementary classes in the set of classes.
II. METHODOLOGY Let's say that the matrix represents the features of
The communication trust model generates a feature the ith class , where Stands for the number of
vector by using the information contained within the characteristics that are included in the ith class. The matrix
message and then uses an LSTSVM-based classifier to represents the characteristics of other classes
determine whether or not the information contained within , which may be written as follows:
the message can be trusted. If the message is authentic, the
model will alert the driver, and the driver will then forward
the message. If the communication cannot be trusted, the (1)
model will forward it to the TA. The vehicle trust model Study a linear model with a problematic involving
consists of the local VTM and the TA VTM, which are the classification of four separate classes, where the
considered important modules. characteristics of each class are represented by a distinct
The local VTM generates a feature vector based on shape so that the classes may be seen more easily. The
the behaviour pattern of the vehicle being evaluated and then MLSTSVM classifier selects n hyperplanes, one for each
utilizes an LSTSVM -based classifier to determine whether or class, and assigns them numbers 1...n for the respective
not the vector represents a genuine vehicle. Following that, classes. Following is an example of a decision function
the evaluation report is sent to the TA by the vehicle. When that can be used to create hyperplanes in such a way that the
calculating the comprehensive vehicle trust value, the results characteristics of each class untruth within the near empathy
of the DST are noted for several automobiles before being of their respective hyperplanes while still maintaining a clear
averaged together. Last but not least, the TA will consult the distinction from the characteristics of other hyperplanes and
results of the DTM and the vehicle trust model, then it will the ith hyperplane:
revise the reputation value of the automobile, and if the
vehicle is removed, it will do it. (2)
The bias term is denoted by , and the
normal vector to the hyperplane is denoted by .
The OF (OF) of the ith linear LSTSVM classifier is
represented as the following expression:

(3)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 328


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

where is the parameter for the penalty, and


are two vectors of 1, and is the adjustable
for the slack. The OF's init ial term determines how far apart
the attributes of each class are when measured by their (15)
squared sums. The hyperplane is kept close to the ith class where the radius is the circumference of the earth, =
through the minimization process. The second term of the
target function works to limit the amount of incorrect , , and
categorization brought on by features belonging to other
classes. Consequently, the hyperplane is positioned in such a , translates the latitude
way that it is as close as feasible to the characteristics of the
and longitude into radians, refers lat itude, and lg refers to
ith class while remain ing as distant as possible from the
Utilizing DST [12] to aggregate various trust reports from a
characteristics of other classes. The follo wing equation is
variety of automobiles was done so that the accuracy of the
used to determine the Lagrangian function of the OF:
vehicle trust evaluation could be improved.
(4) III. EXPERIM ENTA L RESULTS AND DISCUSSION
Following KKT (Karush–Kuhn–Tucker), conditions are
obtained by differentiating the above equation concerning The simu lation area spans around 2.5 kilo metres
and comprises two extensive highways that cross each other,
and as: and 600 passengers are allowed inside the vehicle at one
time. The following is a list of features possessed by the
(5) vehicles: The maximu m speed is sixty kilo metres per hour;
the vehicle measurement is 4.5 metres; the minimu m
(6) distance among vehicles is 2.5 metres; the supreme speed is
sixty kilo metres per hour; the acceleration is 2.6 metres per
(7) second; the deceleration is 4.5 metres per second, and the
Krauss model is used for the car-fo llo wing algorith m.
Model LC2013 was used for the lane change, and a value o f
(8)
0.5 was assigned to the driver flaw. Create 20,000 training
Eqs. (7) and (8) lead to:
sample data for LSTSVM -based message classifiers using
the network simulator. A CSV file stores the information
obtained from the train ing samp le. The proposed LSTSVM
(9)
is evaluated against other methods already in use, such as
Here, define the besides BPNN [4] and SVM -MFM [9], using performance metrics
including True Positive Rate (TPR), False Positive Rate
and . With these notations, (FPR) and accuracy.
Eq. (9) may be rewritten as:
(10)
(11)
The Lagrangian parameter is obtained from Eq. (10) and Eq.
(11)
(12)
Eqs. (14) and (16) lead to:

(13)
The equation will tell you which hyperplane
corresponds to the ith class (15). Obtain the hyperplane for
each class by doing it in this fashion, which classifier can
predict the class k=n for a test feature 'x' by using the
distance D fro m each hyper-plane. It is assigned the class Fig.3.TPR results between proposed and existing
related to the hyper-plane situated at the position closest to methods
the value 'x.' The following is an examp le of the decision
function for the LSTSVM classifier:

(14)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 329


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and SVM -MFM. According to the simulat ion's findings, the


BPNN SVM-MFM LSTSVM
suggested DTM possesses a high detection rate and the
35
ability to generalize. It is virtually unaffected by both the
30 cars' reputation and the malevolent cars' percentage.
25 However, in VA NETs, there are various attack methods, and
FPR(%)

20 the detection mechanism may in the future be updated to


15 resist other forms of malicious behaviour, such as Sybil and
DoS attacks.
10
5 REFERENCES
0 [1]. Engoulou, R. G., Bellaïche, M., Pierre, S., & Quintero, A.
(2014). VANET security surveys. Computer
1500 3000
number4500 6000
of messages 7500 Communications, 44, 1-13.
[2]. Chen, L., Tang, H., & Wang, J. (2013, June). Analysis of
VANET security based on routing protocol information. In 2013
Fig.4.FPR results between proposed and existing method
Fourth International Conference on Intelligent Control and
Information Processing (ICICIP) (pp. 134-138). IEEE.
BPNN SVM-MFM LSTSVM [3]. Al Hasan, A. S., Hossain, M. S., & Atiquzzaman, M. (2016,
96 September). Security threats in vehicular ad hoc networks.
In 2016 international conference on advances in computing,
94 communications and informatics (ICACCI) (pp. 404-411).
Accuracy(%)

IEEE.
92 [4]. J. Zhang, L. Huang, H. Xu, M. Xiao, and W. Guo, "An
incremental bp neural network based spurious message filter for
90 VANET ," in Proc. IEEE CyberC, Sanya, China, Oct. 2012, pp.
360–367.
88 [5]. Y. Liu, Y. Shi, H. Feng, and L. Wang, "Intrusion detection
scheme based on neural network in vehicle network," J.
86 Commun., vol. 35, no. 2, pp. 232–239, Nov. 2014.
1500 3000
number4500 6000
of messages 7500 [6]. P. K. Singh, R. R. Gupta, S. K. Nandi, and S. Nandi, "Machine
learning based approach to detect wormhole attack in
VANET s," in Proc. Workshops Int. Conf. Adv. Inf. Netw. Appl.
Fig.5.Accuracy results between proposed and existing Cham: Springer, 2019, pp. 651–661
method [7]. Haldorai and U. Kandaswamy, “Intelligent Spectrum Handovers
in Cognitive Radio Networks,” EAI/Springer Innovations in
Figure 3 shows that the TPR of LSTS VM begins to Communication and Computing, 2019.
rise significantly as the quantity of messages grows. As [8]. S. Murugan and Anandakumar H., “Study of Efficient Hybrid
Wireless Networks Using QoS-Oriented Distributed Routing
shown in Figure 4, the FPR of LSTSVM starts to go down
Protocol,” Cognitive Social Mining Applications in Data
when the percentage of malicious cars goes above 40%, and
Analytics and Forensics, pp. 213–235, 2019. doi:10.4018/978-1-
the number o f messages goes down. In Figure 6, the TPR o f 5225-7522- 1.ch011
BPNN and SVM -MFM goes down more gradually, [9]. F. A. Ghaleb, M. A. Maarof, A. Zainal, B. A. S. Al-rimy, A.
whereas, in Figure 4, it goes down more sharply with the Alsaeedi, and W. Boulila, "Ensemble-based hybrid context-
probability derivation (PD), reputation is regarded as the aware misbehavior detection model for vehicular ad hoc
conditional probability (CP), and it is the main influence of network," Remote Sens., vol. 11, no. 23, 2019, Art. no. 2852.
BPNN, which is the case even though BPNN is also [10]. Khot and M. Dave, "Position falsification misbehavior detection
pretentious by the reputation or the proportion of malevolent in VANETs," in Mobile Radio Communications and 5G
vehicles. As shown in figure 5, the influence of malevolent Networks. Singapore: Springer, 2020, pp. 487–499.
cars with an average reputation on LSTSVM is significantly [11]. Arulkumar, V., et al. "T ariff rate prediction for truckload based
on predictive analysis using machine learning." Int. J. Adv. Sci.
amp lified. LSTSVM has a pretty high level of accuracy, as
Technol 29 (2020): 5477-5482.
shown in Fig. 3–5. Th is level of accuracy is essentially
[12]. S. Sharanya and S. Karthikeyan, "Classifying malicious nodes
unaffected by the model's reputation or the fraction of in VANET s using support vector machines with modified
malicious vehicles. fading memory," ARPN J. Eng. Appl. Sci., vol. 12, no. 1, pp.
171–176, 2017.
IV. CONCLUSION AND FUTURE WORK
[13]. M. J. S. Aneja, T. Bhatia, G. Sharma, and G. Shrivastava,
An attack detection method for VANETs to guard "Artificial intelligence based intrusion detection system to
against fraudulent messages and message suppression is detect flooding attack in VANETs," in Handbook of Research
described in this work. First, a DTM based on LSTSVM is on Network Forensics and Analysis Techniques. Pennsylvania,
constructed to detect fake messages. The primary focus of PA, USA: IGI Global, 2018, pp. 87–100.
this model is the message itself and also the feature vector of [14]. Arulkumar, V., et al. "Super Resolution and Demosaicing based
self learning Adaptive Dictionary Image Denoising
the representation message provides data like event
framework." 2021 5th International Conference on Intelligent
descriptions and vehicle status. The results of the simulation
Computing and Control Systems (ICICCS). IEEE, 2021.
indicate that the message classifier that is based on LSTSVM
is quite successful. The proposed DTM is examined with the
assistance of several different decision logics, such as BPNN

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 330


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[15]. J. Gu and S. Lu, "An effective intrusion detection approach


using SVM with naïve bayes feature embedding," Comput.
Secur., vol. 103, 2021, Art. no. 102158.
[16]. Wu, Y., Meng, F., Wang, G., & Yi, P. (2015, August). A
Dempster-Shafer theory based traffic information trust model in
vehicular ad hoc networks. In 2015 International Conference on
Cyber Security of Smart Cities, Industrial Control System and
Communications (SSIC) (pp. 1-7). IEEE.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 331


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Issues and Future Challenges of Sentiment


Analysis for Social Networks- A Survey
R.Geethanjali, Dr.A.Valarmathi,
Full Time Research Scholar, Assistant Professor,
Department of Information and Communication Department of Computer Applications,
Engineering, UCE-BIT Campus,Tiruchirappalli,
UCE-BIT Campus,Tiruchirappalli, Anna University, Chennai,
Anna University, Chennai, valar1030@yahoo.com
geethanjaliyokesh18@gmail.com

Abstract— Sentiment Analysis is a approach that uses Natural


run campaigns, and distribute promotional offers.
Language Processing, Machine Learning, and Deep Learning Companies now have new methods for analyzing customer
to computationally identify, categorize, classify, and recover impressions using the data provided via networks, and they
human emotions from unstructured text. The most efficient are striving to employ algorithms to analyze people's ideas
and popular method for learning from and training social and attitudes. For corporate analytics and intelligence,
media datasets is deep learning. In a range of applications, fraud detection, and SA of customer feedback, many
including audio, picture, and natural language processing, it methods are used to evaluate the data on social media.
has been demonstrated to be more successful. A text block is Sentiment analysis (SA) is a method that uses machine
evaluated using the sentiment technique to determine whether learning (ML) and NLP to find and extract human
it is positive, negative, or neutral. Not all members of the sentiments from unstructured text (NLP). The most
public express their feelings in the same way; as a result, some popular sentiment analysis method is machine learning
do so through comments and ratings while others do so since it makes it simpler to train and evaluate social media
through texts that don't reflect the right frame of mind. This datasets.
evaluation lists the most typical and well-liked sentiment
analysis algorithms for social media data. The classification of The most popular strategies are rule- and lexicon-
positive, negative, and neutral reviews using “LSTM, K- based, in addition to machine learning algorithms. To
nearest method, Random Forest, Support Vector Machine, distinguish between the various target content
RNN, and MaLSTM” is explored and examined in this work.
components that are provided and the idea that is being
All of these classification methods were evaluated along with
their drawbacks and difficulties.
stated for each view, aspect-based sentiment analysis
leverages accompanying errands. Social networks,
Keywords— Big Data, Sentiment Analysis, Social microblogs, and other platforms on the World Wide Web
Networks, Machine Learning, Deep Learning are currently producing enormous volumes of data. The
massive volume of information includes insightful details
I. INTRODUCTION on perspectives that may be used to advance businesses
and other industries in the scientific and business fields.
Sentiment analysis (SA) is a technique for identifying It is nearly impossible to manually locate and extract this
and examining user emotional states in texts through important information from such a large volume of data
Natural Language Processing (NLP). It is effectively [3].
deployed in various applications like e-commerce [1],
public poll analysis, heuristic search, information User post sensitivity analysis enhances business
prediction , personalized recommendation, healthcare , decision-making. It's a technique for gathering opinions
and online instruction [3]. or ideas about a certain topic, location, or product from
online customer evaluations and categorizing them as
The fast expansion of these platforms has led to a shift positive, negative, or neutral according on people's
in user behavior from passive social network consumers sentiments toward the topic at hand. Emotions contain a
to active network content producers. China had 710 variety of highlighted values, including tri-gram and bi-
million Internet users as of June 2016, with a penetration gram [4] due to polarity and amalgamations. By using
rate of 51.7%, according to the 38th statistics report from training techniques, feelings and views are assessed by
the China Internet Information Center on the Support Vector Machines as both positive and negative
development of the Chinese Internet [5]. It included aspects. After NLP used ImageNet to recognize objects
almost 100 million daily bloggers, 242 million Microblog with success in 2012, deep learning techniques were
users, and 656 million mobile Internet users. In this introduced [10]. The results of statistical learning were
enormous volume of brief text messages, negative enhanced by DL algorithms in numerous fields. In recent
feelings are most frequently expressed. times additional standards for NLP applications like “SA,
machine translation, and question-answering systems
Online sharing and idea expression have increased have been added to a neural network-based NLP
dramatically since the development of digitization and web framework”.
technologies [1]. The most well-known and web
technologies [1]. The most well-known and commonly Researchers typically combine different Deep
used social media platforms among users include Twitter, Learning techniques onto a single model to increase
Instagram, Facebook, YouTube, and social networking sentimental analysis' effectiveness. “Some of the well-
sites. Governments, customers, and brands all utilize these known deep learning (DL) techniques include Deep
platforms to advertise goods and services, exchange ideas, Averaging Networks (DAN), Denoising Autoencoders

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 332


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

(DAE), Convolutional Neural Networks (CNN),


The Tibetan SA in this work [9] recommends a deep
Recurrent Neural Networks (RNNs), Long Short-Term
Memory (LSTM) networks, Bi-directional Long Short- learning algorithm to evaluate the efficacy of several
Term Memory (Bi-LSTM) networks, Gated Recurrent techniques for sentiment categorization using Tibetan
Units (GRU), and Multi-Head Attention” were used. microblogs. The most popular microblogging site used in
this study for sentiment extraction is Twitter, where
A. Motivation individuals can post their opinions. The author analysed
This report summarizes the significant research gaps reviews from the Twitter page cinema information set
identified following a review and analysis of all prior using the Hadoop framework and sentiment analysis on
sentiment analysis studies. People use a variety of means tweets in order to provide business intelligence
to communicate their emotions, including words, projections. The results are displayed as discrete parts of
comments, evaluations, and other visual indicators. The information on Twitter that display positive, adverse and
main challenge is gathering and exploring the range of neutral expressions.
feelings. The most difficult element is separating the
authentic information from the unreliable information A hybrid Sentimental Analysis model [10] that blends
that is transmitted over social media and networks, such fuzzy sets, semiconductor laws, unsupervised machine
as spam broadcast, fraudulent reviews and opinions, viral learning techniques, SentiWordNet-assisted enriched
posts, and so forth. Information these days is very active lexicon emotions, and fuzzy sets. The approach uses
and grows swiftly in the form of big data, which has its linguistic semantic categorization based on fuzzy sets
own distinct set of characteristics. As a comprehensive polarity models after doing traditional hybrid
information strategy, opinion mining and sentiment classification in the first place.
analysis do not find significant application work. As a
result, it emphasizes the necessity for greater sentiment Millions of individuals around the world use online
analysis research in order to meet present needs and social networks (OSNs) like Facebook and Twitter to
provide fresh strategies. The communicative analysis of connect with others [2]. The effectiveness of protection in
text-related data should be improved in the future to OSN increases with the elimination of fraudulent
accommodate new developments and research in accounts. The construction of the OSN model has the
Internet-of-Things (IoT) applications. Because nodes and the links to identify fake profiles on Twitter.
collaborative filtering only filters regularly sent messages
and rejects discrete messages, it suggests that the current SA of microblog entries and opinion mining were
mining services are ineffective. regarded by Kranjc et al. in 2015. blogging is gaining
popularity daily. Millions of people share their ideas on
II. BACKGROUND AND LITERATURE public platforms like Twitter and Facebook every day,
SURVEY resulting in billions of messages representing people's
attitudes and opinions.
This study's main objective is to use analytics to mine
knowledge and insight from massive amounts of data. It Due to linguistic diversity and the constrained
focuses on developing innovative and effective structure of microblogs, sentiment analysis over noisy
techniques for managing massive amounts of data poses a number of difficulties. Data sparsity is one
unstructured text, audio, and visual data. Businesses have of these problems, while open-domain problems and data
been mining social media networks for meaningful dynamics are other ones. Due to the data sparsity
information since 2000 using sentiment analysis [6]. limitation, a lot of strange and poorly built phrases can be
Although conventional approaches to sentiment analysis found in microblogs. The main focus of the open domain
have been used to analyze unstructured text for financial issue is the posts that users make. Users have the option
gain, they might not be the ideal choice for processing to offer comments on any topic, not only the domain
enormous amounts of sentiment data. The author argues being investigated. Data dynamics, which result from the
that it is critical to foresee the future growth of advanced enormous and unchecked number of users that frequently
data analytics approaches. In this essay, author [7] post to microblogs, is another significant issue.
attempts to address the fundamental problem of Microblogging data processing and real-time analysis are
identifying emotion polarity in South Africa. A thorough challenging due to data dynamics.
explanation of the procedure is given together with the
conventional way for determining the polarity of On social networking sites, people from diverse
sentiments. Data for the study was acquired from Amazon socioeconomic and cultural backgrounds post their
online product reviews. comments and opinions. Additionally, they express their
thoughts in their mother tongues, which encourages the
The studies on sentence-level classification and usage of technologies for mining multilingual viewpoints.
review have become crucial tools. The suggested Recently, certain bilingual and multilingual sentiment
methodology [8] uses ML and a domain-dependent model analysis methods have been developed. For bilingual SA,
to categorize twitter sentiments, which make use of a there are monolingual and multilingual sentiment
variety of textual elements, such as data from Twitter N- classifiers available (Yan et al. 2014). There is only one
grams. Additionally, the author compared three reference language that has a sentiment lexicon in the
alternative weighting techniques to investigate how monolingual sentiment classifier, thus other target
weighing affects the classifier's accuracy. The SVM languages must be translated into the reference language.
classifier performs better when a tweet sentiment score According to Balahur et al. in 2015. developed a bilingual
vector is included since it gives external comprehension. machine learning method in 2014 to analyze sentiment on
tweets in both Chinese and English. better than

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 333


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

contrasting remarks in Chinese and English individually. and categorized using text analytics and natural
Tweets are treated as a continuous stream of text using language processing.
both Chinese and English terms using a bilingual method. 2. Text Preparation: The extracted data needs to be
This bilingual approach analyzes the word stems in movie cleaned before analysis. Both non-textual content and
reviews posted on Twitter in order to generate feature analysis-relevant content are identified and removed.
vectors. Use SVM and N-Gram, two interchangeable
natural language models, to categorize tweets. 3. Sentiment detection: involves looking over the
extracted comments and concepts. Sentences
By examining attitudes in tweets regarding stocks, providing objective ideas (facts, factual information)
Smailovic et al. (2014) described a stream-based efficient
are eliminated, whereas sentences communicating
learning technique to forecast changes in stock price. This
subjective notions (opinions, views, and attitudes) are
approach, which is based on the Granger causality test,
asserts which is possible to predict changes in stock kept.
values many days in advance based on feelings stated in
tweets about stocks. This method divides the posted 4. Classification of Sentences: At this point, subjective
Tweets into three categories based on their sentiment: sentences are broken down into categories like
positive, negative, and neutral. Lau et al. describe a semi- favorites and haters, good and bad, positive and
supervised fuzzy product ontology mining method based negative, and others.
on social analytics (2014Conduct a fine-grained market
knowledge extraction to enhance product design and 5. Output Presentation: At its core, sentiment analysis
marketing strategies. The development of a general aims to turn unstructured text into information that
framework for stock price prediction by Li et al. (2014) may be used. Pie charts, bar charts, and line graphs are
provides a lexicon-based method for examining the effect used to present the text results after the analysis is
of news on sentiment dimensions. The general approach complete. Additionally, by creating a sentiment time
generates the sentiment dimensions using the Loughran- line with the chosen value, the remaining time can be
McDonald financial sentiment language and the Harvard calculated and graphically shown. (frequency,
psychology lexicon. percentages, and averages) as it changes over time.
Ortigosa et al. (2014) describes a Hybrid Method for IV.WHAT SENTIMENT ANALYSIS METHOD IS
emotional state-based adaptive e-learning system for
BEST? DOCUMENT, SUBJECT OR ASPECT
users. Obtain information from course participants that
teachers can use., particularly when adaptive systems are
being employed for online learning. The difficulty of It might be challenging to read people's written
anticipating the fundamentally concealed relationship emotions, especially when doing so in a large group. To
among the news posted and the exchange of stocks as a address this issue, a variety of sentiment analysis
main topic of Nassirtoussi etal(2015) .'s research. techniques are employed. Identification, evaluation, and
classification of people's feelings as positive (1), neutral
Recently, a variety of machine learning techniques, (0), or negative (-1) constitute sentiment analysis
such as SVM and probabilistic models, have been
proposed for text polarity identification. The curse of It helps businesses understand their brand
dimension, or the high dimension character of text, has perception, where parts of their product or business
produced a research gap despite stimulating require improvement, and how they may manage their
dimensionality reduction and feature extraction. Instead resources. To gather human reviews, a variety of polling
of dividing the massage into two phases, it makes more techniques are employed, including platforms for Voice of
sense to take the key ideas from each book. The feature Customer Analytics, Voice of Patient Analytics, and
set must be selected initially before feature values can be Voice of Employee Analytics. Even without such
extracted. Some methods to select representative word specialized tools, a corporation can nevertheless benefit
sets include chi square (Liang et al. 2014), local/global from social media sentiment analysis to learn important
document frequency, bag-of-words (Rong et al. 2014; information.
Balahur and Perea-Ortega 2015; Yan et al. 2014), feature
hashing (de Silva et al. 2014a; Rill et al. 2014), and
We will use specific examples to illustrate the
information gain (Habernal et al. 2014)
various approaches to sentiment analysis in this post. You
III.THE SENTIMENT ANALYSIS PROCESS can use this to decide which sentiment analysis technique
is ideal for you. Additionally, we'll examine the features
The time-consuming sentiment analysis procedure, that make Repustate's sentiment analysis API the fastest
which is used to examine sentiment data, consists of five and most precise in the sector and how it handles
different steps. They are as follows: See Fig. 1 ambiguous responses.

1. Data Collection: User-generated content from blogs, (A). Which Methods Are Used In Sentiment Analysis?
forums, and social media platforms is the first source
of information used in sentiment analysis. These facts Document-level, topic-level, and aspect-level are the
are transmitted in an erroneous manner and with the three different types of sentiment analysis techniques [1].
use of several words, slang phrases, writing styles, etc. Depending on the volume and complexity of the text data,
Practically speaking, manual analysis is impossible. these methods can be used. Let's take a closer look at
As a result, the data used in social media is extracted them.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 334


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

consideration. All of these subjects can be used to train a


1. Sentiment analysis based on Document machine learning model, which can then be adjusted to
Using the data in a document, sentiment-level meet business or industry standards. For instance,
document analysis attempts to categorise a sentiment or healthcare themes may include first aid, dosages of
emotion. Basic text analytics allows for the extraction of prescription drugs, patient wait times, etc., whereas
a document's semantics from three different aspects: word hospitality topics might include food, bookings, or
presentation, sentence structure, and document services.
composition. As long as the language has just one
3. Sentiment analysis based on aspects
emotion, it is simple. However, when phrase structure and
The Aspect-Based Sentiment Analysis (ABSA)
word representation are complicated, this strategy is not
approach pinpoints the key features or traits of a unit and
particularly helpful. In such circumstances, the subtleties
calculates the typical sentiment expressed for each
of the comment can be lost, and the outcomes might be
feature. A luxury watch is an example of a product with
incorrect.
features and attributes that could include battery life,
2. Opinion research based on a topic design, colours, etc. In other words, a more accurate
Opinions on a certain issue are discovered using topic- method of reviewing reviews is aspect-based opinion
based opinion analysis. This model identifies and extracts analysis.
themes from the data using keywords and total scores. The
subject's mood is also taken into

Fig 1: The Sentiment Analysis Processing Steps [1]

Fig 2: The Sentiment Classification Techniques [1]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 335


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

distinct layer. In sentiment analysis utilizing neural networks,


word embedding is used.
V.TECHNIQUES FOR INFERRING SENTIMENTS
2. Sentiment analysis based on SVM
Sentiment classification is a method for classifying a SVM is a supervised method that may be applied to both
target unit in a document as either positive (favourable) or regression and classification. SVM classification entails
negative (unfavorable). The three main classification positioning data points in space so that a plane or line may be
subgroups are as follows: used to quickly divide them. To characterize the text, in other
words. Text can now be represented in an n-dimensional plane
(A). Techniques Based On Lexicon
thanks to feature vectors. When there are little experimental
data, this is very helpful because it makes classification easier.
Literally, "vocabulary" refers to a person's vocabulary.
Unsupervised learning methods include word-based 3. Naive Bayes classifier sentiment analysis
strategies. Documents are looked up for both positive and The Bayes theorem serves as the foundation for the
negative phrases under them. The classification of words as probabilistic technique known as Naive Bayes classification.
positive or negative uses a certain dictionary. The document The chance that specific traits belong to a given class is the
is initialized at the top with a dot s, zero. The quantity of basis for classification. Using a Naive Bayes classifier for
points grows for each word in the document that is both positive and negative reviews in the training dataset, the
constructive. On the other side, each negative word lowers the number of base words is determined for each word in
overall score. In order to assess if a document has a positive Sentiment Analysis. Finally, using this likelihood, predictions
or negative sentiment, also known as document polarity, the are formed.
evaluation compares scores with a threshold number. These 4. Sentiment analysis based on maximum entropy
methods can be broadly divided into the following categories: The maximization of entropy serves as the foundation for
1.A case-by-case technique. this method. It is a probabilistic model, and the classifier's
The dataset gains domain specificity as a result, giving goal is to increase the classification system's entropy. A bag
the terms in the dataset context in addition to related
meanings. of words model can be utilized in sentiment analysis utilizing
the maximum entropy classifier, and it is then transformed
2. A dictionary-based technique
into document vectors. The only difference between it and a
Here, a group of words is initially chosen, and then its
naive Bayesian classifier is that the context here relates to the
synonyms and antonyms are looked up to be added to the
likelihood that each word falls into a particular category. The
group. Up till a stable set is produced, this process is repeated.
naïve Bayes classifier does not treat words independently as a
(B) Techniques Based On Machine Learning result.
5. Using a Bayesian network for sentiment analysis
These can be categorized as classification problems and
It is a probabilistic graph-based classification technique
supervised learning techniques. In essence, this approach uses
that is mostly employed to address decision-making issues.
classification to establish if a document is constructive,
Each edge of an acyclic graph represents a connection
destructive, or neutral. In order for the classification model to
between nodes, just as each node of a Bayesian network
learn to distinguish between features that differentiate
represents a random variable. Tween words are used to
between documents that are positively and negatively classed,
represent dependencies as a graph in sentiment research that
the model obviously needs a training set. The actions are as
use a Bayesian network. When the training dataset is huge,
follows:
this is helpful. It offers a lot of research potential but is not
1. Text-Vector frequently utilized for sentiment analysis.
The document vectors are computed using the document
(C) Techniques Based On Hybrid Model
term and inverse frequency. Only words that truly offer a good
Better results and outcomes are produced by sentiment
or negative description words from a specified dictionary are
analysis using a hybrid method. In comparison to a pure
taken into account.
vocabulary-based strategy and a machine learning technique,
2. Classification the classification performance of a hybrid approach
For classification, a number of methods can be utilized, combining a vocabulary-based technique and a machine
including Naive Bayes and linear regression. Classifiers can learning technique was greatly improved. Example: SAIL,
be probabilistic, linear (like SVM and neural networks), rule- pSenti
based, or decision-tree based (such as Naive Bayes,
Maximum Entropy, or Bayesian Network). Deep learning and VI.APPLICATIONS OF SENTIMENT ANALYSIS
neural networks can also be used to analyze emotions.
Academics and businesspeople now have a practical
Some examples of machine learning-based techniques are understanding of SA because of increased availability of
1. Sentiment analysis using neural networks. sensitive data from numerous forums, blogs, and social media
Sentiment analysis based on neural networks Deep platforms. Sentiment analysis can help businesses understand
learning includes neural networks, which are based on the people's attitudes and specific customers'

human brain. A neural network has three stages: input, preferences based on their past decisions. As a result, it
hidden, and output, with a weight assigned to each node in a can assist them in customizing their products and services to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 336


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

meet their specific needs. The following are the several SA evaluate their situation by considering popular support or
application domains depicted in Fig 3: opposition and adjust as necessary. This can be done by
monitoring how popular they become online throughout the
course of their careers. One approach to do this is through the
1. Health Care
use of social media platforms [15]. Finding the conclusion
The most popular area in this field is healthcare. It is
holder, linking the hypothesis to the issues, separating the
used to analyze the opinions made by users of various social
public folks, and implementation are some of the challenges
media platforms, including Twitter, Facebook, etc.,
in this discipline.
concerning their health. Health care professionals can use this
sentiment dataset to understand the emotions and issues of
their patients and to take appropriate action. This data can be 5. Analysis of Sports Sentiment
used by hospitals to evaluate their performance in perspective Nowadays, sentimental analysis can be used in many other
of patient expectations. It is easy to identify whether a sports. Sports fans want to communicate their feelings and
sentiment is favorable or negative by assigning each one a opinions on social media about how their team and players are
score. Furthermore, it can help medical facilities to determine performing. It can be used with the right statistics to evaluate
if patients are satisfied with their care or if there is space for the opinions of fans and their level of involvement with a
improvement. [17]. particular athlete or event. Examining US sports fans' tweets
on the FIFA World Cup 2014 has been used in research [19]
to measure their emotional responses to the game's holder,
who has the power to express his ideas implicitly. Irony is
most frequently found in online

content [20]. For instance, "Sure, I'm glad my windows


crashed right in the middle of my assignment." Despite the use
of positive words like "glad," the sentence is mocking.

VII.ISSUES AND CHALLENGES IN SA


Fig 3: Sentiment Analysis Applications [1]
The major limitations faced in sentiment analysis are outlined
2.Government Intelligence and discussed below in Fig4.
Government intelligence is a key field of sentiment
analysis. It can be used to gauge public sentiment on
impending initiatives or policies that will have an impact on
laws and regulations. The results of a freshly enacted
government policy can likewise be tracked and predicted
using this domain [16]. Using sentiment analysis, we can
determine how the general public will respond to a scandal or
a topic of contention.

3.Finance Sentiment Analysis


A recent area of study in finance is sentiment analysis.
Economic news can be studied using sentiment analysis in the
Fig 4: Challenges in Sentiment Analysis
finance industry. Additionally, it has the ability to forecast
stock market behaviour and potential trends. By analysing the a. Domain-Specific
tweets of several important financial analysts and decision- The context in which a word is used has a major impact
makers, it is possible to do so. It is possible to understand how on how it is viewed. Hence it is a domain change depending
sentiment analysis is used in real-time finance by assigning on the context of their referral. For instance, the word "soft"
words positive, negative, or neutral sentiment values. For denotes warmth in a positive way, yet applying it to athletes
instance, the terms "good," "profit," and "growth" all have may be offensive. It is a particularly important factor to think
positive values and in contrast, terms like "risk," "drop," about when researching about sentiments. oriented field [11].
"bankruptcy," and "loss" all have low scores. Sentiment The connotation of words can
analysis can be used to analyze client communications and
identify dishonest behaviour. It can assist experts in finance
b. Multiple Opinions in a Sentence
and investors in taking advantage of the market and managing
Multiple views can be expressed in one statement by the
their market risk [18].
opinion holder, along with factual and subjective data. To
4. Politics determine the complete strength of opinions, a comprehensive
Sentiment analysis can be used to track political biases as analysis of sentiments must be conducted. "The restaurant has
well as general public opinions and attitudes. Political parties a beautiful ambiance, but the food is fairly expensive," as an
example. The "ambience" aspect of the statement has a
may benefit from having a better understanding of voter positive polarity, while the "food" aspect has a negative
desires and issues. Political parties or leaders can therefore polarity.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 337


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

c. Handling of Negatives is necessary to give words varied weights based on the


One of the biggest challenges in sentiment analysis is intensity of the sentiment they convey.
handling negatives because it changes the flow of the text [6].
The words "no," "not," "can't," and "shouldn't" are among
e. Multiple-language sentiment processing:
them. As part of mood analysis, the degree of denial must be
Social media networks with multilingual posts challenge
determined. Comparing "The movie wasn't good, but the
sentiment analysis to with levels of consistency and accuracy.
actors did well" to "This battery will not operate for a long
Chinese, Dutch, Spanish, Aurbi, and a few more one-for-two
time," the negative in the latter statement is more general.
level languages including Chinese, English, and German,
English, have recently been the subject of research
d. Subjectivity Detection classification reviews. In addition, the most of them use
Identification of subjectivity is yet another important English as a target language.
aspect of sentiment analysis. This activity is performed to
keep the subjective data for later processing while removing
f. Additional contributions in intense thoughts:
the factual data. For instance, "The movie is releasing on
The location of the negative can sometimes affect the
Independence Day." The audience for the Fourth of July
text's valence. If a negative appears near to an adjective, the
holiday will grow, and it will include both subjective and
polarity is taken to be the opposite of the adjective's polarity.
objective data. Consequently, a careful evaluation is required.
Consider the statements S9, which belongs in the positive
category, and S10, which belongs in the negative category. In
e. Sarcasm Detection order to categorize anything when the adjective "not" is
To detect sarcasm, a comprehensive sentiment analysis present, the polarity is set to the opposite of the adjective's
must be performed. A person with an opinion can polarity. The sentence will be classified as negative while it
communicates it implicitly via using sarcasm. Irony is most should be positive if sentence S11 is taken into consideration.
commonly found in online content [9]. For instance, "Sure,
It's a good thing my computer crashed in the middle of my
g. Prediction time horizon:
schoolwork. The statement is sarcastic despite the use of
Researchers have recently paid a lot of attention to the
terms like "happy." Despite all of the research that has been
study of temporal sentiment analysis and the patterns in
done so far, the problem has still not been fully resolved.
people's sentiment through time. Using time stamps, the
method extracts subject patterns. By narrowing the prediction
VIII. SUGGESTION FOR FUTURE RESEARCH IN SA
time horizon, the connection between news impact and intra-
day stock price return is investigated.
Recently there have seen a significant amount of research
globally in the research is sentiment analysis. Sentiment
Future analysis has the potential to create systems that can be IX. NOVELTY OF THE RESEARCH AND IMPORTANT
successfully used in practical applications. STUDY RESULTS:

These massive data sets can now be used to disclose


a. sarcastic turns of phrase:
user opinions in large part due to NLP and deep learning. The
A lots of research need to be carried out in sentimental
development of hybrid-based deep learning models as a
analysis for sarcastic statements. Consider a phrase S6 that
feasible sentiment analysis solution has become a recent
balances good words with negative complements. S6 ought to
research topic. These algorithms are used to identify a text's
be classified as positive, even though it is negative.
emotional polarity and categorise it accordingly. When
compared to a single model's performance across all dataset
b. Slangs, symbols, misspelled words and idioms: categories, hybrid deep learning models increased sentiment
Some Sentiment classifiers wrongly classifies the phrases analysis's accuracy. When performing sentiment analysis,
because it contains slang, symbols, a misspelt word, and combining deep learning models improves using just one
idioms. Informal and symbol terms are frequently understood model. Design and construct hybrid deep learning models to
by people who have the same interests and can accurately enhance social network sentiment analysis performance. Deep
interpret what another person means by utilising the most Learning Hybrid Models Enhance emotion classification
recent slang phrases. accuracy while lowering computational expense.

Multilingual, multimodal sentiment analysis needs to


c. Annotated training data:
be studied as an additional area of study. To merge audio-
Classification is a method of supervised learning. The lack
visual categories, existing textual sentiment analysis methods
of readily available benchmark training data sets for sentiment
should be taken into consideration. When performing multi-
categorization has been emphasized.
label classification tasks, ABSA (Aspect
d. Sentiment strengths:
Currently, whether a word is good or negative, it receives Based Sentiment Analysis) techniques such as aspect
the same score. However, it would be feasible to give various term discrimination, aspect category detection, and its
words a varying weight based on how strongly they convey a sentiment classification combine RNN and CNN. Using
mood. Consider the sentences S7 and S8, which both have a MaLSTM to create a real-time hybrid deep learning model for
positive polarity, yet S7 would be more influential than S8. It sentiment analysis that will be built on recurrent neural

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 338


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

networks and support vector machines. 6th Int. Conf. Audio, Lang. Image Process., 2018, pp. 109–
112, https://doi.org/10.1109/ICALIP.2018.8455328.
We put a lot of effort into creating new models that are [9] H. Parveen, S. Pandey, Sentiment analysis on Twitter Data-
better at evaluating emotional responses in people. In order to set using Naive Bayes algorithm, in: Proc. 2016 2nd Int.
Conf. Appl. Theor. Comput. Commun. Technol. iCATccT
summarize to any language while performing prediction 2016, 2017, pp. 416–419, https://doi.org/10.1109/
tasks, we also put a lot of effort into making these models ICATCCT.2016.7912034.
language independent. In order to do topic recognition and
[10] R. Feldman, Techniques and applications for sentiment
sentiment classification simultaneously using a single model, analysis, Commun. ACM 56 (4) (2013) 82–89,
the model can be created to operate in parallel mode. Expand https://doi.org/10.1145/2436256.2436274.
the strategy to include other OSNs, discover new methods and [11] R. Rodrigues, C.G. Camilo-Junior, T. Rosa, A taxonomy for
techniques for analyzing non-text signals, and attempt to sentiment analysis field, Int. J. Web Inf. Syst. 14 (2) (2018)
understand their underlying contents in order to protect the 193–211, https://doi.org/10.1108/ IJWIS-07-2017-0048.
organization's reputation. [12] B.A. Rachid, H. Azza, B.G. Henda, Sentiment analysis
approaches based on granularity levels in: WEBIST 2018 -
Proc. 14th Int. Conf. Web Inf. Syst. Technol., 2018, pp.
X. CONCLUSION 324–331, doi: 10.5220/0007187603240331.
[13] Z. Hailong, G. Wenyan, J. Bo, Machine learning and lexicon
The analysis of sentiments, thoughts, and opinions in
based methods for sentiment classification: A survey, in:
relation to particular topics, things, people, groups, and Proc. - 11th Web Inf. Syst. Appl. Conf. WISA 2014, 2014,
services is known as sentiment analysis. This paper gives a pp. 262–265, doi: 10.1109/WISA.2014.55.
detailed survey on supervised, unsupervised, and hybrid [14] J. Ramteke, S. Shah, D. Godhia, A. Shaikh, Election result
Sentimental Analysis approaches along with a recent research prediction using Twitter sentiment analysis, in: 2016
review. Various feature evaluation and classification International Conference on InventiveComputation
algorithms for SA are also reviewed in this research. The Technologies (ICICT), https://doi.org/10.1109/
inventive.2016.7823280.
evaluation of features is contrasted to establish the minimal
and optimal feature vector set. This paper also includes the [15] A. Kumar, A. Joshi, Ontology driven sentiment analysis on
social web for government intelligence, in: ACM Int. Conf.
issues identified during classification is that the simplistic
Proceeding Ser., vol. Part F1276, 2017, pp. 134–139, doi:
usage of only positive, negative and neutral groups. A 10.1145/3055219.3055229.
complete opinion's overall rating cannot be generated by
[16] S. Gohil, S. Vuik, A. Darzi, Sentiment analysis of health care
combining ratings from different lines or paragraphs. Dealing tweets: Review of the methods used, J. Med. Internet Res. 20
with snarky remarks, symbols, misspell phrases, and idioms (4) (2018), https://doi.org/10.2196/ publichealth.5789.
is still challenging. The existence of many languages and
[17] M.F. Tsai, C.J. Wang, On the risk prediction and analysis of
geographical contexts in social media posts makes it more soft information in finance reports, Eur. J. Oper. Res. 257 (1)
challenging to perform sentiment analysis with adequate (2017) 243–250, https://doi.org/ 10.1016/j.ejor.2016.06.069.
levels of consistency and accuracy. [18] A. Joshi, P. Bhattacharyya, M.J. Carman, Automatic sarcasm
detection: A survey, ACM Comput. Surv. 50 (5) (2017),
REFERENCES https://doi.org/10.1145/3124420.

[1] Kanika Jindal,Rajni Aron., A systematic study of sentiment [19] N. C. Dang, M. N. Moreno-García, and F. De la Prieta, “Sentiment
analysis for social media data, 2214-7853/© 2021 Elsevier Ltd, analysis based on deep learning: a comparative study,” Electronics, vol.
https://doi.org/10.1016/j.matpr.2021.01.048 9, no. 3, p. 483, 2020.View at: Publisher Site | Google Scholar
[2] Priyadharshini, V.M., Valarmathi, A. A novel spam detection [20] M. J. S. Keenan, Advanced Positioning, Flow, and Sentiment Analysis
technique for detecting and classifying malicious profiles in online in Commodity Markets: Bridging Fundamental and Technical
social networks Journal of Intelligent and Fuzzy Systems 2021, 41(1), Analysis, Wiley, Hoboken, NJ, USA, 2nd edition, 2018.
pp. 993–100
[3] S. Shayaa et al., Sentiment analysis of big data: Methods,
applications, and open challenges, IEEE Access 6 (2018)
37807–37827, https://doi.org/10.1109/
ACCESS.2018.2851311.
[4] Q.T. Ain et al., Radiotherapy is the gold standard in treating
bone malignancy. Effective in 50-90 % expectancy months,
8 (6) (2017).
[5] L. Yue, W. Chen, X. Li, W. Zuo, M. Yin, A survey of
sentiment analysis in social media, Knowl. Inf. Syst. 60 (2)
(2019) 617–663, https://doi.org/10.1007/ s10115-018-1236-4.
\
[6] X. Fang, J. Zhan, Sentiment analysis using product review
data, J. Big Data 2 (1) (2015),
https://doi.org/10.1186/s40537-015-0015-2.
[7] S. Naz, A. Sharan, N. Malik, sentiment classification on
twitter data using support vector machine, in: Proc. - 2018
IEEE/WIC/ACM Int. Conf. Web Intell. WI 2018, 2019, pp.
676–679, https://doi.org/10.1109/WI.2018.00-13.
[8] B. Sun, F. Tian, L. Liang, Tibetan micro-blog sentiment
analysis based on mixed deep learning, in: ICALIP 2018 -

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 339


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Location based 5G Transmission for LEO


Satellite Communication using BPAM
Technique

Sivasakthi T Barath Narayanan R Palani U


Department of Electronics and Department of Electronics and Department of Electronics and
Communication Engineering Communication Engineering Communication Engineering
IFET College of Engineering IFET College of Engineering IFET College of Engineering
Villupuram, India Villupuram, India Villupuram, India
sakthi15ifet@gmail.com danybarath513@gmail.com palani_uin@yahoo.com

Vasanthi D Preethi R Pooja M (IEEE Member)


Department of Electronics and Department of Electronics and Department of Electronics and
Communication Engineering Communication Engineering Communication Engineering
IFET College of Engineering IFET College of Engineering IFET College of Engineering
Villupuram, India Villupuram, India Villupuram, India
dvasanthime@gmail.com preethiraguraman2205@gmail.com poojaece4444@gmail.com

Abstract—One of the most important technologies for also reducing signal attenuation, both of which are
future communications is the satellite network. Traditional important factors in cutting transmission costs.
geostationary orbit (GEO) satellite systems, on the other
hand, suffer from severe latency and high launch costs. As Although LEO satellite communication has some
a result, low-earth orbit (LEO) satellites have arisen as an advantages over other wireless communication
alternate approach to GEO satellites' inherent issues. The technologies, LEO satellites were constantly getting up
inter-satellite link (ISL) has been intended to deliver because of the distance coverage is low and about the
greater system performance and more reliable service in globe range at huge rates. Each LEO has a set amount of
tandem with the advancement of LEO satellite technology. time to provide services to users, which is frequently less
In addition, because of its high data rate and compact
than the length of the call. To ensure that the user's ability
terminal size, the optical ISL has been highlighted. In the
proposed system LEO satellite communication using
of calls, facsimiles, or the conveying message to
BPAM technique was employed for 5G transmission is communicate is not hampered, several or more satellites
based on the Orthogonal frequency division multiplexing is may be necessary during the user call procedure. When
a method of modulating a several different channels in a the present service satellite is no longer capable of
digital signal to reduce interference. providing proper service to the customers, it can be
replaced with a satellite of visible. Users are generally
Keywords-component: Low Earth Orbit satellite network, covered by many satellites at the same time due to the
Mobile phone, Packet data ratio, Average delay, Energy
peculiarities of LEO satellite constellations. The user must
consumption.
choose the satellites available at the current time while
I. INTRODUCTION starting a handover or a new call. Unlike the terrestrial
Satellite communications can enhance and increase wireless network, when using ground base station services,
the range of terrestrial communications by providing a user needs to be examined the signal strength by
continuous wireless signal coverage. Future wireless checking the range of the signal is capable of making a
networks are expected to use it. LEO communications, decision to connect the satellite communication.
which operate at altitudes ranging from 500 to 1500 km, Satellite network users were unable to choose a
have sparked widespread interest in recent years due to switching object depending on the signal strength obtained.
their potential to provide worldwide wireless connectivity Because in networks of satellites, different elements such
with increased data rates. On the other hand, its as the access satellite's ability to serve the user and
transmission signal is sent by medium- and high-earth orbit system's load balance must be considered. They
latency satellites is lower, allowing LEO satellites to reach correspond to a variety of strategies for handover,
greater bandwidth and real communication. Furthermore, including remaining service time. There are as many
the lower orbital inclination reduces the transmission alternative handover mechanisms as possible, such as the
power requirement by having the earth station antennas time left in service and maximum number of channels, as
and satellite must be in a highly directional way and while well as maximum received data and signal strength.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 340


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A. Bottcher and R. Wemer suggested an approach lines represent a possible relation (The satellite is capable
for selecting the handover satellite based on the highest of providing services to customers, but the quality of those
elevation angle for the satellite handover strategy. The services is currently poor). The connection at a time t, for
strategy's handover performance isn't flawless, however, example, can be expressed as G, where the characters X
because the satellite's maximum elevation angle may not and Y signify for user and satellite sets, correspondingly,
always match the real link quality. M. Gkizeli devised for with E standing for the user- satellite relationship of
satellites, there is a hard changeover technique and a connection The element is 1 if the user is linked to the
mixed channel adaptable handover method of which rely satellite; otherwise, it is 0. Information on the differences
on signal strength as a satellite handover standard. The in Various satellites and users have different service levels
highest maximum idle channels, longest visible duration, can be gathered.
and elevation angle were used to select satellites for new
A. CHANNEL QUALITY
call and handover services, with the impact of the various In this study, it is examined that the satellite can
influences of the combinations performance of the system simultaneously accommodate several single antenna users.
analysed. Wuen at proposed a theory-based on satellite A uniform array with antenna M is placed on the satellite,
handover that uses the lowest route approach to discover with the number of antennas indicated on x and y axis.
the user's optimum handover technique based on distinct Assuming a half-wavelength separation between the
satellite selection criteria assigning variable weights to the antennas. Because several wavelengths divide different
links in the satellite linked graph. In LEO users in space, it's fair to assume that the channels that
communications, selecting handover satellites is difficult. connect satellites and users are unconnected. A ray tracing
Considering a single aspect is obviously insufficient. To based channel model method was used to calculate the at
get the best satellite selection, some researchers advocated instant t and frequency, the downlink channel response
weighing many parameters. However, there is no between the LEO satellite j and user i. The number of
consensus on how to calculate the weight, when to initiate propagation pathways of user channels is determined by
the handover, or which indications to use. doppler shift, channel gain latency, where speed of light is
The weight of a particular the quality of the c, orbit's height is h, elevating angle is t, and A is
channel between the satellite and the user the moment, the atmospheric fading.
satellite's total amount of users is currently servicing, and B. REMAINING SERVICE TIME
the amount of power that the satellite can give to the user Satellites move around the earth at a faster rate,
determine the benefits of the user and the satellite. significantly faster than most users on the planet, satellite
According to existing LEO satellite handover strategies, movement is the primary cause of handover in LEO
the entropy method is employed to reduce this typical satellite communications. The quantity of service time a
multi-objective problem to a single objective problem, service that a satellite can give to consumers is a crucial
which serves as the foundation for users to access measure that is tied to the number of service handovers.
satellites. When compared to alternative strategies, the The earth station is in charge for determining each
simulation results reveal that this strategy has certain satellite's range of coverage to each site in its
benefits in terms of handover times, and has received administration to the study depends on the satellite
SNR, and system load balancing. constellation's predictability.
II. SYSTEM MODEL When a user requires communication system access
Satellite communication will predominantly consist in they can send data to the earth station about their location,
the future of LEO satellites, as communication which will return a 2uN the initial row of a dimensional
technologies progress. As the orbital altitude decreases, matrix elements representing the second line element, as
satellite’s speed increases while their service range well as the satellite j's coverage start time in the area
decreases. The number of satellites must increase in order representing the coverage end time of arrival of satellite j
to achieve worldwide coverage requirements. From the in the area i, N being the constellation's number of
standpoint of the user, there are frequently many satellites satellites. As a result, at instant t, the satellite j's
accessible for users to access at any given moment. In this remaining service period to user I.
study, we measure the user's satisfaction with the satellite
C. NUMBER OF USERS
service.
Communication pervades many various facets of
The interactions between satellites and their users are people's lives. As the number of different communication
fluid from the standpoint of the system. We divided the terminals develops at an exponential rate, the pressure on
period into n time frames to make research easier. The link satellites becomes increasingly heavy. One of the
can be deemed fixed and expressed by a graph structure in reference variables when consumers evaluate satellite
each time slot. User’s access and handovers are handled access should be the number of users serviced by
consistently by the earth station. The solid lines reflect the satellites, to avoid an inequitable situation in which
real users and satellites are connected, while the dotted
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 341
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

certain spacecraft is congested while others are call, as well as the related sub cell ID, for each day of the
underutilized, wasting satellite resources. The total week.
amount of users of the satellite service at any given time. C. At the conclusion of each day, it will calculate the
E denotes the matrix of connections between two points, total number of calls and total call time.
the user and the satellite and N max has the maximum D. The database remembers the cell ID and the
capacity of the satellite. associated time whenever a MN changes cell. As
D. SATELLITE POWER DISTRIBUTION
previously stated, an appropriate timing table must be
Satellite power is frequently limited, therefore maintained to manage these data.
satellite power is very precious. To make the most of B. TIME AREA CONSTRUCTION
satellite power, we plan to assign power adaptively based
In order to create the temporal space, the BPAM
on channel circumstances. In order to maximise the
approach divides the Earth's surface into numerous cells,
transmission rate, If more power to the channel will be
each of which is divided into several sub-cells. Every
allocated, and Less power if the transmission is bad will
sub-primary cell's cell is at the centre. A geographical
be allocated. This work uses the system's total channel
zone ID is assigned to each parent cell. A TAI is also
capacity at the moment t, N is the channel strength
present in each sub-cell. Though the TAI of different sub
between user I and satellite j, and is the noise spectral
cells of different cells is the same since every TAI sub
energy density. Apply the Lagrange multiplier approach
cell is made up of its corresponding TAI cell, the TAI of
to obtain the global optimum solution.
different sub cells of different cells isn't. This is
frequently done to avoid a large TAI variance. The two
types of time zones that will be discussed right now are
III. PROPOSED MODEL
fixed and dynamic time zones.
In this research paper 5gbpam, we present Bipolar A. Fixed-time region: Once the earth's surface has been
Pulse Amplitude Modulation (BPAM), a new mobility partitioned, all MNs are similar in a constant-time
management technique for IP satellite networks that region- based fully contraction. Each MN is assigned to a
combines the notions of precise and flexible position Home Cell, which is where they will spend the
control at different times of the day. The following facts majority of their time during the week. It's also linked
back up the study's core argument. Based on previous to your personal sub-mobile, where you spend the most
investigations, the MN has a signal movement pattern of your time. Overseas sub cells are additional sub cells
like that it follows after. The maximum MN spends the in the host mobile. Alien cells are cells that are in a state
most time if an IP addressing system is employed based of relaxation. An MN's neighborhood and primary sub-
on a ground station's real-time coverage region. Most cells may or may not be the same.
time in each cell in a day. During sleeping hours, for B. Dynamic time area: Each cell in a dynamic time area
example, people spend the majority of their time at home. is formed using the database of each MN, guaranteeing
The majority of mobile users spend the most of that the main sub-cell and local sub-cell of each MN are
their time idling. However, if we look at the call lists of equal. Because each MN has a new cell and a relative
any MN over the course of a week, we can observe that sub cell, this form of the temporal area building is
each MN has a distinct busy and idle time of day. The difficult. Only the BPAM fixed time zone construction
quantity of calls received during sleeping hours, for type will be used in this situation.
example, is smaller than during working hours.
Depending on MN movement and the quantity of calls C. MOVEMENT DETECTION
received in MN from these two areas, the entire 24 hour Minnesotans are likely to have a GPS receiver to
period is divided into two halves. help them locate their cell phone. Motion detection can
be done in two ways for two different texts.
A. BPAM METHOD DESIGN
Database creation, movement detection, Because the active phrase applies correct position
registration, and connection setup, as well as timing area management, every time an MN travels, that is, to a
construction, are all part of the BPAM method's design. different cell or sub-cell, it registers itself via a binding
In this PAM not used for this communication application update. The MN's location is determined by its IP
because It only uses the non-negative amplitude levels. address, which includes information about its primary
For each MN, a database with the following attributes and secondary home cells.
must be created. To put it another way, we build a pager-like system
A. It will be a weekly database, which means that it will using free location management. Because when the
be updated every week. parent sub-cell of a parent cell changes, an MN is not
B. It will provide the starting and finishing times of each required to register. You must, however, register when
changing the source cell. The number of connection
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 342
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

updates is reduced in idle mode because to the rarity of Step 6: Whenever the MN gets a handover demand, it
MN movement. According to the GPS, this comment advances it to the accompanying Local Forwarding is an
contains a Minnesotan. GPS is utilised to determine your energy efficient scheme.
location when you get a message. The database also
F. LOCAL FORWARDINGS SYSTEM
contains the cell ID and sub cell ID. As a result, MN is
the communication's intended recipient.
At the point when a handover happens, a lively MN
D. REGISTRATION advises its new AR of the old AR's area at the hour of the
There are two types of registration procedures to move. In the wake of getting this message, the new AR
choose from. It detects when an MN changes its home illuminates the old AR that the MN has effectively
sub cell or home cell for the active phrase. The idle finished a handover. Therefore, the old AR sends parcels
phrase is registered when an MN switches its home cell. bound for the hub to the new AR. Since the MN, the new
MN's location is managed via the suggested BPAM AR, and accordingly the old AR are only trading control
approach based on time. The connection with care must messages during this sending approach.
be treated whenever a handover occurs in an ongoing ADVANTAGES
call, as well as anytime it changes its sub cells or cells, 1. The foremost advantage of this strategy is that it
because it is employed that both precise and loose combines the advantages of both precise and
location management at the same time. Another thing to unintentional location management. As previously noted
keep in mind is that whenever a new connection is ready in the preceding work, the constraints of employing one
to be established, it is needed to track down the MN and mobility management technique are overcome by
create a line of communication with her. The following combining both mobility management systems at the
BPAM method must be used to lay out an association identical time.
and play out a flawless handover. 2. Divide the entire amount into active and idle periods
E. ALGORITHM OF BPAM supported the activity. At anybody time, not all MN is
active. The number of binding updates is decreases as a
The BPAM algorithm can be explained with the step
consequence.
by step procedure as stated below:
3. Many MNs now work at night because the quantity of
Step 1: When a communication request is disturbing night employees in workplaces expands as a result of
to an MN, the algorithm looks within the database for the the fast- growing IT sectors. As a consequence, the
MN's phrase, which indicates whether it's active or idle. entire binding update management procedure could
even be completed in as little as 24 hours. The number
Step 2: Assuming the MN is in the dynamic expression
of binding updates generated. As a result, the duration
mode, it'll examine exact area the board; on the off
of a single burst is reduced.
chance that not, it'll talk about free area the executives.
Step 3: Because the MN is now in precise location IV. SIMULATION RESULT
control, its location is additionally immediately To assess the BPAM approach's performance, it
ascertained by looking up its IP address. As a result, is compared to MIP and Handover Independent Mobile
putting in place a different relation to the MN is IP. To evaluate each option, the value of handover is
straightforward. used. The results of the simulation were run employing a
network stimulator. The satellite coverage zone is taken
Step 4: The channel between the two communication
under consideration to be square, with surfaces that
MNs alters when it gets a handover request, potentially
cherish those of a 650-kilometer- radius circle. Node
causing the nodes to disconnect. To require care of the
density is calculated by dividing the absolute number of
connection working well, several adjustments are
hubs separated from the all-out region covered. The
necessary kind of handover techniques are developed to
effect of cell shapes on administration costs is
beat this issue. The identical basic routing strategy can be
overlooked with the end goal of effortlessness, and cells
used that was previously taught for Mobile IP because the
are viewed as square. A paging region is made in Mobile
locations of MNs are precisely monitored here. MIP is
IP by joining the inclusion areas of four satellites: one
that the identical thing.
satellite and its four neighbours.
Step 5: MN's position may now be discovered using
Each satellite is within the identical orbit because of
GPS because it is not meticulously maintained. The
the one preceding it, and their orbits are contiguous.
programme then analyses the database to establish the
Within the recommended strategy, however, is reliant on
MN's true location, i.e., which cell and sub cell it lives in.
the cell size. The results of the simulation are in shown
Communication is now straightforward, as previously
Fig.1. In terms of cost, the suggested approach beats,
said.
what's more, an MIP that is autonomous of the
handover. More modest square-formed cell lengths have
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 343
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

a higher administrative cost. Because of the quick health risk. To estimate the amount of bandwidth saved by
restricting updates that happen when an exorbitant adopting FMC, the Mobile Bandwidth Saving Estimate
number of portable hubs, cross the cell limit, this is a model was designed. An estimate of bandwidth saved is
typical event. formed supported the number of mobile users and their usage
habits. it has been proven that by employing this strategy,
Table 1: Parameters of the Satellite
70% of the spectrum is also conserved.
Satellite coverage area 800[km] REFERENCE
Radius
[1] U. Siddique, H. Tabassum, E. Hossain, and D. I. Kim,
Satellite ground Speed 8[km/sec]
“Wireless backhauling of 5G small cells: challenges and
8[km/sec] 18[km/sec](60km/hr) solution approaches,” IEEE Wireless Commun., vol. 22, no.
Active Phrase duration 12hr 5, pp. 22-31, Oct. 2015.
[2] T. Wang, S. Wang, and Z. Zhou, “Machine learning for
Α 16% 5G and beyond from model-based to data-driven mobile
Λ 0.0009 wireless networks,” China Commun., vol. 16, no. 1, pp. 165-
Number of nodes reside in 106 175, Jan. 2019.
the coverage area
[3] X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless
∆t 1sec backhaul networks: Challenges and research advances,”
HMN,LD 2 IEEE Netw., vol. 28, no. 6, pp. 6-11, Nov./Dec. 2014.
HAR,AR 1 [4] Y. Ruan, Y. Li, C. Wang, R. Zhang, and H. Zhang
S 5 “Performance evaluation for underlay cognitive satellite-
terrestrial cooperative networks,” Sci. China Inf. Sci., vol.
61, no. 10, pp. 1-11, Oct. 2018.
[5] Z. Zhang, Y. Li, C. Huang, Q. Guo, L. Liu, C. Yuen and
Y. Guan, “User activity detection and channel estimation for
grant-free random access in LEO satellite-enabled Internet-
of-Things,” IEEE Internet Things J., vol. 7, no. 9, pp. 8811-
8825, Sep. 2020.
[6] N. UL Hassan, C. Huang, C. Yuen, A. Ahmad, and Y.
Zhang, “Dense small satellite networks for modern terrestrial
communication systems: benefits, infrastructure, and
technologies,” Wireless Commun. Mag., vol. 27, no. 5, pp.
96-103, Oct. 2020.
[7] C. Huang, A. Zappone, G. C. Alexandropoulos, M.
Fig:1 Management cost Vs Square-shaped cell length
Debbah and C. Yuen, “Reconfigurable intelligent surfaces
V. CONCLUSION for energy efficiency in wireless communication,” IEEE
The BPAM, which minimises the value of handover, is Trans. Wireless Commun., vol. 18, no. 8, pp. 4157-4170,
shown during this study. After that, the phrase handover is Aug. 2019.
presented, likewise because the challenges that include it in [8] B. Di, L. Song, Y. Li, and H. V. Poor, “Ultra-dense LEO:
satellite communication. Then it is tested that MIP, P-MIP, Integration of satellite access networks into 5G and beyond,”
Handover independent MIP, and other IP protocol IEEE Wireless Commun., vol. 26, no. 2, pp. 62-69, Apr.
management solutions. After that, it is necessary to went 2019.
over the suggested task and its advantages of the worth
analysis of diverse mobility management systems, [9] M. Werner, A. Jahn, E. Lutz, and A. Bottcher, “Analysis
furthermore as a comparison to the following component of of system parameters for LEO/ICO-satellite communication
the research provides access to the planned work. A networks,” IEEE J. Sel. Areas Commun., vol. 13, no. 2, pp.
simulation result of several mobility management approaches 371-381, Feb. 1995.
with the planned works is also presented to facilitate the [10] Madhavendra Richharia, “Satellite constellations,”
value analysis. It demonstrates that the BPAM technique Mobile Satellite Communications: Principles and Trends,
outperforms alternative IP protocols. As a result, it will be Wiley, 2013, pp.37-87
able to use it in the IP networks as a future satellite
communication channel. As a bonus, this method reduces [11] D. C. Beste, “Design of satellite constellations for
optimal continuous coverage,” IEEE Trans. Aerosp.
human exposure to radiation, which has been identified as a
Electron. Syst., vol. AES-14, no. 3, pp. 466-473, May 1978.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 344
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[12] C. J. Wang, “Structural properties of a low Earth orbit


satellite constellation - the Walker delta network,” in Proc.
MILCOM ’93 - IEEE Military Commun. Conf., Boston,
MA, USA, 1993, pp. 968-972.
[13] M. P. Wilkins and D. Mortari, “Flower constellation set
theory. Part II: Secondary paths and equivalency,” IEEE
Trans. Aerosp. Electron. Syst., vol. 44, no. 3, pp. 964-976,
Jul. 2008.
[14] J. Jiang, S. Yan, and M. Peng, “Regional LEO satellite
constellation design Based on user requirements,” in
IEEE/CIC Int. Conf. Commun. in China (ICCC), Beijing,
China, 2018.
[15] C. Dai, G. Zheng, and Q. Chen, “Satellite constellation
design with multi-objective genetic algorithm for regional
terrestrial satellite network,” China Commun., vol. 15, no. 8,
pp. 1-10, Aug. 2018.
[16] T. Savitri, Y. Kim, S. Jo, and H. Bang, “Satellite
constellation orbit design optimization with combined
genetic algorithm and semianalytical approach,” Int. J. of
Aerosp. Eng., vol. 2017, pp. 1-18, May. 2017.
[17] Chen, joy Iong Zong. "5G technology and
advancements in connected living-comprehensive survey."
Journal of Electronics 1, no. 02 (2019).
[18] Sharma, Nirmala, and Subarna Shakya. "5G Coverage
Planning for Urban Area at Kathmandu City, Nepal." Journal
of Electronics 4, no. 3 (2022): 152-167.
[19] X. Zhu and Y. Gao, “Comparison of Intelligent
Algorithms to Design Satellite Constellations for Enhanced
Coverage Capability,” in Int. Symp. Comput. Intell. and
Design (ISCID), Hangzhou, 2017, pp. 223-226.
[20] Federal Communications Commissions, One Web non-
geostationary satellite system (Attachment A), 2016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 345


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Detection of Selfish Nodes based on Node Energy in


Mobile Adhoc Networks – MANETs
R. Sarumathi V.Jayalakshmi
Research Scholar, VISTAS, Chennai, India School of Computing Sciences
Dept. of Computer Science Vels Institute of Science, Technology and Advanced Studies
RajeswariVedhachalam Govt. Arts College, VISTAS,Chennai, India
Chengalpet, India Email: jayasekar.scs@velsuniv.ac.in
Email: mathisaru@gmail.com

Abstract—One of the most essential self-configuring and data loss. A high end-to-end delay is caused by node failure in a
independent wireless networks is the MANET. MANET employs MANET network. To study the selfish node attack, a malicious
a large number of intermediate nodes to exchange information selfish node is put into the network, and a trust-based algorithm
without the need for any centralized infrastructure. However, for the selfish node attack is also suggested.In order to discover a
some nodes act in a selfish manner, utilizing the network's solution to this issue, we have developed an algorithm called
resources solely for their own benefit and refusing to share with S NRM for the detection of selfish nodes. The routing protocol
the surrounding nodes. Mobile ad hoc network se curity is a used in this paper for analysis is AODV. Using a simulation tool,
critical factor that is widely accepted. S elfish nodes are the PDR and end-to-end delay are evaluated and compared.
primary problem of MANET. In a MANET, nodes that are only
interested in themselves do not involve in the process of packet Keywords—Adhoc, MANET, Routing protocol, selfish
forwarding. A node can be identified as selfish or malicious due node,Trust, Trust-based algorithm,W ireless networks.
to some misbehavior reasons. S elfishness on the part of network
nodes may be a factor in the low delivery ratio of packets and
I. INTRODUCTION trust model is essential for planning secure connection
pathways in order to carry out the packet forwarding strategy.
Wireless communication is currently being adopted by
mobile users who work independently.The mobile nodes are In a MANET, each node has a certain amount of energy
able to communication directly with other nodes as long as and bandwidth. It is necessary for it to transmit the packets to
they all have the same radio. If they don't, they need to the other nodes, which causes it to consume both power and
communicate with one another through the intermediate bandwidth. Because of energy limits, every node in a network
nodes. The term "mobile ad hoc network" (MANET) refers to can become a selfish node[3]. There are three categories of
a group of interconnected mobile nodes that make up the nodes in a MANET network, including selfish, normal, and
network without a central controller[1, 2]. The topology of the malicious nodes. Nodes that are considered to be normal are
network is in a constant state of flux due to the fact that the those that do not cause any disruptions to the network's usual
nodes are constantly switching places and re-organising activity and correctly transmit all of the data packets.
themselves in order to keep communication going despite the Malicious nodes may remove data packets, obscuring their
physical distance between them. Accordingly, packets are identity, wasting the energy of other nodes, and interfering
routed from one node to another using a node as a router. with the operation of the network. Alternatively, they may
send data packets in the wrong direction instead of sending
Cooperative event of packet forwarding is currently them along the right route. The selfish node doesn't help with
utilized way for ensuring the reliability of time dependent the sending of packets. Selfish nodes only try to keep in touch
actions. Due to the dynamic nature of a MANET, however, with other nodes when they need to. The features of selfish
packet forwarding is a critical operation. If the intermediate nodes are as follows: a) they do not engage in the routing
relaying nodes that are picked during the setting up of the process; b) they do not respond to or transmit hello messages;
route between the starting node and the target node are not c) they delay the RREQ packet on purpose; and d) they drop
selected appropriately, then there is a high probability that the data packets. To improve the performance of the network, the
link will fail. Also, link failures cause more packets to be lost, Selfish node should be found and taken out of the network.
which increases the number of retransmissions. This has a big The selfish node is one that does not share its resource with
impact on the throughput and energy efficiency of the packet other nodes in the network because it wants to use those
forwarding strategy. The MANET's nodes are autonomous, resources for itself.
and its energy and memory resources are typically
constrained. This causes a node to become self-centered, and it II. RELATED WORK
will only participate in communication if it provides the node The proposed method states that a selfish node must not
more benefits than expense. The potential for the development allow other nodes to use its memory for copy storage [4]. To
of self-centered nodes positioned in the middle of other figure out how selfish a node is, each node adds up the credit
significant networking constituents leads to a distraction of the risk information of other nodes. Selfish allocation systems cut
generally sent information as well as the performance of the down on communication costs and use a safe hill cypher
network in terms of both energy and safety. As a result, the algorithm to ensure that replica data is kept secure.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 346


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Utilizing community-based and context-based information conditions of the algorithm, adaptive perturbation strategy,
about the node, the SENSE method provides detection of neighbour selection strategy, and wireless sensor network are
selfish nodes[5]. Through the application of intensive used to generate the globally optimal solution.
mechanisms, the value of the node will increase so that it can
take part in the network[6]. You may determine the selfishness III. Selfish Node Behaviour
of a node by using its unselfishness value. The mobility model Selfish nodes avoid sending hello packets to other nodes.
is based on the concept of a "home-cell community." The selfish nodes do not forward RREP messages. The selfish
A method is presentedin which a trust table containing the nodes don't send data messages to other nodes. RREQ
global trust state of all nodes is maintained by each node. The messages have a delay when being forwarded by selfish nodes.
selfish nodes are identified based on their trust value and their Selfish nodes ignore RREQ messages.
threshold for selfishness[7]. Their neighbours can utilize this
knowledge to avoid doing any kind of activity with the selfish
nodes, whether forwarding or any other type of supportive
function.
Three detection methods are proposed to enhance the
selfishness avoidance protocol's capacity to identify selfish
nodes and hence increase the number of legitimate rou tes[8].
These three methods are called reset activity mode, warming
mode, and reset failure mode. The investigation of the
suggested procedures is carried out using the protocol
developed by TEAM and Marti.
Token based umpiring technique was used to suggest a
method for detect and reduce selfish nodes in MANETs [9]. It
is a technique called token-based umpiring, in which each
node in the network needs a token in order to take part in the
network, and the nodes that are adjacent to each other operate
as umpires. Umpire nodes will keep an eye on node activity Figure 1 Selfish Node Attack
and notice if any node is acting inappropriately. It works very
well because it takes less time to find problems and has less Fig. 1shows the selfish node attack, in that the source nodeA,
overhead. destinationnode F and the node E is the selfish nodewhich
drops the packet between the intermediate node D
A rapid model is provided to analyse the selfish node &destination node F.
discovery in MANET utilising a watchdog strategy. They
calculated the detection time and cost of the collaborative
IV. PROPOSED MODEL
watchdog method for detecting a selfish node[10].
[11] The method that is being proposed, which makes use In this paper, In the proposed SNRM architecture, each
of reinforcement learning.The approach chooses the node node maintains a neighbour table that comprises RREQ packet
depending on transmission delay and success.The selects the forwarding information, as shown in table I.In the neighbour
best group with the biggest reward on its activities for table, you'll find data like the battery's remaining charge.This
transmitting the information and favours with the node is responsible for recovering the individual's remaining
neighbouring node of very small distance to the destination as battery from the previous node.
the next hop to set up as shortest path.Further, each node's
Neighbour Number of Battery S elfishness Total
mobility is predicted by setting up a structure with multiple
Address RREQ Life packet
states and assuming that mobile nodes could be in any one of Packet forward
those states, even when they're moving, and acting according forwarded ed by
to how things are done in that state.This makes it possible for node
mobile ad hoc networks to set up stable short paths based on
reinforcement learning.
Tables 1. Neighbour Table
[12]When the routing protocols are utilised, certain routing
algorithms can cause an uneven consumption of energy at the the Selfish Node Removal using Model (SNRM) algorithm.
nodes of the network.This can be solved by employing The node's reputation is determined to prevent selfish nodes
intelligent optimization algorithms such as ACO and dynamic from participating in routing. The current energy level of a
optimization.Using a smart ant colony optimization and node and the communication ratio of that node are both taken
planning protocol for routing, the network's energy into consideration when determining that node's reputation.
consumption is optimised and a global optimal solution is The source node 'O' and destination node 'S' are set, and the
discovered by partitioning the network's areas based on sender node initiates communication. Assuming that both 'O'
latency and energy.Utilizing machine learning to analyse and 'S' are within communication range, the node will look at
energy patterns and further reduce energy use in these the 'O' and ‘S’ reputation value, and if there is a match, the
networks.The jump probability is calculated by taking into transmission will occur and the system will be updated. In the
account both the location of the node and the node event that both 'O' and 'S' do not fall within the
transmission area. communication range, then 'O' will send control packets to its
neighbours and wait for reply messages to arrive. In this case,
This area is then divided in order to search for potential the checks on reputation are a little bit difficult due to the fact
nodes while taking into account both the delay and the energy that selfish nodes do not easily reply to the messages that are
of the divided area.In conjunction with the smart ant colony sent. As a result, the communication ratio between nodes is
optimization algorithm, the characteristics of the termination calculated by combining the sent request message and the
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 347
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

received reply message. 2. Examine the communication range for 'O' and 'S.'
3. If O and S are part of single-hop communication, it is easy
to send data.
A. Communication Range
4 If 'O' and 'S' do not lie inside the communication range then
Request and response routing messages sent between
"O" communicates with its neighbours by sending "RQ"
nodes in a communication network are used to determine the
communication ratio between them. The difference in the 5. Reputable nodes are those that reply to O's 'RQ' message.
number of Route reQuest (RQ ) messages that were sent to a 6. Now examine CR and the energy values of reputable
specific node and the number of Route Reply (RR) messages nodes.
that were not sent in response to a received 'RQ ' message is
what is used to calculate the CR for that particular node. 7. IF CR>80% and energy higher than threshold values
choose a higher residual energy node for Data
Therefore, CR is calculated using equation Transmission.
8. otherwise, that node is Selfish node.
[ ] ------------- Eqn(1)
9. Repeat the steps until you reach "S" Destination node.
10. End
where RQ indicates the total number of request messages O as originenode,S as sink node,RQ is route request.
that were transmitted from the node O and RR indicates the
total number of reply messages that were received by the node
O.
B. Detecting Selfish Node
The 25% of the initial battery capacity is used to determine the
battery threshold, which results in the introduction of the
residual battery threshold.

Battery Threshold = 0.25 * Initial Battery

Then, the remaining battery is compared to the threshold


value. If the intermediate node's remaining battery life is more
than the threshold, it may be safely assumed that the RREQ
message will be successfully relayed to the destination node,
and the intermediate node will retransmit the RREQ. If the
remaining battery is lower than the threshold, it can be
deduced that the intermediate node does not have enough
battery to transmit the RREQ message. As a result, the
intermediate node will choose not to convey the RREQ
message in order to conserve its own energy.

C. Energy Factor
After identifying the neighbour nodes, the energy levels for
each node are checked, together with the 'RR' message. When
choosing the next relay node, one of the criteria that is taken
into consideration is the energy with the highest value. Within
the framework of the routing process, the procedure of
selecting the node that has the maximum energy and the
highest communication ratio is chosen. The nodes given in the
route are chosen to transfer the detected information from 'O'
to the destination node 'S'. The nodes' energy levels are
compared to the threshold values after the threshold energy
has been set. Fig.2: Detailed communication

The node with the higher energy values compared to the


threshold is chosen, and this process is repeated until the data
V. RESULT AND DISCUSSIONS
reaches the destination
()
------ Eqn(2) The performance of the proposed system is evaluated by
simulating it with the network simulatorNS-2[40] using
Er (i) Remaining energy capacity of node Ni the most recent version, NS-2.34, and comparing it to a
well-known on-demand protocol called AODV as well as
E0 initial energy capacity of node Ni the Power aware routing.Scenarios with10,30,50, and 100
t denotes time taken. nodes in a 1000 m * 1000 m area have been prepared.By
adjusting the pause times from 0 to 500 and the speed
Algorithm:
from 1 to 25 metres per second in various circumstances
1. Nodes 'O' and 'S' are set. ranging from small networks to large networks, the value
for packet delivery ratio has been observed.Various
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 348
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

parameter values for mobile or wireless networks have


been the following: SNRM:Because selfish nodes are cut off from the rest
of the network, E-AODV ensures that any packets
T ABLE I. SIMULAT ION PARAMET ER
transmitted will be easily received by other nodes and
S imulation Parameter Value delivered to their intended location.Therefore, the
Simulator NS-2 Version 2.34 ratio of successfully delivered packets is higher in
SNRM than it is in AODV.
Simulation Time 100s
Number of Nodes 10,30,50,100 2. That proposed techniques minimise E2E delayThis is as
Routing Protocol AODV , SNRM a result of the reason that the suggested algorithm only
Traffic M odel CBR detects the true selfish nodes in the network, hence cutting
down on the amount of time needed to create the routes,
Pause Time 0 to 500s
and also as a result of the fact that more nodes relay
M obility 1 m/s to 5 m/s packets from other nodes. As a result, the E2E delay is
Terrain 1000m*1000m reduced. When compared with AODV, the average end-to-
Transmission Range 250m end latency is cut by about 57 percent, and when compared
with SNRM, the delay is cut by around 10 percent.

Simulation is an essential part of the process of developing AODV:Since selfish nodes are not recognised and
MANET protocols, and SNRMis superior to both AODV in separated in AODV, their existence in the network will
terms of both performance and security Then evaluate how result in higher retransmission, and packets will arrive at
AODV and E-AODV fare under similar conditions. their destination significantly more slowly.
1. Packet Delivery Ratio (PDR): is the ratio of the total SNRM: Because selfish nodes are identified and isolated
number of packets sent by the source to the total in SNRM, packets will be sent quickly and readily to other
number of packets received at the destination. It nodes, and it will take significantly less time to route the
characterizes the correctness and effectiveness of ad packets to their final destination.
hoc routing protocols by measuring the loss rate as
observed by transport protocols. Figure 1 illustrates a
comparison between the existing method and the
2.9 AODV
suggested proposed method. The number of nodes is
represented on the x-axis in this graph, while the 2.85 SNRM
packet delivery ratio as a percentage is shown on the 2.8
E2E Delay (sec)

y-axis.The fact that the performance of the suggested


algorithm 'SNRM' is best for 50 nodes is demonstrated 2.75
in figure 1, confirming the notion that it was 2.7
preferable to take attention of aspects such as the 2.65
energy status and the traffic level.Even though the
2.6
number of packets was very low when the pause time
was zero at first, as the pause time increased, SNRM 2.55
became much better at delivering packets than 2.5
AODV.SNRMis able to provide a greater total number
2.45
of packets at all speeds, ranging from 0 to 20 metres
per second. 1 2 3 4 5 6 7 8 9 10
Number of Nodes
AODV:Because selfish nodes in AODV do not pass
packets to other nodes, the number of packets that are
received willbe significantly lower than the number
of packets that are delivered or transmitted. Figure 2 . E2E delay vs selfish node percentage

10.01 Figure 3.Throughput, also known as network throughput,


refers to the typical rate at which messages sent across a
Packet Delivery Ratio

10
network are successfully delivered. This information may
9.99 travel over a logical or physical link or go through a specific
9.98 network node. Bits per second (bps) is the standard unit of
9.97 measurement for throughput, however bytes per second (bps)
AODV
and data packets per time slot (bps) are also common. When
9.96 SNRM illustrated in Figure3, as the number of nodes in a network
9.95 increases, the throughput decreases. When nodes behave
selfishly and discard the routing packets of other nodes, the
9.94
network's average throughput drops. In figure3 The diagram
0 20 40 60 80 100 demonstrates that the proposed approach improves the
No. of Nodes network throughput when there is a s elfish node in the
network.
AODV:Selfish nodes in AODV won't share their data with
Figure 1. .PDR(%) vs selfish node percentage others, hence the protocol's throughput suffers. This is because
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 349
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the selfish nodes won't transfer the packets to other nodes and by the inappropriate actions of selfish nodes. The selfis h nodes
will instead keep discarding the packets, requiring more don't take part in the routing process, so the packet is held up
retransmissions. and dropped on purpose. These selfish node mis -behaviors
will have an impact on efficiency, dependability, and fairness.
SNRM:In SNRM, the following is true:-Because selfish
The selfish node uses the resources for its own benefit, but it
nodes are cut off from the rest of the network, more data can
does not make any effort to distribute those resources to the
be transferred from one node to another in the same amount of other nodes. Therefore, it is essential to identify the selfish
time.
nodes in the MANET. In order to efficiently identify the
selfish nodes, this research s uggests a new approach. The
SNRM method that was recommended is an efficient method
160 that helps to improve the functionality of MANET. It
T 140 considerably enhances performance parameters including PDR
h and detection ratio. In addition to this, it reduces the overall
120 overhead, as well as the latency and the percentage of dropped
r packets. In MANET, the suggested method is able to detect
o 100 selfish nodes with greater accuracy than the AODV method
u 80 that is currently in use. The potential improvement can be
AODV achieved in the future by giving security to the neighb our
g 60
SNRM node. By doing this, the neighbour node is protected from the
h 40 selfish node's compromise.
u 20
REFERENCES
t 0 [1] K.Vanitha, A.M.J.Md.ZubairRahman and K.Anitha,”An Analysis of
10 15 20 30 40 50 55 60 Issues in Security and Routing Protocol in MANET,” International Journal of
Engineering Research & Technology (IJERT), Vol. 3 Issue 1, Page No: .1594-
No of Nodes 1599, 2014.
[2] K.Vanitha& A. M. J. ZubairRahaman ,”Preventing malicious packet
Figure 3. Throughput vs. No of Selfish Nodes dropping nodes in MANET using IFHM based SAODV routing protocol”,
Cluster Computing, Page No: 1-9,2018.
Residual Energy [3] Y. Yoo, S. Ahn, and D. Agrawal, “A credit payment scheme for packet
The value of energy that is left in the node after the forwarding fairness in mobile ad hoc networks”, In Proceedings of IEEEICC,
volume 5, pages 3005 – 3009,May 2005.
transmission of a given level of data packets for the next set of
routing processes is referred to as residual energy. This value [4] Muthumalathi, N., and M. Mohamed Raseen. "Fully selfish node
is needed for future transmission of the data packets. detection, deletion and secure replica allocation over MANET ." In Current
Trends in Engineering and Technology (ICCTET), 2013 International
Commonly, the process of sensing and conveying the Conference on, pp. 413-415.IEEE, 2013.
information uses up the node's energy level. Since the data is
[6] Ciobanu, Radu-Ioan, CiprianDobre, MihaiDascălu, ŞtefanTrăuşan-Matu,
handled by high-energy-level nodes, the proposed protocol and ValentinCrist ea. "SENSE: A collaborative selfish node detection and
uses less power than traditional. incentive mechanism for opportunistic networks." Journal of Network and
Computer Applications 41 (2014): 240-249.
.
[7]Subramaniyan, Senthilkumar, William Johnson, and
KarthikeyanSubramaniyan."A distributed framework for detecting selfish
nodes in MANET using Record-and T rust-Based Detection (RT BD)
technique."EURASIP Journal on Wireless Communications and Networking
2014, no. 1 (2014): 1-10.
[8] Rodriguez-Mayol, Alberto, and Javier Gozalvez. "Reputation based
selfishness prevention techniques for mobile ad-hoc networks."
Telecommunication Systems 57, no. 2 (2014): 181-195.
[9] Kumar, Jebakumar MSP Josh, AyyaswamyKathirvel,
NamaskaramKirubakaran, PerumalSivaraman, and MuthusamySubramaniam.
"A unified approach for detecting and eliminating selfish nodes in MANET s
using T BUT ."EURASIP Journal on Wireless Communications and
Networking 2015, no. 1 (2015): 143
[10] E Hernández-Orallo, MS Olmos, J-C Cano, C Calafate, P Manzoni, A
fast model for evaluating the detection of selfish nodes using a collaborative
approach in MANETs. Wirel. Pers. Commun. 74, 1099–1116 (2014).02/01
2014.
Figure 4 Analysis of residual energy [11] Duraipandian, M. "Performance evaluation of routing algorithm for
Manet based on the machine learning techniques." Journal of trends in
Figure 4 depicts the amount of residual energy that can be Computer Science and Smart technology (TCSST ) 1, no. 01 (2019): 25 -38.
obtained using either the suggested proposed method and the [12]. Chen, Joy Iong Zong, and Kong-Long Lai. "Machine Learning based
conventional method. Energy Management at Internet of Things Network Nodes." Journal: Journal
of T rends in Computer Science and Smart Technology September 2020, no. 3
V. CONCLUSION (2020): 127-133

In MANET, one of the most significant issues is caused

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 350


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Review on Energy Efficient Cooperative Routing


Algorithm for Wireless Sensor Networks
Immanuvel Arokia James K * Manjula P Mohana M
Department of Information Technology, Department of Computer Science and Department of Artificial Intelligence and
VEL TECH MULTI TECH Dr.Rangarajan Business Systems, Data Science,
Dr.Sakunthala Engineering College, Panimalar Engineering College, Chennai, VEL TECH MULTI TECH Dr.Rangarajan
Chennai, India India Dr.Sakunthala Engineering College,
immanuel_james@yahoo.com manjula.arunraj@gmail.com Chennai, India
Mohananisha0531@gmail.com

Arthi S
Department of Computer Science and Engineering,
VEL TECH MULTI TECH Dr.Rangarajan Dr.Sakunthala Engineering College, Chennai, India
Arthisankar794@gmail.com

Abstract - Wireless communications have experienced speedy and technical development in this modern era. Significant improvements
are required in terms of communication speed link, energy level, size of the device, network lifetime and applications for different
generations of wireless devices. Due to the advancement in technical development, the researchers have started to build WNArchitectures
the conventional method of data communication using peer-to-peer basis with a centralized (BS) controller. In Wireless Sensor Networks
(WSNs), the conventional method of data communication in the network is instituted and this allows the nodes to forward data through
other nodes in the communication network and create new communication paths that involve several wireless hops in the communication
network. Recently, there has been an upraise in cooperative communication. This promising methodology plays an important role in
relieving wireless channel fading, as well as, recuperating steadfastness in networks which permit nodes that allow cooperation among
them. The nodes share data in cooperative communication by exploiting the communication in their broadcasting nature. Simulations
were run for various adjustments in order to approve the Cooperative Power and Energy-efficient routing protocol (COPE) [14]
convention's implementation alongside the proposed Minimum Power Least Cost Routing (MPLCR) Algorithm conventions.

Keywords – Wireless Sensor Networks, Cooperative Communication, Energy Efficiency

rather than interference on the destination side, where


I. INTRODUCTION information is only deciphered based on the direct signal. As a
result, cooperative diversity in a wireless network uses
In recent years, wireless communications have seen
dispersed antennas, which are essentially antenna diversity that
rapid and technological advances. Significant improvements
belongs to each node. Cooperative diversity is a strategy that
are required in terms of communication speed link, energy
uses several antennas to maximise the network channel's
level, size of the device, network life time, applications for
overall bandwidth by combining relayed signals and using user
different generations of wireless devices. Due to the
diversity to decode direct signals in wireless multi hop
advancement in technical development, the researchers have
networks. Direct transmission is used in a single hop system.
started to build WN Architectures the conventional method of
data communication using peer-to-peer basis with a centralized Previous studies outline the cooperative
(BS) controller. In Wireless Sensor Networks (WSNs), the communication that mainly happens in the physical layer. i.e.
conventional method of data communication in the network is It can share its data and cooperate to send to the destination
instituted, which allows the nodes to forward data through side node. The main functions of the relays in the cooperative
other nodes in the communication network. It allows creating include relaying methods such as Decode-and-Forward (DF)
new communication paths that involve several wireless hops and Amplify-and-Forward (AF).
in the communication network [18]. The major characteristics
The relaying schemes in the cooperative
of WSN are network speed, link error, power consumption,
communications are categorized into two types: fixed relaying
size of the network, network lifetime, node mobility and
and adaptive relaying. In the fixed relaying scheme, the
security.
channel comprised of resources that have a few predetermined
A. Co-operative Communications approaches between the source and the intermediate nodes.
The relay node receives data from the sender and transmits it
The Co-operative communications, self- to the destination in an amplified fashion. This process is
governing paths are chosen between sender to receiver through referred to as Amplify and Forward (AF) relaying protocol.
a relay channel. Figure 1 shows sample cooperative network This approach was discussed in the article [1] by Al-Thous et.
architecture. In the cooperative communication, the relay node al. The received signal can also be decoded by the relay node,
is tasked with forwarding the received signal to its intended then re-encoded and later transmitted back to the receiver. This
destination. Both the sender and the relay node transmit process is referred to as suitable D&F - Decode & Forward
multiple copies of data through independent fading channels relaying protocol.
and they need to have a spatial diversity as well as having a
separate antenna. This results in numerous advantages that In the suitable relaying scheme, the execution is
include better coverage, a good higher capacity, signal quality much easier than relaying, but the throughput (bandwidth)
and minimum transmission power [12]. When cooperative efficiency observed is comparatively lower. The overall data
diversity is used, the other signal is seen as a contribution rate is reduced when the intermediate relay nodes are allocated

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 351


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
more channel information. Potential exhaust delay and data
loss may occur in the relay channel when transmitting huge
amounts of data packets between the source and destination.
Fixed relaying schemes usually take double the time when
sending a small messages between sender and receiver node
compare to Method of direct transmission (DT). The location
of the relay usually causes an impact on the relative
performance of each method.

Fig 2 Simplified Cooperation Model

Let us consider that source to the intermediate node,


transmission data with the power of equal P. The source send
the communication data to destination as well as relay nodes
in the network.
C. Relay Node Selection
A good and quality relay node should be chosen
Fig 1 Direct Transmission and Cooperative Transmission in the cooperative routing schemes to enhance its performance,
and thus providing a greater diversity gain. Therefore, the
choice of the ideal relay node increases the performance of the
The adaptive relaying scheme resolves the system while the cooperative routing achieves critical
difficulties of the fixed relaying method and it describes two performance, throughput, efficiency, power efficiency, packet
methods namely selective and incremental relaying delivery rate, and network lifetime. The relay node selection
techniques. methods are given here.
In a selective relaying scheme, the sender can D. Optimal Number of Relay Nodes
choose the appropriate relay node based on its Signal-to-Noise
Ratio (SNR). The relay node performs the Decode-and- Better performance and greater diversity can be
Forward (DF) operation when the SNR received exceeds a achieved by engaging more relay results. However, this may
certain onset level. In the incremental relaying method, the require more resources (such as more time slots) in the case of
sender may transmit information to the destination node higher relay nodes. This may eventually cause collision at the
through direct link. Relay can eventually forward a data to a destination end, leading to a reduction in the cooperative gain.
destination. if the receiver is unable to get data properly Number of relay nodes high, the power efficiency co-operative
through the direct link [7]. communication decreases due to protocol overhead. Normally,
there is a direct connection between the number of relay nodes
The number of relay nodes and their position and the collision area. Increase in the number of relay nodes
both have a direct impact on the cooperative path's potential leads to the increase in the collision area affected by the
gain. The relay node with the highest performance is cooperation. This may eventually reduce the overall
considered to be the best. The optimum relay nodes are often operational efficiency. This can be overcome by using the
determined by the different usage scenarios. For instance, in single-relay node, it can achieve similar results of diversity
the case of energy efficiency, the optimum relay node for the gain of multi-relay cooperation.
sender node is chosen if the minimum power consumption of
a cooperative communication link is similar to that of a certain
relay node. Prior studies have shown that for multiple II. LITERATURE REVIEW
intermediate relaying nodes (i.e., cooperative networks based
on multiple relays), maximum efficiency can be attained when Co-operative routing was evolved as the trustable
all the cooperative nodes appear to be positioned at the target methodology to redress wireless network channel recuperating
node. steadfastness and fading of networks that would permit nodes
can co-operate among them. The nodes share data in
Moreover, that the DF relay method, had cooperative communication by exploiting the communication
demonstrated that the relay node is conveniently located near in broadcasting nature. Cooperative routing is categorised as
the mid-point between a sender to receiver at each link. follows:
B. Cooperation Protocols A. Hierarchical Cooperation
Consider a three terminal network with a single In the first phase (setting up the transmission co-
relay for forwarding a data. The source sends the data to its operation point), Each and every node shares data to the
receiver, and the intermediate node also receives the data additional nodes inside the group of data. In the next phase
concurrently in phase 1. The relay node forwards the data to (MIMO transmission phase), the long-range MIMO
the destination in phase 2. As shown in transmission is demonstrated. In the last phase (cooperate to
Figure 2, the source transmits data through power P 1, while the decode phase), Each and every node in group of data ‘L’ bits
intermediate node transmits the data through power P2.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 352


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
of a data and there are no Memory In Memory Out
observations.
B. Cooperative Relaying Architectures
The architectural and system designs of
cooperative techniques are described in this section. Similar to
the Medium Access Control (MAC) layer, a classification is
made based on the relaying method to aid the multi-hop
communication in the network.
C. Homogeneous Cooperative Architectures Fig 3 CT and DT Modes
Multi-hop Cellular Networks (MCNs) broaden flawlessly the The data is received, the receiver & relay decode
connectivity provided by the existing network without any the information. Such framework blunder may spread,
changes at the client-side. A mobile node can access network however its impact can be negligible. This is the point at which
services without depending on any other devices in the the transfers work in a high SNR administration, the
network. predominant wellspring of mistake is diverted by being in a
 Relaying in Wireless MAN blackout (i.e.) profound blur, which compares to the SNR
falling beneath some edge.
 Relaying in Wireless LAN
Flat quasi-static fading channels are measured in
D. Heterogeneous Cooperative Architectures
this. Thus, the channel factors are held to be steady amid a total
Mobile devices support multi-mode with edge and may shift from a casing to another. At long last, the
multiple air interfaces and different data rates in heterogeneous clamour terms are displayed as Nil-mean, complex Gaussian
MCNs. This architecture may lead to many challenges in the irregular factors with measure up to difference N0. In this area,
communication network. the base power directing issue is figured and characterized in
two principle transmission modes.
Several factors influence the cooperative
architecture that includes multi-interface Mobile Stations G. Cooperation based Routing Algorithms
(MSs), topology and routing, transmission rate and co-channel
Two collaboration routing algorithms are
interference management and load balance. The end-to-end
developed, require polynomial many-sided quality to locate the
route selection is according to the Service Level Agreement
minimum power route. Each and every node regularly
(SLA) of the user. The network layer handles horizontal hand-
broadcast a ‘hai’ packet to neighbours. Also, a MAC protocol
off between BSs of the same technique in a flawless approach.
is considered [15].
E. Distributed Cooperative Routing
Minimum power cooperative routing calculation
Data packets transmitted between the transmitter is actualized as follows: First, every node ascertains the
source to receiver nodes are completed through relaying the expenses of its active connections and afterwards applies the
data packets in Mobile Ad-hoc Networks. The source node will briefest way Bellman-Ford calculation utilizing these recently
find the location of the receiver node and will set up a path to updated figured expenses. Required transmission control
reach the destination. Table-based and on-demand based between the two nodes in base power got via looking over all
routing algorithms are the two different methods of routing the conceivable nodes in the area to go about the hand-off. On
algorithms of MANETs. Each node stores a routing table in the off chance that there is no easy hand-off in the area, an
table-based routing algorithms. This routing table information immediate transmission mode is measured. Second, the
is updated regularly through a message sent by every node in conveyed Bellman-Ford most brief way steering calculation is
the communication network. actualized at every node.
Designing cooperative algorithms can help in H. Broadband Cooperative Communications
saving power significantly. Cooperative routing uses two
Orthogonal Frequency Division Multiplexing
truths: (a) the wireless broadcast advantage in the transmission
(OFDM) is responsible for capturing multipath energy,
model (b) Wireless co-operative advantage in the supportive
alleviating the inter-symbol interference and providing high
model. The entire node transmits its information to more nodes
spectral efficiency in broadband communications. Multiband
in the broadcast mode.
Orthogonal Frequency Division Multiplication have put
F. Network Modes and Transmission Modes forward the Ultra Wide Band for WPAN. The original idea of
cooperative diversity is applied for improving the performance
The main aim is to find a suitable route that
of OFDM systems. Certain techniques are required to utilize
minimizes transmitted aggregated power between source and
the available multiple carriers effectively.
destination. Let d and s denote the source-destination pair in
the communication network. Figure 3 shows the use of CT and OFDM protocol improves spectral efficiency
DT nodes in the network. compared to fixed relaying protocols in the communication
network. This protocol helps in forwarding data from each
intermediate of multiple sources in one OFDM symbol by
exploiting inadequate response from the destination. A relay
assignment scheme is implemented in OFDM based networks.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 353


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
I. Network life expectancy Maximization via Cooperation reception apparatus exhibit are isolated in space diverse
shadow fading.
Expanding the life expectancy of battery worked
gadgets are crucial outline proceed that permits continuous ● Higher throughput-lower delay
data trade among circulated nodes in remote systems. Helpful
The adjustment rate is accomplished via versatile
interchanges empower and use viable asset sharing among
balance as well as versatile channel coding at the physical
agreeable nodes. The system proficiently exploits distinctive
layer. Numerous MAC conventions have acquainted rate
areas and vitality levels among dispersed nodes. Initially, a
adjustment as well as battling unfavourable channel
lifetime amplification issue using agreeable nodes is
circumstances. For example, due to low SNR brought about by
contemplate, an execution examination for M-ary phase-shift
high channel error rate experience, the WLAN standard, IEEE
keying balance is given. A target to amplify the base gadget
802.11 changes to lower transmission rate to ensure specific
lifetime under an imperative the enhancement problem
fading rate. The energy of participation is evident when it has
determines which nodes should cooperate and how much
connected in combining with any rate adjustment calculation
power should be allocated for participation based on bit error
[18].
rate execution [3]. In addition, the device lifespan is
additionally enhanced by an arrangement of agreeable
transfers with a specific end goal to push data to the circulated
nodes in the network. The ideal area and power portion for
every helpful transfer are resolved with a means to augment
the lifetime of the devices [14].
 Life time maximization
Initially, the lifetime amplification issue is
detailed. At that point, an investigative arrangement is given
for a system with two agreeable nodes. Given the answer for
the two-node, a quick problematic calculation is produced to
tackle an issue for a network with multiple cooperative nodes. Fig 5 Illustration of Delay and Throughput Improvement
J. Benefits of Cooperative Transmission
Collaboration in the system can provide huge On the off chance that Rate2 and Rate3 are greater
benefits to the nodes, as well as the entire system in various than Rate1 with the end goal that the aggregate transmission
angles. A few advantages are recorded as follows: rate of the two hops over R2 is lesser than that of the direct
● Higher spatial diversity transmission, participation promptly beats the heritage
coordinate transmission, as far as both throughput and latency
Figure 4 shows a network such that the quality of observed by the sender ‘S’. Besides, for transfers, for example,
the channel between the Sender ‘S’ and Receiver ‘D’ nodes R1 and R2, things being what they are, their own individual
corrupts seriously, an immediate transmission may have a self-intrigue can be serving other people effectively.
heinous error rate, which prompts retransmissions. On the
other hand, ‘S’ can utilize assorted spatial variety by having a The intermediate relay node R1 that participates
transfer ‘R1’ catch the transmitted data and forward the packet in the network appreciates the advantage of the lower channel-
to ‘D’ afterwards. Source ‘S’ may fall back on another access delay, which can convert into throughput. Figure 5
terminal ‘R2’ which may help in sending data or utilize ‘R 1’ additionally draws an unpleasant similarity with the helpful
and ‘R2’ simultaneously. Subsequently, contrasted and plan and shows that rate adjustment can additionally enhance
coordinate transmission, the helpful approach appreciates the advantages of collaboration in a system setting.
higher sufficient transmission likelihood. K. Optimality
In a routing algorithm, the term optimality refers
to the route that achieves the significant steps in routing. The
primary function of the algorithm is optimised depending on
the requirements. The routing requirement of cooperative
communication in WSNs is to reduce the consumption of
energy in the communication network. Checking the most
viable cooperative route in an outsized capricious network is
found to be obstinate [5]. Sub-optimal algorithms in
cooperative routing can be alienated into the following types.
The primary type of sub-optimal cooperative algorithm that is
co-operative together with a non -cooperative path is
demonstrated by initially analysing the route with the shortest
path.

Fig 4 Cooperation in a Network L. Objective


The co-operative routing algorithm is categorised
as three types: Quality of Service parameters, collision
Agreeable correspondences can adjust and relieve the impacts minimisation and energy-efficiency.
of shadow fading superior to MIMO since, dissimilar to
MIMO, receiving wire components of a helpful virtual a) QoS-aware

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 354


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
The Quality of Service in the co-operative which can augument considerably and transmit cooperatively
routing algorithm is categorised as a packet delivery ratio, along the path to next-hop receiver node by multiple nodes
throughput and outage probability. QoS is additionally a [10].
critical foundation to quantify the performance of the network.
e) Cooperative link
QoS is a significant concern in significant applications,
including fire detection, security and monitoring health. The The algorithms initially compute the cost
QoS in the network finds a path that satisfies the requirements function established in the minimum transmission power for
and concurrently optimises the exploitation of resources in each helpful link. The energy-saving links are then engaged in
cooperative routing [8]. a cooperative link strategy for discovering the least amount of
energy routing technique. The calculation of the cost of the link
b) Throughput-aware
is done using the allocation of minimum transmission power
Cooperative communication ultimately uses the under convinced network scenarios [9].
broadcast condition of wireless channels and adventures
f) Relay node assignment
time/spatial diversity in a dispersed way. This accomplishes
massive upgrades in framework limit and reliability in Selecting an energy-efficient intermediate node
transmission. Cooperative diversity has concentrated from the is a valuable technique for saving energy in cooperative
physical layer point of view. Cooperative MAC method has routing algorithms. A weight value is assured for each
pinched much concentration in recent times. To find the best intermediate node in existing cooperative routing algorithms.
route, a node initially decides if participation on each The consumed power can be kept if the particular node serves
connection is required, the optimal cooperative scheme and the as a co-operative intermediate node for the precise link which
most exquisite relay are selected. denotes the weight. The link checks the weight of all probable
intermediate nodes & intermediate node is taken into
Cooperative routing metric values are intended
consideration for the equivalent link. The candidates of the
and compared for each possible intermediate node, and the best
relay node are sorted in a descending way for cooperative
value is selected, which is then compared with the non-
routing algorithms based on their residual network lifetime.
cooperative link metric [6]. Utilising the last ideal metric
This technique covetously selects the node with the outsized
incentive rather than the customary metric incentive, ideal
residual network life expectancy with it’s uses them as the next
ways are built up in multi-hop ad-hoc networks; thereby
intermediate nodes. Last few nodes are selected in some cases
considering the advantages from the MAC layer in the
for Minimum energy non- co-operative path in the
communication network [12].
intermediate nodes. Every node that transmits data will then
c) Packet delivery ratio adjust its point in the network, so that all the nodes become
visible to be at the equal distance from the destination [15].
The percentage of transmitted packets from the
source that have effectively been delivered to their receiver is g) Path selection
termed as the Packet Delivery Ratio (PDR). The cooperative
The minimum energy non-supportive course or
routing algorithms enhance the system PDR by using an
the smallest amount of energy supportive course can be
approach. This approach is based on each connection and
obtained from work done by the algorithms with shortest-path
correlation of the connections to choose the ideal PDR of the
equally Bellman- Suurballe’s algorithm , Ford algorithm and
supportive routing [13].
Dijkstra’s algorithm.
The cooperation between mobile hosts is in the
outward appearance of nodes are acted as relay intermediately
that move data from a sender, or else remote destination using III. MOTIVATION OF THE WORK
point-to-point or point-to-multipoint links in the network.
Power allocation and routing problems are evaluated under Wireless sensor networks has been widely used in
cooperative communications of the network. This is done to many fields, such as smart home, smart city applications,
gain a cross-layer design as well as the physical layer [4]. The monitoring (underwater activities like water salinity, oil
multi-criteria cooperative routing algorithm is evaluated. This pollution monitoring, and seismic monitoring), different
algorithm has the following parameters: the remaining energy environmental changes (like temperature, humidity, light,
of nodes and the power required for transmission of these scope of the human body like human vitals, telemedicine,
nodes. The algorithm picks a path for each specific pair as well Hospital information systems), animal surveillance (like
as the transmission power of the nodes. coverage in the forest and zoo), vehicular ad hoc networks,
agricultural (like smart farming, smart agriculture), Industry
d) Energy Efficiency
4.0/5.0, Intelligent transportation systems, security and safety,
Energy efficiency is regarded as the primary goal defence and so on.
of algorithms that are intended for routing, including ad-hoc A lot of energy is needed by the nodes in the network.
networks, Personal Area Networks (PAN), sensor networks This energy is used in the transmission and reception of
and other wireless networks in the exploitation of an information that is required in sensing and processing. In order
assortment of wireless networks. The cooperative routing to increase the lifetime of the network, all the designing
algorithms regarding energy efficiency can be divided into two protocols and applications for the wireless sensor networks
types: should be energy aware. Typically, all the real time
applications are heterogeneous in nature rather than
All energy-saving algorithms show improvement
homogeneous.
in energy saving under different conditions of the network and
In this research, designing flexible cooperative
constraints under various performances. The consumption of
routing protocol is taken into account while exploring the
power for active radio electronics is not considered. Prior
outcome of cooperation nodes, with reference to optimal
importance is given to radio electronics that consume power

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 355


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
routing techniques, energy consumption, throughput, and of cooperative multi-hop routing under more complex fading
lifetime of WSN. The key elements of this research work is to models. The sole purpose of these methods involves reducing
illustrate how the operational parameters (QOS) like the the total energy consumed in the routing from the source node
lifetime of the network, throughput, along with total energy to the destination node. Nonetheless, irregular energy
consumption of the network are improved in significant distribution among nodes is experienced while using the
manner. Similarly the performance of the following QOS minimum cost path. The irregular energy distribution can
metrics like the quantity of alive nodes, quantity of dead nodes, negatively affect the life-time of the network.
quantity of dropped packets, End to End Delay are discussed The proposed MPLCR algorithm is compared
and given better results than various existing methods. with COPE to analyse the performances. COPE is supposed to
compare the energy balancing variation and power saving with
COPE demonstrates greater energy efficiency.
MPLCR to understand the QoS.
However, COPE protocol also demonstrates improvement in
terms of energy efficiency and network lifetime. Each round
results in a relatively smaller number of dead nodes. IV. PERFORMANCE RESULTS
Additionally, due to energy efficiency, the number of alive Sensor nodes have been assumed to be stable and
nodes rises after each round, improving throughput. The introduced indiscriminately in this simulation. The base station
network as a whole is able to send more data packets from is capable of tolerating, accumulating, and sharing the
nodes to the BS, boosting the system throughput. information from the cluster heads to the preferred destination.
A. Scope and Novelty When communicating, the bits are sent to the Base Station and
CHs. Simulations were run for various adjustments in order to
The efficiency and performance of the networks approve the proposed MPLCR convention's implementation
can be determined in terms of the following parameters; energy alongside COPE conventions. In the simulations, 100 sensor
consumption, network throughput as well as end-to-end delay. nodes are distributed at random; they are assumed to be
The energy efficiency is defined as the ratio of the amount of immobile and have a BS sent a long distance from the sensors.
energy consumed per successful packet delivery. The total It is also acknowledged that each node in the system delivers
energy consumption is achieved by minimizing the number of information about residual energy to BS.
relays, increasing the packet delivery rate along with reducing
end to end delay bounded source to destination.
TABLE I. PARAMETERS FOR SIMULATION
Minimum Power Least Cost Routing (MPLCR)
Algorithm is proposed. This MPLCR includes link S. No. Parameters Values
computation which is used to find a optimal path (relay node) 1 DC Current (RX) 18 mA
to avoid link failures and to reduce the traffic in the network. 2 DC Current (TX) 10.5 mA
The shortest path with minimum hop selection has been 3 Minimum Supply Voltage 1.9 V
achieved by using a sequential scanning algorithm to achieve 4 Erx - elec 50 nJ/bit
minimum power consumption in the network. Moreover, the 5 Etx - elec 50 nJ/bit
relay node and its characters for acquiring a quality of service 6 Eamp 1.3 nJ/bit
in the transmission stream have discussed. The proposed 7 EDA 5 nJ/bit
MPLCR algorithm guarantees to save energy to the extent of 8 Size of each packet 4000 bits
30% when compared to the other existing algorithms like 9 Prob of choosing a CH (p) 0.125
Cooperative Power and Energy-efficient routing protocol 10 Initial Energy (Eo) 0.8 J
(COPE).
Simulations are used to evaluate the execution of our
B. Proposed Routing Algorithm proposed route loss aware protocol MPLCR, which is
The proposed Minimum Power Least Cost compared to COPE standards [2] A system with a size of 1200
Routing (MPLCR) is algorithm developed for improving the square meters is investigated, with 100 nodes distributed
network lifetime. This algorithm is designed by calculating randomly in the field and a sink node positioned at the system's
link computation, sequential scanning algorithm and balance co-ordinates region of (600 square meters) [6].
energy shared by the neighbouring nodes. It is considered for
the construction of the minimum power route through
cooperative nodes. Also, Johnson’s briefest path algorithm
helps in finding the briefest way between all sets of vertices.
And it permits negative values yet not negative cycles, and it
works along with Bellman-Ford briefest path routing.
Execution is completed by using Johnson's briefest path
algorithm. In the Bellman-Ford calculation, each node has a
place from 1 to n esteems (i.e.) x є (1,..., n). Assume that ‘x’ as
the source and ‘y’ as the receiver.
The cycle will be dx(y) = min{c(x, v) + dv(y)},
where dx(y) = cost of least way from x to y. The base is
assumed to control over all neighbours v of x. dx(y) = gauge
of minimum cost from x to y, node x knows cost to each
neighbour v: c(x, v), node x keeps up remove vector dx =
[dx(y): yєN]. Node x additionally keeps up its neighbours’
separation vectors for each neighbour v, x looks after dv =
[dv(y): yєN]. For minimizing energy, there have been studies Fig 6 : Scalability comparison of MPLCR and COPE

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 356


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In the figure 6 the comparative analysis of two protocols can


be discussed. The packets sent to the base station of the
compared protocol MPLCR. The Scalability of both protocols
can be varied and MPLCR can be much better compared with
COPE. The Scalability of each node can be described in a
graph in a predominant way [17].

Fig 9: Packet count in multiple rounds

Figure 9 shows that in the network, number of rounds is


compared to the number of living nodes. As expressed in
COPE, the CHs are overburdened. As a result, it has the fewest
active hubs. MPLCR has far better results than COPE.
However, as seen in the diagram, our model has the greatest
number of alive nodes left until the end of the rounds, making
it more efficient and producing superior results when
compared to other procedures [16].
Fig 7: Energy Consumption V. CONCLUSION
In the figure 7 the number of nodes consuming energy in An account of the underlying architecture and
relation to the number of rounds for the two routing protocols working of cooperative routing is presented in this chapter. The
used, as well as COPE. The number of dead nodes in COPE motivation of the work, scope and objectives of the research
increases with each round, and our proposed protocol MPLCR are presented. Also the cooperative communications,
achieves the best outcomes; as a result, it is substantially more cooperative protocols in cooperative routing, hierarchical
productive in terms of dead hubs each round, as shown by the cooperative, cooperative relaying architectures, distributed
plots [11]. cooperative routing, broadband cooperative communications,
network lifetime maximization, advantages and their
applications are also presented. This algorithm initially
computes the cost function established on the minimum
transmission power for each helpful link. The energy-saving
links are then engaged in a cooperative link strategy for
discovering the least amount of energy routing technique. The
calculation of the cost of the link is done using the allocation
of minimum transmission power under convinced network
scenarios. The subsequent chapter provides a thorough
overview of the numerous cooperative routing applications and
their challenges.

VI. FUTURE WORK AND CHALLENGES


A joint investigation of the techniques and
challenges from the physical layer, the network layer as well
as the MAC layer can be used to guarantee huge benefits to
cooperative communications. Cooperative mechanisms
subject to retro-compatibility constraints that limit
Fig 8: Alive node variations in multiple rounds performance. Nevertheless, in the long-term, the evolution of
wireless communications will be defined by new architectures
In the figure 8 the scalability of both protocols can be and standards, which, once engineered, may follow different
compared. Our proposed MPLCR can be varied along with design principles to their predecessors. It is reasonable to
COPE and it gives a maximum result of scalability when consider that future standards such as the fifth generation of
compared [14]. mobile communications will have the capabilities of embedded
support for cooperative communications.
For implementing Inter-cluster cooperation at the
application level, the following example applications can be
considered.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 357


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
 Smart home scenario interfaced with IoT. [11] Mariam Akbar, Nadeem Javaid, Zahoor Ali Khan, Umar Qasim,
Turki Ali Alghamdi, Saad Noor Mohammad, Syed Hassan Ahmed,
 Smart city applications. Majid Iqbal Khan, Safdar Hussain Bouk, 2015 “Towards Network
 Underwater monitoring. Lifetime Maximization: Sink Mobility Aware Multi-hop Scalable
 Different environmental (light, humidity, Hybrid Energy Efficient Protocols for Terrestrial WSNs”, International
Journal of Distributed Sensor Networks (IJDSN), October 25, 2015,
temperature, etc.), https://doi.org/10.1155/2015/908495
 Human body parameters (human vital signs), [12] Anwar Khan, Ismail Ahmedy, Mohammad Hossein Anisi, Nadeem
 Animal surveillance (coverage in the forest and zoo), Javaid, Ihsan Ali, Nawsher Khan, Mohammed Alsaqer & Hasan
 Vehicular ad hoc networks, Mahmood 2018, ‘A Localization-Free Interference and Energy Holes
Minimization Routing for Underwater Wireless Sensor Networks’,
 Telemedicine and Hospital Information Systems, MDPI Sensors 2018, 18, 165; doi:10.3390/s18010165.
 Smart farming, smart agriculture, [13] Shariatmadari, H, Mahmood, A & Jantti, R 2013, ‘Channel ranking
 Industry 4.0/5.0, Intelligent transportation systems based on packet delivery ratio estimation in wireless sensor networks’,
etc. In Wireless Communications and Networking Conference (WCNC),
Additionally, this work can be enhanced for 2013 IEEE, pp. 59-64.
different channel environments. The profound effects of the [14] S. Jamil, S. Jamil, S. Ahmed, M. Zubair and F. Sikandar, "COPE:
Cooperative Power and Energy-efficient routing protocol for Wireless
suggested relay selection scheme with energy balanced Sensor Networks," 2015 IEEE/ACIS 14th International Conference on
cooperative clustering architecture will also be interesting Computer and Information Science (ICIS), 2015, pp. 47-52, doi:
horizons to explore [10]. It fulfils the requirements of the 10.1109/ICIS.2015.7166568
modern era of IoT, which is driven by data. In today's scenario, [15] Zhai, C, Liu, J, Zheng, L, Xu, H & Chen, H 2012, ‘Maximise
data is an asset but turning data into an insightful knowledge lifetime of wireless sensor networks via a distributed cooperative routing
algorithm’, Transactions on Emerging Telecommunications
with minimum overhead and minimum complexity, especially Technologies, vol. 23, no. 5, pp. 414-428.
in WSN-led IoT applications, is a challenge. In recent years, [16] N. G. Palan, B. V. Barbadekar and S. Patil, (2017) "Low energy
the focus of research in the WSN domain has shifted towards adaptive clustering hierarchy (LEACH) protocol: A retrospective
edge computing-based techniques and Edge AI to achieve a analysis," 2017 International Conference on Inventive Systems and
trade-off between challenges of the resource-constrained Control (ICISC), Coimbatore, 2017, pp. 1-12.
environment and utilization/processing of the sensed data to doi: 10.1109/ICISC.2017.8068715
automate the operations with the effective decision-making in [17] N. Cao et al., (2017) "The Comparison of Single-Hop and LEACH
near real-time. Protocols in Wireless Sensor Networks," 2017 IEEE International
Conference on Computational Science and Engineering (CSE) and IEEE
International Conference on Embedded and Ubiquitous Computing
REFERENCES (EUC), Guangzhou, 2017, pp. 426-429. doi: 10.1109/CSE-
[1] Al-Tous, H & Barhumi, I 2013, ‘Joint power and bandwidth
EUC.2017.267
allocation for amplify-and-forward cooperative communications using
Stackelberg game’, IEEE Transactions on Vehicular Technology, vol. [18] Jiale Liang, Zhenyue Xu, Yanan Xu, Wen Zhou, Chunguo Li,
62, no. 4, pp. 1678-1691. “Adaptive cooperative routing transmission for energy heterogeneous
[2] Fazle Hadi, Sheeraz Ahmed, Abid Ali Minhas, Abdulaziz Al wireless sensor networks”, Physical Communication, Volume 49, 2021,
Mazyad, Najam ul Islam, Imran Ahmed & Nadeem Javaid, 2017, 101460, ISSN 1874-4907,
‘Wireless-powered cooperative energy aware anycast routing in wireless https://doi.org/10.1016/j.phycom.2021.101460.
sensor networks’. International Journal of Distributed Sensor Networks
2017, Vol. 13(1)
[3] Gnanambigai, J, Rengarajan, N & Navaladi, N 2014, ‘A clustering
based hybrid routing protocol for enhancing network lifetime of Wireless
Sensor Network’, In 2014 2nd International Conference on Devices,
Circuits and Systems (ICDCS), IEEE, pp. 1-4.
[4] Gravalos, I, Kokkinos, P & Varvarigos, EA 2013, ‘Multi-criteria
cooperative energy-aware routing in wireless ad-hoc networks’, In
Wireless Communications and Mobile Computing Conference
(IWCMC), 2013 9th International, IEEE, pp. 387-393.
[5] Habibi, J, Ghrayeb, A & Aghdam, AG 2013, ‘Energy-efficient
cooperative routing in wireless sensor networks: A mixed-integer
optimization framework and explicit solution’, IEEE Transactions on
Communications, vol. 61, no. 8, pp. 3424-3437.
[6] K.Immanuvel Arokia James, R.Prabakaran, “Analysis of
Landmark Based Wireless Sensor Routing protocols”, IJCTA, 9(9),
2016, pp. 3679-3689.
[7] Kamran Latif, Nadeem Javaid, Malik Najmus Saqib, Zahoor Ali
Khan & Nabil Alrajeh, 2016, ‘Energy consumption model for density
controlled divide-and-rule scheme for energy efficient routing in
wireless sensor networks’, Int. J. Ad Hoc and Ubiquitous Computing,
Vol. 21, No. 2, 2016.
[8] Mansourkiaie, F & Ahmed, MH 2015a, ‘Joint cooperative routing
and power allocation for collision minimization in wireless sensor
networks with multiple flows’, IEEE Wireless Communications Letters,
vol. 4, no. 1, pp. 6-9.
[9] Mansourkiaie, F & Ahmed, MH 2015b, ‘Cooperative Routing in
Wireless Networks: A Comprehensive Survey’, in IEEE
Communications Surveys & Tutorials, vol. 17, no. 2, pp. 604-626,
Second quarter 2015. doi: 10.1109/COMST.2014.2386799
[10] K. Immanuvel Arokia James, R. Prabakaran "Intracluster
cooperative communication in smart home scenario through stable
election protocol", Concurr. Comput. Pract. Exp. 33(3) (2021)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 358


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Impact of Power, Dıstance and Channel Conditions


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

on The Throughput of Infrastructure and Adhoc Wi-


Fi Networks

ManasaPriya K Chaitanya G Mubeena Sk


Department of ECE Department of ECE Department of ECE
VFSTR, University VFSTR, University VFSTR, University
Guntur, India Guntur, India Guntur, India
manasathatavarthi@gmail.com chaitanyakrishna@gmail.com sk.mubeena951@gmail.com

Jahnavi K Seetha Ramanjaneyulu B Gangaprasad G


Department of ECE Department of ECE Department of ECE
VFSTR, University VFSTR, University VFSTR, University
Guntur, India Guntur, India Guntur, India
k.jahnavi417@gmail.com ramanbs@gmail.com ganga.prasad96@gmail.com

Abstract— Since Wi-Fi technology is widely used nowadays, these standards, some of them operate in 2.4 GHz ISM band
it is important to understand how different levels of transmitted and some in 5 GHz range of ISM band. The higher frequency
powers and channel conditions affect the throughputs at various band of 5 GHz has the advantage of offering more
communication distances. This inter-related study is carried out bandwidths and hence higher data rates compared to 2.4 GHz
in this work with focus on both infrastructure and ad-hoc type
Wi-Fi networks. This study would help in designing a better Wi-
band [2], [3]. However, it suffers from the issue of lesser
Fi network in infrastructure mode and decide on the number of coverage distances when compared with 2.4 GHz band
access points that are required at different distances in the systems.
coverage area, to offer required throughput. In ad-hoc mode of
Wi-Fi, this analysis would be useful in deciding the power levels In this work, a study is carried out to know how the
required at the transmitters to enable the signal to reach the varying power levels of transmitter can affect the throughput
destination through the intermediate relay nodes that are values at receiver, for the different versions of IEEE 802.11
located at various distances from each other. Simulation study
is carried out for different versions of IEEE 802.11 standard like Wi-Fi standards, under different channel condition
the 11a, 11b, 11g, 11n and 11ac. The study also helps in deciding environments. The study can help in deciding the locations of
on the version of the standard that offers the optimum coverage access points in infrastructure mode of Wi-Fi network. In
distance and throughput, for the given network. mobile ad-hoc networks, it aids in knowing the power levels
required to reach the next available nodes, through which
Keywords— IEEE 802.11, Transmitter Power, Path loss, destination would be reached [2], [6].
Throughput, Coverage Distance, Channel conditions, Fading,
Data rate. Introduction
Rest of the paper is organized as follows. Section-II
I. INTRODUCTION describes related work of the theoretical aspects of path loss,
In addition to the conventional wired local area networks channel conditions, signal-to-noise ratios, bit error rates and
that employ Ethernet technology, wireless local area includes some literature survey that dealt with the study of
networks (WLANs) also became common these days, for the these aspects.Section-III describes the proposed network
main reasons of quick deployment and affordability. While system and its parameters that are chosen to carry out the
IEEE802.3 became the popular standard for wired LAN, desired study of throughput result analysis. Section IV
IEEE 802.11 became the de-facto standard for WLANs. It is concludes the paper.
also known with its trade name Wi-Fi. In addition to the
original 802.11 version, the other main versions of it are II. TRANSMISSION POWER AND COVERAGE AREA
IEEE11b, 11a, 11g, 11n and 11ac [1]. The initial IEEE802.11 It is known that in wireless communications, power of the
version was supporting 1 Mbps and 2 Mbps of data rates only.
received signal decreases drastically, with increasing
The next version of it with the name IEEE802.11b was
distances from the transmitter. While ‘path loss’ is the main
supporting upto 11Mbps data rate, with fall back rates of 5.5
cause of this decrease, other mechanisms like reflection,
Mbps, 2 Mbps and 1 Mbps that the system would roll back if
unacceptable percentage of bit error rates (BER) are refraction and multipath fading of the signal also contribute
experienced. The next version of it was 802.11a that offers 6- to it. In its simplest form, received power can be considered
54 Mbps of data rates [1], [2]. The later version 802.11g also as transmitted power minus path loss [5], [7]. ‘Free Space
offered 6-54 Mbps of data rates. Later on, many versions are Path loss’ (FSPL) can be mathematically expressed as,
introduced with increased data rates, namely the 802.11n
with 72-600 Mbps, 802.11ac with 433-6933 Mbps, 802.11ax
with 600-9608 Mbps and 802.11be with 40000 Mbps [3]. Of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 359


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

4𝜋 III. SIMULATION RESULTS


𝐹𝑆𝑃𝐿 = 20 𝑙𝑜𝑔(𝑑) + 20 𝑙𝑜𝑔(𝑓) + 20 𝑙𝑜𝑔 ( ) − 𝐺𝑡
𝑐
− 𝐺𝑟 (1) The impact of changing the transmission power is studied
at first, for different versions of IEEE 802.11 standard.
where, ‘d’ is the distance between the transmitter Distance is kept constant for this study. Then next study is
and receiver, ‘f’ is the frequency of the channel used for carried out by changing the distances between the transmitter
transmission, ‘c’ is the velocity of the wave and ‘𝐺𝑡 ’ and ‘𝐺𝑟 ’ and receiver but keeping the transmission power as constant.
are the gains of transmitting and receiving antennas. Finally, the effect of channel conditions is studied for
different channel parameters and varying distances. These are
As path loss increases with distance, received power gets discussed in the following subsections.
decreased at longer distances. This results in the decrease of
signal-to-noise ratio (SNR). But sufficient value of SNR is A. Varying Transmitter Power
needed to detect the binary bits from the received signal.
In this, simulation is carried out by increasing the
Lower values of SNR result in bit errors. In such cases, if the
transmitter power from 5mW onwards, upto 100 mW. The
transmitted power level can be increased, it can help to
devices are kept close enough within a distance of 50 meters,
improve the SNR and reduce the bit error rates (BER) [5], [7].
and line of sight (LoS) channel with no other impairments is
How much strength of the received signal is needed to get
considered here. It is known from theory that the signal will
detected depends on receiver sensitivity also. A receiver with
travel longer distances for higher values of applied power,
good sensitivity levels will be able to identify the signal of
and so the access point's effective range is directly
very low strength also, but bit errors may be present because
proportional to the transmitter power it emits. The results are
signal’s level is too low, to the level of noise. Receiver
shown in Fig-1. As it can be observed, throughput values
sensitivity in the order of -100dBm is generally used in Wi-
remained constant even if the transmitter powers are
Fi systems [8].
increased beyond a value. It indicates the maximum possible
throughput for the offered load. As mentioned earlier, 14.07
In general, path loss models are considered to be the tools
Mbps load is offered in all the cases, for these simulation
to forecast the coverage areas of wireless networks. The
studies. The reason for 802.11b offering 1-2 Mbps data rates
authors in [9] depicted the effect of pathloss on a signal at
is due to its physical limits that are based on the modulation
different distances into different categories. As the path loss
and coding schemes employed in it. The discussion of
increases with frequency, higher value of frequencies are
maximum possible physical data rate is carried out in the next
prone to higher path losses and hence lesser coverage
subsection, that deals with distance-based variations in
distances, for the given power levels of transmitter [9], [10].
throughputs.
As different pathloss models exist, in [11], the authors
considered few pathloss models and compared how one path
loss differs with another in urban, sub-urban and rural area
environment and given which model suits best for the three
environments.

For predicting transmitter coverage and optimizing


wireless network performance accurate prediction of pathloss
is necessary. In [12], the authors provided a better
understanding for the propagation of radio waves for wireless
network optimization & communication design.
Fig: 1 Transmitter power Vs Throughput
In [15], the authos have taken urban and rural
environments and checked with respect to the pathloss B. Effect of Distance
models selected and concluded on the path loss model that is As per the principles of electromagnetic wave propagation
suitable for rural environments. and path loss phenomenon, the received signal power
decreases as the distance between the communicating nodes
In the experimental study of this work, the analysis is increases. Due to this, the signal to noise ratio (SNR)
carried out with respect to the throughput, distance and decreases and hence bit error rate (BER) of the transmission
channel characteristics for different path loss models, increases, when distance is increased. This BER value is used
shadowing and fading conditions using NETSIM simulator. in IEEE802.11 standard to decide the transmission rate of the
NETSIM offers various features that support VANET system. That means, when the BER gets increased, the data
simulation, WSN simulation and many other types of rate of Wi-Fi falls back to smaller value. This ‘Physical Data
network simulations. NETSIM helps in implementing Rate’ will decide the throughput of the system for the given
different new routing protocols and experimenting with distance [13], [14]. Physical data rates and actual throughput
various available pathloss models. With the support of these values of the simulated system are shown in Fig-2 and Fig-3
available path loss models, we analysed the throughput respectively. As can be observed from these results, 2.4 GHz
performance for the proposed network. versions of Wi-Fi offer longer distances of coverage of up to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 360


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

200 meters when compared to 5GHz based versions that


cover 100 meters, for the chosen transmitter power of 10 mw.

Fig 4: 802.11b performance under different channel conditions

Fig: 2. PHY rate Vs Distance

Fig 5: 802.11g performance under different channel conditions

Fig: 3. Distance Vs Throughput

C. Channel Characteristics
In addition to path loss, channel impairments like
shadowing and multipath fading also influence the
throughput performance. These effects are studied here. The
effect of ‘path loss alone’, ‘path loss plus shadowing’ and
‘path loss plus shadowing plus fading’ are considered. Fig 6: 802.11n - 2.4 GHz performance under different channel
conditions
Throughput changes for these different channel conditions
for varying distances are found. The results are shown in Fig-
4 through 9 for different versions of IEEE 802.11. The results
of versions that use 2.4GHz band are shown in Fig 4 through
Fig 6. The results of versions that use 5 GHz band are shown
in Fig 7 through Fig 9 The results are obtained for a
transmitter power of 10mW. For the versions of 2.4 GHz
band, when the Pathloss alone is applied, as the distance
increases throughput gets slowly decreased and at 1500m of
distance it becomes zero. For pathloss (Friis Free Space) plus
shadowing (lognormal) case the throughput becomes zero at
1200m itself. For the case of pathloss plus fading (Rayleigh)
plus shadowing, the throughput becomes zero at 700m
distance. Transmitter power is considered as 10mW in all the Fig 7: 802.11a performance under different channel conditions
above cases. These are depicted in Fig 4 for 802.11b, in Fig
5 for 802.11g and in Fig 6 for 802.11n.
For the versions of 5 GHz band, when the Pathloss
alone is applied, throughput gets slowly decreased to zero at
550m of distance. For the cases of pathloss (Friis Free Space)
plus shadowing (lognormal) and pathloss plus fading
(Rayleigh) plus shadowing, the throughput becomes zero at
400m distance itself. Here also, transmitter power is
considered as 10mW in all the cases. These are depicted in
Fig 7 for 802.11a, in Fig 8 for 802.11n and in Fig 9 for
802.11ac. Fig 8: 802.11n - 5 GHz performance under different channel conditions

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 361


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[3] Khorov, Evgeny, et al. "A tutorial on IEEE 802.11 ax high efficiency
WLANs." IEEE Communications Surveys & Tutorials 21.1 (2018):
197-216.
[4] Wu, Xinzhou, et al. "Vehicular communications using DSRC:
challenges, enhancements, and evolution." IEEE Journal on Selected
Areas in Communications 31.9 (2013): 399-408.
[5] Stallings, William. Wireless communications & networks. Pearson
Education India, 2009.
[6] O. O. Erunkulu, A. M. Zungeru, C. K. Lebekwe and J. M. Chuma,
"Cellular Communications Coverage Prediction Techniques: A Survey
and Comparison," in IEEE Access, vol. 8, pp. 113052-113077, 2020,
doi: 10.1109/ACCESS.2020.3003247.
[7] Haider Kadhim Hoomod, Intisar Al-Mejibli and Abbas Issa Jabboory,
Fig 9: 802.11ac performance under different channel conditions “ Analyzing Study of Path loss Propagation Models in Wireless
Communications at 0.8 GHz ” J. Phys.: Conf. Ser. 1003 012028, doi
:10.1088/1742-6596/1003/1/012028
IV. CONCLUSION [8] S. W. Choi, Y. S. Shim and S. K. Park, "A study on throughput
In this article, throughput analysis of Wi-Fi is carried out difference of station according to separation distance among WLAN
Aps," 2012 International Conference on ICT Convergence (ICTC),
for varying values of transmitter power and distance between 2012, pp. 631-634, doi: 10.1109/ICTC.2012.6386866
the communicating devices under different channel [9] Tianlin Wang and H. H. Refai, "Network performance analysis on
conditions. The simulation study is carried out for different IEEE 802.11g with different protocols and signal to noise ratio values,"
versions of IEEE standard. As higher distances lead to lesser Second IFIP International Conference on Wireless and Optical
powers received at the receivers, the SNR values will be Communications Networks, 2005. WOCN 2005., 2005, pp. 29-33, doi:
10.1109/WOCN.2005.1435983.
decreased and BER values will increase at those higher
[10] R. Amritha, B. Divya and V. Ramaiyan, "Wi-Fi Coverage in Indian
distances, which in turn results in lesser throughputs. This Homes," 2021 International Conference on COMmunication Systems
effect can be compensated by increasing the transmitter & NETworkS (COMSNETS), 2021, pp. 334-341, doi:
powers, as depicted in the results. It is known that channel 10.1109/COMSNETS51098.2021.9352832.
conditions that depend on reflection, refraction, multipath [11] R. Amritha, B. Divya and V. Ramaiyan, "Wi-Fi Coverage in Indian
Homes," 2021 International Conference on COMmunication Systems
fading and shadowing also play their role in this. Impact of & NETworkS (COMSNETS), 2021, pp. 334-341, doi:
them for three common channel types is also discussed. The 10.1109/COMSNETS51098.2021.9352832.
study helps in network planning and appropriate placement [12] S. Kouhbor, J. Ugon, A. Rubinov, A. Kruger and M. Mammadov,
of access points in infrastructure network. In the case of ad- "Coverage in WLAN with Minimum Number of Access Points," 2006
hoc network it helps in deciding the location of relay nodes IEEE 63rd Vehicular Technology Conference, 2006, pp. 1166-1170,
doi: 10.1109/VETECS.2006.1683018.
in stationary networks and identifying the required power
[13] Q. Hou and L. Gao, "The Simulation of WLAN Outdoor Coverage in
levels needed to reach the neighbour nodes in mobile ad-hoc Hot Spot Area for Wireless Digital City," 2011 7th International
network. Conference on Wireless Communications, Networking and Mobile
Computing, 2011, pp. 1-4, doi: 10.1109/wicom.2011.6036676.
REFERENCES [14] K. Nishat, R. Anwar, A. Mehfooz, B. Zaidi, H. Choudhary and I. A.
[1] Fan, Shiru, Yutong Ge, and Xiang Yu. "Comparison Analysis and Qazi, "On the effectiveness of high-speed WLAN standards for long
Prediction of Modern Wi-Fi Standards." 2022 International Conference distance communication," 2014 IEEE Conference on Computer
on Big Data, Information and Computer Network (BDICN). IEEE, Communications Workshops (INFOCOM WKSHPS), 2014, pp. 145-
2022. 146, doi: 10.1109/INFCOMW.2014.6849197.
[2] Davri, Eleni-Constantina, et al. "An accurate model for energy [15] M. Botella-Campos, L. Parra, S. Sendra and J. Lloret, "WLAN IEEE
efficiency in IEEE 802.11 WLANs." 2014 IEEE 19th International 802.11b/g/n Coverage Study for Rural Areas," 2020 International
Workshop on Computer Aided Modeling and Design of Conference on Control, Automation and Diagnosis (ICCAD), 2020,
Communication Links and Networks (CAMAD). IEEE, 2014. pp. 1-6, doi: 10.1109/ICCAD49821.2020.9260568.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 362


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Towards Internet of Things: Integration of Wireless


Sensor Network to Cloud Services for Data
Collection and Sharing
Anil Kumar N Dr.S.Vijayalakshmi Dr. D. Baswaraj
Department Electronics & Instrumentation Department of ECE, Department of CSE
Engineering R.M.K. Engineering college Vasavi college of engineering
Sree Vidyanikethan Engineering svl.eie@rmkec.ac.in Ibrahimbagh, Hyderabad
College Tirupati braj.d@staff.vce.ac.in
anilkumar.n@vidyanikethan.edu Dr.S.Chandramohan
Department of ECE Mohit Tiwari,
Padmanayaki Selvarajan Sri Chandrasekarendra Saraswathi Viswa Department of CSE
Department of Information Technology and Mahavidyalaya Bharati Vidyapeeth’s College of Engineering
Security Kanchipuram, India Delhi,India
Jazan University, Jazan, Saudi chandramohan@kanchiuniv.ac.in mohit.tiwari@bharatividyapeeth.edu
prasanasp23@gmail.com

Abstract - Web applications with special computation and of the Internet of Things (WSN) idea is wireless sensor
storage requirements benefit greatly from the cloud computing networks, specifically. With inbuilt CPUs and low-power
model. With an extensible and flexible architecture, Wireless radios, WSNs are made up of intelligent sensor nodes that
Sensor Networks are integrated with the Cloud. It is possible to
keep track of environmental variables including temperature,
directly integrate REST-based Web services into other
pressure, humidity, vibration, and power usage [2]. The
application domains, such as e-health care, smart homes, and
even vehicular area networks (VANs). An IP-based WSN testbed primary objective of WSN is to offer users discovery services.
has been used to implement a proof of concept REST API web It makes sense to offer her WSN service to an expanding
service for accessing data from anywhere using a REST API. customer base given the rise in Internet users.
When monitoring data exceeds values or events of interest, users
will receive notifications by email or tweet. Users can transmit real-time data to your consumers at any
time with high bandwidth and excellent quality thanks to our
Keywords: Vehicular area network, Wireless Sensor network, adaptable, efficient, and economical cloud computing
testbed, Web service infrastructure. The cloud, which enables the provision of
computing as a service, is made up of hardware, networks,
I. INTRODUCTION
services, storage, and interfaces. [3]. Additionally, data
The term "Internet of Things" (IoT) refers to the
acquired from wireless sensor nodes can be shared via email,
interconnection of commonplace items with the Internet,
SMS, messaging services like social networks and blogs, and
including smartphones, Internet-enabled TVs, sensors, and
REST-based web services like Simple Object Access Protocol
actuators. These technologies can be intelligently connected to
(SOAP) and Representational State Transfer (REST). [4].
open up new channels of interaction between things and
These sensor networks can be connected, connected, and
people. The introduction of new dimensions to the world of
reviewed to forecast trends, analyze data in real time, and
information and communication technology has helped the
avert hazardous situations. For the Open.Sen.se sensor data
development of IoT advance significantly in recent years. The
platform, this study presents the design, development, and
number of linked gadgets surpassed the number of connected
integration of a scalable WSN architecture [5].Data from
persons in 2008, claims [1]. By 2020, 50 billion connected
sensor nodes is processed, stored, and examined by the
gadgets will exist, predicts Cisco. seven times the size of the
Open.Sen.se server via application programming interfaces
world's population now.
(APIs) (APIs). Use REST-based web services as an adaptable
application layer that can be readily incorporated into a variety
These connections are anticipated to develop into the fully
of application domains, such as e-health services, smart
developed and dynamic IoT network now that anyone can
homes, and even vehicle area networks (VANs).
connect to anything from anyplace. The Internet of Things
In order to demonstrate the concept of an intelligent
will be significantly impacted by developments in
environment, we integrated a REST-based web service into an
nanotechnology and wireless sensors. One of the key elements
IP-based low-power WSN testbed. This allowed the intelligent

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 363


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

environment to access data from any location. Wireless Sensor tiny sensors is a difficult task. It can be used to gather
Networks (WSNs) have long been an obvious innovation. information. It is a technique that dispenses with the necessity
Sensor data must be stored and made available for use in real- to categorize information based on application requirements
world applications at all times and in all places. WSNs lack and produce copy packages, allowing for the orderly
the ability to store a lot of data and perform subsequent data management of information. Information-gathering techniques
processing because they are constructed using proprietary increase system longevity and cut power usage. In addition,
components. The quantity of WSNs may rise in a cloud obstructions between them can cause information loss. This is
environment that offers these controls. In order to synchronize a really challenging test to pass.
cloud conditions and distant sensor linkages, this notion
therefore presupposes a sensor cloud structure. b. Cloud computing

For Internet of Things (IoT) applications that demand International companies and scientists are interested in the
adaptable and unavoidable compute, the tuned system is suited continuous advancement of distributed computing. The cloud
and pragmatistically constructed. Developing nations require offers a domain of execution to which a client or company can
appropriate social security systems to manage their large connect and exchange resources like superior PCs, databases,
populations. An integrated system can address problems with etc., situated in geographically distant sites, often controlled
the provision of health services that are included in the plan. by other affiliates. The construction of routine, system-based
Using this to make it possible for people, networks, and functions and services allows for the delivery of coordinated
businesses who offer health care services to gather and send and carefully curated functionality to end users. This is made
health information when necessary to enhance social security possible by a key idea known as distributed computing. It
services for residents of both urban and rural locations. A delivers a management-centric design with little end-user data
framework with IoT capabilities does not have many technology overhead, lots of customizability, and low TCO. It
challenges to investigate. This theory focuses on issues with is possible to use distributed computing with three different
remote sensors and provides original solutions to these issues. management models and four different organizational types.
When connected to the Internet, WSNs often follow the IEEE The following are the three major types of control that the
802.15.4 standard and employ their own set of regulations, cloud can offer:
such as unpredictable board and construction. This proposition
offers a method for synchronizing sensor vision with a cloud ● Software as a Service (SaaS): It is a product delivery
environment that depends on the Internet. Operating a paradigm that enables users to access programmes from a
6LoWPAN-based hub offers dependable system-to-system range of client devices without having to hire professionals to
communication, including Internet connectivity. operate the underlying cloud infrastructure.
● Platform as a Service (PaaS): Provides customers with
a. Challenges in WSN access to a hidden cloud infrastructure for rapid application
development, management, and oversight.
The sensor system is facility-dependent and differs slightly ● Infrastructure as a Service (IaaS): Instead of using actual
from a conventional PC organization. In comparison to
hardware, this service offers virtualized computer resources.
conventional PC systems, there are some testing difficulties.
Based on cloud framework leaders, usage, and ownership,
The memory, battery life, and reserve power of small sensor
there are four different contract models.
hubs are all constrained. The following are some viewpoints
that WSN need to be able to include: availability of IP The
majority of Internet of Things applications need a small hub to II. WIRELESS SENSOR NETWORK
connect to the internet. The fact that CEOs have a range of IoT devices with embedded sensors are connected through
personalities and that packaging varies depending on communication protocols. Owing to LPWAN wireless
convention requirements make it difficult. This experiment networks, these Internet of Things devices can interact across
has to be run using IP-based remote sensing. In WSN, the use great distances (Low-Power Wide Area Network). Based on
of steering force is a crucial element. his Lora, many people use wireless sensor networks. Cellular
The control system should be created to enhance energy networks like NBIoT, LTE-M, WLAN, and technologies like
efficiency because the energy supply at the sensor hub is quite sub-1 GHz, Zigbee, and Thread can be used to transfer the
constrained. Your Vitality might increase if you change how data gathered by this sensor network to the cloud.
you use it. Information Gathering Data collection from several

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 364


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

a. Components of Wireless Sensor Network Remote interior monitoring systems support monitoring vast
● Sensor Nodes: Sensors are necessary for recording areas and ensuring the gas concentration level.
environmental parameters. The recorded data is used to create
an electrical signal that is then transferred. Outside Monitoring: To ensure broad flexibility for
● Radio Nodes: A wireless node, also known as a master machinery that is prone to having extreme access, external
node, gathers data from sensors and transmits it to the gateway monitoring of air quality requires the use of precise remote
in a wireless sensor network. These are made up of a sensors, rain and wind safe preparations, as well as energy
transceiver, a battery, and a microcontroller. procurement procedures.
● Access Point or Gateway: Receiving wireless data from
Air Pollution Monitoring: In a few urban locations, wireless
radio nodes and transmitting it over a cloud, often over the
sensor systems have been installed to alert residents to the
Internet or other cellular networks, is done by access points or
presence of a set of harmful gasses. These can benefit from the
gateways.
advantages of the particularly designed remote connections
● Edge Computing and Data Analysis: Information received
rather than wired establishments, which also increases their
from the gateway is further processed, examined, and stored
adaptability for testing readings in various locations[13-16].
using data analytics and edge computing. This information can
be shown on an IoT dashboard or mobile application[8-12].
Woodland Fire Detection:A system of sensor nodes can be
installed in woods to identify the beginning of fires. Sensors
b. Wireless Sensor Network Architecture
that measure temperature, humidity, and gases released by
burning trees and other vegetation can be installed on the hub.
Fault Tolerance: Fault tolerance refers to the network's
Avalanche Detection: The Avalanche Detection Framework
capacity to continue running even in the event that a sensor
employs distant sensor systems to identify minute variations in
node malfunctions.
soil composition and other traits that could happen before or
Mobility of Nodes:To enhance network performance, nodes
during an avalanche. Avalanches can be predicted using
can be moved anywhere they are within the sensor's range
information gathered prior to the event.
thanks to their mobility.
Scalability: WSN networks can include thousands of nodes
Water Quality Monitoring: Monitoring water quality entails
due to the network architecture.
looking into the purity of subsurface reservoirs, streams, lakes,
Feedback in case of Communication Failure: Notifies the base
and oceans[17-21].
station instantly and without delay if a specific participant is
unable to communicate data over the network.
Catastrophic event Prevention: Rapid response from wireless
sensor systems helps prevent the effects of calamities like
c. Sensor network
floods. Canals with expected moderate fluctuations in water
level are good locations for remote hubs.
Many WSN applications for earth science research have
emerged as a result of the evolution of environmental and
Mechanical Monitoring Machine Health Monitoring: For
earth observation technologies. This covers the exploration of
hardware condition-based maintenance, a wireless sensor
the outback, the oceans, the ice sheets, and volcanoes. This list
system was developed. This is due to the fact that it provides a
includes some of the most well-known locations.
large financial investment and allows for more capabilities
(CBM). In wired systems, wiring work typically prohibits the
Air Quality Monitoring: Counts of persons who can be seen
installation of enough sensors. Resources, rotating hardware,
must be taken across the board on a frequent basis in order to
dangerous or restricted areas, and previously unreachable
safeguard both people and the environment from the harm
places are now available to remote sensors.
caused by air pollution. Hazardous situations require the use
of technology that continuously monitors dangerous gasses.
Information Logging: Data collection for ecological
since both major quality metrics and the climate are subject to
monitoring is also done via wireless sensor systems. This can
fast change.
be done in a number of ways, from as basic as checking the
temperature in an ice chest to as difficult as figuring out how
Inside Monitoring: The employment of top-of-the-line,
much water is in a nuclear power plant's flood pond. In this
complex equipment that can adhere to mechanical regulations
manner, it will be simple to show through quantifiable data
is required to monitor the gas levels in unprotected areas.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 365


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

how well the framework functioned. WSNs have an advantage


over conventional loggers in that they may offer an
information flow that is "live."
Modern Sense and Control Applications: Several protocols
that enable remote sensor setup have been established through
continuing research. Future mechanical and associated distant
sensing and control applications are anticipated to profit from
these fresh viewpoints, with his WSN approach partially
replacing or enhancing conventional wireline-based systems.
Water/Waste Water Monitoring: Among the various activities
involved in water and wastewater monitoring are the
identification of surface or groundwater kinds and checking
that the nation's water infrastructure can support both people
and other animals.
Horticulture: Remote sensing systems are being employed
more frequently in agriculture, relieving ranchers of the need
for wired support in challenging circumstances. In gravity fed
systems, weight transmitters can be employed to impart a load
to the central point of control and monitor water tank levels.
The water system can be mechanized to use water more Figure 1: IoT with different WSN
effectively while minimizing waste.
Tracking and Localization: Leveraging WSNs results in a. Addressing
inactive restrictions and pointless targets by taking use of the
A front-end proxy system's base station must be able to offer
inescapably straightforward nature of such innovations and the WSN and Internet compatibility. In the second case, the base
nature of remote connectivity based on a consistent WSN station ought to serve as a gateway at the application layer.
infrastructure. will be monitored (e.g. brand). There must be compatibility between WSN and Internet
Keen Home Monitoring: Remote sensors are put into common protocols. The sensor node must have a direct IP address in
objects to create the WSN, which is used to monitor activity in order to employ the third technique because it can be directly
connected to the internet. Figure 2 denotes gateway protocol
smart homes. Systems that use remote sensors can monitor
which links the user with the sensor node along with the base
changes in the state of objects under human control and station.
provide behavioral support services.
Region Monitoring: WSN monitors a region that exhibits
some wonders. Geofencing for gas or oil pipelines is a
civilized example. Sensors are used in military models to find
enemy disturbance.
III. IOT IN WIRELESS SENSOR NETWORK
Sensor networks in the Internet of Things (IoT) consist of Figure 2: Gateway solution
specialized, spatially dispersed sensors that collect information Regular Internet protocols are challenging to run on sensor
about the environment and wirelessly communicate it to nodes with limited resources for the following reasons:
internet-based destinations. A WSN typically functions as a
network of nodes that sense and regulate their immediate ● Deployment: Devices are regarded as fixed things on
surroundings. All of these nodes are connected via a wireless the Internet. During operation, your actual location
means. Nodes communicate with one another through this won't change. Network administrators have
link. Figure 1 illustrates IoT connected with different WSN1, experience with reliable topologies. Sensor nodes are
WSN2, WSN 3 and WSN 4. dispersed throughout the detection field in a WSN at
random. Numerous applications also employ
portable sensor nodes. This shows that sensor nodes'
structural makeup is dynamic.

● Vulnerability: The sensor is exposed to events


because of its position. A dead knot might form in the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 366


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

entire process for any number of reasons, and a node UNO implements these two features. Both the XBee interface
with an excessive amount of events or and the functionality of the web server require libraries. The
communication will use up too much power. mini-server acts as a mobile application server between a
wireless sensor and a dedicated network, allowing it to process
● Limited Resources: The energy in sensor nodes is more sophisticated data than the sensor end devices. To gather
finite. To maximize energy consumption, alternate data from wireless sensors and transmit it to a platform for
between active and sleeping modes frequently. Sleep sensor data in the cloud, base station sink nodes use the
mode has a direct impact on sensor node architecture ZigBee protocol. The monitoring layer also gives the base
since it effectively disconnects the node from the station access to its web server so that it can connect and
network. upload sensor data.

It is obvious that WSN and IoT are approached completely Figure 4 denotes the flowchart of sensor communication with
differently. Niche aspects govern how well WSN and IoT its end nodes. This layer includes a web interface for
integration works. WSN topology changes need to be closely manipulating sensor data, producing statistics, and database
monitored [6, 7, 8]. storage. The monitoring layer uses Open.sense.se. HTTP
. Service because it offers a REST-based API for exposing and
IV. PROPOSED METHODOLOGY accessing sensor data.This enables the connection of new
4.1 Wireless Sensor Node Design applications to existing networks with little adjustments. In
order to access sensor readings by device type and timestamp,
The processes of developing the testbed and designing the Open.Sen.se offers a graphical user interface for infographic
hardware are highlighted in this section along with the data streams used in real-time system monitoring. The base
suggested architecture. The base station is essential to the station domain rule may also automatically give an alert to the
suggested strategy. While retaining all communication, user each time it detects the needed occurrence.
retrieval, and computing capability, the size of this node is
kept to a minimum. XBee-ZB module, Ethernet shield, and
Arduino UNO board form the base station hardware. Through
a USB connection, the ATMEGA 328, an Atmel AVR
processor found in open source Arduino microcontrollers, may
be programmed in C.Figure 3 indicates the interrelation of IoT
in wireless sensor networks.

Figure 4 : Flowchart of sensor communication with its end


Figure 3: Interrelation of IoT in Wireless Sensor Network nodes

Wireless sensor networks use microcontrollers to gather


sensor values from end devices, organize the data using a V. Result and Discussion
predefined packet protocol, and transmit it via Ethernet. Sen. In virtually every area of life, the fusion of IoT with WSNs
se runs a job that communicates data to the server. Local creates a wealth of options. The integration has flaws despite
proxies are linked to wireless sensor networks via the Ethernet how enticing they may look. Little hardware and software are
module, which serves as a hub node. The two primary available to sensor nodes in WSN. Sensor node operating
functional parts of a base station are typically web servers and systems function quite differently from internet node operating
XBee interfaces to wireless sensor networks. The Arduino systems since they have far less computing power. Hardware

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 367


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for sensor nodes is made to use less energy and to awaken in [2] V. Katiyar, P. Kumar, and N. Chand, ‘‘An intelligent
response to an incident. IoT, on the other hand, is not transportation systems architecture using wireless sensor networks,’’
constrained by the capabilities of hardware or processing. For Int. J. Comput. Appl., vol. 14, no. 2, pp. 22–26, Jan. 2011.
interoperability during integration, WSN and IoT layered
[3] L. Mainetti, L. Patrono, and A. Vilei, ‘‘Evolution of wireless
functions must be synchronized. WSN nodes should be sensor networks towards the Internet of Things: A survey,’’ in Proc.
updated as well to fend off cyberattacks. The capacity of a 19th Int. Conf. Softw., Telecommun. Comput. Netw. (SoftCOM),
WSN to faithfully integrate must be improved, and the layered 2011, pp. 1–6.
operations of IoT must be modified to function with a WSN.
In figure 5, the wireless sensor network nodes are depicted [4] X. Feng, F. Yan, and X. Liu, ‘‘Study of wireless communication
over their lifetime. technologies on Internet of Things for precision agriculture,’’
Wireless Pers. Commun., vol. 108, no. 3, pp. 1785–1802, 2019.

[5] V. Kumar, A. Jain, and P. N. Barwal, ‘‘Wireless sensor networks:


Security issues, challenges and solutions,’’ Int. J. Inf. Comput.
Technol., vol. 4, no. 8, pp. 859–868, 2014.

[6] P. P. Ray, ‘‘Home health hub Internet of Things (H3 IoT): An


architectural framework for monitoring health of elderly people,’’ in
Proc. Int. Conf. Sci. Eng. Manage. Res. (ICSEMR), Nov. 2014, pp.
1–3.

[7] P. Chamoso, A. González-Briones, S. Rodríguez, and J. M.


Corchado, ‘‘Tendencies of technologies and platforms in smart cities:
A state-ofthe-art review,’’ Wireless Commun. Mobile Comput., vol.
2018, pp. 1–17, Aug. 2018.

[8] R. Piyare, S. Park, S. Y. Maeng, S. H. Park, S. C. Oh, S. G. Choi,


H. S. Choi, and S. R. Lee, ‘‘Integrating wireless sensor network into
cloud services for real-time data collection,’’ in Proc. Int. Conf. ICT
Converg. (ICTC), Oct. 2013, pp. 752–756.

[9] S. Huh, S. Cho, and S. Kim, ‘‘Managing IoT devices using


blockchain platform,’’ in Proc. 19th Int. Conf. Adv. Commun.
Technol. (ICACT), 2017, pp. 464–467.
Figure 5: Wireless sensor network node lifetime
[10] J. Guerreiro, L. Rodrigues, and N. Correia, ‘‘Modeling of sensor
clouds under the sensing as a service paradigm,’’ in Proc. Int. Conf.
VI. CONCLUSION Broadband Commun., Netw. Syst. Faro, Portugal: Springer, 2018, pp.
22–30.
This idea evolved into a flexible structure for WSN connection
to the cloud using REST-based complete Web products as an [11] L. Iacono, C. García Garino, O. Marianetti, and C. Párraga,
interoperable software layer that can be immediately added ‘‘WSNs data and configuration management in sensor clouds with
into different applications, gathering and dispensing sensor cloud file synchronization services,’’ J. Comput. Sci. Technol., vol.
data. To avoid data loss and social unrest brought on by 17, no. 1, pp. 1–11, 2017.
coordinator failure, we implemented intelligence at many [12] K. Karunanithy and B. Velusamy, ‘‘An efficient data collection
architectural layers to meet the various requirements of using wireless sensor networks and Internet of Things to monitor the
conceivable software scenarios with the least amount of wild animals in the reserved area,’’ Peer-to-Peer Netw. Appl., vol.
redecoration and recoding. The results of the assessment show 15, pp. 1105–1125, Jan. 2022.
that clients can benefit from sensor statistics on any mobile
device with internet connectivity and from any place. [13] K. Karunanithy and B. Velusamy, ‘‘Edge device based efficient
According to the data, the Open.Sen.se server typically needs data collection in smart health monitoring system using wireless body
eleven seconds to automatically assemble and send the user's area network,’’ Biomed. Signal Process. Control, vol. 72, Feb. 2022,
alert notification email to their chosen email account. Utilizing Art. no. 103280.
the sleep capability of low strength XBee ZB transceiver [14] X. Li, Z. Li, Y. Ouyang, H. Duan, and L. Xiang, ‘‘Using UAV
modules allowed for the evolution of a comparable energy- to detect truth for clean data collection in sensor-cloud systems,’’
efficient method for extending the life of sensor nodes. ZTE Commun., vol. 19, no. 3, pp. 30–45, 2021.
VII. REFERENCES [15] I. Ali, ‘‘Data collection in sensor cloud: Recent advances,
[1]. M. Dong, K. Ota, and A. Liu, ‘‘RMER: Reliable and energy- taxonomy, use cases and open challenges,’’ TechRxiv, 2020, doi:
efficient data collection for large-scale wireless sensor networks,’’ 10.36227/techrxiv.13054148.v2.
IEEE Internet Things J., vol. 3, no. 4, pp. 511–519, Aug. 2016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 368


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[16] A. Belfkih, C. Duvallet, and B. Sadeg, ‘‘A survey on wireless


sensor network databases,’’ Wireless Netw., vol. 25, no. 8, pp. 4921–
4946, Nov. 2019.

[17] I. Ali, A. Gani, I. Ahmedy, I. Yaqoob, S. Khan, and M. H. Anisi,


‘‘Data collection in smart communities using sensor cloud: Recent
advances, taxonomy, and future research directions,’’ IEEE
Commun. Mag., vol. 56, no. 7, pp. 192–197, Jul. 2018.

[18] H. Xie, Z. Yan, Z. Yao, and M. Atiquzzaman, ‘‘Data collection


for security measurement in wireless sensor networks: A survey,’’
IEEE Internet Things J., vol. 6, no. 2, pp. 2205–2224, Apr. 2019.

[19] S. Cheng, Z. Cai, and J. Li, ‘‘Approximate sensory data


collection: A survey,’’ Sensors, vol. 17, no. 3, p. 564, Mar. 2017.

[20] W. Wenhua, W. Tian, W. Qun, W. Guojun, and J. Weijia,


‘‘Survey of delay-constrained data collection with mobile elements in
WSNs,’’ J. Comput. Res. Develop., vol. 54, no. 3, p. 474, 2017.

[21] N. C. Luong, D. T. Hoang, P. Wang, D. Niyato, and D. I. Kim,


‘‘Data collection and wireless communication in Internet of Things
(IoT) using economic analysis and pricing models: A survey,’’ IEEE
Commun. Surveys Tuts., vol. 18, no. 4, pp. 2546–2590, 4th Quart.,
2016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 369


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Modified Aquila Optimization based Route Planning


Model for Unmanned Aerial Vehicles Networks
Sachin Vasant Chaudhari Dr. M. Dhipa
Associate Professor, Department of Electronic and Associate Professor, Department of Biomedical
Computer Engineering, Sanjivani College of Engineering, Engineering, Nandha Engineering College, Perundurai Main
Kopargaon, Ahmednagar, Maharashtra, Road, Erode,
sachin_tra@rediffmail.com dhipachandrasekar@gmail.com .
Shahnawaz Ayoub,2 B Gayathri
Shri Venkateshwara University, NH-24, Venkateshwara Associate Professor, Department of Computer Science,
Nagar, Rajabpur Gajraula, Dist: Amroha, Uttar Pradesh, Bishop Heber College, Affiliated to Bharathidasan
India, shahnawazayoub@outlook.com University, Trichy,
Dr. M. Siva gaya3arun85@gmail.com
Assistant professor, Department of Civil Engineering, V. Banupriya
Easwari Engineering College, Chennai, Assistant Professor, Department of Computer Science
Tamilnadu, India, and Business Systems, M. Kumarasamy College of
m.siva@eec.srmrmp.edu.in Engineering, Karur, Tamilnadu, India,
banucs03@gmail.com

Abstract—Unmanned aerial vehicles (UAVs) are deliberated as safety duties such as border watching, controlling protected parts
a potential example of automated emergency tasks in dynamic namely energy broadcast appearances are other bags where
marine environments. But the maritime transmission drones are working frequently [3]. Administrations have
performances among UAVs and offshore platform becomes a previously spent millions of dollars on this skill, and seemingly
crucial problem. The task planning problems of numerous UAVs this spending will endure increasing with the cumulative
are classified into two parts, route planning and task allocation requirement in both civil and governmental governments [4].
problems, are different and interrelated from one another. With progress in aerospace abilities such as altitude, range,
Because of the complicated marine environments, both efficiencies endurance, and observation, UAVs are an indispensable aspect
of UAVs in an intelligent ocean are not acceptable. This study
to increase military power. In armed forces, drones are
presents a Modified Aquila Optimization Algorithm based Route
Planning Scheme (MAOA-RPS) for UAV networks. The presented
employed in execution of several assignments like electric
MAOA-RPS technique is majorly concentrated on the detection of conflict and signal intelligence, transportation, battle damage
optimal routes for UAV data transmission. To attain this, the valuation, investigation search and rescue, and reconnaissance
MAOA-RPS technique involves the incorporation of Levy flight and aggressive rival targets [5]. Fig. 1 defines the components
(LF) with the traditional AOA. In addition, the optimal routes are of UAV system.
chosen by the MAOA-RPS technique via a fitness value, which can
be determined by many input parameters. For assessing the
enhanced outcomes of the MAOA-RPS technique, we have
performed a series of experiments. The comparison study revealed
the improved performance of the MAOA-RPS technique under
distinct metrics.

Keywords— Unmanned aerial vehicles; Route planning; Data


transmission; Metaheuristics; Levy flight

I. INTRODUCTION Fig. 1. Components of UAV


As mobile sensing systems, unmanned aerial vehicles
(UAVs) or drones are an efficient and fast option to distinguish With the expansion in UAV technology, the necessity for
the atmosphere owing to their quick response abilities [1]. The utilizing drones professionally develops more significant stock
UAVs could adopt self-directed performances execution [6]. Users have to plan their doings efficiently and segment the
multifaceted errands at a low working cost, offering strong data timely, while the enhancements in the information and
incentives to accept such automobiles for several happenings communication schemes aid doctors discover reckless and real
like environmental monitoring, search and rescue operations, solutions. It is experimental that drones remain progressively for
and accurate agriculture [2]. Drones were used effortlessly in investigation tasks. As the supreme flight time of a drone was
cases where anthropoid life is at risk, like military processes limited, it is vital to have an ideal route strategy to shelter
performed in bad weather, intimidating ecological additional ideas, regions of interest, or lines. Besides, allowable
circumstances, or polluted districts. Scientific research events process periods may also be snugger than aerospace time [7, 8].
like monitoring vehicle traffic, data collection, saleable and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 370


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Process of many drones in shadowing task chiefs the decision making christened MANFIS-DM procedure on
investigators to the steering problematic which is an influential independent drone schemes. The MANFIS-DM method means
arena of processes research identified as the Vehicle Routing to efficiently establish the drone system into bunches and then
Problems (VRPs), presented by Dantzig and Ramser. VRP was categorize the imageries into fitting class tags.
usually castoff in the terms of transport processes with a delivery
system of goods among a granary and patrons. Every route III. THE PROPOSED MODEL
employed by vehicles remains strongminded to curtail the In this study, we have developed a new MAOA-RPS
transport price or total travel coldness topic to some restraints. technique for route planning in the UAV network. The presented
VRP was an NP-hard issue, then, since it is presumed that P is MAOA-RPS technique is majorly concentrated on the detection
unequal to NP [9], the computing power essential for solution of optimal routes for UAV data transmission. To attain this, the
surges at a better rate than multinomial as the delinquent size MAOA-RPS technique involves the incorporation of the LF
rises. For large illustrations of the VRP, meta-heuristic methods concept with the traditional AOA [16]. In addition, the optimal
were employed in a shot to overwhelmed the problems related routes are chosen by the MAOA-RPS technique via a fitness
with exact methods [10]. The review of meta-heuristics value, which can be determined by many input parameters.
expresses that the projected techniques could bargain and Initially, in AOA, the swarm catches the prey via four predation
occasionally optimal resolutions to bulky examples having an methodologies.
insufficient one hundred customers. The initial approach: Fly high in the sky search prey. Now,
This study presents a Modified Aquila Optimization they are above the hunt space at highest height and initial
Algorithm based Route Planning Scheme (MAOA-RPS) for searching and flippers the target. When the prey is identified,
UAV networks. The presented MAOA-RPS technique is they dive vertically towards the prey and the behavior is
majorly concentrated on the detection of optimal routes for UAV formulated as follows:
data transmission. To attain this, the MAOA-RPS technique 𝑡
𝑋(𝑡 + 1) = 𝑋𝑏𝑒𝑠𝑡 (𝑡) × (1 − ) + (𝑋𝑀 (𝑡) − 𝑋𝑏𝑒𝑠𝑡 (𝑡) × 𝑟𝑎𝑛𝑑) (1)
involves the incorporation of Levy flight (LF) with the 𝑇
traditional AOA. In addition, the optimal routes are chosen by From the expression, 𝑋(𝑡 + 1) represents the individual
the MAOA-RPS technique via a fitness value, which can be location at 𝑡 + 1 iterations, 𝑋𝑏𝑒𝑠𝑡 (𝑡) denotes the existing global
determined by many input parameters. For assessing the optimal location at 𝑡 𝑡ℎ iterations. 𝑡 and 𝑇 signify the present 𝑡-
enhanced outcomes of the MAOA-RPS technique, we have 𝑡ℎ iterations and the maximal count of iteration. 𝑋𝑀 (𝑡)
performed a series of experiments. represents the current mean position of individual at extant
iteration. rand refers to the arbitrary number in Gauss
II. RELATED WORKS distribution ranges from [0, 1].
Santin et al. [11] grant metaheuristics for routing a varied The second approach: contour flight with shortest glide
group of unmanned air vehicles (UAVs) for comprehensive attack. Now, it switched from flying at highest altitude towards
exposure of pulverized parts, seeing concurrent reduction of the hovering on prey's head, getting ready for predation behavior
attention time and placement the negligeable amount of and the position can be upgraded as follows:
refuelling stations. As this problematic was not solved, the 𝑋(𝑡 + 1) = 𝑋𝑏𝑒𝑠𝑡 (𝑡) × 𝐿𝐹(𝐷) + 𝑋𝑅 (𝑡) + (𝑦 − 𝑥) × 𝑟𝑎𝑛𝑑 (2)
author intended high-level path preparation that syndicates the From the expression, 𝑋𝑅 (𝑡) indicates the arbitrary position,
multi variable neighborhood search (MOVNS) meta-heuristic and 𝐷 shows the dimension size. 𝐿𝐹 represents Levy flight
and the careful preparation to travel the usual non-dominated function. 𝑦 and 𝑥 characterize the shape of search that is given
answers. In [12], a drone steering and orientation problem below:
drones UAV-ROP) that reduces the 3D flight detachments of the 3×𝜋
drone under directional, navigation and indeterminate 𝑥 = (𝑟1 + 0.00565 × 𝐷1 ) × 𝑠𝑖𝑛 (−𝜔 × 𝐷1 + )
{ 2 (3)
restrictions are presented and established NP-hard in this study. 3×𝜋
To enhance the covered direction-finding and locations in the 𝑦 = (𝑟1 + 0.00565 × 𝐷1 ) × 𝑐𝑜𝑠 (−𝜔 × 𝐷1 + )
2
UAV-ROP concurrently, a real memetic process is projected in 1
this study. In the system, the GA achieves the outer loop for 𝜋𝛽 𝛽
𝜇×𝜎 Γ(1 + 𝛽) × sin ( )
enhancing the route and the local search meta-heuristic does the 2
𝐿𝐹(𝑥) = 0.01 × 1 ,𝜎 = 𝛽−1
(4)
inner loop for enhancing the locations. 1+𝛽 ( )
Ozkan [13] suggests an algorithm to use and drones for |𝑣|𝛽 Γ( )×𝛽×2 2
( 2 )
mitigating forest fire risks. The advanced metaheuristic Consider, 𝑟1 as the searching cycle number within [0, 1], 𝐷1
technique crossbreeds fake annealing and resident signifies a random number from one to 𝐷-dimension, along with
hunt metaheuristics with an integer lined software 𝜔 specifies a constant of 0.005. Fig. 2 demonstrates the
design method. The precise perfect was industrialized to resolve flowchart of AOA.
the distance-constrained multi-based multi-drone routing
problem, and since the difficulty of the issue, the generated
meta-heuristics aid the method treasure better answers. In [14],
an exact route planning technique for weeding machines related
to drone imageries was devised. A GA was rummage-sale to
enhance the process route. For GA, a novel route indoctrination
method and fitness function remained. In [15], projects an
innovative metaheuristic by a neuro-fuzzy inference scheme for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 371


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

This distribution followed the predictable LD for |𝑠| ≥ |𝑠0 |,


while 𝑠0 discusses the minimal step length. Now, 𝛤(. )
characterizes the Gamma function and is calculated by:

𝛤(1 + 𝛽) = ∫ 𝑡 𝛽 𝑒 −𝑡 𝑑𝑡 (12)
0
In the distinct cases, if 𝛽 is an integer, then guarantees that
𝛤(1 + 𝛽) = 𝛽! (13)
In the proposed model, the step size can be generated by
means of LD to exploit the searching region:
𝑠𝑡𝑒𝑝𝑠𝑖𝑧𝑒(𝑡) = 0.001 × 𝑠(𝑡) × 𝑆𝐿𝐶 (14)
Now, 𝑡 indicates the iteration count to local search method,
𝑠(𝑡) has evaluated by means of LD and 𝑆𝐿𝐶 represent the social
learning components of global searching method.
The routing issue is processed as a Multiobjective minimized
problem. In such cases, 2 objectives are considered to enhance
reliability of the data distribution. The purpose of the proposed
method is to minimalize the cost of inter‐cluster and intra‐cluster
Fig. 2. Flowchart of AOA communications. The aim of the proposed model is shown
below.
The third approach: Lowest‐altitude flight gets closer |𝑉| |𝑐𝑘 |
towards the prey and slowly attacks. Now, they initially discover
and determine the neighboring prey location, and descend ∑ ∑ 𝑤𝑐𝑚𝑚,𝑘 →𝐶𝐻𝑘 (15)
vertically towards primary predation, once they found prey 𝑘=1 𝑚=1
|𝑉|
reduction the speed and it is expressed as follows:
𝑋(𝑡 + 1) = (𝑋𝑏𝑒𝑠𝑡 (𝑡) − 𝑋𝑀 (𝑡)) × 𝛼 − 𝑟𝑎𝑛𝑑 ∑ 𝑤𝐶𝐻𝑘 →𝑁𝑒𝑥𝑡𝐻𝑜𝑝𝐶𝐻 , (16)
𝑘
+ ((𝑈𝐵 − 𝐿𝐵) × 𝑟𝑎𝑛𝑑 + 𝐿𝐵) × 𝛿 (5) 𝑘=1
Whereas, 𝐶𝐻𝑘 → 𝐶𝐻 number 𝑘; 𝑘 → whole amount of CH
Assume 𝛼 and 𝛿 as amendment parameters in the
selection; 𝑁𝑒𝑥𝑡𝐻𝑜𝑝𝐶𝐻𝑘 →Next hop to 𝐶𝐻𝑘 ; 𝑐𝑚𝑚,𝑘 → Cluster
development process, fixed as 0.1, 𝐿𝐵 and 𝑈𝐵 correspondingly
shows the lower and upper boundaries of the search space. member number 𝑚 of clusters 𝑘; 𝑉 → The vector involving the
The fourth approach: Walk on land and catch the prey. Now, CH selected; 𝐶𝑘 → The vector covers the CM from the cluster
they go toward the land for tracking the prey escaping trajectory, that corresponding to 𝐶𝐻𝑘 .
along with attack the prey and this behavior is formulated by: IV. RESULTS AND DISCUSSION
𝑋(𝑡 + 1) = 𝑄𝐹 × 𝑋𝑏𝑒𝑠𝑡 (𝑡) − (𝐺1 × 𝑋(𝑡) × 𝑟𝑎𝑛𝑑)
− 𝐺2 × 𝐿𝐹(𝐷) The experimental result analysis of the MAOA-RP model is
+ 𝑟𝑎𝑛𝑑 × 𝐺1 (6) assessed under three scenarios as demonstrated in Table 1.
2×𝑟𝑎𝑛𝑑−1
𝑄𝐹(𝑡) = 𝑡 (1−𝑇)2 (7) TABLE I
𝐺1 = 2 × 𝑟𝑎𝑛𝑑 − 1 DATASET DETAILS
{ 𝑡 (8)
𝐺2 = 2 × (1 − ) Parameter
Scenario Scenario Scenario
𝑇 1 2 3
From the expression, 𝑄𝐹 denotes the quality function of
search process, 𝐺1 indicates the parameter of random motion 10*10 10*10
The task allocation area 10*10 km
during prey chasing, as well it is arbitrary number ranges in km km
[−1,1], 𝐺2 refers to the flight slope during prey chasing that is The number of warehouses 1 1 1
denoted by 2 reduced linearly to 0. The material loading capacity
20 kg 20 kg 20 kg
The MAOA is derived by the use of LF. It is an arbitrary of a UAV
walk while the step was defined based on the step length that has 1.5 1.5 1.5
likelihood distribution. An arbitrary step length was derived in The flight speed of UAVs
km/min km/min km/min
the Levy distribution (LD) as follows [17]. 𝐼𝑘𝑚𝑎𝑥 75 km 75 km 75 km
𝐿(𝑠) ∼ |𝑠|−1−𝛽 (9)
Whereas 𝛽(0 < 𝛽 ≤ 2) indicates the index and ‘s’ shows 𝑁𝑐 10 20 30
the step length. The Mantegna Approach for symmetric Levy 𝑁𝑝 100 100 100
stable distribution has been employed for creating arbitrary step Iterations 200 200 300
sizes as follows:
𝑢 Independent runs 50 50 50
𝑠= 1 (10)
|𝑣|𝛽
In Eq. (10), 𝑢 and 𝑣 denote the standard distribution.
𝑢 ∼ 𝑁(0, 𝜎𝑢2 ), 𝑣 ∼ 𝑁(0, 𝜎𝑣2 ) (11)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 372


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-1

Shortest Distance / km (Scenario – 1)


No. of MAOA-
SA GA ACO GA-PSO
Iterations RP
0 84.55 66.63 91.22 62.94 58.26
25 73.40 61.25 85.05 57.96 54.38
50 67.02 58.36 82.36 55.57 53.18
75 66.03 56.67 69.91 55.67 53.18
100 59.36 55.87 63.54 55.67 53.18
125 56.07 55.87 61.75 55.67 53.18 Fig. 3. SDIS analysis of MAOA-RP system under scenario-1
150 56.07 55.87 61.75 55.67 53.18
175 56.07 55.87 61.75 55.67 53.18
200 56.07 55.87 61.75 55.67 53.18
Average 63.17 57.68 70.48 56.52 53.65

Table 2 and Fig. 3 implies the shortest distance (SDIS) of the


MAOA-RP model with recent models. The results depicted that
the MAOA-RP model has gained least SDIS values. For
instance, with 25 iterations, the MAOA-RP model has resulted
to lower SDIS of 58.26 whereas the SA, GA, ACO, and GA-
PSO models have attained higher SDIS of 84.55, 66.63, 91.22,
and 62.94 respectively. Also, with 100 iterations, the MAOA-
RP method has resulted to lower SDIS of 53.18 whereas the SA,
GA, ACO, and GA-PSO models have reached higher SDIS of Fig. 4. Average SDIS analysis of MAOA-RP system under
59.36, 55.87, 63.54, and 55.67 correspondingly. Similarly, with scenario-1
150 iterations, the MAOA-RP model has resulted to lower SDIS Table 3 and Fig. 5 implies the SDIS of the MAOA-RP model
of 53.18 whereas the SA, GA, ACO, and GA-PSO models have with recent models. The results portrayed that the MAOA-RP
achieved higher SDIS of 56.07, 55.87, 61.75, and 55.67 approach has gained least SDIS values. For example, with 25
correspondingly. iterations, the MAOA-RP technique has resulted to lower SDIS
An average SDIS assessment of the MAOA-RP model on of 116.94 whereas the SA, GA, ACO, and GA-PSO models have
scenario-1 is illustrated in Fig. 4. The results assured that the attained higher SDIS of 161.74, 139.07, 136.95, and 134.65
MAOA-RP model has gained superior results with minimal correspondingly. Additionally, with 100 iterations, the MAOA-
SDIS of 53.65 while the SA, GA, ACO, and GA-PSO models RP model has resulted to lower SDIS of 105.96 whereas the SA,
have obtained maximum average SDIS values of 63.17, 57.68, GA, ACO, and GA-PSO models have attained higher SDIS of
70.48, and 56.52 respectively. 113.04, 122.78, 131.46, and 116.23 respectively. Also, with 150
iterations, the MAOA-RP method has resulted to lower SDIS of
106.31 whereas the SA, GA, ACO, and GA-PSO models have
reached higher SDIS of 113.04, 115.70, 123.84, and 110.21
correspondingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 373


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE III
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-2

Shortest Distance / km (Scenario – 2)


No. of MAOA-
SA GA ACO GA-PSO
Iterations RP
0 178.74 154.13 146.69 148.28 125.08
25 161.74 139.07 136.95 134.65 116.94
50 147.04 133.58 130.93 122.96 110.21
75 123.14 129.86 131.28 118.35 107.91
100 113.04 122.78 131.46 116.23 105.96
125 113.04 119.24 127.39 110.21 106.31
150 113.04 115.70 123.84 110.21 106.31
175 113.04 115.70 122.43 110.21 106.31 Fig. 6. Average SDIS analysis of MAOA-RP system under
200 113.04 115.70 122.43 110.21 106.31 scenario-2
Average 128.88 126.54 129.89 118.94 109.51

TABLE IV
SDIS ANALYSIS OF MAOA-RP SYSTEM WITH DISTINCT
ITERATIONS UNDER SCENARIO-3

Shortest Distance / km
No. of GA- MAOA-
SA GA ACO
Iterations PSO RP
0 294.65 259.82 251.65 257.33 221.79
25 279.01 237.07 223.92 237.07 201.53
50 255.91 214.33 206.51 219.30 175.94
75 214.68 203.31 200.11 201.53 166.70
100 185.89 190.52 199.05 183.76 166.35
Fig. 5. SDIS analysis of MAOA-RP system under scenario-2 125 178.43 180.21 195.14 180.92 166.35
150 178.43 179.85 189.80 176.30 166.35
An average SDIS assessment of the MAOA-RP model on
scenario-2 is exemplified in Fig. 6. The results assured that the 175 178.43 179.85 189.80 175.94 166.35
MAOA-RP approach has gained superior results with minimal 200 178.43 179.85 189.80 175.94 166.35
SDIS of 109.51 while the SA, GA, ACO, and GA-PSO models
have obtained maximum average SDIS values of 128.88, 225 178.43 179.85 189.80 175.94 166.35
126.54, 129.89 and 118.94 correspondingly. 250 178.43 179.85 189.80 175.94 166.35
Table 4 and Fig. 7 implies the SDIS of the MAOA-RP model
with recent models. The results depicted that the MAOA-RP 275 178.43 179.85 189.80 175.94 166.35
model has gained least SDIS values. For instance, with 25 300 178.43 179.85 189.80 175.94 166.35
iterations, the MAOA-RP approach has resulted to lower SDIS Average 201.67 194.02 198.77 191.79 172.79
of 201.53 whereas the SA, GA, ACO, and GA-PSO models have
attained higher SDIS of 279.01, 237.07, 223.92, and 237.07
correspondingly. Also, with 100 iterations, the MAOA-RP
technique has resulted to lower SDIS of 166.35 whereas the SA,
GA, ACO, and GA-PSO models have attained higher SDIS of
185.89, 190.52, 199.05, and 183.76 respectively. Also, with 150
iterations, the MAOA-RP model has resulted to lower SDIS of
166.35 whereas the SA, GA, ACO, and GA-PSO models have
achieved higher SDIS of 178.43, 179.85, 189.80, and 176.30
correspondingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 374


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
[1] B. Abhishek, S. Ranjit, T. Shankar, G. Eappen, P. Sivasankar, A. Rajesh,
Hybrid PSO-HSA and PSO-GA algorithm for 3D path planning in
autonomous UAVs. SN Appl. Sci. 2(11), 1–16 (2020)
[2] H. Sang, Y. You, X. Sun, Y. Zhou, F. Liu, The hybrid path planning
algorithm based on improved A* and artifcial potential feld for unmanned
surface vehicle formations. Ocean Eng. 223, 108–709 (2021)
[3] C. Liang, X. Zhang, Y. Watanabe, Y. Deng, Autonomous collision
avoidance of unmanned surface vehicles based on improved A star and
minimum course alteration algorithms. Appl. Ocean Res. 113, 102755
(2021)
[4] X. Liu, X.B. Zhai, W. Lu, C. Wu, QoS-guarantee resource allocation for
multibeam satellite industrial Internet of things with NOMA. IEEE Trans.
Ind. Inf. 17(3), 2052–2061 (2019)
[5] S. Xu, J. Zhang, S. Meng, J. Xu, Task allocation for unmanned aerial
vehicles in mobile crowdsensing. Wirel. Netw. 1–13 (2021)
[6] K. Srivastava, P.C. Pandey, J.K. Sharma, An approach for route
optimization in applications of precision agriculture using UAVs. Drones
Fig. 7. SDIS analysis of MAOA-RP system under scenario-3 4(3), 58 (2020)
[7] M. Yan, H. Yuan, Z. Li, Q. Lin, J. Li, Energy savings of wireless
An average SDIS assessment of the MAOA-RP model on communication networks based on mobile user environmental prediction.
scenario-3 is demonstrated in Fig. 8. The results assured that the J. Environ. Prot. Ecol. 22(1), 206–217 (2021)
MAOA-RP model has obtained superior results with minimal [8] S. Ma, W. Guo, R. Song, Y. Liu, Unsupervised learning based coordinated
multi-task allocation for unmanned surface vehicles. Neurocomputing
SDIS of 172.79 while the SA, GA, ACO, and GA-PSO 420, 227–245 (2021)
techniques have obtained maximum average SDIS values of
[9] G. Xia, X. Sun, X. Xia, Multiple task assignment and path planning of a
201.67, 194.02, 198.77 and 191.79 correspondingly. multiple unmanned surface vehicles system based on improved self-
organizing mapping and improved genetic algorithm. J. Mar. Sci. Eng.
9(6), 556 (2021)
[10] L. Li, Q. Gu, L. Liu, Research on path planning algorithm for multi-UAV
maritime targets search based on genetic algorithm. In: 2020 IEEE
International Conference on Information Technology, Big Data and
Artifcial Intelligence (ICIBA), vol. 1, pp. 840–843 (2020)
[11] Santin, R., Assis, L., Vivas, A. and Pimenta, L.C., 2021. Matheuristics for
multi-uav routing and recharge station location for complete area
coverage. Sensors, 21(5), p.1705.
[12] Xiang, S., Wang, L., Xing, L. and Du, Y., 2021. An effective memetic
algorithm for UAV routing and orientation under uncertain navigation
environments. Memetic Computing, 13(2), pp.169-183.
[13] Ozkan, O., 2021. Optimization of the distance-constrained multi-based
multi-UAV routing problem with simulated annealing and local search-
based matheuristic to detect forest fires: The case of Turkey. Applied Soft
Computing, 113, p.108015.
[14] Zou, K., Wang, H., Zhang, F., Zhang, C. and Kai, D., 2022. Precision
route planning method based on UAV remote sensing and genetic
algorithm for weeding machine. Applied Intelligence, pp.1-11.
Fig. 8. Average SDIS analysis of MAOA-RP system under [15] Ragab, M., Ashary, E.B., Aljedaibi, W.H., Alzahrani, I.R., Kumar, A.,
scenario-3 Gupta, D. and Mansour, R.F., 2022. A novel metaheuristics with adaptive
neuro-fuzzy inference system for decision making on autonomous
unmanned aerial vehicle systems. ISA transactions.
V. CONCLUSION
[16] Aribowo, W., Supari, B.S. and Suprianto, B., 2022. Optimization of PID
In this study, we have developed a new MAOA-RPS parameters for controlling DC motor based on the aquila optimizer
technique for route planning in the UAV network. The presented algorithm. International Journal of Power Electronics and Drive Systems
MAOA-RPS technique is majorly concentrated on the detection (IJPEDS), 13(1), pp.808-2814.
of optimal routes for UAV data transmission. To attain this, the [17] Lakshmanna, K., Subramani, N., Alotaibi, Y., Alghamdi, S., Khalafand,
MAOA-RPS technique involves the incorporation of the LF O.I. and Nanda, A.K., 2022. Improved metaheuristic-driven energy-aware
cluster-based routing scheme for IoT-assisted wireless sensor
concept with the traditional AOA. In addition, the optimal routes networks. Sustainability, 14(13), p.7712.
are chosen by the MAOA-RPS technique via a fitness value,
which can be determined by many input parameters. For
assessing the enhanced outcomes of the MAOA-RPS technique,
we have performed a series of experiments. The comparison
study revealed the improved performance of the MAOA-RPS
technique under distinct metrics. In future, data collection
scheme can be introduced to improve the overall network
performance.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 375


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Performance Analysis M-PAPM WDM-PON


System with ASE-Powered Stealth Channels
for Steganography Applications
Mr. A. S AGAYA S ELVARAJ, MATHIBALAN.B, S AGADEVAN K
Associate Professor, UG Scholar, Associate professor
Department of Electronics and Department of Electronics and Department of Electronics and
Communication Engineering, Communication Engineering, Communication Engineering,
IFET College of Engineering, IFET College of Engineering, IFET College of Engineering,
Villupuram, TamilNadu, India. Villupuram, TamilNadu, India. Villupuram, TamilNadu, India.
johndanielpascal@gmail.com mathibala100@gmail.com sakakec@gmail.com

MOHANRAJ S
UG Scholar,
Department of Electronics and
Communication Engineering,
IFET College of Engineering,
Villupuram, TamilNadu, India.
admohanraj17@gmail.com

Abstract----Wavelength Division Multiplexing (WDM) 1. INTRODUCTION


boosts a physical medium's carrying capacity. Light
frequencies within a frequency range are assigned to The flo w of in formation fro m one location to
incoming optical communications (wavelengths or another is referred to as co mmunicat ion.
lambdas). Dense Wavelength Division Multiplexing Co mmunicat ion systems are necessary to communicate
(DWDM) has lately acquired favor as a low-cost method of over great distances. The method of modulat ion is used
increasing the tran smission capacity of existing fibre cable in various communicat ion systems to convey
connections. DWDM was formerly solely used in baseband informat ion across long distances. In the modulation
digital applications, especially in terrestrial long-distance process, high-frequency electro magnetic waves carry
networks and, in certain cases, metropolitan and the information. In particu lar, visible optical carrier
commercial networks. The performance of DWDM waves in the optical range are required in optical fibre
components and frequency-stabilized lasers has lately
skyrocketed, while their costs have plummeted. As a result, a
communicat ion systems. These optical carrier waves
variety of novel optical network configurations have become have very high frequencies in the range of 100 THz
commercially viable. Different types of DWDM systems, [1]. People used to send brief messages across small
such as point-to-point, tree, and ring networks, are distances using light and fire, mirrors, and s moke in the
developed based on application needs. Each of these systems past. After many years, in 1880, Alexander Graham
needs an own set of parts. Becau se it provides greater Bell invented the photophone which made the use of
management and protection measu res, the ring light for co mmun ication. Photophone was a device
configuration is preferred above all others. A multichannel which used to transmit sound on them light beam. But
high-speed DWDM ring with 16 channels and a channel the photophone did not become the practical device
spacing of 0.4 nm was developed in this work. Each channel
because of unsecured channels through which the light
has a 10 Gbps data rate. The performance optimization of
the DWDM ring using various modulation techniques was was passing. Fiber optic trans mission began to advance
discovered on the simulated ring. As a comparison, the rapidly with the invention of fiberscope. Fiberscope
MPAPM modulation format was employed. Different was used in industry and for laparoscopic surgery. But
modulation formats' BER and Eye diagrams were compared it was in 1970 that fiber optic co mmun ications
and analyzed. MPAPM outperformed CRZ, NRZ, RZ, and revolutionized with the invention of Laser diode. Then
DPSK, according to research. The Electronic Dispersion in 1975, first commercial fiber optic co mmun ication
Compensation (EDC) iii technology, which includes system was developed which used semiconductor [2].
Decision Feedback Equalizers (DFE) and Feed Forward
The fourth-generation optical fiber systems
Equalizers (FFE) equalizers, can extend the tran smission
distance even more. made use of optical amp lifiers to increase the repeater
spacing. The WDM technique was also used to
Keywords: Optical Networks, Dense increase the bit rate. By 2001, fourth generation optical
Wavelength Division Modulation, Optical communicat ion systems were operating at 10 Tb/s. The
Co mmunicat ion, Frequency Reuse, Pulse A mplitude major fiber losses in the systems were compensated by
Modulation the EDFA amplifier. The conventional C band was the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 376


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

focus of the fifth-generation of optical technologies [3]. signals propagating through the cables. The added
These systems concentrated on expanding the advantage of optical fiber is its small size and weight
wavelength range in WDM. Solitons are employed in as the fiber is made up of g lass or plastic and the
optical co mmunications systems as well. So litons are diameter of fiber is as small as a single strand of hair.
pulses of a specified form that maintain their shape
while co mpensating for fibre dispersion and 1.2. DENS E WAVEL ENGTH DIVIS ION
nonlinearity. The goal of this generation of systems MULTIPLEXING
was to efficiently use the bandwidth of fibre using DWDM is variant technology of WDM. In
DWDM methods. The WDM variant technology is
mid of 1990, dense WDM systems started emerg ing,
DWDM.
those systems used 16-24 channels spaced at 100-200
1.1. OPTICAL FIBER COMMUNICATIONS:
GHz. In late 1990, DW DM systems were capable of
The data carrying capacity of communication carrying up to 80 channels, those were densely spaced
networks rises as the carrier frequency increases. at 25-50 GHz. In DWDM, d ifferent wavelengths at
Optical waves in the THz band are used in optical narrow spacing are co mbined and sent at a t ime over a
fibre co mmunication systems, which greatly boosts the single optical fiber. The application of DWDM is in
optical co mmunicat ion systems' informat ion carrying submarine and long-haul terrestrial systems which
capability. The fundamental b lock diagram of an carry enormous data [5]. The difference between the
optical fibre co mmun ications system is shown in WDM and DWDM is the spacing between the
Figure 1.1. The data is transferred in either digital or wavelengths. In DWDM , wavelengths are closer than
analogue format. At the source, the data is in electrical WDM hence DW DM provides mo re channel capacity.
form. At the optical source, the electrical signal is first In networks based on Synchronous Optical Netwo rk
converted into the optical signal. The optical source at (SONET) or Synchronous Digital Hierarchy (SDH)
the transmitter side can be a laser diode or an LED. protocols, DWDM and WDM methods are employed.
The optical signal is then transmitted through the glass Depending upon the applications, different network
fiber. At the receiver end, the optical signal is topologies like point-to-point, tree and ring topology
converted back into the electrical form using an optical are used. But ring topology is preferred for DWDM
detector [4]. The optical detector can be a p-n diode, p- because of the advantages of better management
i-n or an avalanche diode. Optical detection provides experience and protection. Optical Add Drop
the optical-electrical conversion. Multiplexer (PA PM) is one of the main co mponents
used for imp lementation of DWDM. An PAPM takes
a multi-wavelength signal, removes one or more
wavelengths, and replaces them with one or more pre-
selected wavelengths. Amplification and equalization
of optical signals are possible at PAPM as each optical
signal is controlled indiv idually. In DWDM, Crosstalk
is the main issue like in W DM. Crosstalk arises due to
imperfections of network co mponents and hence limits
the performance of networks based on DWDM.

Figure 1.1 Block Diagram of Optical Fiber


Communication
In optical fiber co mmunication, signal is in
optical fo rm and transmitted through the glass fiber.
The optical fiber communication system has many
advantages over the conventional commun ication
systems in which electrical signals travels through the
copper wires. As the signal travels in optical for m and Figure 1.2 Block Diagram of Wavelength Division
the signal remains confined to the glass fiber, optical Multiplexing
fiber co mmunication system becomes secured. The
range of the optical carriers is in THz which has very 1.3. MODULATION FORMATS
high bandwidth as compared to the radio Modulation is a method of impressing data
communicat ion and microwave co mmun ication optical carrier waves for transmission across optical
systems. The signal is guided by the glass fiber and fibre. The researchers explored and analy zed
signal attenuation is very small as compared to the bandwidth-efficient modulation forms for optimal

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 377


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

exploitation of high-capacity optical networks. The degradation, numerous modulation techniques were
modulation formats used to imprint data on optical developed, each having major advantages for
carrier waves have an impact on the capacity of transmission. Differential Quadrature was shown to
DWDM networks. For real world applications, be superior than Suppressed Return to Zero (PAPM )
selection of the modulation format also depends upon and Duobinary Phase Shift Key (DB-PSK) modulation.
the other factors like interference and inter-modulation A. Sangeetha et al proposed a set of simu lations to
fro m adjacent channels, nonlinear properties and noise connect non-Return to Zero (NRZ), RZ, and CRZ
tolerance. The simp lest modulation formats used in systems in terms of signal degradation caused by Kerr
optical fiber co mmunication systems is non-return-to- non-linearities in 320 km of DW DM signal trans mission
zero (NRZ). In NRZ, pulse is ON for the entire bit simu lations. The author explored the dynamics of CRZ
period. The NRZ modulation format has the advantage systems. The CRZ modulation format was determined
of ease of generation and less bandwidth requirement. to have substantial advantages over the NRZ modulation
But NRZ is not a suitable modulation format in standard. WDM systems did not perform well across
DWDM systems as this modulation format is h ighly distances of 5000 km o r more at 10 Gb/s. The author
susceptible to linear effects. One of the most common used the CRZ modulation format across more than 5000
optical modulation formats is a return-to-zero (RZ). In kilo meters with acceptable power marg ins, and he also
RZ, pulse remains ON for a portion of the b it period. examined the generation of individual CRZ pulses. The
RZ has better performance as compared to NRZ in creation of pulses at ideal power levels was dominated
high-speed networks like DW DM, because of self- by chromatic dispersion, with non-linearity having little
synchronizing data format and resistant to Kerr non- impact. In decreasing the influence of non-linearity,
linearity. Because the RZ pulse has a greater optical symmetric dispersion compensation was shown to be
bandwidth than the NRZ pulse, it is more susceptible more important than asymmetric compensation [9, 10,
to dispersion. Chirped Return-to-Zero (CRZ) 11].
modulation format is a subset of RZ modulation A. Sheetal et al created a model of a 40 Gb/s
format. This modulation fo rmat is obtained by pre- long-distance DWDM system with a capacity of 1.28
chirp on conventional RZ pulses at the transmitter Tb/s. The modulation types Carrier Suppressed Return -
side. For long haul transmission systems at channel to-Zero (PAPM), Duobinary Return-to-Zero (DRZ), and
data rates up to 10 Gbps, CRZ modulation format is Modified Duobinary Return-to-Zero (M DDRZ) were
used. Phase modulation of RZ data format generates simu lated (MDRZ). In the research, MDRZ, a modified
CRZ. CRZ format is tolerant to the fiber non-linearity modulation format, was given. A maximu m
but wide optical spectrum is its disadvantage as it transmission distance of 1450 kilo metres was reached
reduces the dispersion tolerance and spectral using a 32-channel DWDM system employing the
efficiency [6]. MDRZ modulat ion standard with symmetric correction
[12, 13].
2. RELATED WORK Bobrovs et al.demonstrated nonlinear optical
It is crit ical to use available bandwidth as effects on NRZ and RZ modulated signals. Nonlinear
efficiently as possible in very h igh-capacity optical effects were emp loyed by the authors to demonstrate the
networks such as DWDM. Choosing modulation utilisation of Non-Return-to-Zero (NRZ) and Return-to-
methods that utilize less bandwidth is one technique to Zero (RZ) modulat ion formats in WDM systems. The
optimize available bandwidth. The modulation format outcomes of the simulation demonstrated that nonlinear
adopted must be interference-resistant and resistant to effects (NOE) were affected by dispersion and input
nonlinearity and noise in the fibre. The speedy power levels. The NRZ format is faster to generate and
implementation effort must also comp ly to budgetary has less signal bandwidth than the RZ format, which has
constraints. M. Jaworski et al discussed several less inter-symbol interference. The d ispersion value of
modulation formats. The author provided an overview NRZ systems is nearly nil. The newly produced
of the modulation types used in terabit DWDM system harmonic peak power in RZ format systems is two times
testing. Kerr In DWDM systems [7, 8], nonlinearity and lower than in NRZ format systems [14].
chromatic d ispersion of fibre are major degradation 3. PROPOSED OBJECTIVES
problems. The author ran simulat ions of a 4 x 40 Gb/s Because of its low loss, fast speed, extended
DWDM system across a 4 x 80 km single -mode fibre bandwidth, and great capacity, DWDM Stealth Optical
distance, then modified the dispersion. The simu lations networks have transformed data delivery. As a result,
of various modulation formats were then conducted. In much study has been conducted in this sector in recent
simu lations, fibre parameters like as attenuation, years. According to a review of the literature, much of
dispersion, dispersion slope, and non-linear co-efficient the study has focused on a small nu mber of nodes, a
were employed. In order to prevent fiber-induced small nu mber o f channels, and point-to-point networks,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 378


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

with little focus on ring networks. A ring network with .


16 channels spaced by 0.4 n m was used in this work, RING LENGTH 300 km
with a data throughput of 10 Gbps. Different modulation SPAN LENGTH 50 km
formats were investigated using an eye diagram and NUMBER OF NODES 6
BER. According to ITU-T rules, the effect of crosstalk
has been studied for channel spacings more than 25 DATA RATE 10 Gbps
GHz, but no study has been undertaken for channel NUM BER OF 16
spacings smaller than 25 GHz. Cross talk becomes less CHANNELS
of an issue as channel separation increases. Dispersion CHANNEL SPACING 0.2,0.4,0.8&1n m
is caused by the material of the fibre, non-linearity, and
the distance travelled by the signal within the fibre. Figure 5.1 shows the arrangement of the designed
Several strategies must be used to limit this dispersion. DWDM ring. The designed optical ring network design
Electronic Dispersion Co mpensation is one way that is has unidirectional fiber as a channel. The proposed
emp loyed. This method is used to account for single - network consists of six PAPMs arranged in a ring
mode fib re d ispersion. In order to find the optimal topology. Each PAPM is connected to other PAPM by a
outcomes, the EDC was evaluated. nonlinear single mode fiber. The length of fiber span of
4. PROPOSED WORK 50 km is used between PAPM. Each node converts
A literature analysis was conducted to electrical data into an optical signal and the optical
investigate the performance optimization of a signal is transmitted 54 through the DWDM ring. Each
mu ltichannel, mu lti-gigabit per second DWDM ring node has a programmable transmitter and receiver with
using optical software. numerous filters. Each node can add/drop any
Crosstalk and channel spacing will also be wavelength of each channel. For amp lificat ion of the
evaluated on the Stealth DWDM Ring system. optical signal, EDFA amp lifier is employed between the
Various modulation techniques will be used to nodes. To compensate the non-linearities of a
examine the planned Stealth DWDM Ring system. mu ltichannel system, large effective area fiber (LEA F)
The electrical equalizat ion approach was used is used. Power of -9 d Bm per channel is used as a
in the performance study to increase the distance of the transmitter. Total 45 wavelengths at spacing of 0.4 n m
optimized DWDM Ring. are used in the designed ring network. After each node,
In the planned DWDM Ring, a fast comparison Multiplot is used to observe optical performance.
of different HOA and the effect of power transients in Figure 5.2 depicts the simulation configuration
cascaded EDFAs is made. for the DWDM PAPM ring network. Each node
5. METHODOLOGY includes one line signal input and output, as well as 16
DWDM technology helps service providers input and outputs for adding and deleting wavelengths.
in dealing with rising user traffic. SDW DM is a kind Each port's output is routed to optical receiver blocks,
of wavelength-division-mult iplexing (DWDM). By which are subsequently routed to Multiplot. The 16
distributing incoming optical signals to specific light wavelengths employed in the design of the ring are
wavelengths within a specified frequency range, shown in Table 5.2
DWDM increases the carrying capacity of physical
fibre. When the channel gap between channels is less Table 5.2 Wavelengths Used in DWDM Ring
than 0.2 n m, SDWDM is employed. WDM versions Lambda Wavelength
include DW DM and SDWDM. The fourth-generation λ1 1550
optical networks were based on WDM. WDM is
wavelength division multiplexing. By using WDM λ2 1550.4
technique, channel bandwidth is used efficiently by λ3 1550.8
sending various wavelengths simultaneously over the
same fiber channel. λ4 1551.2
OptSim 5.3 software is utilised in this thesis
λ5 1551.6
work for imp lementation and assessment of the
proposed DWDM ring. It is a sophisticated fibre λ6 1552
simu lator tool that takes into account characteristics
λ7 1552.4
like as fibre loss, chromatic d ispersion, birefringence,
polarization mode dispersion, and Kerr non-linearity. λ8 1552.8
The OptSim 7simu lator can produce high-precision
λ9 1553.2
findings for fibre networks in a short period of time
Table 5.1 Netwo rk Design Simu lation λ10 1553.6
Parameters

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 379


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

. . fiber is doped using rare earth element Er then EDFA is


obtained. The operation of EDFA is normally limited to
. .
C-band i.e. 1530-1560 n m reg ion. EDFA uses optical
. . pumping fo r amp lification. The optical pu mping process
requires the use of three energy levels.
. .
EDFA is made up of a doped fibre and pump
λ16 1568 lasers. When pump light is injected in the same direct ion
as the signal flo w, co-directional pump ing occurs. A
counter-directional pump injects pump light in the
opposite direction of signal flow. In the DWDM PAPM
ring network, EDFA is employed to compensate for
attenuation.
5.4. OPTICAL RECEIVER
The optical receiver is responsible for
converting optical impu lses to electrical signals. To
compensate the dispersion, electronic dispersion
compensation techniques are applied after the
receiver block.
Figure 5.1 Simulation Setup of 16 nodes DWDM PAPM
Ring 6.RESULTS AND DISCUSSIONS
5.1. OPTICAL TRANSMITTER
6.1. EFFECT OF CROSSTALK
The optical transmitter section consists of input Crosstalk occurs owing to the comp lexity of
fro m a PRBS generator. The output is given to an mu ltichannel systems. As a result, investigating the
electrical generator. The output of electrical generators influence of crosstalk on the proposed DWDM ring is
and the laser is given to the external modulator. crucial. Crosstalk is measured at various levels, and an
External modulator modulates the signal and the analysis is performed to determine which levels
modulated signal is given to PAPM. Figure shows the enhance BER. The simu lation results of BER at
simulation setup of optical transmitter. various degrees of crosstalk are shown in Table 5.2.
The results are based on the wavelengths at the
extreme upper (45), extreme lower (1), and central
(25) ends of the spectrum. The PAPM modulat ion
format is used to modulate the wavelengths.
Figure 5.3 Plots the variation of BER with
respect to of crosstalk. Plot in blue color indicates
λ1. Plot in red color indicates λ25 and plot green color
indicates λ45. It is found that BER is min imu m at -40
dB crosstalk.
Figure 5.2 Simulation Setup of Optical
Transmitter

5.2. OPTICAL FIBER


Optical fiber is the mediu m or channel through
which the optical signal propagates to reach the
receiver. When an optical signal is transmitted over a
fiber, it degrades because of linear and nonlinear
degrading effects in the fiber. Optical loss and
chromatic dispersion are linear degrading effects; SPM,
XPM, FWM, SRS and SBS are nonlinear degrading
effects.
For imp lementing the DWDM PAPM ring
network, large effective area fiber (LEAF) is used to
compensate the non-linearities in the fiber. To overco me
Figure 5.3 Variation of BER verses Crosstalk
the attenuation in fiber, EDFA is employed after each
fiber span.
7. CONCLUS ION
5.3. EDFA The dissertation work's major goal was to
Erbiu m doped fiber amp lifier (EDFA) is used implement and optimize a mult ichannel, mu lti-gigabit
to compensate the attenuation in fiber. When optical per second DWDM ring. Several channel DWDM ring

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 380


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

with mu ltip le gigabits per second. The proposed [11] R. Goyal and R. Kaler, (2012), “A novel architecture of hybrid
(WDM/TDM) passive optical networks with suitable
DWDM PAPM ring network has six nodes and works
modulation format”, Optical Fiber Technology, Vol. 18, No. 6,
on 45 channels separated at 0.4 n m. Different amounts pp. 518-522.
of crosstalk were used to monitor the BER in order to [12] Wiley India Edition, New York, Third Edition, pp. 332.
analyze the influence of crosstalk on the proposed [13] X. Liu, (2005), “Can 40-Gb/s Duobinary Signals be Carried
network. Crosstalk BER was found to be the lowest at Over Transparent DWDM Systems With 50-GHz Channel
Spacing?”, IEEE Photonics Technology Letter, Vol.16, No.6,
-40 db. To find the optimu m channel spacing for the
pp. 1328-1330.
proposed DWDM ring network, channel spacing was [14] Q. Liu, N. Ghani and T. Frangieh, (2007), “Topology
varied fro m 0.2 n m to 1 n m. It was observed that at Abstraction Schemes in MultiDomain Full Wavelength
0.4 n m, the performance of the proposed ring was best Conversion DWDM Networks”, IEEE International
in term of BER, as BER was least at 0.4 n m. The Symposium on High capacity Optical Networks and enabling
performance of proposed DWDM PAPM ring is also technology, Dubai, pp. 1-6.
affected by the type of modulation format used. To
optimize the performance of the designed DWDM
PAPM ring, the optimu m data format was selected.
Various modulation formats, including NRZ, RZ,
CRZ, DPSK, Manchester, and PAPM, are emp loyed
for analysis. The three wavelengths λ1, λ25 and λ45
i.e., 1550 n m, 1555.6 n m and 1567.6 n m respectively
are taken. The selected wavelengths are modulated
and transmitted at 10 Gbps rate. Performance
parameters like eye d iagrams and BER are used to
analyze the designed ring. The eye d iagrams of PAPM
modulation format were best at all the three
wavelengths. BER was least in case of the PAPM
format. Hence, it is concluded that the PAPM
modulation fo rmat is best for the designed DWDM
PAPM ring and the performance of the designed ring
was best using PAPM modulation format in terms of
BER.

REFERENCE
[1] Senkans, Ugis, et al. "Research of hybrid WDM-PON data
transmission system with embedded ASE-powered stealth
channels for steganography applications." Optical Fiber
T echnology 58 (2020): 102300.
[2] Jingjing, Bao, and Zhan Honglin. "The Study of Generalized
Spatial Modulation Based on MPAPM Signals in Indoor
Visible Light Communication System." 2020 IEEE Eurasia
Conference on IOT, Communication and Engineering (ECICE).
IEEE, 2020.
[3] Wang, Xu, et al. "40 Gb/s Secure Optical Communication
System Based on Optical Code Technology." 2018 20th
International Conference on Transparent Optical Networks
(ICT ON). IEEE, 2018.
[4] A short history of Fiber optics;
http:/www.sff.net/people/jeff.hechts/history.html.
[5] G. Kesier, (2011), “Optical Fiber Communications”, T ata
MacGraw-Hill, New Delhi, Fourth edition, pp. 35.
[6] J. Senior, (2002), “Optical Fiber Communications”, Prentice
Hall of India, New Delhi, Second edition, pp. 105-107.
[7] H. Bulow, F. Buchali and A. Klekamp, (2008), “Electronic
Dispersion Compensation”, Journal of light Wave Technology,
Vol. 26, No. 1, pp. 158-167.
[8] M. Syuhaimi, A. Rahman and M. Moghaddasi, (2012), “A
Comparison between Electrical and Optical Chromatic
Dispersion Compensation in Wavelength Division Multiplexing
Network Regarding to Electrical Pulse Shapes”, Journal of
Computer Science, Vol. 8, No. 1, pp. 76-83.
[9] G. Agrawal, (2008), “Fiber-Optic Communications Systems”,
Wiley India Edition, New York, Third edition, pp. 427-428.
[10] A.Borsali, H. Badaoudi, M. Aichi and W. Aichi, (2012), “Effect
of Wavelength Spacing For WDM system on the Quality of
Transmission”, International Journal of Computer Science, Vol.
9, No. 2, pp. 441-443.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 381


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Detection of Distributed Denial of Service Attack


using Random Forest Algorithm

Murukesh C Kishore Kannan B Thilak kumar A Venkat B Haris kumar V


Associate Professor, UG Students, UG Students, UG Students, UG Students,
Department of ECE, Department of ECE, Department of ECE, Department of ECE, Department of ECE,
Velammal Engineering Velammal Engineering Velammal Engineering Velammal Engineering Velammal Engineering
College, College, College, College, College,
Chennai, Tamil Nadu, Chennai, Tamil Nadu, Chennai, Tamil Nadu, Chennai, Tamil Nadu, Chennai, Tamil Nadu,
India. India. India. India. India.
thilak241100@gmail.c
om

Abstract— The Distributed Denial of Service (DDoS) attack to access. This paper examines the protection of the commonly
entails flooding an online service with traffic from multiple used Internet of Things disassembly components and might
sources such that it is rendered unavailable. These attacks have function in the event of recent solutions. A security study is
been identified by many researchers using machine learning additionally a challenging endeavor because the kinds of
algorithms. In this paper, Ping of death attack is executed and attacks that are possible can affect many sorts of services or
their detection was performed using random forest algorithms. A perhaps damage equipment for various kinds of applications in
DDoS attack is detected by Splunk software, which collects attack a way. The researchers can make use of this study to
details about the data packets. Data from Kaggles’s dataset is
investigate various attacks on the devices. The Splunk software
used to train the machine learning algorithm. An algorithm
is employed to view the variations in the Wi-Fi and CPU
based on the random forest is used to visually differentiate
between the normal and attacked samples whose accuracy is
performance before and during the attack. This software is also
equal to 99.8%. During the attack on the network, the Central used to feed the real-time data during the attack. Classification
Processing Unit and Wi-Fi performances are also analyzed. is then performed using the Random Forest algorithm.

Keywords— Distributed Denial of Service, Ping of Death, II. RELATED WORKS


Random Forest algorithm, Splunk, Cyber security.
Various researchers have studied and implemented
detection techniques for DDOS attacks mainly by using
I. INTRODUCTION advanced learning techniques some of them are discussed
DDoS is one kind of Cyberattack that is performed on the below. Rohan Doshi, et.al discusses IoT networking
layers of the OSI model. The attackers are mainly targeting the insecurities and the solutions to detect the DDoS attack using
network layer. There are various categories of DDoS attacks the feature selection technique. This technique accurately
like SYN flooding, Fragmented packets, Ping of death, Smurf predicts the DDoS detection in IoT network traffic and also
DDoS, etc. The attacker looks for the loopholes in the network demonstration is done on the usage of IoT network-specific
and sends the node which is not a part behaviors which is used to say that feature selection will have
lighter accuracy. Machine learning algorithms are employed
of the network. Later the attacker uses these nodes to send a including various neural networks. The result is the detection
huge amount of data packets to the target which in turn disrupts of DDoS attacks on the local IoT device using a low-cost
the network. This entire attack is done without the knowledge Machine learning algorithm and traffic data[2].
of the user. The entire server may also be down within a short
time. On a large scale, this attack can be done by assembling a Zekri, Marwane, et al discusses the DDoS attack on the
network of compromised nodes and following the above cloud service network. The performance of the cloud service is
process. In the category of Ping of death attack, the data degraded by the use of many compromised computers by
packets are sent into the network more than the allowed limit taking advantage of known bugs and vulnerabilities large
which causes overheating and gets crashed. packets are sent then the server is jammed by the attacker. This
problem is identified by the use of c.4.5 algorithms to eradicate
The IoT is the latest technology that allows us to control the DDoS threats. Thus algorithm uses signature detection
devices or sensors from remote locations. It can try this through techniques along with a decision tree to perform automatic
easy communication between a neighborhood network, detection of the DDoS attack also many comparisons are done
internet-type, radio, etc. With the web of Things developing and the best-suited model is chosen[3].
together with automation and mechatronics, the technology can
create a good array of solutions that are inexpensive and simple

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 382


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A classification algorithm is used to predict the results by It exploits the TCP/IP structure of the Internet to send
using the given dataset. The disadvantage of the existing unwanted or deficient data packets in the system using the ping
method is that a non-real-time dataset is used for a prediction instructions. Generally, a data packet may have a payload of up
that is taken from one or more websites that have been to 84 bytes. It is illegal to send data packets greater than 84
collected and combined as a dataset. bytes. Therefore, the attacker will break down a large packet
into many small bits and send them to the target node. When
This proposed method uses real-time data and Kaggle data that node finally reconstructs all the small pieces of the data
as a dataset to predict the results with high accuracy. The packets, the final size is larger than 84 bytes, resulting in a
training set and test set were used to visualize using the server or machine crash. In the field of computer security, Kali
matplotlib module between normal and DDoS. Linux is a commonly used term. It is recognized as the most
The remainder of this paper is arranged in the following advanced tool for advanced security assessments, ethical
format. Section III presents the proposed method for DDoS hacking, and penetration testing. Kali Linux is used to perform
attack and light automation system and Splunk software. The Ping of Death DDOS attacks by using the command mentioned
machine learning algorithms are elaborated in detail. In Section below. The code is used to perform Basic commands used to
III, the details of the experimental setup are provided. The perform
results and discussions from experimentation are detailed in
Ping of Death attack:
Section IV and conclusions are provided in Section V.
root@kali:~ ls
III. PROPOSED METHOD root@kali:~ cd DDOS
In this model, the IoT device is attacked using Kali Linux root@kali:~ ls
which sends a huge amount of packets into the network and
disrupts the normal functioning of the device, this type of root@kali:~ python2 ddos.py
attack is known as Ping of Death. Here the IoT device is the
root@kali:~ ping 118.35.108.43
voice-controlled LED which uses Adafruit and the IFTTT
platform along with the google assistant for the switching of Click Enter to start the attack
the LEDs. The Ping of Death attack is performed in an IoT
device that is controlled by the mobile phone. The real-time root@kali:~/DDOS
data from the network before and after the attack is collected IP:118.35.108.43
using the Splunk software after which the difference can be
noted. Data is fed into a machine learning model as a test set to PORT SCANNING:80
determine if an attack has occurred or not. Click enter to start the attack. After maximum packets are
sent, hit Ctrl+C to break the attack. Ping of Death attack was
successfully launched in the target system.

Figure.1 Block diagram of DDoS attack detection

3.1 DDOS ATTACK


In the Open System Interconnection model, all the layer has
a set of instructions, and each instruction exposes
vulnerabilities and exceptions. An attacker can use protocol-
based attacks to carry out a DDoS attack by exploiting these
vulnerabilities. It primarily targets the third and fourth layers of
the OSI model to drain out the processing functions and
memory of the target system. Ping of Death is one of the
protocol-based attacks.
Figure.2 Root kali window

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 383


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

3.3 SPLUNK SOFTWARE


Splunk is a technology that searches and indexes log files
and provides insight into the data. One of its main benefits is
that it does not need to store its data in a separate database, so it
does not require any extra infrastructure. It indexes and
correlates information into a container that can be searched,
and generates alerts, reports, and visualizations. Splunk is used
to monitor and search through large amounts of data. The tool
can detect patterns in data, create metrics and diagnose
problems arising from challenges such as IT management,
security, and compliance.
To detect DDoS, the system generates traffic using Curl
scripts, as well as using Splunk software to visualize it. A high-
rate flooding attack is launched against the server using the curl
script. Requests are sent in large quantities, with responses
flooding back to the source. A log file is stored at the local
server. In the visualization module, the log file is analyzed
based on which metadata is generated. Using visual analysis, it
Figure.3 Root Kali DDoS window is possible to identify the IP addresses which are responsible
for flooding the network. Using query virtualization, we
3.2 LIGHT AUTOMATION SYSTEM calculate how many requests come from each IP address. As a
Voice-controlled wireless light automation through the result, there is a problem with formatting the network log file,
Internet is integrated with a mobile phone application so that which is obtained from server log files.
users can control their lights and utilities using voice
commands through their phones. If This Then That (IFTTT) is
a web service that allows you to create simple conditional
statements by chaining together conditional statements called
applets. A web service triggers an applet when a change
occurs. Adafruit IO works with your project’s data by
displaying, responding, and interacting. The IFTTT chain uses
Google assistant and Adafruit services. By using google
assistant to turn on or off the lights in my home by giving a
command like “Hey Google turn on or turn off”, the lights get
turned on or off accordingly. When this happens, IFTTT can
interpret the message and send it to Adafruit's dashboard in the
form of an understandable command to the created feed.

Figure.5 Splunk output

3.4 RANDOM FOREST ALGORITHM


Machine learning techniques such as random forests are
used for regression and classification problems. Random forest
gives solutions to complex problems. Random forest
algorithms generate many decision trees and train these trees
using bagging. Bagging is a method of improving a machine
learning algorithm’s accuracy by combining two ensemble
meta-algorithms. By taking the average or mean of the outputs
from the various trees and by examining the predictions from
the decision trees, the random forest algorithm determines the
outcome. The accuracy of the outcome increases with more
Figure.4 IoT process flow
trees.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 384


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Various classification techniques are performed on the


dataset to find out the best predicting model. Eighty percent of
the dataset is used for training the model and twenty percent is
used as a test set. The dataset also consists of real-time data
taken from the Splunk software.
3.4.1 PSEUDO CODE:
Step 1: Importing the libraries
Step 2: Importing the dataset
Step3: Splitting the dataset into a Training set and Test set
Step 4: Feature scaling
Step 5: Training the Random forest classification on the
training set
Step 6: Predicting the new result Figure.7 CPU performance
Step 7: Predicting the test set results after attack
Step 8: Making the confusion matrix
Step 9: Visualizing the Training set results
step 10:Visualizing the Test set results

Figure.8 Wi-Fi performance

after attack
Table .1 Comparison of Machine Learning Algorithm

Figure.6 Random forest output for the test set

IV. RESULTS AND DISCUSSION


The tools are analyzed to simulate Distributed Denial of
Service attacks, that is sending a huge amount of packets to
shut down Web servers in the initial stages. During DDOS
attacks, the IoT device can't be controlled by mobile devices
due to the system processing a large number of data packets.
During packet traffic in the network, the devices connected to
the network will not able to communicate with each other. This V. CONCLUSION
Splunk software monitors network traffic and generates reports
when abnormal packet traffic is detected on the network. A An analysis of current DDoS detection techniques is
random forest classification algorithm was trained with the presented in this paper, including machine learning techniques.
given dataset. Real-time data is taken from the Splunk software The Ping of Death attack is executed by the Kali Linux
and using this, the Random forest algorithm delivers results. operating system which affects the network performance of the
IoT module. As a result, 99.8% of instances were correctly
The task manager is used to analyze the Wi-Fi and CPU classified using a random forest algorithm. The future scope of
performance of the system and the Rate of sending and this project will be incorporating deep learning technology
receiving packets per second was displayed in the Wi-Fi instead of machine learning.
section associated with the task manager.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 385


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
[1] Banitalebi Dehkordi, Afsaneh, MohammadReza Soltanaghaei, and
Farsad Zamani Boroujeni. "The DDoS attacks detection through
machine learning and statistical methods in SDN." The Journal of
Supercomputing 77.3 (2021): 2383-2415.
[2] Rohan Doshi, Noah Apthorpe, Nick Feamster, "Machine Learning
DDoS Detection for Consumer Internet of Things Devices", 2018 IEEE
Symposium on Security and Privacy Workshops, DOI
10.1109/SPW.2018.00013.
[3] Zekri, Marwane, et al. "DDoS attack detection using machine learning
techniques in cloud computing environments." 2017 3rd international
conference of cloud computing technologies and applications
(CloudTech). IEEE, 2017.
[4] Hoyos Ll, Manuel S., et al. "Distributed denial of service (DDoS) attacks
detection using machine learning prototype." Distributed Computing and
Artificial Intelligence, 13th International Conference. Springer, Cham,
2016.
[5] Khamparia, Aditya, et al. "Multi-level framework for anomaly detection
in social networking." Library Hi Tech (2020).
[6] Mirkovic, Jelena, and Peter Reiher. "A taxonomy of DDoS attack and
DDoS defense mechanisms." ACM SIGCOMM Computer
Communication Review 34.2 (2004): 39-53.
[7] Alam, Tanweer. "A reliable communication framework and its use in the
internet of things (IoT)." CSEIT1835111| Received 10 (2018): 450-456.
[8] Bhattacharyya, D. K., & Kalita, J. K. (2016). "DDoS attacks: evolution,
detection, prevention, reaction, and tolerance". CRC Press.
[9] Sonar, K. and H. Upadhyay, "A survey: DDOS attack on Internet of
Things. International Journal of Engineering Research and
Development," 2014.10(11)
[10] Behal, Sunny, Krishan Kumar, and Monika Sachdeva. "D-FACE: An
anomaly-based distributed approach for early detection of DDoS attacks
and flash events." Journal of Network and Computer Applications 111
(2018): 49-63.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 386


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Digital Data Protection using Barcode &


Steganographic Approach
Ayushi Chaudhary Prof. Ashish Sharma Dr. Neeraj Gupta
GLA University GLA University GLA University
Mathura Mathura Mathura
ayushichaudhary11@gmail.com Ashish.sharma@gmail.com Neeraj.gupta@gla.ac.in

phrases within the textbook. Principally, a textbook is


Abstract—In order to secure the digital data, various then used as a medium of conversation.
image steganography methods were proposed. This a. Format Grounded Styles, in these textbook facts are
research work investigates and proposes a novel embedded within the provider textbook by converting
steganographic approach. This research study considers a the layout of the quilt textbook itself [4].
hard and fast set of standards to investigate and estimate b. Verbal styles simply evaluate the verbal information.
the advantages and disadvantages of the steganographic c. Random and statistical technology styles produce its
methods. As a result, a novel steganography style has been provider textbook in accordance with the arbitrary
proposed. Steganography provides higher protection than characters.
cryptography due to the fact that cryptography covers only
the contents of the verbal exchange. Steganographic
messages are always first restated with the conventional
methods, and then the input image will get changed in some
way to include the rephrased conversation. Steganalysis is
the discovery of steganography based decrypted program.
They are LSB-based Steganography, Steganography with
closing full-size bits, and Steganography with photo slant
dots. The discussion has been figured out using succession
and lopsided cryptography.
Figure1: Steganography Process
keywords: Steganography techniques, Steganalysis, digital
image, Cryptography, encryption.
B. Image Steganography

I. OVERVIEW The method of data concealment into that source image


Digital data security has become a significant challenge within the absence of declination within the image is
in the recent years. Internet provides consistent called image steganography [5, 6].
information about essential images, sort of prints and
archives. To safeguard the information, one needs to a. Spatial Sphere Fashion: Particles are incontinently
make it less consistent by moving the repeated data over changed into the print pixel-worth bitwise and
the local area [1, 2]. additionally encompass the profundity of pixels and
To arrange and make comparatively consistent control decibel. There are a few ways to do inserting
frameworks, various information reserving and instruction in a Spatial Sphere; the ideal is the Least
encryption styles were proposed. Furthermore, Square Bit (LSB).
encryption styles help to safeguard the sensitive b. Changing Domain Fashion: This style face challenges
information (4). Encryption encodes the information in a in terms of different image processing stages
way that an accidental provider cannot intrude the (compression, docking and improvement) to this style,
information processing model. Steganography hides the since the transformation circle conceals the situation
general reality of the dialogue by masking it. The dispatch inside the broad spot inside the source image
steganography helps the users to stay away from [7-10].
drawing in duplication to the transmission. Steganalysis c. In the metamorphosis sphere, the primary factor is to
helps to understand steganography patterns. It has convert the image from the spatial sphere into the
recently become more important to evaluate the metamorphosis sphere and additionally the name of the
underlying information. Steganography styles are used game communique is embedded into the provider image.
to defend watermarks in data [3]. These approaches cover statistics via means of
exceptional functions.
II. STEGANOGRAPHY TECHNIQUES d. Deformation Fashion, the data is stored in sign
deformation. This style calls for know-how and
A. Text Steganography:
carefulness in searching exceptional among the authentic
provider photo and stego image after data embeds
It hides the textbook in the back of a few different lines, throughout the method of decrypting
converting the layout of a being textbook, to extrude the e. Veiling and Filtering, image with 24bit length or
grayscale ordinarily utilizes a securing and separating

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 387


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

style and the utilization of outstanding activities to cover frequency circle grounded styles. Holding capacity and
a report. Concealing information through a method of shortcomings in tape steganography are the basic
denoting the photograph, this style is like a paper outcomes. The results have gained steganography ability
watermark, this style gives information in a likewise with the utilization of spatial set of rules and promptly
broad photograph place than essentially stowing away embed the information into the given photograph and not
inside the commotion position [11]. utilize the apparent adjustments and exact quality.
Change circle set of rules is embedding the information
C. Sound Steganography inside the change region and the addition of this
arrangement of rules is based on the dependability but
The Human Auditory System (HAS) is more interesting with little capacity [18].
than the Human Visual System (HVS); this is one of the
points of view that makes implanting a message in sound
III. LSB SUBSTITUTION BASED STEGANOGRAPHIC
recording in any remarkable procedure more noteworthy
TECHNIQUES
than various existing formats [12, 13].
A. LSB SUBSTITUTION IN GRAYSCALE
These methods are utilized for installing a novel strategy IMAGE
in sound recording: A record-scale virtual portrayal is a review wherein
the figure of each pixel incorporates the most
a. LSB Coding productive information. The Steganographic execution
b. Equality Coding selects the devoted LSBs (K=1,2) of each pixel to
c. Reverberation Data Hiding smooth out with the signification of the match promotion
patches [19]. The dispatch is unscrambled inside the
In audio steganography, there might be a format, which most un-extensive fix of each pixel and the wrap print
can be used as a cowl media for installing the [20]. This creates no saw to expel the real depiction. The
comprehensive record of MP3, WAV and MIDI and so procedure of LSB convenience in grayscale preview is
forth [14]. offered below. An image is examined. If there should
arise an occurrence of a dim scale picture, a 2-layered
a. LSB Coding:
framework of unsigned whole numbers with values
The un-broad byte of the supplier record is changed with somewhere in the range of 0 and 255 is achieved.
the bytes of the situation dispatch. • The pixels are pulled so and follow parallel.
• The private dispatch can remain alive and reworded
b. Equality Coding applying symmetric crucial or RSA cryptography
designs.
The equality tag of the blanket record is checked for
• The manual is broken at all significant pieces of the
closeness, in the event that similarity exists moreover no
pixels. Dim scale gets a 2-layered grid of unsigned
movement can be done and assuming the assortment
numerals (1) or (- 1).
exists furthermore any piece LSB can be scarcely
• The pixels are-reinserted into the image [21].
changed (cowl instruction or secret report) to make
equity equivalent.
B. LSB SUBSTITUTION IN COLOR IMAGE
c. Reverberation Data Hiding
The information is outfitted for including a reverberation Each pixel in RGB image is suggested by three
sound to the blanket record [15]. elements, red, blue and green assortments. The RGB
image is depicted by the line, segment, 3 array of home
a) The legitimate expansiveness is utilized to conclude unit8 / unit16 or twofold. In this quarter, LSB
the genuine measurements sound. steganography is offered, wherein the RGB conceal
b) Decay charge is useful to self-control reverberation image is applied. The plaintext is unevenly allowed
component. among the three elements, red, green and blue. The
c) The offset includes the space among the genuine movement of LSB concession in tone picture is given
discourse alarms with the executed reverberation [16]. under [22].
• A RGB image of the 3D lattice is investigated and the
D. Video Steganography pixel staying in contact with the farthest segment and
pitch nuts and bolts of each assessment is laid out and
changed into twofold.
Stowing away the tape resembles a craftsmanship of
• A private dispatch gets to and is rewarded with
concealing information due to the reality that the shipper
working symmetric legend or RSA cryptography [23].
isn't best at stowing away anyway how that report is
• The pulled patches are changed by manual fixes.
open through method of method for one and all other
Subsequently, each piece is changed with a value of
than recipients. Concealing Communication inside the
1[24].
tape is a piece of the fine art concealing information
[17].
Tape grounded steganography approaches are equivalent
to original photograph; it's named into spatial circle and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 388


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. STEGANALYSIS
a)
Steganalysis [25] is the method of unscrambling the
encrypted information from the stego image. The pixels
of the image are then emptied. Further, 8 portions are
removed. The removed string can be deciphered by
using a key. The square diagram of steganography is
also addressed [26]. The Steganalysis method is used
while deciphering available keys, and eventually unique
correspondence is completed.

Assuming that an argentine scale photo is required, a 2-


layered shape of unsigned numbers with values ranging
between 0 and 255 has been executed.

FIGURE 3. Decoded steganography process

The 3D scanner tag performs in opposite and vertical


squares and also perform in-depth analysis. This 3D
standardized tag is distinct from others and streamlined
to be reproduced [29].

Figure 2: Block Figure of Steganalysis

In order to develop communication encryption using the


RSA algorithm to construct the cover of the message FIGURE 4: 1D and 2D barcode
encrypted within the steganographic image, the message
can be encrypted by utilizing any of the Steganographic The standardized tag enables the buyer to view
patterns. In the end, the decryption has been the products at physical stores, checkout stations,
implemented to decipher the encrypted message. structure devices, labor force charge, tagging,
convenient carrier tickets, and reduces the fundamental
V. BARCODE
slip. In avionics, this standardized identification is
Scanner tags are important in all areas, including media imprinted on the ticket to disseminate the traveler
exposure, trade, travel, and money transactions, since the information such as phone work, standard handout work,
recognition is a sophisticated ID (machine-ID). There approaching flight, lodging, traveler report place flyer,
are three types of standard tags: one dimension (1D), and numerous other realities. This scanner tag aids
two dimensions (2D), and three dimensions (3D). airlines in naturally discovering the negative-top
rundown [31].
a) 1D scanner tags give current realities in opposite
joints, show numerals and aplhabets and have a clear VI. STEGANOGRAPHY
information volume. The 2D scanner tag shows the The steganography mode is a shift-by-shift schedule for
realities both in opposite and vertical squares and the changing or giving up the top image into the stego
supplement information and is 100 minutes longer than image [32]. There are three types of images that are
the 1D standardized identification [28]. commonly used in steganography: Graphics Interchange
Format (GIF), Joint Photographic Experts
Group (JPEG), and helpful Network Graphics (PNG).
These records became the standardized, recognizable
proof image in BMP format with the most atom
association [33].
The program decoded the normalized label image on the
ticket and converted it to a stego image. The stego image
could be appropriately changed back to the cover image

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 389


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[35]. Figure 6 depicts the proposed flowchart. In future, the deep learning techniques can be
b) incorporated to encrypt and decrypt the image and also
to analyze the different types of scanner tags.

REFERENCES

[1] Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing


the Unseen. Computer 31(2), 26–34 (1998)
[2] Artz, D.: Digital Steganography: Hiding Data within Data. In:
IEEE Internet Computing, pp. 75–80 (2001)
[3] Li, X., Wang, J.: A Steganographic Method based Upon JPEG
and Particle Swarm Optimization Algorithm. Information
Sciences 177(15), 3099–3109 (2007)
[4] data-stealer could not enter the passenger’s data, because
Westfeld, A., and G. Wolf, Steganography in a Video
conferencing system, in proceedings of the second
FIGURE 5. Flowchart international workshop on information hiding, vol. 1525 of
lecture notes in computer science, Springer, 1998. pp. 32-47.
VII. RESULTS AND DISCUSSION [5] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for
data hiding. In IBM Systems Journal, Vol. 35, Nos. 3-4, pages
The proposed model performs two tasks: decoding and 313-336, February 1996.
unveiling the standardized tag image, as represented by [6] Aura, T., "Practical Invisibility in digital communication, in
numerals. The strategy uncovered the standardized tag information hiding" First international workshop, proceedings,
image; the scanner tag was then updated into a stego vol. 1174 of lecture notes in computer science , Springer,
image that couldn't be ruled by the versatile telephone 1996, pp. 265-278.
detail or the online standardized tag. Similarly, the [7] Johnson, N.F. and S. Jajodia. "Exploring Steganography:
timetable conveyed the perplexing activity. Along these Seeing the Unseen." IEEE Computer Mag., February 1998.
lines, the stego image could be live on and be updated [8] Westfeld, A., and G. Wolf, Steganography in a Video
conferencing system, in proceedings of the second
independently into the scanner tag image. international workshop on information hiding, vol. 1525 of
lecture notes in computer science, Springer, 1998. pp. 32-47.
[9] Pan ,H.K., Y.Y., Chen, and Y.C., Tseng, “A Secure Data
Hiding Scheme for Two-Color Images”, Proc. Fifth IEEE
Symp. Computers and Comm., IEEE Press, Piscataway, N.J.,
2000.
[10] Rabah, K“ Steganography : The Art of Hiding Data”
Information Technology Journal ,Vol 3 No.3, 2004 , pp. 245-
269 .
[11] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron
spectroscopy studies on magneto-optical media and plastic
FIGURE 6. The program encoded the cover image substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp.
740–741, August 1987 [Digests 9th Annual Conf. Magnetics
Japan, p. 301, 1982].
[12] N. Hamid, A. Yahya, R. B. Ahmad and O. M. Al-Qershi,
Image Steganography Techniques: An Overview, IJCSS 6, pp.
168-187 (2012).
[13] X. Feng and H. Zheng, Design and Realization of 2D Color
Barcode with High Compression Ratio,International
Conference on Computer Design and Applications 1, pp. 314-
317 (2010).
[14] N. Victor, Enhancing the Data Capacity of QR Codes by
Compressing the Data before Generation,International Journal
of Computer Applications 60, pp. 17 – 21 (2012).
[15] R. Rani and G. Deep, Digital 3D Barcode Image as a
Container for Data Hiding Using Steganography, ISPCC, pp.
FIGURE 7. The decoded steganography image 325 – 330 (2017)
[16] Y. van der Westhuizen and D. Chai, 3D dynamic barcode,
Electronics Letters 54, pp. 1024–1026 (2018).
[17] A. Grover et al, “Parameters Effecting 2D Barcode Scanning
VIII. CONCLUSION Reliability” in Advances in Computers vol 80, (Burlington:
From the results, it is evident that the proposed Academic Press, 2010), pp. 209-235.
steganography approach has been successfully [18] T. Morkel, J.H.P. Eloff and M.S. Olivier, An Overview of
Image Steganography, Proceedings of the Fifth Annual
developed and decrypted the information from the
Information Security South Africa Conference. (2005)
image. Finally, the information has been obtained from [19] P. Xuea, H Liu, J Hu and R. Hu, A Multi-Layer
the scanner tag by analyzing the developed stego image Steganographic method Based on Audio Time Domain
by inserting LSB as stego key. Segmented and Network Steganography, AIP Conference
Proceedings 1967, pp. 020046-1 - 020046-17 (2018).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 390


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[20] M. Devi and N. Sharma, Improved Detection of Least


Significant Bit Steganography Algorithms in Color and Gray
Scale Images, Proceedings of 2014 RAECS UIET Panjab
University Chandigarh (2014)
[21] N. Hamid, A. Yahya, R. B. Ahmad and O. M. Al-Qershi,
Image Steganography Techniques: An Overview,IJCSS 6, pp.
168-187 (2012).
[22] S. Goel, S. Gupta, and N. Kaushik, Image Steganography –
Least Significant Bit with Multiple Progressions, Proceedings
of the 3rd International Conference on Frontiers of Intelligent
Computing: Theory and Applications (FICTA) 2014 328, pp.
105 – 112 (2015).
[23] C. Maiti, D. Baksi, I. Zamider, P. Gorai, and D. R. Kisku, Data
Hiding in Images Using Some Efficient Steganography
Techniques, CCIS 260, pp. 195–203 (2011).
[24] F. Y. Shih (2017), Digital Watermarking and Steganography,
Boca Raton: CRC Press.
[25] P. Filzasavitra, T. W. Purboyo and R. E. Saputra, Analysis of
Steganography on PNG hnage using Least Significant Bit
(LSB), Peak Signal to Noise Ratio (PSNR) and Mean Square
Error (MSE), Journal of Engineering and Applied Sciences 14,
pp. 7821-7827 (2019).
[26] Johnson, N.F., Jajodia, S.: Exploring Steganography: Seeing
the Unseen. Computer 31(2), 26–34 (1998)
[27] Artz, D.: Digital Steganography: Hiding Data within Data. In:
IEEE Internet Computing, pp. 75–80 (2001)
[28] Li, X., Wang, J.: A Steganographic Method based Upon JPEG
and Particle Swarm Optimization Algorithm. Information
Sciences 177(15), 3099–3109 (2007)
[29] Westfeld, A., and G. Wolf, Steganography in a Video
conferencing system, in proceedings of the second
international workshop on information hiding, vol. 1525 of
lecture notes in computer science, Springer, 1998. pp. 32-47.
[30] W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for
data hiding. In IBM Systems Journal, Vol. 35, Nos. 3-4, pages
313-336, February 1996.
[31] Aura, T., "Practical Invisibility in digital communication, in
information hiding" First international workshop, proceedings,
vol. 1174 of lecture notes in computer science , Springer,
1996, pp. 265-278.
[32] Johnson, N.F. and S. Jajodia. "Exploring Steganography:
Seeing the Unseen." IEEE Computer Mag., February 1998.
[33] Westfeld, A., and G. Wolf, Steganography in a Video
conferencing system, in proceedings of the second
international workshop on information hiding, vol. 1525 of
lecture notes in computer science, Springer, 1998. pp. 32-47.
[34] Pan ,H.K., Y.Y., Chen, and Y.C., Tseng, “A Secure Data
Hiding Scheme for Two-Color Images”, Proc. Fifth IEEE
Symp. Computers and Comm., IEEE Press, Piscataway, N.J.,
2000.
[35] Westfeld, A.” F5-A Steganographic Algorithm: High Capacity
Despite Better Steganalysis”, 4th International Workshop on
Information Hiding.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 391


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Blockchain based Healthcare Data Management


Karthigha M[1] Padmavathy C[3] Dr.V.S.Akshaya [2]
Department of Computer Science Department of Computer Science Department of Computer Science
and Engineering and Engineering and Engineering
Sri Ramakrishna Engineering Sri Eshwar College of Engineering Sri Ramakrishna Engineering
College Coimbatore, India College
Coimbatore, India Vsakshayaphd@gmail.com Coimbatore, India
karthiga.m@srec.ac.in padma.dhansh@srec.ac.in

Abstract -- Block Chain is an emerging technology which Ethereum based blockchain data management for healthcare
includes a number of features by default such as, distributed application, to store and review the patient record by web
ledger, decentralised storage, authentication, security, and application allowing only identity verified users like patient,
traceability. In health sector, patient data are sensitive and it is doctors, family members and hospital staff to have the secure
very essential to be secured, which can be done using access to health information. Ethereum currently uses a proof-
blockchain technology. Exchange of healthcare data between of-work consensus mechanism. S olidity is the popular
hospitals is limited by privacy and dependency on centralized language for writing Ethereum smart contracts. The data on
data management systems. Such a centralised storage can be a Ethereum blockchain is stored using tire data structures to
concern since it can lead to data leakage, data manipulation, manage temporary and permanent data. To protect data
mistrust, and single point of failure. Blockchain offers a integrity, ownership, and permissions, smart contracts are
decentralised computing and storage solution that can help created. S ince the business can be handled by smart contracts,
with these issues. It includes smart contracts, identity there won't be a need for centralised authority to oversee and
verification and more. Integrating block chain technology with authorise it, which will cut costs.
identity management will be the solution for some issues, such
as centralized governing of identities. This system proposes Keywords— Block chain, distributed ledger, Authentication,
Smart contract, Ethereum, Identity management, decentralized.

I. Introduction A. Problem Statement

Blockchain is a digital ledger used for recording the Patient health data includes sensitive information
transactions and it is immutable. The main issue in health care such as the patient's past health record, investigation report,
is securing patient data from data theft, modification, data therapy, test reports, and other specifics . Both manual and
breach and identity issues. A significant difficulty is how to computerized management of these health data is possible.
authenticate information regarding identity and access control The manual approach, which uses papers and ledgers, is the
[18, 19]. Blockchain technology relies on private keys to sign long-standing procedure used in the majority of hospitals to
each transaction and authenticate a user's identity . Open- retain records [14,15]. The drawbacks of this approach are
source operating system Ethereum creates a peer-to-peer the necessity for enormous storage spaces and the
network and provides smart contract capability. It is a challenging nature of data retrieval. Currently,
platform for distributed computing that facilitates the creation computerization of clinical data is common due to the ease
of decentralised Digital applications (DApps) with the use of of data storage and retrieval. However, there is a risk that
block chain technology. data manipulation will become a significant issue.
Currently, healthcare organizations save patient data,
The decentralised virtual computer known as the diagnostic results, and prescriptions in a centralized manner
Ethereum Virtual Machine (EVM), provided by Ethereum, [16,17]. There is a potential of data leakage because it is a
may run programmes via a worldwide network of public centralized system. Since patients have limited control over
nodes. Ethereum's native programming language is called their data and sharing the acquired data is a laborious &
Solidity. A smart contract is a piece of software code designed challenging process, hackers can easily steal or exploit
to execute, manage the pertinent events, and uphold the patient data for a variety of reasons.
conditions of a contract or agreement automatically. It is
powered by the open-source Ethereum technology. Smart
contracts make it possible to conduct legal transactions alone.
These transactions can be tracked and are permanent.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 392


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

DATA ACCESS AND


Randhir Kumar [4] created a distributed on-chain
DATA STORAGE AND SECURITY PROBLEM
AVAILABILITY PROBLEM and off-chain storage method employing Interplanetary File
Systems (IPFS) and consortium blockchains. The
ATTACKER ALSO CAN
GET ACCESS architecture made it simple for hospital employees (such as
doctors and clinical staff) to store medical records and
PATIENT DATA 1 retrieve medical evidence of COVID-19 patients.
SS
NO ACCESS Kevin Peterson et al. [5], proposed that a
HOSPITAL 1
blockchain can be a solution to enable data sharing within a
CENTRALIZED ATTACKER network and defined the protocols for applying this
STORAGE
technology to healthcare. It helped to overcome issues such
WRITTEN FORMAT as privacy, interoperability and decentralized data
management.
HARD TO MANAGE
LOT OF FILES Peng Zhang [6] offered a blockchain-based design
where the system represents users' digital identities using
the public key infrastructure. In order to assure that only
users in appropriate key can log in, identity was
PATIENT DATA 2
HOSPITAL 2 immediately stored in the blockchain. For the purpose of
PATIENT’S DETAILS NURSE
facilitating data exchange, enhancing patient decisions, and
protecting data, these identities were designed for clinical
practitioners.
Fig.1: Problem in the Existing System Daisuke et al. [7], functioned on health archives
utilising the blockchain platform, submitting medical data
II. Literature Survey to the Hyper Ledger network. The information used in the
work was kept in the Hyperledger blockchain.
Anuraag et al. [1], explored blockchain as a
Catalini [8] discussed the ability of blockchain
method to effectively manage medical data. A number of
technology to provide medical information exchange over
studies were conducted, the most of which were concerned
specific control, which was evaluated with a paper on the
with speculating about the potential advantages and
topic of blockchains in healthcare. The study's authors
disadvantages of blockchain technology for the healthcare
looked at how blockchain technology which provides
industry without offering any supporting evidence or
digital access throughout the network, processing a
system evaluation. It was concluded that blockchain
significant amount of medical data, is transforming the
technology might offer a way to manage medical records
healthcare industry.
on a cloud platform while maintaining data privacy and
Shen et al. [9], offered MedChain, a system
confidentiality.
that shares medical data via peer-to-peer networks and
Vardhini B [2] presented a system to house
blockchains. This system was created to manage patient
health record blockchain transactions in order to establish a
data gathered via Internet of Things (IoT) sensors, gadgets,
smart ecosystem and address the challenges now plaguing
and other mobile applications as well as healthcare data
the healthcare industry. The objective was to make patient
gathered from physical examinations.
data accessible securely so that a third party cannot access
Tsai and Wu [10] conducted an analysis of e-
it without authorization. EHR framework used block chain
healthcare management systems. Two algorithms were
technology to store data securely and enforce a single
suggested for supplying data or network security and
version of the truth. Prior to committing the transaction to
integrity. In creating rules for the healthcare data, adopting
the distributed ledger and accessing a patient's medical
a distributed system for data administration was also
record, the stakeholders require authorization. A
recommended.
blockchain-based solution can support widespread
Rouhani et al. [9], on an blockchain platform for
availability and data confidentiality.
the handling of medical data , a solution was presented to
Kavinga Yapa Abeywardena [3] proposed Flexi
get around permission and permission-less block chain
Medi, a private blockchain-based patent detail management
network restrictions.
system which was expected to solve the privacy issues.
Khezr et al. [12], discussed a number of issues
Solution proposed a distributed ledger to permit secured
with the healthcare management system and suggested
system access control and retrieval. Flexi Medi achieved
ways to use blockchain technology to address them. Due to
high data security principles based on hybrid access
some potential medical use cases where block chain
mechanism, public key and cryptography.
technology could significantly improve the practise, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 393


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

study topic was highlighted on distributed ledger


technology in healthcare. A network protocol-based IoMT
distribution mechanism was also suggested. PATIENT RECO RDS ARE
Litchfield et al., concerns about the privacy and STO RED IN ETHEREUM
security of medical data. Paper [13] suggested using BLO CKCHAIN

blockchain to address these issues in addition to polling the


public on healthcare data-related issues.

Table .1 Comparison of the Existing Systems

EACH RECO RDS ARE STO RED


IN BLO CKS USING PUBLIC
KEY AND HASH

III. Design of Blockchain PATIENT PERMITS


HO SPITALS TO ACCESS
THEIR DATA BY
SHARING UNIQ UE ID
i) Workflow of Block chain:

After patients are admitted in the hospital, the patient


records are stored in Ethereum blockchain. Each record is
stored in blocks using public key and Hash. Hash value
will be different for each transaction. Using the Ethereum
blockchain, patients can control their own medical records
across numerous hospitals . Patients only will have the
Fig. 2: Workflow of blockchain
access to Healthcare data. Patient grants or permits the
hospitals to access or modify their data by sharing their
unique key. This enables safe access to patient data, by
preventing unauthorized third party access.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 394


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REGISTER
DOCTOR - A

PATIENT GETS DIAGNOSED


1
IN HOSPITAL - X
PATIENT GOES
TO HOSPITAL - Y

Hospital - X 2

REGISTER
DOCTOR - B

2
REGISTER THE
PATIENT

Hospital - Y

ACCESS TO PATIENT
DATA
Create 3
blockchain

DOCTOR – B VIEWS AND EDITS THE


PATIENT DATA IN HOSPITAL - Y

DOCTOR - A

GETS TO KNOW ABOUT


ETHEREUM LAST UPDATE ABOUT
Blockchain THE PATIENT

Fig.3: Workflow of the Proposed System

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 395


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Asset Management System". IEEE Smart Data (Smart Data), Halifax,


NS, Canada, August 2018
ii) Workflow of the proposed system [12] Khezr, S, Moniruzzaman, M, Yassine, A, Benlamri, R. "Blockchain
technology in healthcare: A comprehensive review and directions for
When the patient comes to hospital-X, the patient and future research". Appl. Sci. 2019
[13] Litchfield, A.T , Khan, A. "A Review of Issues in Healthcare
doctor-A should register on Ethereum blockchain – Dapp. Information Management Systems and Blockchain Solutions" CONF-
Patient gets diagnosed in the hospital-X. All patient IRM, 2019
[14] Nabil Rifi, Elie Rachkidi, Nazim Agoulmine and Nada Chendeb
information will be kept in the blockchain as blocks . After T aher, "Towards using blockchain technology for eHealth data access
a while, patient goes to the another hospital called hospital– management", 2017 Fourth International Conference on Advances in
Y. Doctor-B in that hospital should register in the Biomedical Engineering (ICABME), 2017
[15] Nafiz AI Asad, T ausif Elahi, Abdullah AI Hasan. ” Permission-
blockchain. Only the patient can access the health data. Based Block chain with proof of Authority for Secured Healthcare
Patient grants access to Doctor-B by sharing a unique ID. Data Sharing”. ICAICT I,2020
[16] Mikula, T omas,Rune Hylsberg Jacobsen.” Identity and Access
Now Doctor-B can view or modify the past data of the Management with Block chain “ Euromicro Conference on Digital
patient. Doctor-B updates the current condition of the System Design,2018
[17] Kamau Gabriel, Caroline Boore, Elizaphan Maina and Stephen
patient in the Ethereum blockchain. Njenga, "Blockchain T echnology: Is this the Solution to EMR
Interoperability and Security Issues in Developing Countries?", IST -
IV. Conclusion Africa Week Conference , 2018
[18] Luharuka, Shubham, Gaurav Anil Kulkarni, Pallothu Devi Sri, and
Ria Somani."T echnical Scrutiny of Block chain Technology Protocols
Attackers can hack the health care records easily. Ethereum and its Applications."IRO Journal on Sustainable Wireless Systems 2,
based patient management system is much secured, and it no. 1 (2020): 13-22.
[19] Shakya, Subarna. "Efficient security and privacy mechanism for
allows patient to view and edit health records securely. The block chain application." Journal of Information Technology 1, no. 02
patient has to give access to the hospitals or other users to (2019): 58-67.
view the records, hence the attackers can’t access the data.
Data can be made accessible to any hospitals wherever the
patient goes for treatment. The disadvantages of paper
based centralized storage are solved by the patient data
management using blockchain.

V. References
[1] Vazirani A, O'Donoghue O, Brindley D, Meinert E,”Implementing
Blockchains for Efficient Health Care: Systematic Review”J Med
Internet Res 2019
[2] Vardhini B, Shreaya N Dass, Sahana R. “A Blockchain based
Electronic Medical Records Frameworks using Smart Contracts”
International Conference on Computer Communications and
Informatics (ICCCI) 2021
[3] Kavinga Yapa Abeywardena, Budhima Attanayaka, Kabilashan
Perisamy, “ Blockchain based Patient’s detail management System”.
In 2020 2nd International Conference on Advancement in
Computing/ DOI: 10.1109/ICA51239.2020.9357163.
[4] Kumar, R.; T ripathi, R. A Secure and Distributed Framework for
sharing COVID-19 patient Reports using Consortium Blockchain and
IPFS. In Proceedings of the 2020 Sixth International Conference on
Parallel, Distributed and Grid Computing (PDGC), Waknaghat, India,
6–8 November 2020
[5] Kevin Peterson, Rammohan Deeduvanu, Pradip kanjamala, Kelly
Boles. “ A Blockchain-based Approach to HIE Networks”.
ONC/NIST ,2016.
[6] Peng Zhang, Jules White, Dougias C, Schmit, Gunther
Lenz,S.T rentRosenbloom.”FHIRchain:ApplyingBlockchain to
Securely and Scalably Share Clinical Data”. Elsevier,22018.
[7] Ichikawa, D.; Kashiyama, M.; Ueno, T . T amper-resistant mobile
health using blockchain technology. JMIR mHealth uHealth 2017
[8] Catalini C, Gordon, W.J. "Blockchain technology for healthcare-
Facilitating the transition to patient-driven interoperability". Comput.
Struct. Biotechnol. 2018, 16, 224–230
[9] Shen, B, Guo, J, Yang, Y. "MedChain: Efficient Healthcare Data
Sharing via Blockchain". Appl. Sci. 2019
[10] Hsin-Te Wu, Chun-Wei T sai. "Toward blockchains for health-care
systems: Applying the bilinear pairing technology to ensure privacy
protection and accuracy in data sharing", IEEE Consum. Electron.
Mag. 2018
[11] Rouhani, S., Butterworth, L., Simmons, A.D., Humphery, D.G.,
Deters, R. "MediChainT M: A Secure Decentralized Medical Data

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 396


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Intruder Detection System for Digital Device using


Computer Vision
Sugantha Mallika .S.S[a] Priyadharsini.M[a]
Information Technology Information Technology
Sri Ramakrishna Engineering College Sri Ramakrishna Engineering College
Coimbatore, India Coimbatore, India
sugantha.samuel@srec.ac.in priya.murugesan@srec.ac.in

Venkat Kumar .I.S[b] Sudharsan .R[b] Surya .M[b]


Information Technology Information Technology Information Technology
Sri Ramakrishna Engineering College Sri Ramakrishna Engineering College Sri Ramakrishna Engineering College
Coimbatore, India Coimbatore, India Coimbatore, India
venkatkumar.1805156@srec.ac.in sudharsan.1805149@srec.ac.in surya.1805151@srec.ac.in
[a] Assistant Professor (Sl.Gr) – Sri Ramakrishna Engineering College, Coimbatore, India
[b] UG Students - Sri Ramakrishna Engineering College, Coimbatore, India

Abstract — Probably, the most valuable asset of a digital and the camera captures continuous video. Face recognition is
device is its data and their security. An intruder detection system carried out using Open Computer Vision library. The image of
is a modern concept that is absolutely necessary for a computer the user had already been saved in the database. The image
system to have a secured data and its features. This intruder will be compared to the datasets in the database by the system.
detection system detects intruders and sends an alarm to the If the captured image does not match the dataset image, the
appropriate party. As a result, the incident responder can system will save the image by clicking it. After that, Simple
quickly evaluate the problem and take appropriate action. Here Mail Transfer Protocol library generates a mail and sends it to
in the system the image of the person is captured through a web
the specified mail address. The email contains a picture of
camera. The extracted face is recognized and then stored in a
intruder and the screen recorded video as attachment.
separate folder. The captured image is compared to the
authorized person’s saved image in the database. By comparing,
the system can distinguish between authorized and illegitimate II. IMAGE PROCESSING
users. If an unauthorized person is discovered, the system sends
The process of transforming an image into a usable format is
the owner the recognized image through email. Along with that
this model also sends the recorded screen video of the intruder,
known as image processing and converting an image to a
which will give information about what the intruder tried to do digital format and executing operations on it to extract
with the device. Then to alert the authorized person a normal important information from it. When implementing specific
message is also sent to the authorized person mobile number signal processing algorithms, the image processing system
because one may not check the mail frequently so sending an normally treats all images as 2D signals.
SMS will alert the authorized person even if their phone is out of
internet. Then at last the device will make an alarm to alert the A. Types of Image Processing
people around the device and then it will be locked, so the • Visualization - Locating objects that aren't visible in
intruder can no long access the device. the image
Keywords—intruder detection; face recognition; Open
• Object Recognition – Identifying and detecting things
Computer Vision; twilio; Simple Mail Transfer Protocol
in an image
I. INTRODUCTION • Sharpening and Restoration – From the original
Human intrusion on a personal device states that a security image, an upgraded image is created.
event in which the intruder gains access to the system or it’s
resource without having authorization. The purpose of a • Pattern recognition - Calculating numerous patterns
human intrusion detection system is to detect illegal access to around the image's items
a digital system, gadgets, PC, Laptop or a protected systems
and deny such unauthorized access to protect personnel and
secured data from damage or theft. This technology detects • Retrieval - Browse and search through a big library
intruders correctly and provides security. By identifying the of digital photos that are similar to the original.
intruder, this technology can help to decrease data and
information theft. The model has the ability to respond fast, B. Steps In Image Processing
ensuring that no theft occurs in our systems or devices. The • The initial stage in image processing is image
camera is accessed through the webcam in this arrangement, acquisition. In image processing, this step is also

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 397


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

known as pre-processing. It entails getting the image Sivakumar et al.[3] have worked on home security
from a source, which is usually hardware. enhancement by sending verification letters to the house
owner or using face recognition to detect intrusion are
• Image enhancement is the technique of bringing out common examples. This research combines the two
and highlighting certain interesting characteristics in a techniques and provides a two-layered solution that is simple
previously concealed image. This can include and cost effective.
adjusting the brightness, contrast, and other settings.
The system is intended for the property's main entrance and
• Image restoration is the process of enhancing an has already been designed and demonstrated. An Arduino
image's look. Picture restoration, unlike image controller interfaces with sensors and image processing tools
augmentation, is done using mathematical or in MATLAB to authorise entrance using a GSM module in
probabilistic models. this system, Limitations – The movements of the intruder are
• In the digital domain, colour image processing detected but face is not detected in this paper, they have
encompasses a variety of colour modelling techniques. mentioned it will be done as future work.
Because of the widespread usage of digital photos on Bhanse et al.[4] have worked on an Face revelation is used
the internet, this step has acquired popularity. in this application to boost the auto applications. It
• Wavelets are a type of visual representation that demonstrates how the camera's confidence affects the edge
comes in a variety of resolutions. For data every second and, consequently, the ideal open door for
compression and pyramidal representation, the images standing up to acknowledgement. The image processing for
are separated into wavelets or smaller sections. face identification, face tracking, and recognition for
automotive applications is done here using Open Computer
• Compression is a technique for reducing the amount Vision. Wang et al.[5] have worked on intrusion detection
of storage or bandwidth needed to save or transmit an system for video surveillance, Target detection, automatic
image. This is especially true when the photograph identification, and automatic alert are the system's core
will be used on the Internet. function modules. The system will call the camera and launch
• Morphological processing is a collection of processes the video surveillance and automatic alarm system when the
used to morph images based on their forms. user starts the software. Intrusion behaviour is detected using
the three frame difference method and the background
• One of the most difficult phases in image processing subtraction method. The system is practical, easy to run, and
is segmentation. It entails breaking down an image has a greater working efficiency, allowing it to achieve the
into its component bits or objects. user's intended purpose.

• Each region of an image is represented and described Menage et al.[6] have on the system It is used to identify
in a form appropriate for further computer processing intruders and send an alert to a designated person. As a result,
once it is divided into regions in the segmentation the incident responder can quickly evaluate the problem and
process. The qualities and regional properties of a take appropriate action. The PIR sensor detects human
picture are dealt with in representation. The task of movement in the system, which is captured using the Pi
description is to extract quantitative information that camera. The extracted face is detected and then delivered via
can be used to distinguish one class of things from HDMI connection to the Raspberry Pi. In Open CV- Python,
another. this system works great. The taken image is compared to the
authorised person's saved image in the database, Limitations –
• Recognition is the process of assigning a label to an The picture of the intruder is sent only through mail. It may
object based on its description. not be sure if the user has internet connectivity all the time to
check the intruder’s activity. Ron Bitton et al.[7] Securing
III. LITERATURE REVIEW Remote Desktop Connections to Electronic Flight Bag Servers
with a Machine Learning-Based Intrusion Detection System it
functions by far off work area conventions (RDP) are
Various researches have been done on Detecting an regularly utilized for associating and interfacing with PCs
Intruder. This study is done prior to beginning the project by from a distance. For this situation, a server part runs on the far
which one can comprehend the many methods that have been off PC and offers its work area (i.e., screen) with the client
employed in the past. This research assisted in determining the part which runs on an end client gadget. As of late, various
advantages and disadvantages of the current system. weaknesses have been distinguished in two generally utilized
Jan Lansky et al. [1] have worked on deep learning-based far off work area executions, Microsoft Remote Desktop and
intrusion detection systems, and present a comprehensive RealVNC. These weaknesses might uncover the distant server
study and classification of these schemes. It explains how to another assault vector.
deep learning networks are used in the intrusion detection Chunjie Zhous et al.[8] have worked on numerous models
process to accurately detect intrusions, Limitations – Used old are built by exhaustively breaking down the multidomain
datasets which cannot represent the current threats and information on field control layers in modern interaction
security attacks. Nelson et al.[2] have worked on to figure out computerization, with thought of two perspectives: physical
the quickest way for homeowners to be notified if an intruder science and data. Wei Zhong et al.[9] have worked on an AI
or thief breaks into their home utilising a proactive based Intrusion Detection System (Intruder Detection System),
surveillance system The outcome demonstrates that the system has turned into an imperative part to safeguard our financial
can identify and recognise intruders and provide a proactive and public safety. Past shallow learning and profound learning
notification to homeowners via a mobile application, techniques embrace the single learning model methodology
Limitation – The resolution of the image is reduced to increase for interruption identification. The single learning model
the Frames per second to capture the intruder. methodology might encounter issues to see progressively

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 398


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

confounded information dispersion of interruption designs. D. Flowchart


Especially, the single profound learning model may not be
successful to catch remarkable examples from nosy assaults
having few examples. Manish kumar et al.[10] Interruption Start
Detection System (IDS) is a well-known word in the field of
network and information security. It's an important aspect of
the basis for Network and Information Security. The Have
Intrusion Detection System (HIDS) aids in the detection of Detect the face
unauthorised use, uncommon, and malevolent exercises on the from the camera
host, while the Network Intrusion Detection System (NIDS)
aids in the detection of network assaults and interruptions[11-
15]. Different specialists are effectively chipping away at
various ways to deal with further developing the Intruder
Compare the detected
Detection System execution and numerous upgrades have
face with the authorized
been accomplished, Limitations – There is communication
delay and cost of implementation is quite expensive. persons face

IV. SYSTEM ANALYSIS


NO
A. Existing System If the person
The old technologies need a human support or require is intruder?
more work for the instalment. There are also false alarm in
some situations, so the authorized person getting notified YES
without any intruder and the data is stored in a external disk,
so as long as camera is installed there may be a need of
additional storage disk which increases the cost effectiveness Report the intruder to the
of the model. There are some Intruder Detection System authorized person
available, but they consume more time to execute the process
and reporting an intruder. Sometimes those systems produce
false alarm, so the efficiency of those systems gets diluted and
the available features are very less. The existing Intruder End
Detection System was not facilitating the screen recording
feature. Fig 1. Working Model of IDS

B. Proposed System
The system consists of a web camera which is used to V. METHODOLOGY OF SYSTEM
acquire the video continuously and with that the picture of the
person is taken. So it requires no additional cost for Using the Open Computer Vision and face recognition
installation. Then the camera continuously monitors and library the intruder is detected, then using Simple Mail
obtains the video, Images are taken for each period of time Transfer Protocol and Twilio API the intruder will be
from the captured video. The Images will be in RGB format. reported. This approach uses the below processes to detect and
These images are examined once again to see if the invader is report the intruder.
still present. If there is no invader, the processing will come to
a halt. If there is an intruder on the premises, then the model A. Detecting an Intruder
takes a snap of the intruder image and sends an e-mail and a
message by this system This includes a notification of the Initially the images of the authorized person is stored and
intruder's existence as well as the intruder's photograph. Then will be given as input to check the intruder. Then using the
an alarm will be raised to alert the people around the device Face recognition Python library the picture of authorized
and finally the system will be locked. person is compared with the unknown person. The image will
be converted into numerical encoding, so that it will be easy
C. Modules Used for the model to do the comparison. When the authorized
person is unavailable, then the system recognize the intruder
When a new person tries to access the device the new
by comparing with loaded image in authorized folder. Once
person’s face will be compared with the authorized person. If
there is no match then the new person will be labelled as the person if found as intruder, the camera will stop recording
intruder. at a fixed time and next process will get started.

Once the intruder is found the screen will be recorded to


know what the intruder is trying to do with the device. The B. Recording the Screen
video will be recorded for a fixed time. When the intruder is found then the screen recording will
Then using Simple Mail Transfer Protocol library, the be immediately started, screen recording is done to monitor
picture and the recorded screen video will be sent to the the intruder’s activity on that device. The recording will be
authorized person mail. Finally, an alarm will be raised and stopped when it meets the fixed time limit. The time limit is
the device will be locked. So that the intruder can no longer fixed by the authorised person, and it is customizable. With
access the device. the recorded video we can be able to know what the intruder is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 399


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

trying to do in our device. After the fixed time, the screen


recording will be stopped.
C. Reporting Intruder to authorized person
The intruder picture will be stored in a separate folder.
Then the recorded screen video and the intruder picture will be
sent to the authorized person mail account, Simple Transfer
Protocol library is used to send the mail. The stored pictures
are then deleted on the disk to save storage space because the
copy of that picture and video is already sent to the authorized
person mail. Along with the intruders picture the screen
recorded video will also be sent in mail to monitor the
intruder’s activity Fig 3. Authorized person picture on camera

D. Alarm, Short Message Service and Locking device


First of all, a Twilio account is created then using the
Twilio account id and account token the configuration is
finished. After that a Twilio number is obtained, with that
number only the authorized person will receive the SMS. Then
using Python Twilio rest library, the SMS will be sent to the
authorised person’s mobile number. Then an alarm sound for
fixed time limit will be activated, to alert the people around
the device. The time limit and the volume of the alarm is
customizable. Then at last the system will be locked so that
the intruder no longer can able to access the device. The alarm
and the screen lock is achieved through Python libraries.
Fig 4. Intruder’s picture on camera
E. Block Diagram Then the intruder’s picture and the recorded screen video will
be sent to authorized person through email. The mail will
come from the sample mail created for this project
intruderdetectionpc@gmail.com and the mail will be sent to
Video Frames Face Detection the authorized person email.

NO

Intruder Face Comparison

YES

Record the Screen Email the photo and


screen recorded video

Make an alarm and lock


the screen Fig 5. Received Email

After that to alert the authorized person, a SMS will be sent to


Fig 2. Block Diagram
the mobile number.

VI. RESULT
The program will be executed and then the camera will be
turned on to check if any other person other than the
authorized person using this PC. It will compare the face
detected from the camera with the authorized person image
and display the result below the image.
Fig 6. Received SMS

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 400


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VII. RESULT ANALYSIS [3] Chen, Joy Iong Zong. “Smart Security System for Suspicious Activity
Detection in Volatile Areas”, Journal of Information Technology 2, no.
01 (2020): 64-72.
A. About Pycharm
[4] Chunjie Zhou, Shuang Huang, Naixue Xiong, “Design and Analysis of
PyCharm is a Python Integrated Development Multimodel-Based Anomaly Intrusion Detection Systems in Industrial
Environment (IDE) that includes a variety of key tools for Process Automation”, 2020, IEEE Transactions on Systems, Man, and
Cybernetics: Systems, ISSN Information: 2168-2232
Python developers that are tightly integrated to create a
[5] Jan lansky, Saqib ali, Mokhtar Mohammadi, “Deep Learning-Based
pleasant environment for effective Python, web, and data Intrusion Detection Systems: A Systematic Review”, 2021, IEEE access,
science development. It offers with a robust set of capabilities Electronic ISSN: 2169-3536
that support the most up-to-date development methods right [6] Manish Kumar, Ashish Kumar Singh, “Distributed Intrusion Detection
out of the box. Smart code completion, code inspections, System using Blockchain and Cloud Computing Infrastructure”, 2020,
automated code restructuring, an integrated debugger, and a 2020 4th International Conference on Trends in Electronics and
Informatics (ICOEI) (48184), Electronic ISBN:978-1-7281-5518-0
test runner are all included in PyCharm Community Edition. It
[7] Nelson C. Rodelas1, Melvin A. Ballera2, “Intruder detection and
simplifies the management of large projects. recognition using different image processing techniques for a proactive
surveillance”, 2021, Indonesian Journal of Electrical Engineering and
B. Accuracy Calculation Computer Science, pp. 843~852
According to this project, initially all the images will be [8] Nitesh Singh Bhati, Manju Khari, “Comparative Analysis of
considered as the input data and processing data. But as per Classification Based Intrusion Detection Techniques”, 2021, 5th
International Conference on Information Systems and Computer
proposed method, we need to pre-process the image for Networks (ISCON)
obtaining result. [9] Ron Bitton, Asaf Shabtai, “A Machine Learning-Based Intrusion
Accuracy = (TP+TN)/(Total). Detection System for Securing Remote Desktop Connections to
Where TP = True Positive, TN = True Negative Electronic Flight Bag Servers”, 2021, IEEE Transactions on Dependable
The world's simplest face recognition library recognizes and and Secure Computing, ISSN Information: 1941-0018
manipulates faces from Python or the command line using the [10] Sivakumar, Swetha, and R. GomathiBhavani, “Image Processing Based
System for Intrusion Detection and Home Security Enhancement”, 2018
face recognition module. The library is based on dlib's deep 3rd IEEE International Conference on Recent Trends in Electronics,
learning-based state-of-the-art facial recognition. On the Information & Communication Technology (RTEICT), pp. 1676-1680.
Labelled Faces in the Wild benchmark, the model has a 99.38 IEEE, 2018
percent accurate rate [11] S. Menaga, A. Priyadharshini, V. Subalakshmi, “A Smart Intruder
Detection System”, 2021, International Journal of Engineering Research
& Technology (IJERT), ISSN: 2278-018
[12] Vaishali Bhatia, Shabnam Choudhary, K.R Ramkumar, “A Comparative
Accuracy Study on Various Intrusion Detection Techniques Using Machine
Learning and Neural Network”, 2020, 8 th International Conference on
Reliability, Infocom Technologies and Optimization (Trends and Future
Directions) (ICRITO).
[13] Wang, Jin-xiang, “Research and implementation of intrusion detection
Face Recognition algorithm in video surveillance”, 2016, International Conference on
Audio, Language and Image Processing (ICALIP), pp. 345-348, IEEE,
2016
[14] Wei Zhong, Ning Yu, Chunyu Ai, “Applying big data based deep
0 50 100 150 learning system to intrusion detection”, 2020, Big Data Mining and
Analytics, Electronic ISSN: 2096-0654
Accuracy
[15] Xue Ying Li, Rui Tang; Wei Song, “Intrusion Detection System Using
Fig 7. Accuracy of Face Recognition Module Improved Convolution Neural Network”, 2022, 11th International
Conference of Information and Communication Technology (ICTech))
VIII. CONCLUSION AND FUTURE SCOPE
Science and technological innovation is a never-ending
process. New products and technology are always being
developed. Hence this intrusion detection system helps to
avoid data theft and to provide a secured computer
application. So that one can keep their personal device turned
on without worrying about any intruders.

For the future scope, Intruder Detection System can be


developed into an application to make the process easier and
to make a call to the authorized person with some recorded
voice after an intruder is found.
REFERENCES
[1] Bhanse, Vivek Kishor, and M. D. Jaybhaye, “Face Detection and
tracking using Image processing on Raspberry Pi.”, 2018, International
Conference on Inventive Research in Computing Applications
(ICIRCA), pp. 1099-1103, IEEE, 2018
[2] Bhambri, Pankaj, Sachin Bagga, Dhanuka Priya, Harnoor Singh, and
Harleen Kaur Dhiman. “Suspicious Human Activity Detection System”
Journal of IoT in Social, Mobile, Analytics, and Cloud 2, no. 4 (2020):
216-221.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 401


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Detection of Attacks using Attention-based


Conv-LSTM and Bi-LSTM in Industrial
Internet of Things
Bebin Josey T Dr. D.S. M isbha,
Research Scholar, Department of Computer Science, M CA, M .Phil, Ph.D Assistant Professor,
Nesamony M emorial Christian College, M arthandam, Nesamony M emorial Christian College, M arthandam,
India. India.
bebinmca@gmail.com misbhasatheesh4@gmail.com

Abstract- This research work proposes an attack by the attack stage. In the preparation phase, the
detection algorithm for the industrial internet of information about the target is collected by the
things (IIoT) which uses an attention-based Conv- attackers.In the attack phase, the target
LSTM and Bidirectional Long short-term memory infrastructure/equipment is under the control of
(Bi-LSTM) network. The approach consists of two attackers and the attackers will launch attacks on
feature extraction modules namely attention-based thetarget. This first phase is performed in three stages
Bi-LSTM feature extraction and Convolutional namely (a) Intrusion penetration, (b) Lurking, and (c)
LSTM (Conv-LSTM) feature extraction algorithm Lateral intrusion. In the intrusion penetration stage,
that extracts the features on the same data. The Bi- the attackers identify the device that has less security
LSTM further extracts two types of features where in the IoT system and takes central of the weak secure
one type is extracted in the forward pass while the device. In the lurking stage, the controlled device will
other is extracted in the backward pass. The Bi- collect essential information by hiding in the IIoT
LSTM and Conv-LSTM extracted features are target as normal authenticated devices. This lurking
fused and are trained/tested using the fully process may occur for several months. In the intrusion
connected layer of the neural network to detect stage, move weak devices will be under the control of
normal or abnormal data. The evaluation of the attackers for collecting more sensitive information as
algorithm was performed using the metrics namely illustrated in Fig. 1. There are two types of attacks
false negative rate, false alarm, detection rate, and namely low frequency and multistage. In the low-
accuracy with the IIoT dataset namely AWID, and frequency type, the attacker gets undetected for
CTU-13. The proposed approach provides an several years or months and collects the data. In this
accuracy of 98.02% and 95.98% for the AWID, type, only a few abnormal data are produced. In a
and CTU-13 datasets respectively which shows multi-stage attack, the intensity of the attack will
that the algorithm outperforms other recent IIoT increase. The attackers will get control of USB
attack detection algorithms. devices, wireless devices, local area network (LAN)
servers, etc. Finally, the target industrial infrastructure
Index Terms-Convolutional-Long Short Term or equipment will be attacked by a virus.
Memory (Conv-LSTM), Bidirectional Long Short
Term Memory (Bi-LSTM), Industrial Internet of An intrusion detection system (IDS) is used to detect
Things (IIOT) attack, Feature Extraction, such attacks that perform three major functions
Attention namely (a) It monitors the firewall, routers, and
servers (b) It identifies the patterns of malicious
1. INTRODUCTION
content and supports the network administrator for
Recently, due to the development of cloud effective control (c). It sends a notification on
computing and the internet of things (IoT), industrial detecting malicious content. Two approaches namely
systems have established the industrial internet of signature-based schemes and behavior-based schemes
things [1] (IIoT). This IIoT has become the attack are used in the Intrusion detection system.Signature-
target of attackers. There are two phases in IIoT based schemes provide better performance for the
attacks which include the preparation phase followed detection of unknown malware attacks since these

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 402


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

schemes compare the incoming data traffic with the the system that was linked to the attack which also
signature of attacks that was stored in the database. uses statistical information.
The behavior-based IDS alsomonitors the behavior of

Weak secure device


Attacker Core Server Industrial equipment

Personal Computer Target Network


Employees

Send attack command T ransmit information

Fig. 1: Representation of attack in IIoT

Several researchers are working on developing IIoT from each interval to detect the abnormality. The
attack detection algorithms where the traditional author Smadi et al. [8] used a feature extraction
schemes can be categorized as time series detection algorithm on the input data in an adaptive approach,
and online learning detection. In the time series where the implementation was done to detect phishing
approach, the data is initially divided into different e-mails. A principal component analysis (PCA) based
intervals from which the interval score is estimated. approach was proposed by Wang et al. [9] where the
The author Ren et al. [2] used a dynamic Markov abnormal feature variation is detected from
model, where the memory attribute length is balanced theextracted features. The author Roshan et al. [10]
using a high-order Markovmodel. The real-time state used an extreme learning approach using the new
prediction approach was combined with the dynamic detection data and the historical data. The model is
duration approach [3] by Ortega et al., where varying updated by estimating the mean square error (MSE).
time window is used for anomaly detection. The Deep learning algorithms [11] are also used in
authors Melnyk et al. [4] used a semi-Markov-based anomaly detection, where the LSTM model [12]
auto-regressive approach where the data suggested shows a better performance. The data at current or
phase distribution is compared with the model- past instances may be used to predict the abnormal
predicted phase distribution. The online learning data that was arriving in the future. Therefore a short-
schemes proposed by Ozkan et al. [5] used temporal term prediction of normal/abnormal at any time
data for anomaly detection. In this approach,Neyman- instance is performed using the hybrid conv-LSTM
Pearson's approach is used in detecting the anomaly and Bi-LSTM model.The contribution of the paper is
from the received dynamic and static data. This as follows,
approach shows better performance when there is a (i) The paper proposes an attack detection algorithm
high/large sequence data rate. by detecting the features extracted from the IIoT data
which classifies the data as normal/abnormal.
The authors Sasikala et al [6] used a (ii) The feature extraction algorithm uses two modules
classifier namely XGBoost for the detection of namely Bi-LSTM and attention-based Conv-LSTM.
attacks. The attack detection on the cloud was TheBi-LSTM generates two different features namely
proposed using a Flower Pollination Algorithm by the forward and backward pass features. The extracted
authors Ananthi et al. [7], where the scheme can features are trained using the fully connected layer to
detect different attacks on wireless sensor detect the abnormality.
networks.Since the time series approach uses the (iii) The evaluation of the algorithm was done using
model for attack detection on a selected time interval, the dataset namely AWID, and CTU-13 using the
the performance of attack detection reduces if there is metrics false negative rate, false alarm, detection rate,
a mismatch between the actual attack interval and and accuracy.
chosen attack interval. In the online learning The remaining section of the paper is constructed as
approach, a few features are extracted from the data follows. Section II shows the proposed IIoT attack

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 403


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

detection algorithm. Section III shows the evaluation Attention


results of the proposed algorithm and finally, Section
IV concludes the work.
Normalize
II. PROPOSED METHOD Convolution
layer 1 and 2
The block diagram of the proposed hybrid attention -
LSTM
based Conv-LSTM and Bi-LSTM for the detection of
attacks in IIoT is provided in Fig.2. The hybrid
detection schemes consist of two networks namely the
attention-based Bi-LSTM network and Conv-LSTM Fig. 3: Representation of attention-based conv-LSTM
network [13]. Let the data from the IIoT network at
∑ ( ) (4)
time be .
The block diagram representation of Conv-LSTM
with the attention mechanism is provided in Fig. 3.
Bi-LSTM
Two convolution layers are used where the arriving
Fully connected
Feature fusion

network Result
Data dataat a time instance having size is convolved with
layer

Normal/ the kernel equal to the size of the arrived data that is
Conv-LSTM
Abnormal received on that time instance. The convolved data is
network
then applied to the function followed by a
normalization, where the function also uses the
Fig. 2:Block diagram representation of proposed LSTM output estimated from the two-layer
attack detection in IIoT convolution. The normalized feature and the LSTM
features are multiplied to obtain the Conv LSTM
Therefore the data on a time frame be represented as output.
{ } (1)
Data
LSTM
The Conv-LSTM performs, the convolution operation
network LSTM
in two layers (layer-1, and layer-2) the convolution
output is applied to the LSTM network and an network
LSTM
attention process. Let and be the kernels of network LSTM
CNN in layer-1 and layer-2 respectively. The
.....

network
convolution operation in layer-1 can be expressed as,
LSTM
( )( ) ∫ ( ) ( ) (2) network LSTM
network
The convolution operation in layer-2 can be expressed LSTM
as, network LSTM
network
( )( ) ∫ ( ) ( ) (3)

The feature value obtained from the LSTM and Fig. 4: Representation of Bi-LSTM
attention process are multiplied to obtain the Conv-
LSTM feature . The Conv-LSTM generates the The Bidirectional LSTM (Bi-LSTM) consists of two
output from the IIoT data input as. processes namely forward pass and backward pass.
This Bi-LSTM consists of two sections of cascaded
LSTM network where one network performs the
forward pass while the other section performs the
backward pass. The forward pass section generates
the output , similarly, the backward pass section
generates the output . The representation of
forward pass and backward pass in bi-LSTNM is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 404


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

represented in Fig. 4. The LSTM layer estimates the The features are trained using the fully
hidden state of each time step represented as connected layer of the neural network. The features
that are extracted by the Conv-LSTM and Bi-LSTM
[ ] (5) are trained in the fully connected layer that has layers
such as the input layer, hidden layers, and output
The output of the attention can be estimated as layers. The number of neurons in the input layer is
equal to the number of features extracted by the

(6) hybrid algorithms. Two neurons are used in the
outputlayer where one neuron represents the
Where the score estimated as classification result that corresponds to normal data
while the other neuron represents the classification
( ) (7) result that corresponds toabnormal data.The attack can
be detected periodicallyon the IIoT network using the
Where represent the hidden output of Conv-
trained model. For handling the attack detection in the
LSTM. , and are the learnable parameters.
cloud data, the algorithm can be implemented in the
The attention output depends on the hidden cloud server, where the IIoT network is also
variable and input . The output gate, cell state, connected. Thus the algorithm can detect the
forget gate, and input gate in the LSTM network is attackfrom the data that was received on the network
given by that was sent by the attacker.

( ) (8) III. EXPERIM ENTA L RESULTS

( ) The evaluation of the proposed hybrid attention-based


(9) Bi-LSTM in detecting the attacks in IIoT is
performed with the metrics false negative rate, false
( ) alarm, detection rate, and accuracy which can be
(10) estimated using the relation
( ) (13)
( )
(11)
( ) (14)
Where ( )
( ) (15)
Here is the element-wise matrix multiplication
operator. represent the input, b’s and W’s represent
the bias and weight respectively. The function ( ) ( ) (16)
represents the activation function. The LSTM network
has a memory cell that preserves the state over time. Where , , represents the false negative, false
Gates are used to control the memory cell which can positive, true negative, and true positive respectively
enable the memory cell to forget or retain the state. A obtained from the classified normal and abnormal
sigmoid layer is used in the network that makes the results. The evaluation of the algorithm for attack
feature between 0 to 1. In each time instance, the state detection was carried out using the datasets namely
of the memory cell is updated based on the input data AWID [14], and CTU-13 [15]. The algorithm was
and memory cell state. The product of the output gate implemented using Matlab 2020a on a PC with the
and the sigmoid result of the memory cell state gives 64-bit window-7 operating system with 8GB RAM,
the feature value at the current time instance. The and a 3.4GHz I7 processor. The performance of the
forward pass feature backward pass feature proposed algorithm was compared with the traditional
and the attention-based Conv-LSTM ( ) are merged. schemes such as sequential HNP [5], CELM [10],
Therefore the complete features that can be SAM [9], MSB [16], PEDS [8], O-LSTM [17], and
trained/tested are given by, MLSTM [12].

(12)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 405


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I: Performance comparison between TABLE II: Performance comparison between


Proposed and traditional attack detection schemes for Proposed and traditional attack detection schemes for
the dataset AWID the dataset CTU-13
FNR FA DR Acc
FNR FA DR Acc S chemes (%) (%) (%) (%)
S chemes (%) (%) (%) (%) HNP 7.35 6.95 59.69 93.01
HNP 7.35 5.97 63.29 93.89 CELM 9.54 7.74 56.49 92.08
CELM 10.58 6.04 62.2 93.51 S AM 6.16 7.08 59.55 93.01
S AM 8.32 5.69 64.17 94.05 MS B 10.62 7.84 55.88 91.88
MS B 6.85 3.59 74.22 96.08 PEDS 7.98 7.04 59.24 92.87
PEDS 6.59 4.81 68.3 95.05 O-LS TM 8.21 9.98 50.49 90.18
O-LS TM 7.88 3.29 75.67 96.25 MLS TM 2.14 5.31 67.2 95.01
MLS TM 6.02 2.02 83.79 97.58 Proposed 2.02 4.86 68.45 95.98

Proposed 5.85 1.96 86.39 98.02

The accuracy and detection rate of the proposed


approach is higher than the traditional schemes,
whereas the false negative rate and false alarm rate of
the proposed approach are lesser than the traditional
schemes when evaluated using the AWID dataset. For
the proposed approach the FNR, FA, DR, and
accuracy are estimated as 5.85%, 1.96%, 86.39%, and
98.02% respectively as depicted in Table I.

Fig. 6: Graphical comparison of Accuracy, DR, FA,


and FNR of the proposed method for the dataset
CTU-13

The accuracy and detection rate of the proposed


approach is higher than the traditional schemes,
whereas the false negative rate and false alarm rate of
the proposed approach are lesser than the traditional
schemes when evaluated using the CTU-13 dataset.
For the proposed approach the FNR, FA, DR, and
accuracy are estimated as 2.02%, 4.86%, 68.45%, and
95.98% respectively as illustrated in Table II. The
high accuracy is attained by the proposed model due
Fig. 5: Graphical comparison of Accuracy, DR, FA, to the usage of an attention mechanism that focuses
and FNR of the proposed method for the dataset only on essential data for training/testing the model to
AWID detect attacks in IIoT.The graphical comparison
obtained on the CTU-13 is provided in Fig. 6.
The graphical comparison for the AWID dataset is
provided in Fig. 5. The experiment was done with a
sequence length of 50 and an input dimension of 50
[12]. The LSTM network in the hybrid system uses a
batch size of 50 with 50 epochs at a learning rate and
dropout rate of 0.01 and 0.5 respectively.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 406


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and Security (NT MS), 2016 8th IFIP International Conference on.
IEEE, 2016, pp. 1–5.
[4] I. Melnyk, A. Banerjee, B. Matthews, and N. Oza,
“Semimarkov switching vector autoregressive model-based
anomaly detection in aviation systems,” in Proceedings of the 22nd
ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining. ACM, 2016, pp. 1065–1074.
[5] H. Ozkan, F. Ozkan, and S. S. Kozat, “Online anomaly
detection under markov statistics with controllable type-i error.”
IEEE T rans. Signal Processing, vol. 64, no. 6, p p. 1435–1445,
2016.
[6]. Sasikala, D., Chandrakanth, D., Reddy, C., & Teja, J. J. (2022).
Inhibiting Webshell Attacks by Random Forest Ensembles with
XGBoost. Journal of Information Technology and Digital
World, 4(3), 153-166.
[7]. Ananthi, J. Vijitha, and S. Shobana. "C-FPA: A Cloud-Based
FPA Novel Approach to Defend Hotspot Issues and Attacks in
WSN." Journal of Information Technology 4.2 (2022): 95-104.
Fig. 7: Variation of accuracy for different epochs
[8] S. Smadi, N. Aslam, and L. Zhang, “Detection of online
during training in AWID and CTU-13 datasets. phishing email using dynamic evolving neural network basedon
reinforcement learning,” Decision Support Systems, vol. 107, pp.
The variation of accuracy during the training epoch is 88–102, 2018.
illustrated in Fig 7. Since the conv-LSTM and Bi- [9] T . Wang, J. Xu, W. Zhang, Z. Gu, and H. Zhong, “Selfadaptive
cloud monitoring with online anomaly detection,” Future
LSTM are trained with 50 epochs, the model attains a
Generation Computer Systems, vol. 80, pp. 89–101, 2018.
training accuracy of around 95%. The accuracy [10] S. Roshan, Y. Miche, A. Akusok, and A. Lendasse, “Adaptive
almost stabilizes as the number of epochs reaches 50 and online network intrusion detection system using clustering and
when evaluated using both the AWID and CTU-13 extreme learning machines,” Journal of the Franklin Institute, vol.
355, no. 4, pp. 1752–1779, 2018.
datasets. From Fig. 7 it is clear that the model attains
[11]. Suchetha, M., et al. "Region of interest -based predictive
a maximu m training accuracy infewer epochs. algorithm for subretinal hemorrhage detection using faster R-
CNN." Soft Computing 25.24 (2021): 15255-15268.
IV. CONCLUSION [12]. Li, X., Xu, M., Vijayakumar, P., Kumar, N., & Liu, X. (2020).
Detection of low-frequency and multi-stage attacks in industrial
The model proposed an IIoT attack detection internet of things. IEEE Transactions on Vehicular
algorithm that uses an attention-based Bi-LSTM. The Technology, 69(8), 8820-8831.
[13]. Zheng, Haifeng, et al. "A hybrid deep learning model with
algorithm initially extracts two different features from attention-based conv-LSTM networks for short -term traffic flow
the IIoT data using attention-based Conv-LSTM and prediction." IEEE Transactions on Intelligent Transportation
Bi-LSTM networks. The extracted features are fused Systems 22.11 (2020): 6910-6920.
and trained using the fully connected layer of the [14] M. T avallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “ A
detailed analysis of the kdd cup 99 data set,” pp. 1–6, 2009.
neural network. Evaluation metrics namely false [15] P. Berezi´nski, B. Jasiul, and M. Szpyrka, “An entropy based
negative rate, false alarm, detection rate, and accuracy network anomaly detection method,” Entropy, vol. 17, no. 4, pp.
are used to evaluate the proposed attack detection 2367–2408, 2015.
algorithm with the datasets namely AWID, and CTU- [16] J. Jeong, T . S. Yoon, and J. B. Park, “Mean shifttracker
combined with online learning-based detector and kalman filtering
13. The detection accuracy of the AWID, CTU-13 for real-time tracking,” Expert Systems with Applications, vol. 79,
dataset was estimated as 98.02% and 95.98% pp. 194–206, 2017.
respectively. The performance of the algorithm was [17] Y.-L. Kong, Q. Huang, C. Wang, J. Chen, J. Chen, and D. He,
found to be better when compared to similar attack “Long short-term memory neural networks for online disturbance
detection in satellite image time series,” Remote Sensing, vol. 10,
detection schemes. no. 3, p. 452, 2018.

References

[1]. Khan, Izhar Ahmed, et al. "Enhancing IIoT networks


protection: A robust security model for attack detection in Internet
Industrial Control Systems." Ad Hoc Networks 134 (2022): 102930.
[2] H. Ren, Z. Ye, and Z. Li, “Anomaly detection based on a
dynamic markov model,” Information Sciences, vol. 411, pp. 52–
65, 2017.
[3] J. L. G. Ortega, L. Han, and N. Bowring, “A novel dynamic
hidden semi-markov model (d-hsmm) for occupancy pattern
detection from sensor data stream,” in New T echnologies, Mobility

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 407


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Design of Hybrid Authentication Protocol for


High Secure Applications in Cloud
Environments
Sai Srinivas Vellela, Dr.R. Balamanigandan,
Research Scholar, Associate Professor,
Department of Computer Science and Department of Artificial Intelligence,
Engineering, Saveetha School of Engineering,
Saveetha School of Engineering, Saveetha Institute of M edical and
Saveetha Institute of M edical and Technical Sciences,
Technical Sciences, Chennai, Tamil Nadu, India.
Chennai, Tamil Nadu, India. balamanigandanr.sse@saveetha.com
sais1916@gmail.com

Abstract: S ince a large amount of data gets transferred, Internet-based IT services are represented, and
the security and privacy are important in cloud current consumption is supplemented by the new
computing which increases the risk of data attack. Cloud computing method. As a service, dynamic
Cryptography is a method of transmitting and storing
scaling and regular virtualization are given [2].
data so only the intended receiver or recipient can read
and process it. The original message, known as plain Internet service providers provide a number of
text, can be converted to an unintelligible version internet services that benefit users when utilized. As a
known as cipher text in cryptography. The ability to result, resources must be saved in management and
securely delete sensitive data from storage is becoming computation, as well as data storage. Specific
more important. In this method some important services, such as lower-cost client hardware and
security services including authentication Protocol is software are provided by service providers. Large
provided in cloud computing.The entire architecture is volumes of data are also kept on remote servers as
divided into four modules they are security server, computing resources and storage increase.
cloud database, hybrid authentication protocol and
communication. To provide efficient security hybrid
authentication protocol is utilized. In hybrid Remote locations also have access to computing
authentication protocol initially data will be registered resources (software and hardware) and cloud
and to this data privacy is provided using privacy computing takes use of these to access the entire
module. Now to the obtained data security key is network. Expanding techniques for using cloud
provided. After that data base functions are performed. computing to transform information technology
Security server will provide security for the transmitter processes will be created in the future. Due to its
and received data. Cloud data base will store the data. many advantages, including flexibility, cost-
From results it can observe that hybrid authentication effectiveness ,scalability and most businesses use
protocol will improve the performance, security,
cloud computing technology to transfer cloud data. In
scalability and reduces the errors, Delay and attacks
which are obtaining from unauthorized users. order to share informat ion or documents other
among staff members in the cloud and an
Key Words:Cloud data base, Security server, hybrid organization subscribes to cloud services using a
authentication protocol, Cloud computing, Cryptography, cloud service application. Every file is characterized
Delay. by a set of keywords, and members of staff or other
I.INTRODUCTION authorized users have the ability to download a file
Internet computing resources are provided by cloud fro m the cloud by querying the cloud using specific
computing. The Cloud computing network has keywords.
absorbed the majority of applications, resulting in a
system that is more persistent [1]. The exponential The Vectorspacemodel is co mmonly used in
growth of modern data centres, social network data informat ion retrieval because of its simplification and
and a sudden increase in computing data power and adaptability. An information retrieval system based
storage are the primary reasons for adopting cloud on boolean models has issues with addressing and
computing. So me of them have low utilisation and order ranking. The vector space model is emp loyed
high costs, which could be reduced by developing for informat ion retrieval, but as a result, the search
cost-effective and reliable cloud-based solutions. precision for informat ion is inadequate since long

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 408


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

documents with poor representation exhibit poor complete analysis of Physical Unclonable
similarity values; in these situations, spontaneous Functions (PUF) features of rad ios for improved
weightings are acceptable, but not in the vector space security of physical layers[3]. The theoretical
model. The term-based order of the documents is lost enhancement of RF-PUF is represented for an
in the vector space approach. asymmetric IoT network.Any additional hardware
The design of the newly introduced N-level vector at the constrained resource of IoT node is not
design system ranking scheme, wh ich explores a required for RF-PUF operation.PUF
novel idea for term weighting and takes into account implementation at Tx node does not require on-chip
the feature term location in the document, effect ively oroff-chip circuitry fo r RF-PUF.Process variability
removes this difficu lty. Then, using the newly and component to lerance factors are inherent
introduced system, the ranking process of encrypted variations developed in proposed schemeateach
documents is evaluated once the document content transistor.A framework basing on machine learning
has been properly described. This newly p resented techniques is designed in this study which reduces
formula, which is supplied for information ext raction, the nonidealities such as data variability accounts
produces a better retrieving outcome. With this and variability in channel at receiver end.
approach, a new termweighting formu la is Atthe time o f data transmission, the data packets
introduced, and the featureterm location and a brief are highly prone to attacks.To overcome these
summary of its contents are also included in the drawbacks a powerfu l method is required that not
document. only provides security but it should improve the
efficiency of currently wo rking network
A group of sensor nodes are connected to each other system.This study presents a new technique based
in anetwork through wireless Co mmunicat ion is on mach ine learning which generates fake data for
called Wireless Sensor Network(WSN).Sensornodes providing secured path for commun ication among
are distributed spatially in WSN that are controlled sensor nodes by misleading the attacker. In
mutually in so meconditions. Sensornodes are present proposed technique generation of faked at a packets
in adversarial environment such that the attackers can is not supported in order to reduce consumption of
easily enter into the network fo r capturing data fro m power and it avoids end to end delay by promoting
physical nodes. In most ofthe cases, the sensors may through put rate.
devices in any of the present node where every single
sensor represents mult iple sensor identities within the
II.LITERATURE SURVEY
network.Syb il attacks may remarkab ly decrease the
Ambika Gupta, Anjan i Mehta, LakshyaDaver,Priya
rig idness off aulty systems like maintenance of
Banga.et.al [4], In th is co mputerized period, the
topology and distributed storage. Geographic routing
development of many various applications makes the
protocols mayhave be open for threats such that an
liv ing souls in a manner more brilliant and yet it
adversary using theSybil attack is appeared in
likewise expands how much informat ion to an
mu ltip le sensor nodes at a time to manipulate the
exceptional rate.
location data information with neighbour nodes.
Fabio Bracci, Antonio Corradi, Luca Foschini.et.al
Authentication of identity for sensor node has to be [5], Soft ware as a Service (SaaS) applications
performed in turn to prevent attacks.Such activities completely taking advantage of the capability of
are practiced for public key cryptography in versatile Cloud figuring foundations normally is
conventional internet. The ability of resource empowering new universal access situations for
constrained with this storagecost sensor node is not itinerant clients, like market sales users and home
efficient fo r generation of d igitalsignatures. Present med ical care clinical data. SaaS applications
working models sort out the issue by forming commonly expect to move in formation and assets to
secured pair wise keys through pre-distribution the Cloud framewo rk site; that raises a few testing
methods of random key and. Ho wever, th is issues spreading over from access control to assets to
simp lification is not totally secured and energy protection insurance, proprietorship, and security of
efficient. the information of the last SaaS clients [14][15].

Jun Feng, Yu Chen, Pu Liu.et.al [6]The information


In this study, the current working system is that is put away as well as co mmunicated on the
enhanced for identification of radio sensor nodes Internet has been classified "the blood of the IT".
basing on their fundamental signatures impulsively Alongside the framework and organization based
depending on communication signal that leads to applications, information capacity has been perceived

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 409


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

as one of the significant components of data results were essentially reliant upon the particular
innovation. The success of Cloud Co mputing requires examples tried and the pursuit terms utilized by the
the moving fro m server-appended capacity to specialist [9][10][11].
disseminated capacity [12][13].
III. HYBRID AUTHENTICATION PROTOCOL
Yun Zhang, FarhanPatwa, Rav i Sandhu.et.al[7] a The below figure (1) shows the architecture of hybrid
public cloud gives undertakings and associations a authentication protocol. The entire architecture is
safe and effective climate to convey their divided into four modules they are security server,
frameworks. While associations and organizations cloud database, hybrid authentication protocol and
benefit fro m mov ing to cloud stage, almost certainly, communicat ion. To provide efficient security hybrid
comparative d igital assaults will happen to authentication protocol is utilized. In hybrid
associations what share a similar cloud stage. One authentication protocol initially data will be
method for allev iating this chance is to d ivide registered and to this data privacy is provided using
network protection data between these associations. privacy module. Now to the obtained data security
key is provided. After that data base functions are
Brad ley Lee Snyder, James H. Jones.et.al [8]Past performed. Security server will provide security fo r
endeavors to recognize cross -occurrence cloud the transmitter and received data. Cloud data base
permanence have comprised of looking through will store the data. The below figure (1) shows the
mo mentu m occasion unallocated space for pieces explanation of entire architecture.
effectively owing to an earlier client or case, and

Security Server

Cloud Data Base Hybrid Authentication Protocol


Database
functions Security Registration
Resident DB Communication
New
module Module Module
module resident Module
Database
module
Visitor
module Visitor API Privacy
Module
Module
Archive Returning
module

Fig. 1: Architecture of Hybrid Authentication Protocol

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 410


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Security servers
Cloud Data Base
These Servers are utilized to store and to share. It
A cloud data set is one that is created and retrieved additionally used to large informat ion handling in
using a cloud stage. It serves the majority of the same framework. These are kept up with by distributed
functions as a traditional data base, but with the computing suppliers, those are not in one space like
added flexib ility of distributed computing. To end-clients. In this way, these servers are not
execute the data set, clients use programming on a dependable subsequently the end client's can't be trust
cloud platform [16][17]. cloud servers. To make and authorize the security
strategy access choices. Here taking into account the
In registering, aresident module or inhabitant servers in cloud are not conniving with Data shoppers
program stays in memo ry a ll through the lifetime of a and End-clients[18][19].
figuring meeting. One such program may be an attack
on program. This has brought about the term This deal with each characteristic and distribute out
inhabitant security. Visitor’s module records different users chose from space trait to end customers or end-
informat ion about guests and shows this information clients. This is the super key age place, here age of
in the configuration of either Reports (with graphs) or public boundaries are finished. The characteristic
Blocks. Archive Module Creates a packed chronicle power awards different access honors for the end-
of at least one record or trees [20]. clients by giving mystery keys in view of the
properties and it is co mpletely private in organization
Hybrid Authentication Protocol of a framework.

The gathering, storing, transferring, and sharing of These End-clients are called as information
data over the cloud without compro mising the makers/proprietors; their information is rethought in
security of independent information is referred to as the cloud. Utilizing these clients scramb le their
informat ion security in distributed computing. The informat ion to control and access their own
cloud security engineering model is typically informat ion. These are considered as rules in the
communicated as far as: Security controls which can organization. Informat ion is mentioned by buyers
incorporate innovations and cycles. Controls ought to fro m distributed computing servers. The information
consider the area of each help organizat ion, cloud is decoded by the shoppers just when the entrance
supplier, or outsider. approaches are fulfilled by users. However, the
customer attempts to get to the unavailable
APIs (Application Programming Interfaces) are information from the users.
comprehensively acknowledged and utilized in web
applications. There are four chief kinds of API The Data Owner (DO) and Data User (DU) are the
ordinarily utilized in online applications: public, two sorts of elements used for this framework. The
accomplice, p rivate and composite. In th is specific DO can be either an association or an individual
circu mstance, the API "type" shows the expected which was the proprietor for a progression of records
extent of purpose. An API details can have a nu mber to share. While DUs are the approved information
of formats, but most commonly includes,data clients of DOs who were permitted to get to a portion
structures schedules,remote calls, object classes or of those records.
factors. So, a module is a product part, and an API is
directions, and conceivably a few devices, fo r IV.RESULTS AND DISCUSSION
utilizing and speaking with a product part. The below table (1) showscomparison of
authentication protocol, Multifactor authentication
Communication Module protocol andhybrid authentication protocol. In this
performance, errors, security, delay, scalability and
By the use of servers, data sets, informat ion storage, attacks are utilized. In this hybrid authentication
system ad min istration, and programming, many protocol performance, security and scalability will be
administrations can be provided through the Internet increased compared with authentication protocol &
in a distributed manner. People who need ext ra Multifactor authentication protocol. In the same way
capacity and companies looking for a dependable off - errors, delay and attacks are reduced compared with
site data backup option both have become mo re and authentication protocol.
more used to distributed storage.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 411


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Table. 1: Comparison Of Parameters

Multi factor Hybrid Authentication


S.NO Parameters Authentication Authentication Protocol
Protocol Protocol

1 Performance 86% 91% 98%

2 Errors 73% 54% 8%

3 Security 64% 86% 95%

4 Delay 89% 32% 7%

5 Scalability 43% 68% 87%

6 Attacks 77% 28% 6%

The below figure (2) shows the comparison of authentication protocol and Multifactor
performance and errors for authentication protocol, authentication protocol, hybrid authentication
Multifactor authentication protocol andhybrid protocol increases the performance and reduces the
authentication protocol. Co mpared with errors in effective way.

Fig. 2: Comparison Of Performance And Errors

In hybrid authentication protocol, security is authentication protocol, Multifactor authentication


increased and delay is reduced compared with protocol which is shown in below figure (3).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 412


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3: Comparison of Security and Delay

Co mparison of scalability and attacks for scalability is increased in hybrid authentication


authentication protocol, Multifactor authentication protocol compared with authentication protocol and
protocol andhybrid authentication protocol is shown Multifactor authentication protocol.
in below figure (4). Attacks are reduced and

Fig. 4: Comparison Of Scalability And Attacks

V.CONCLUSION internet to store and protect our data.Fro m results it


Cloud computing plays major ro le in present can observe that hybrid authentication protocol will
generation to save the data.So to protect the data improve the performance, security, scalability and
hybrid authentication protocol is introduced. Fro m reduces the errors, Delay and attacks which are
past decades the cloud computing has gained huge obtaining fro m unauthorized users.Comparison of
attention. In this the service provider manages via authentication protocol, Mult ifactor authentication

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 413


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

protocol andhybrid authentication protocol is g iven pp. 259–268. [Online]. Available:


http://doi.acm.org/10.1145/2420950.2420989
in detail manner. In this performance, errors,
[14] R. Spillane, R. Sears, C. Yalamanchili, S. Gaikwad, M.
security, delay, scalability and attacks are utilized. In Chinni, and E. Zadok, “Story Book: An Efficient Extensible
this hybrid authentication protocol performance, Provenance Framework,” in First Workshop on the Theory and
security and scalability will be increased compared Practice of Provenance, ser. T APP’09. Berkeley, CA, USA:
USENIX Association, 2009, pp. 11:1–11:10. [Online]. Available:
with authentication protocol & Mult ifactor http://dl.acm.org/citation. cfm?id=1525932.1525943
authentication protocol. In the same way errors, [15] S. Ali, G. Wang, M. Z. A. Bhuiyan, and H. Jiang, "Secure
delay and attacks are reduced in hybrid Data Provenance in Cloud-Centric Internet of Things Via
authentication protocol compared with authentication Blockchain Smart Contracts," in IEEE SmartWorld, Ubiquitous
Intelligence & Computing, Advanced & Trusted Computing,
protocol and Multifactor authentication protocol. Scalable Computing & Communications, Cloud & Big Data
Computing, Internet of People and Smart City Innovation, 2018,
REFERENCES pp. 991–998
[1] Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, [16] EbelechukwuNwafor, Andre Campbell, David Hill, Gedare
WaelAlosai ,HashemAlyami, And Muhammad Ayaz, “A Bloom, “Towards a provenance collection framework
Systematic Literature Review on Cloud Computing Security: for Internet of Things devices”, 2017 IEEE SmartWorld,
Threats and Mitigation Strategies”, ACCESS.2021.3073203/IEEE, Ubiquitous Intelligence & Computing, Advanced & Trusted
2021 Computed, Scalable Computing & Communications, Cloud &
[2] Sai Srinivas Vellela , Dr.R.Balamanigandan, Dr.S.Phani Big Data Computing, Internet of People and Smart City Innovation
Praveen, “ Strategic Survey on Security and Privacy Methods of (SmartWorld/SCALCOM/UIC/ AT C/CBDCom/IOP/SCI), Year:
Cloud Computing Environment”, Journal of Next Generation 2017
T echnology, ISSN: 2583-021X, Vol. 2, Issue 1, May 2022. [17] Mahmoud Elkhodr, BelalAlsinglawi, Mohammad Alshehri,
[3] AvneetKaur,Sachin Yadav,Gaurav Raj,TanupriyaChoudhury, “Data Provenance in the Internet of Things”, 2018 32nd
‘Performance Evaluation of AWS and IBM Cloud Platforms for International Conference on Advanced Information Networking
Security Mechanism’’, International Conference on Computational and Applications Workshops (WAINA), Year: 2018.
T echniques, Electronics and Mec.hanical Systems (CTEMS), 2018 [18] Phani Praveen, S., &Rao, K. T. (2018).Client -Awareness
[4] SaakshiNarula, Arushi Jain, Prachi, “Cloud computing security: Resource Allotment and Job Scheduling in Heterogeneous Cloud
amazon web services”, 2327-0659/15 $31.00 © 2015 IEEE DOI by Using Social Group Optimization. International Journal of
10.1109/ACCT.2015.20, 2019 Natural Computing Research (IJNCR), 7(1), 15-31.
[5] Ambika Gupta, Anjani Mehta, LakshyaDaver,PriyaBanga, [19] Sindhura, S., Praveen, S. P., Syedbi, S., Pratap, V. K., &
“Implementation of Storage in Virtual Private Cloud using Simple Krishna, T. B. M. (2021). An effective secure storage of data in
Storage Service on AWS”,Proceedings of the Second International cloud using ISSE encryption technique.Annals of the Romanian
Conference on Innovative Mechanisms for Industry Applications Society for Cell Biology, 5321-5329.
(ICIMIA 2020) IEEE Xplore Part Number: CFP20K58-ART; [20] Praveen, S. P., &Rao, K. T. (2019). An effective multi-faceted
ISBN: 978-1-7281-4167-1, 2020 cost model for auto-scaling of servers in cloud. In Smart Intelligent
[6] Sai Srinivas Vellela, Dr. A. Murali Krishna, “On Board Computing and Applications (pp. 591-601). Springer, Singapore.
Artificial Intelligence With Service Aggregation for Edge [21] Phani Praveen, S., &ThirupathiRao, K. (2018).An optimized
Computing in Industrial Applications” Journal of Critical Reviews rendering solution for ranking heterogeneous VM instances.In
ISSN- 2394-5125 Vol 7, Issue 07, 2020 Intelligent Engineering Informatics (pp. 159-167).Springer,
[7] Fabio Bracci, Antonio Corradi, Luca Foschini, “Database Singapore.
Security Management for Healthcare SaaS in the Amazon AWS [22] Lalitha, R.V.S.S., Srinivasu, P.N. (2017). An Efficient Data
Cloud” ,978-1-4673-2713-8/12/$31.00 ©2012 IEEE, 2012. Encryption Through Image via Prime Order Symmetric Key and
[8] Jun Feng, Yu Chen, Pu Liu, “ Database Security Management Bit Shuffle T echnique. In: Sat apathy, S., Bhateja, V., Raju, K.,
for Healthcare SaaS in the Amazon AWS Cloud”, 978-1-4244- Janakiramaiah, B. (eds) Computer Communication, Networking
5176-0/10/$26.00 ©2010 IEEE, 2010 and Internet Security. Lecture Notes in Networks and Systems, vol
[9] Yun Zhang, FarhanPatwa, Ravi Sandhu, “ Community-Based 5. Springer, Singapore.https://doi.org/10.1007/978-981-10-3226-
Secure Information and Resource Sharing in AWS Public Cloud, 4_26.
2015 IEEE Conference on Collaboration and Internet Computing,
2015
[10] Bradley Lee Snyder, James H. Jones, “Determining the
Effectiveness of Data Remanence Prevention in the AWS Cloud”,
978-1-7281-2827-6/19/$31.00 ©2019 IEEE, 2019
[11] Y. Ji, S. Lee, and W. Lee, “RecProv: Towards Provenance-
Aware User Space Record and Replay,” in Provenance and
Annotation of Data and Processes, ser. Lecture Notes in Computer
Science, M. Mattoso and B. Glavic, Eds. Springer International
Publishing, Jun. 2016, no. 9672, pp. 3–15, dOI: 10.1007/978-3-
319-40593-3 1. [Online]. Available:
http://link.springer.com/chapter/10.1007/978-3-319-40593-3 1
[12] a. Chen, Dr Joy IongZong, and Kong-Long Lai. "Internet
of Things (IoT) Authentication and Access Control by Hybrid
Deep Learning Method-A Study." Journal of Soft Computing
Paradigm (JSCP) 2, no. 04 (2020): 236-245.
[13] D. J. Pohly, S. McLaughlin, P. McDaniel, and K. Butler, “Hi-
Fi: Collecting High-fidelity Whole-system Provenance,” in
Proceedings of the 28th Annual Computer Security Applications
Conference, ser. ACSAC ’12. New York, NY, USA: ACM, 2012,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 414


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Randomized Dot Pattern Character Encoding


Scheme (R-DPCES) for Steganography
Susmita Mahato
School of Computer Science and Engineering
NIST Institute of Science and Technology (Autonomous)
Brahmapur, Odisha, India, 761008

Email: sus_ps@rediffmail.com

Abstract— Randomization is popularly used in encryption


techniques to improve cryptographic security compared to II. PROPOSED TECHNIQUE
their deterministic counterparts. A cipher text is chosen The aim to randomize the dot pattern character encoding
randomly from a set of cipher texts matching the message to scheme (DPCES) is to increase security which can be
encipher a message. This paper proposes randomizing the achieved in the following ways:
existing DPCES to secure information transmission in a
steganography system. The randomization concept is applied
i) Smooth out the a priori probabilities statistics [5] for the
to a flexible DPCES, a Character Binary encoding scheme used
in steganography. This would significantly improve the distribution of inputs to the encoding method reduces the
effectiveness of defense against statistical analysis aimed at efficiency of statistical attacks.
revealing the message of suspecting the steganography method
is under attack. Knowledge of the exact mapping dot pattern ii) By removing the chances of the revelation of the chosen
applied to encode the message is required to extract the dot pattern scheme by an attacker. If the encoding function
message. An attacker's probability of knowing the encoding encodes the message by randomly generated bit sequences,
scheme would be very low, if not zero. Thus, the the revelation of the message from the bit sequences is
Steganography system becomes highly secured with a almost impossible.
randomized encoding scheme. The binary data is computed
using R-DPCES and inserted into the cover. The stego-cover is
transmitted to the intended recipient through the public iii) Increases the size of the message space to the attackers.
channel. If the message space is small, the non-randomized scheme
risks being defeated by simple statistical or forward search
Keywords— Character to binary encoding, Dot Pattern attacks [6].
Character Encoding Scheme, Randomized Dot Pattern Character
Encoding Scheme, Randomization, Steganography iv)The entropy of the plaintext is increased by adding
random bits [7] [8].
I. INTRODUCTION

In a steganography scheme, a message in bit form [1] [2] A. Mapping using R-DPCES
is embedded in the cover file. The stego cover is transmitted
to the receiver. In DPCES, a secret message is transformed
The proposed algorithm consists of two parts, i.e., the
into a binary string by a flexible case-specific dot-pattern
hiding process and extracting process.
mapping technique. The binary code is embedded in a
steganography system to improve its security [3]. A Algorithm for converting the message into a binary
randomized encryption scheme encodes a message by string: -
selecting a cipher text from a sheet of cipher texts randomly
corresponding to the message under the current encryption Step 1: Take a message M.
key [2]. Goyal et al. first defined and constructed functional Step2: Transform the alphabet in a dotted form using
encryption using randomized functionalities [4]. randomly selected dotted character pattern set Cs (following
Randomizing an encoding scheme makes the system more the steps given in [9]).
secure and robust to attacks. The present work discusses the
benefits of the randomization of the dot pattern character Step 3: Represent M for Cs, Merge dotted pattern of Cs
encoding scheme. and M.

This paper proposes to randomize the dot pattern Step 4: The row set is created by checking the connection
character encoding scheme to achieve better security in a between dots (following the steps given in [9]).
steganography system. In randomized encoding, the system Step 5: Merge the Bit strings received from Step 5.
randomly selects an encoding pattern from a set of dot
pattern character sets. Step 6: Embed this bit string in a cover using any image
steganography method.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 415


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Step 7: transmit the image file to the receiver.


Algorithm for reverting back the message from the
binary string: -
Step 1: Collect the binary data using the mining
algorithm on the received image file.
Step 2: Plot the matrix with dots.
Step 3: Separate the row and column-wise dots.
Step 4: Extract the bit string by checking the row and
column-wise dot connection.
Step 5: Separate the pattern and message from the dot
matrix data.
Step 6: Match the data part’s character pattern with the
template’s dot pattern to identify each pattern in the data part
and decode the complete message. (b)

III. R-DPCES IMPLEMENTATION


The proposed technique application in image steganography
can be accomplished in two ways. The whole process of
sending and receiving of the message comprises of two
phases.
A. First way
We encode the secret message using a random pattern and
embed the encoded message in a cover. Then, finally, send
the key comprising the pattern details through a secure
channel.

1) First phase

The message is transformed into bit string using R-


DPCES.
(c)
Fig. 1 (a) – (c) Encoding window for R-DPCES with randomly generated

template using 6 dots

(a)

Fig. 2 Encoding window for R-DPCES with randomly generated template


using 9 dots

2) Second phase
In this phase image steganography [10] is performed. the bit
string is implanted in a cover image. Here, MATLAB code

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 416


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

is used for message embedding using Least Significant Bit


steganography. Different test images are tested to hide the
secret bit strings. Then, the resultant image is sent to the
recipient. The recipient fetches the binary data using the
message extraction method. Finally, the bit string is
transformed into the message using the same mapping rules
used during embedding.

3) Third phase
It is the third and last phase. Finally, the message is
converted from the binary string using RDPCES.

(a)

Fig. 3 R-DPCES with randomly generated template using 6 dots

(b)

Figure 5 (a-b) Encoding window for R-DPCES with the randomly


generated template using 6 dots and 9 dots respectively

2) Second phase

The second phase would be similar to given in


Section III.A.2.
Fig. 4 R-DPCES with randomly generated template using 9 dots

3) Third phase
Thus, randomizing the dot pattern character encoding
scheme using nine dots also gives a very large number of
character sets combinations to choose from which would
defeat the risk of revealing the secret message by simple
statistical or forward search attacks.

B. Second way
The dot patterns can be merged with the secret message and
embedded in a cover. An image cover consists of a lot of
scopes to embed a lengthy bit string without raising much
noise. In addition, there will not be any need to share the
key, which would make the system more secure.

1) First phase
(a)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 417


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

B. Considering nine dots for each character


Number of dots to represent each character = 9

Number of edges row wise = 6

Number of edges column wise = 6

Total number of edges = 12

Total number of bits = 12

Maximum unique combination of bits can be made = 212

= 4096
(b)
Figure 6(a-b) Decoding window for R-DPCES with randomly generated
template using 6 dots and 9 dots respectively Total number of alphabets in English script = 52 (26 capital
letters + 26 small letters)

IV. BENEFITS OF RANDOMIZATION CONCERNING Considering some special symbols = 3


SECURITY
Total characters considered for our experiment = 55
This section discusses the benefits of RDPCES w. r. t
security evaluation.
A total 55 characters can be represented using 4096 dotted-
patterns in
A. Considering six dots for each character
Number of dots to represent each character = 6

Number of edges row wise = 3 = = = 3.323848*10138

Number of edges column wise = 4 number of various dotted pattern representation character set
combinations. The benefit is analyzed in two parts: -
Total number of edges = 7 1) Security is improved: -

Total number of bits = 7 o It reduces the effectiveness of statistical attacks.

Maximum unique combination of bits can be made = 27 = o An increase in the number of dot pattern character
128 sets combinations defeats the risk of failure by
statistical or forward search attacks [6].
Total number of alphabets in English script = 52 (26 capital
letters + 26 small letters) o Adding random bits in RDPCES increases entropy.

Considering some special symbols = 3 2) Revealing of Secret message becomes challenging for
the attacker: -
Total characters considered for our experiment = 55 o The randomized encoding scheme selects encoding
pattern randomly, not limiting to any fixed standard
Total 55 characters can be represented using 128 dotted code for representing any script.
patterns in
o Accurate fetching of the typescript and
combinations of typescript would be nearly
= = = 8.626634*10109 impossible task without knowing the dotted
pattern, so the revealing of the secret message.

number of various dotted pattern representation character set


combinations. Thus, randomizing the dot pattern character V. CONCLUSION
encoding scheme using six dots gives a vast number of In this paper, a randomized DPCES is presented to increase
character set combinations to choose from, defeating the the security of the steganography system. The dotted
risk of revealing the secret message by simple statistical or patterns are generated randomly, making the encoding a
forward search attacks.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 418


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

priori statistical attack proof. The proposed scheme


improves the reliability and security of secret messages
transmitted through a public channel. Further enhancement
can be done through an automated random dot pattern
generation system for character encoding and randomized
choice of specific patterns for different scripting languages
to transmit and communicate to the receiver using a
steganography system.

ACKNOWLEDGMENT
The author would like to thank the anonymous reviewers
for the valuable comments and Dr. Biplab K. Dutta, Ph.D.
(Pittsburgh), IIMC and IIT alumnus, for his continuous
guidance from constructing the first draft to the publication
of this article.

REFERENCES
[1] Desoky, A., Younis, M, Chestega: chess steganography methodology,
SecurCommun Netw, 2(6):555–66 (2009)
[2] Rivest, R.L., Sherman, A.T. (1983). Randomized Encryption
Techniques. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds)
Advances in Cryptology. Springer, Boston, MA.
https://doi.org/10.1007/978-1-4757-0602-4_14
[3] Mahato, S., Yadav, D. K., and Khan, D. A.,. A novel approach to text
steganography using font size of invisible space characters in
Microsoft word document, Intelligent Computing, Networking, and
Informatics, Springer India, pp. 1047-1054 (2014)
[4] Goyal, V., Jain, A., Koppula, V., Sahai, A., Functional encryption for
randomized functionalities, Cryptology ePrint Archive, Report
2013/729 (2013)
[5] Taylor, I. The Applications of Probability to Cryptography, Alan M.
Turing, Available from: arXiv:1505.04714v2 [math.HO] ) (accessed
on 14/10/2017 2015)
[6] Simmons, Gustavus J., and Holdridge, D. Forward search as a
cryptanalysitic tool against a public key privacy channel. Presented at
the Symposium on Computer Security and Privacy (1982)
[7] Shannon, Claude E. Communication theory of secrecy systems, Bell
System Technical Journal, 28, 659-715 (1949)
[8] A. Wyner, "Review of 'Information Theory and Reliable
Communication' (Gallager, R. G.; 1968)," in IEEE Transactions on
Information Theory, vol. 16, no. 1, pp. 103-104, January 1970, doi:
10.1109/TIT.1970.1054414.
[9] Mahato, S., Yadav, D. K., Khan, D. A., Personal characters to bits
mapping using Dot Pattern Character Encoding Scheme (DPCES),
Journal of King Saud University – Computer and Information
Sciences (2017)
[10] Vinothkanna, Mr R. "A secure steganography creation algorithm for
multiple file formats." Journal of Innovative Image Processing (JIIP)
1, no. 01 (2019): 20-30

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 419


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Usage of Classifier Ensemble for Security


Enrichment in IDS
1
Ch. Phaneendra Varma
Dept. of CSE, Shri Vishnu Engineering College for Women(A), Bhimavaram, India
chpvarmacse@svecw.edu.in
2
G. Ramesh Babu
Dept. of CSE, Shri Vishnu Engineering College for Women(A), Bhimavaram, India
grameshcse@svecw.edu.in
3
Pokkuluri Kiran Sree,
Department of CSE Shri Vishnu Engineering College for Women(A), Bhimavaram, India
drkiransree@gmail.com
4
N.Raghavendra Sai
Assoc.Professor Department of Computer Science and Engineering, Koneru Lakshmaiah EducationFoundation,Vaddeswaram,
AP, India
nallagatlaraghavendra@gmail.com

Abstract: The success of the web and the consequent rise in data sharing have made network security a challenge. Attackers
from all around the world target PC installations. When an attack is successful, an electronic device's security is jeopardised. The
intrusion implicitly includes any sort of behaviours that purport to think twice about the respectability, secrecy, or accessibility of
an asset. Information is shielded from unauthorised clients' scrutiny by the integrity of a certain foundation. Accessibility refers to
the framework that gives users of the framework true access to information. The word "classification" implies that data within a
given frame is shielded from unauthorised access and public display. Consequently, a PC network is considered to be fully
completed if the primary objectives of these three standards have been satisfactorily met. To assist in achieving these objectives,
Intrusion Detection Systems have been developed with the fundamental purpose of scanning incoming traffic on computer networks
for malicious intrusions.

Keywords: Intrusion, Classification, Threat.

I. INTRODUCTION A lot of attention is paid to data security because of


how frequently individuals use the Web. IDS is designed to
An Intrusion Detection System (IDS) looks through the monitor network traffic and spot any unusual patterns that
data frame's assets, and alerts the frame leader to any could signal a network intrusion and jeopardise the framework.
potentially dangerous movement. IDSs with more To put it another way, it continuously scans network traffic for
sophisticated innovation can fend against attacks. This potential security gaps [1]. If an IDS detects a security
sophisticated IDS moves to block access to the PC's resources weakness or another, the framework separates the two, and a
by bad individuals or organisations. The two main categories notification will be sent to customers informing them of the
are abuse and irregularity-based IDS. Abuse-based IDSs are intrusion. IDS is essential for enhancing the environment's
created to display known risks by using instances of known security for systems management. Depending on the
assaults [2]. By contrasting instances of major attacks or techniques used to detect attacks, there are various types of IDS
inadequacies of the facility, facilities can discern abuses and [2].
identify intrusions. The benefit of IDS abuse is the ability to
identify known attacks with high precision. This form of IDS's (1) The IDS analyses the organisation and combats observed
inability to recognise novel tackle types is a significant issue behaviour and regards doubtful examples that are fixed to an
[3]. The characteristic feature of structures that distinguish aggression signature data collection. It is based on scoring.
abuse intrusions is their ability to recognise the majority, if not Alarm is sounded, and the attack is manifested by the
all, of the reported patterns of aggression. Their main worry is appropriate actions. The data collection excludes newly
the issue of abuse-based responses to identify fresh assaults or detected or undetected risks without a label. If an unknown
zero-day vulnerabilities. assault occurs, IDS won't have a chance to notice it because its
mark doesn’t match the one in the dataset. This illustrates that

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 420


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the information base’s capacity to remember indicators of an processes, and factual methodologies were all defined by
assault in progress, limits the viability of intrusion detection. Mishra and Yadav [8] as complementing strategies. Others
These frameworks have successfully defended against have combined the computations to expand the capabilities of
recognised attackers. the IDS, although some scholars have only used one
calculation in these tactics [8].
(2) IDS in the Light of Particulars: IDSs with signature-based
detection are beneficial for differentiating between known but In order to find rarities in view of profile markers,
ineffective traces and unexplained ones. To get beyond this Atefi et al., [9] developed a framework by combining Genetic
restriction, peculiarity-based IDS investigations act Algorithms (GA) and Support Vector Machine (SVM)
realistically when measured against the benchmark that algorithms. SVM had higher accuracy than GA. The two
represents the typical condition of the architecture, which approaches were merged by specialists to produce a purebred
includes elements like conventions, traffic volume, and IDS. Half of the IDSs failed to consider individual execution
standard packet size. tactics when performing the evaluation.

A departure from the expected example signals odd The fluid ranking method for IDS that Khor et al. [5]
behaviour and issues a warning. Occasionally, thorough implemented, supports identification rates for assaults that fall
explanations of acceptable behaviour can cause acceptable into the odd ranking. The tactic lessens the unfavourable
behaviour to be mistaken for aggressive [3]. The IDS crossover effects of widespread intrusion classification, which has shown
consolidates the usage of strangeness-based and signature- higher rates of single intrusion detection. The suggested
based ones in order to benefit from both [4]. This is hoped to technique first separates exceptional attacks from the rare
be done by raising detection rates for ongoing assaults while intrusion categorization, allowing each teacher to concentrate
lowering the likelihood that fresh plastic attacks may benefit on fewer courses. The technique's processing cost is further
from misleading advantages. decreased and identification rates are raised by the double
separation of network traffic.
II. RELATED WORKS
An intrusion detection model was suggested by [11]
Researchers have been working to encourage programming in light of SVM and Random Forest tactics. The pooling was
that can inherently recognise intrusions in network frames ever carried out using two approaches. NSL-KDD was used to
since Denning originally suggested to distinguish the intrusion evaluate the models. A recognition accuracy of more than 95%
[6]. IDS are defined as frameworks that make use of AI, was attained using the models. SVM was not used in the
machine consciousness, and dataset frameworks to identify irregular timbers procedure's traffic management of the two
potentially harmful tendencies in huge datasets [2]. IDS in the models' exhibitions.
context of peculiarities and IDS in the context of misuse can
be roughly divided into two kinds. Recent convergences of Using Naive Bayes, ID3, MLP, and group learning
abnormality and IDS abuse have given rise to a number of new approaches, [12] advocated a unique intrusion detection
delivery methods for new courses. methodology. Using the CICIDS2017 dataset, the models were
assessed. The NB, ID3, and MLP were combined to produce
Framework that can spot intrusions in the light of the crew model. The F1 score, accuracy, revision, and
anomalies is reviewed. The identification of inconsistency precision were utilised as metrics to assess the models. In
attacks, outlines the typical behaviour of a framework, which comparison to other models, the ID3 decision tree model
makes fun of the framework's routine duties, and whenever performed better.
anything unexpected is detected, a banner is raised. Quirk-
aware frameworks define the "ordinary" actions of a Buczak and Guven [4] assessed AI calculations for
framework and clients prepared for anything that deviates from intrusion detection while taking into account a variety of
the design [2], as opposed to containing all the examples of the elements, such as the calculations' complexity, the problem
extraordinary and dreadful data collection and updating them with security designs, and others. The authors suggested a
as new examples appear. number of characteristics, such as accuracy, computational
complexity, and humdrum complexity, to determine the most
According to [7], an IDS feature has three stages: effective technique for finding the intrusion.
definition, preparation, and recognition. The data is prepared
to record the device's typical behaviour during the define In order to increase accuracy, Aburomman and Ibne
phase. Following definition, the model is ready to adjust to Reaz [6] proposed a creative method of giving the classifier
customary behaviour. In light of the specified information, the access to intrusion detection frameworks. When building the
model detects and accounts for any deviation from expected builder kit according to the recommended PSO delivered load
behaviour during the identification phase [7]. The Irregularity table, the results were different from those attained by using
IDS was developed using a variety of intrusion detection the Weighted Moving Average (WMA) method. The load
techniques. Information extraction techniques, AI-based

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 421


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

arrangement developed in LUS with rationalisation has III. PROPOSED FRAMEWORK


allowed for an expanded presentation of IDS.
IDS examines the gathered network data and compares it to a
The availability of attributes that are most appropriate standard that has been established for the framework and
for identifying various anomalies in network traffic was addresses its typical form of behaviour. Befuddle advises
explored by Qassim et al. [7]. A-IDS was developed as a shatter the frame just in case it is detected. The following are
cautious classifier that can automatically evaluate and the components of a cut ID image.
categorise anomalies picked up by a system for packet header-
based inconsistency identification. The suggested method To gather information about network traffic, this calls for
analyses network traffic, selects the best examples, and blocks attention to client and framework operations.
traffic patterns that represent previously available data and (1) Tracking the movement of the company.
assaults. (2) Examine and identify first.
Govindarajan [8] developed another mid-run intrusion
detection framework using an auxiliary vector machine with a
spiral premise capacity. According to tests using several slice
identification information indexes, heterogeneous models
outperform homogeneous models in terms of fitness.
Resampling is employed to increase the number of streams in
the minority class, and a modified collecting approach is
subsequently used to work on classifier speculation, according
to the cross technique known as SmootheAdaNL by Liu et al.
[9]. Order execution operates by loading improperly described
flows.

A Distributed Denial of Service (DDoS) assault is an


attempt to flood a network or service with internet data in order
to disrupt regular traffic. DDoS attacks leverage multiple
compromised internet-connected computers and other devices
as the source of attack traffic, making them more effective. Fig. 1: Proposed Architecture
Computers and other related resources, such as IoT devices,
are instances of exploited machinery. In the event of a DDoS Figure 1 illustrates the process for analysis and detection of
attack, the server's bandwidth and connectivity are seriously attacks in the suggested framework. This section includes the
affected, causing major intrusions in all network services. The training of an intrusion expectation model that can detect the
primary objective of DDoS attacks is to damage the network
intrusion with accuracy.
and resource availability for authentic users. The network is
overloaded beyond its bandwidth capabilities in a malicious This review suggests a characterization-based
flood attack resulting in downtime and the intrusion of worldview for intrusion analysis and detection. The main goal
services. Targets range from banks and healthcare providers to of this work is to concentrate on the infrequent class invasions.
low-profile public networks. The recognition patterns generated with this data may not be
persuasive in that class, because of the low number of agent
The security of IDS has been aided by artificial occurrences in the class. To prevent this, the minority class is
intelligence techniques that permanently differentiate originally resampled. Engineering knowledge is currently used
intrusions. Despite the considerable work put into these
in this kind of attack. For classes with many cases, more
sections, IDS dataset preparation bias is such a fundamental modest examples are also utilized. This pre-managed data
issue that it could significantly reduce the usefulness of IDS. serves as a training set for detection model learning. Another
The number of patterns in the positive class is less than the component of pre-treatment is clear proof of sensational
number of occurrences in the negative class. When making information or material lacking certain attributes.
decisions, a classifier that has been trained using biased data
may be predisposed to the undesirable classes. To prevent this When the classifier group strategy is applied,
problem, the class size bug must be fixed. By resampling the concentrations on the currently targeted have displayed
dataset and utilising the cluster classification approach, the increased detection rates. Therefore, the suggested method
framework aimed to reduce class irregularity and advance favors a unique categorization kit by combining the bits of
order execution. information from many knowledgeable authorities. The
company is built using two optional strategies in order to
establish two-tier meetings. Utilizing the information layer and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 422


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

element layer techniques, a total of two detection models are


produced. By trial and error, the KDDCup'99 dataset was selected from the
UCI library [12]. As a kind of prospective dataset, the
Model 1 for detection: The information subsets D1 D2,... D[n] information from KDDCup'99 was used to assess a number of
that have been created by taking out a portion of the data from proactive activities that have been carried out in the IDS sector.
the initial preparation are obtained by the singular basis In a tactical organizational environment, the dataset comprises
classifier. These classifiers' outputs combine to produce Model of a number of attacks that have been imitated repeatedly. The
1 for detection, which is the group's expected outcome. dataset is represented by 41 characteristics and contains a
Model 2 for detection: The highlighted subsets S1, S2,…,S[n] training dataset with 494 021 records and a test dataset with 311
from the first training dataset were processed by eliminating 029 records.
segments. These subsets were then used to train individual The KDDCup'99 dataset [4] identifies four crucial
classifiers. The findings are synthesized to produce Model 2 attack types: Remote-to-Local (R2L), User-to-Root (U2R),
for detection. management test, and Denial of Service (DOS). R2L attacks
involve an assailant attempting to break into a building or
The combined secondary effects of identifying patterns 1 and company [6]. A U2R assault entails the attacker being granted
2 are used to determine whether an attack has taken place. access to the victim's PC while he or she is competing for
superset honours. Filtering is used by the attacker in an
(3) Development of safety measures.
investigative attack to look for any security gaps in the victim's
Any risky activity that has been observed will be reported via image. A structure's weaknesses could be taken advantage of by
an alert to the head. its flaws. A DOS attack aims to deny access to resources to
authorised clients. This is frequently accomplished by
IV. ALGORITHM overburdening structures or organisations with knowledge,
which divides the association or administrations. The
administrations will channel themselves toward it gradually or
ineffectively. A subset of attacks from the KDDCup'99 dataset
is chosen for this review, including any concomitant attacks.

Table 1: Datasets used in the experiment

(a) Teardrop. It entails sending cross-received split IP packets


from the target machine. After receiving them, the target
machine tries to put them back together, but it is unsuccessful.
The framework is unable to handle it due to a coverage issue in
Windows 95 and Windows NT, effectively covering the
packages. The framework can crash or restart as a result.
(b) Smurf. In this particular sort of attack, the attacker spoofs the
target framework and transmits Internet Control Message
Protocol (ICMP) packets using the IP address of the target
framework to avoid management. The majority of orchestrated
devices react to the source IP, which results in a flood of traffic
that exceeds the target frame. Therefore, recently accepted
clients will approach the services.
Fig. 2(a)(b): Algorithm of the proposed classifier For the trial and error, a portion of the KDDCup'99
dataset was used. The specifics of the dataset considered in this
V. EXPERIMENTAL RESEARCH review are displayed in Table 1. The effectiveness of the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 423


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

framework is measured using the detection rate as the


assessment metric. The degree of incursions that are accurately
highlighted makes up a portion of the accuracy.

VI. DETECTIONS AND RESULTS

The suggested framework's implementation conflicts


with the multiclass classifier group that is currently in use.
Trial and error are fully disclosed for the distinct Logistic
Regression, J48, and Naive Bayes classifiers. Table 2 lists the
detection rates for the suggested and supplementary reference
methodologies. Figure 3 depicts the assessment of the
recommended strategy's implementation in relation to the
detection rate. Even though the presentation increase seems to Fig. 3: Logistic Regression
be less important, the precise intrusion that separates the
evidence is important and encouraging. The extended accuracy
of intrusion finding when utilising the suggested technique is
evident from a close inspection of the diagram in Figure 3.

The analysis's main objective was to determine the


impact on suggested IDS detection rates of selecting particular
individual classifiers as team critical classifiers. Some
inferences about the best classifiers for IDS have been drawn
from this. The best base classifier can be selected for a team
built for an IDS using the results of the data analysis. Three
classifiers were put to the test as part of the suggested strategy:
J48, Logistic Regression, and Naive Bayes. The use of
strategic consequences as a fundamental classifier for
identifying intrusions has been very successful. Pre-processing
helps the classifier operate more accurately and makes it easier Fig. 4: J48 method
to detect attacks from staggered classification. In any case, it is
a cost because the model's learning phase requires more time.
In general, the suggested technique enhances IDS deployment
by using a more transparent plan and system.

Table 2: Detection Rates

Fig. 5: Naïve Bayes Method

VII. CONCLUSION

This paper has introduced a new intrusion detection


classifier group system that is expanded by utilising two
distinct methods. Various skills are used to have the sets ready
at the end of the day. In addition, a resampling technique that
concentrates on the deluge of unexpected ratings is deployed
simultaneously. The suggested methodology enhances existing

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 424


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

general reference techniques to correctly identify intrusions


based on revision. Based on the size of the dataset, the cycle
can develop gradually to adjust the staff size. This means that
the number of base classifiers to be used to put the meeting
together must be decided quickly. If the dimension is solved
deductively, it could not be beneficial for datasets of varied
sizes and embarrassment indices. Consequently, you can
enhance efficiency while creating a minimal amount of
overhead by analyzing these attributes and adaptively scaling.
The method's viability can also be assessed for various forms
of attacks.

REFERENCES
[1] O. Y. Al-Jarrah, O. Alhussein, P. D. Yoo, S. Muhaidat, K. Taha, and K.
Kim, “Data randomization and cluster-based partitioning for botnet intrusion
detection,” IEEE Transactions on Cybernetics, vol. 46, no. 8, pp. 1796–1806,
2016.
[2] K. Kumar and S. Singh, “Intrusion Detection Using Soft Computing
Techniques,” 2016.
[3] S. Rajasegarar, C. Leckie, J. C. Bezdek, and M. Palaniswami,“Centered
hyperspherical and hyperellipsoidal one-class support vector machines for
anomaly detection in sensor networks,” IEEE Transactions on Information
Forensics and Security, vol. 5, no. 3, pp. 518–533, 2010.
[4] A. L. Buczak and E. Guven, “A survey of data mining and machine learning
methods for cyber security intrusion detection,” IEEE Communications
Surveys and Tutorials, vol. 18, no.2, pp. 1153–1176, 2016.
[5] K.-C. Khor, C.-Y. Ting, and S. Phon-Amnuaisuk, “A cascaded classifier
approach for improving detection rates on rare attack categories in network
intrusion detection,” Applied Intelligence,vol. 36, no. 2, pp. 320–329, 2012.
[6] A. A. Aburomman and M. B. Ibne Reaz, “A novel SVM-kNNPSO
ensemble method for intrusion detection system,” Applied Soft Computing
Journal, vol. 38, pp. 360–372, 2016.
[7] Q. S. Qassim, A. M. Zin, and M. J. Ab Aziz, “Anomalies classification
approach for network—based intrusion detection system,” International
Journal of Network Security, pp. 1159–1171, 2016.
[8] M. Govindarajan, “Evaluation of ensemble classifiers for intrusion
detection,” World Academy of Science, Engineering and Technology,
International Journal of Computer, Electrical, Automation, Control and
Information Engineering, vol. 10, no.6, pp. 876–884, 2016.
[9] Z. Liu, R. Wang, and M. Tao, “SmoteAdaNL: a learning method for
network traffic classification,” Journal of Ambient Intelligence and
Humanized Computing, vol. 7, no. 1, pp. 121–130, 2016.
[10] W. Hu, J. Gao, Y. Wang, O. Wu, and S. Maybank, “Online AdaBoost-
based parameterized methods for dynamic distributed network intrusion
detection,” IEEE Transactions on Cybernetics, vol. 44, no. 1, pp. 66–82, 2014.
[11] Shakya, Subarna. "Modified Gray Wolf Feature Selection and Machine
Learning Classification for Wireless Sensor Network Intrusion Detection."
IRO Journal on Sustainable Wireless Systems 3, no. 2 (2021): 118-127.
[12] Amrish, R., K. Bavapriyan, V. Gopinaath, A. Jawahar, and C. Vinoth
Kumar."DDoS Detection using Machine Learning Techniques." Journal of IoT
in Social,Mobile, Analytics, and Cloud 4, no. 1 (2022): 24-32.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 425


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Optimal Installation for Enhancing Power System


Security using Integrated BBO-PSO Techniques
K. Kavitha
Dept. of Electrical & Electronics Engineering, Annamalai University, Chidambaram, Tamil Nadu, India
kavitha_au04@yahoo.com

Abstract FACTS devices are categorized into three types relies


upon the types of connections; the initial category embrace
Currently the power system is revolving out to be
devices like thyristor-controlled series capacitors (TCSC)
extensive and multifaceted. An indispensable variable in the
which can be linked in sequences with branches. The second
function of a power system is the hankering to preserve
category embrace gadgets like static VAR compensator
system security. The power system security valuation
(SVC) and static synchronous compensator (STATCOM)
determines the safe and the erratic working states, even if the
they can be linked in shunt with the buses and their vital
security promote administer the fundamental control action
operation is voltage control. Sooner or later, the third one
alongside over-burdens under emergency state of affairs.
encompasses devices like unified power flow controller
Contingency Analysis (CA) is essential in power system
(UPFC), includes series-connected along with the shunt-
assessment. In the dissertation, a resourceful method is
connected elements and are termed as combined series-shunt
projected for contingency analysis depends on line flow. A
gadgets [11]. UPFC becomes one FACTS tool that could
proposed method is the amalgamation of Biogeography
administer the power flow in transmission line by interleave
depend optimization (BBO) and Particle swarm optimization
active and reactive voltage constituent in series have the
(PSO) algorithm. Here, SVC, TCSC and UPFC devices are
broadcasting line [12-14]. Therefore, the issue that should be
exploiting for scrutinize the line contingency and preserve the
solved in a reactive power optimization issue was to find out
system security. The proposed method is employed for make
the reactive power production by the all sources, thereby
out the optimal spot and sizing of FACTS devices were
optimized a convinced optimization issue [15-20].
resolute. To recognize the optimal place of FACTS devices,
the utmost API bus is acknowledged. Subsequently, the line This paper described about the BBO algorithm and
contingency is investigated and weigh up the analogous PSO algorithm for improvising the security of power
competence of FACTS devices. It aids to kick off compulsory mechanism based on the FACTS devices. Here, the BBO
control proceedings to sustain power system security, algorithm is utilized for identifying the optimal location of
reliability and stability. The anticipated method put into FACTS gadgets. Then the PSO method can be employed for
practice in Matlab/Simulink platform. evaluating the capacity of FACTS devices.
Keywords: Flexible AC transmission system, unified power 2.Recent research works: A brief overview
flow controller, Biogeography based optimization, Particle
S.Sreejithet al.[21] have listening carefully on solving
swarm optimization
Security Constrained Unit Commitment (SCUC) problem by
1. Introduction employing ABC method integrating FACTS gadgets. The
purpose of the SCUC issue was to achieve least operating
Since the contemporary electric power system can be
cost concurrently preserving the system security. The
heterogeneous, globally interrelated, and a broadly isolated
representation of the FACTS gadgets in a power system and
network, controlling to a great extent multifaceted system
determining an appropriate location were converse.
becomes a severe scientific challenge. Due to the complexity
S.Ravindraet al.[22] have anticipated a severity function
such as variation in structure, rapid development, and
was devised by employing transmission line loadings and bus
functioning techniques which leave the power system
voltage magnitude divergence. MajidMoazzamiet al.[23]
exposed to uncertainties the modern power systems were
have discussed an most favorable UPFC placement and load
susceptible to extensive failures Due [1, 2]. This situation
shedding coordination scheme for voltage crumple avoidance
makes the power systems susceptible to stability and refuge
in unforeseen event condition employing Hybrid Imperialist
complexities [3]. Flexible AC transmission system (FACTS)
Competitive Algorithm-Pattern Search (HICA-PS). The main
gadgets are ordinary method to face such consequences, using
optimizer of the algorithm is ICA, at the same time as pattern
[4]. Consequently, employing FACTS gadgets could be an
search was employed to fine tune the ICA results.
appropriate solution for escalating transmission system
capability having power flow controls [5, 6]. Moreover, M.VenkateswaraRaoet al.[24] have anticipated the
owing to the development of power system, network security SSSC, STACOM and UPFC were painstaking to consequence
was extra significant and it becomes essential to pay lot of of such controllers in attractive mechanism ATC. Additional,
attentions over application of FACTS gadgets for network building transmission lines, substations are incredibly
security indices [7]. A FACTS device controls the power flow economical to face the growing load and to amplify the
in the network, and minimizes superfluous loop flows in the transfer capabilities. Consequently, use of FACTS controllers
profoundly loaded lines there by resulting in augment is the alternative method to increase the transfer capacity.
loadability, better security and firmness of the network [8- RabiahBadaret al.[25] have projected Voltage Source
10]. Converter (VSC) based FACTS have a notorious capability
for hasty regulation of various network quantities and battle

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 426


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Low Frequency Oscillations (LFOs) when prepared with


competent accompanying damping control. To sustain the
voltage constancy of the transmission line is extremely Start
significant accountability of designing the power flow
controller. If the transmission lines activate their constraints
like voltage profile, voltage angle, real and reactive power Read the bus data & line
generation then the mechanism will be unsteadiness and
data
enlarge the whole power losses. To develop the system
security, in transmission lines or generators emergency Select the maximum API
conditions, voltage source-based power injection replica is
necessary to advance the system security. The objective of the bus –line outage performed
FACTS gadgets was to give the necessary reactive power to
congregate voltage constancy and allotment of real power
Stage1: BBO algorithm
flow via every transmission line lacking distressing its Place FACTS devices
restraints. There are only some methods proposed to resolve
these security troubles in literature but they all are fruitless. Stage2: PSO algorithm
The above-mentioned limitations have aggravated to do this Analyzing capacity, cost of
research exertion.
facts device
3. The Proposed Model
In the manuscript, BBO and PSO algorithm for
improvising the security of the power system depends on the No
FACTS devices. The overall flow diagram is given in figure
Max iter
1. At this point, the SVC and TCSCare painstaking. The
anticipated BBO algorithm is leveraged for discover the
Yes
optimal location of FACTS gadgets. Then the PSO algorithm Save the optimal results
is employed for appraise the competence of FACTS gadgets.
Primarily, the normal power flow was scrutinized through the
Newton-Raphson scheme. Afterward the line contingency is
employed in the system, which encloses the maximum End
apparent power flow index (API) values. This is Figure 1: Flowchart of overall analysis
acknowledged as the optimal location for putting in place the
FACTS gadgets, which is employed by BBO algorithm. This Stage 1:
is painstaking as the first stage of the anticipated method.
In stage1, the BBO algorithm was engaged for
Then the size of the FACTS gadgets is determined by via
determining the optimum place of the FACTS gadgets. At
PSO algorithm, which is well thought-out as the second stage.
this point, the power flow terms like the voltage, real and
The exhaustive rationalization of the anticipated BBO and reactive power flows had previously resolute by means of the
PSO algorithm is expressed as lower. Newton–Raphson (N–R) method. Followed by the line
contingency is carried out at the lines results in instability at
the mechanism. Thus, the maximal API bus and the
equivalent disturbing features were obtained by means of the
BBO method. The algorithmic ladder to maximize the
location is specified in the subsequent section.
BBO algorithm
BBO is a population depend, stochastic optimization
method, which is depend on the perception of biogeography
that agreement with nature’s way of distribution of species.
Areas, where these aspects are exceedingly constructive be
liable to have a larger number of species, measure up to with
a less favorable area. Movement of species from one area to
another area smooths the progress of sharing of their
characteristics with each other [30]. In consequence of this
movement, the quality of some species may enhance due to
barter of good attributes with superior species. Geographical
regions that are highly suitable as residences for biological
species had an elevated habitat appropriateness index (HSI).
The variables that exemplify habitability termed as suitability
index variables (SIVs) [31-33]. At this juncture, the steps to
recognize the optimum location of FACTS devices were
described below.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 427


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Steps to find the optimum location of FACTS devices capability of the FACTS for defend voltage steadiness of the
Step 1: Begin the BBO input variables namely bus date, line transmission system. The variance in the normal voltage ( Vn
data, bus voltage (Vi ) , real and reactive power ) and the fault duration was well estimated. An ample account
of the process of the PSO approach is deliver below and the
( Pi and Qi ) etc. Disperse the habitat modification flowchart is shown in figure 2.
probability like mutation rate (  ) and emigration
rate (  ).
Steps to find the optimum sizing of FACTS devices
1. In PSO method, prepare the velocity and positions vector
Step3: Start SIV, every SIV of a system was initialized of all controlling parameters haphazardly. Here, all
arbitrarily by fulfilling the restraints. Apiece habitat parameters are painstaking as particles, which positions
embody an effective solution to the presented issue. ( )
vector is Pi k = pik1 , pik2 ,.....pink at iteration k, and
Step 4: Prepare the migration procedure and apply mutation velocity vector represents as (
vik = vik1, vik2 ,.....vin
k )
function to all migrated values.
correspondingly.
Step 5: Run the load flow of the system for normal condition.
2. The optimum solution was acquired by ith particle in
Step 6: Find the normal condition API by means of the iteration k can be defined as
equation (1) for all the buses. k = pk
Pbesti ( k k
bset,i1, pbest,i 2 ,..... pbest,in . )
Step 7: Employing the objective function, the BBO make out
the optimum location and of FACTS devices. 3. Assess the fitness function of the particles.
Step 8: By conducting the mutation function the species fitness function = minC F ,Vd  (29)
count probability of every habitat was upgraded via
the novel migration formulae which is expressed At this juncture, the minimum value of cost of FACTS
below, gadgets and voltage deviation was regarded as a fitness
function.
(i ) (t + t ) = Ainj (i ) (t )1 − t ( +  ) − t Ainj ( i −1) i −1 + Ainj (i +1) i +1 
1
Ainj (28)
4. k
Contrast the personal best Pbesti of each particle with its
Step 9: Make sure every constraint with regard to every existing fitness values. If the current fitness value was
migration and emigration rate dissimilarity. The migration k
well again, after allocate the current fitness value to Pbesti
function can be conducted probabilistically. when the
migration function achieves the optimal values then the value coordinates.
was preferred as the optimal value. Depend on the output of 5. Institute the current best fitness value in the complete
BO algorithm, the optimal location is branded for fixing the population and its coordinates.
FACTS gadgets, like SVC, TCSC and UPFC
correspondingly. 6. Modernize velocity and position of the d th dimension of
the ith particle by means of the subsequent equations,
The capacity of FACTS device was computed by employing
the PSO algorithm. The complete working process of PSO Vi (u+1) = w *Vi (u ) + C1 * rand() * (Pbesti − Pi (u ) ) + C2 * rand() * ( gbesti − Pi (u) ) (30)
algorithm was illustrated below.
Pi (u+1) = Pi (u ) + Vi (u+1) ) (31)
Stage 2:
7. Reiterate the process until the annihilation is
In this fragment, the second stage of the anticipated
accomplishing otherwise cease the algorithm.
method is embodying. Now, the prophecy of handpicked
capacity of the FACTS device is taken into account. By
means of the ideal capability of the FACTS device the
dynamic stability of the system is superior.
PSO algorithm
The Particle Swarm Optimization algorithm (PSO) has
developed as a population-depend search algorithm and also
as a replacement solution to the ever-intricate non-linear
optimization problem. It depends primarily on the instinctive
procedure of group communication to deal out personage
knowledge when a group of birds or insects are on the
sentinel for food or drift along in an incisive space, despite
the fact that they are not conscious of the finest position. On
the other hand, from the fashion of the animal social
demeanor, if any member thrives in trace a preferable path,
all the other members’ just follows it without loss of time. In
the case of PSO, every member of population was tenure as
‘particle’ and the population termed as ‘swarm’. At the outset,
a random population can be generated which travelled
intermittently in the chosen directions. In the manuscript, the
PSO method is gracefully employed to stop in mid-sentence
the voltage variance and in this manner augment the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 428


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

standard 30 BSs. The bus data, line data and the limits of
control variables were anticipated from [32, 33]
Initialize the bus data, line correspondingly. The Newton Raphson power flow algorithm
data, and facts device was successfully utilized to compute the power flow solution
parameter earlier than and later than setting FACTS device. In the N-R
method, the voltage, real and reactive powers are found out.
Subsequently, the line contingency is generated and
investigate the system characteristics. It constitutes the
Initialize the particles maximum API value, which is acknowledged as the
randomly with position and preeminent location for fixing the SVC, TCSC and UPFC
velocity correspondingly. The voltages are examined under the normal
and fault condition which is put into a table in table 2.The
IEEE 30 BS is demonstrated in the figure 3.
Evaluate the minimum
fitness function

Evaluate the fitness value

Y
Update gbest If fitness is less than pbest
=fitness N

Y
Update pbest If fitness is less than gbest
=fitness

N
Update the velocity and
position N
Y

If gbest is less than the Figure 3: Structure of IEEE-30 test system [34]
desired goal
Table 1: Implementation parameters
S.No Description Algorithm Values
Terminate 1 Population Size 10
BBO
2 Generation Limit 50
algorithm
3 M.R 0.1
Figure 2: Flowchart of PSO algorithm
4 Population Size 10
4.Results and discussion 5 Generation Limit 50
6 PSO
In the manuscript, a competent method is introduced for C1,C2 1.5
algorithm
improvizing the dynamic security of the system with FACTS 7 wmin 0.4
devices. Currently, the BBO and PSO are engaged to 8 wmax 0.9
establish the optimal location and sizing of SVC, TCSC and Table 2: Voltage analysis in normal and fault time
UPFC gadgets. The ground-breaking algorithm can be
enforced in the MATLAB/Simulink platform and their Voltages during fault time
Bus Normal
Line numbers
performances were appraised. The performance of presented numbers voltage
4 6 12 22 33
technique was review by line contingency problem. For the 1 1.06 1.06 0.989 1.06 1.06 1.06
duration of this condition, the optimal placement of FACTS 2 1.033 1.023 0.995 1.043 1.043 1.043
device is time-honored depend on their utmost API value. 3 1.0228 1.0201 0.98997 1.0386 1.0307 1.0386
The line contingency is abridged after insertion SVC, TCSC 4 1.0136 1.0109 0.99003 1.021 1.0239 1.021
5 1.0044 0.9764 0.98047 1.0091 1.0092 1.0091
and UPFC on the accurate place. The line flow limit was
6 1.01 1.01 1.002 1.01 1.01 1.01
leveraged to substantiate the contravention of line limits after 7 0.99993 0.9879 0.98524 1.0018 1.0018 1.0018
tenacity problem that shows the security limits. Auxiliary, the 8 1.0103 1.0103 1.0021 1.0103 1.0103 1.0103
voltage deviation of the mechanism can be assessed. 9 1.0458 1.0456 1.0272 1.0461 1.0463 1.0461
10 1.0367 1.0362 1.0122 1.037 1.0373 1.037
4.1. Performance analysis 11 1.0771 1.0769 1.059 1.0774 1.0775 1.0774
12 1.0572 1.0567 1.0241 1.0596 1.0604 1.0596
The execution parameters are put into table 1. At this 13 1.071 1.071 1.028 1.071 1.071 1.071
time, the proposed approach is employed to the IEEE 14 1.0414 1.041 1.0094 1.0435 1.0441 1.0435

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 429


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
15 1.0355 1.0349 1.0048 1.0371 1.0377 1.0371
16 1.0411 1.0406 1.0106 1.0426 1.0432 1.0426
17 1.0326 1.0321 1.0062 1.0333 1.0337 1.0333
18 1.0236 1.0231 0.99483 1.0248 1.0253 1.0248
19 1.0198 1.0193 0.99218 1.0207 1.0211 1.0207
20 1.0232 1.0227 0.99636 1.024 1.0244 1.024
21 1.0228 1.0223 0.99655 1.0234 1.0237 1.0234
22 1.03 1.03 1.001 1.03 1.03 1.03
23 1.0229 1.0225 0.99621 1.0235 1.0239 1.0235
24 1.0158 1.0156 0.98948 1.016 1.0161 1.016
25 1.0069 1.0068 0.98684 1.007 1.007 1.007
26 0.98903 0.989 0.96859 0.9891 0.9892 0.9891
27 1.01 1.01 0.994 1.01 1.01 1.01 (b)
28 1.0094 1.0094 1.0004 1.0094 1.0094 1.0094
29 0.98987 0.9899 0.97351 0.9899 0.9899 0.9899
30 1.0014 1.0231 0.9481 1.0241 1.0253 1.0281

Here, the performance investigation of anticipated


method with the FACTS devices is argued in 4 various cases.
Every case can put in plain words briefly.
• Case1: With SVC
• Case2: With TCSC
• Case3: With SVC and TCSC
• Case4: With UPFC (c)

Case 1
The anticipated algorithm was executed on IEEE 30-BS
depicted in Figure 4. The test BS comprises of 1 slack bus, 5
generator buses, 41 lines and 24 load buses. During the
emergency period, the maximum API line is acknowledged.
To settle on the optimal location and size of SVC gadgets in
the network, the anticipated BBO and PSO algorithm has
been executed. Table.3 presents that the SVC placement by
means of the projected method show the way to lower SVC
cost and vaguely less voltage deviation. The calculated value
of voltage deviation was 0.546 and average cost of SVC was (d)
74.53296 $/KVAR at the optimal location 3, 4, 10, 26 and 19.
Moreover, the optimal susceptanceand capacity are analyzed
in the corresponding buses that are0.0084, 0.0095, 0.017,
0.0408 and 0.0428 and 102.7569, 105.587, 102.2995, 89.3582
and 98.8955 respectively. The other optimal locations are
revealed and concerning the SVC. Subsequently, investigate
their power, voltage deviation and cost etc. The voltage
profile scrutiny of projected method depend SVC is
established in the figure 4.

(e)
Figure 4:Analysis of voltage profile using SVC in a line (a)3
(b)4 (c)10 (d) 26 and (e)19
The above depictions shows that the voltage profile
examination of SVC which is associated in the assortment of
buses such as 3, 4, 10, 26 and 19 during the contingency
period. And their equivalent voltages, power and costs are
explore.
(a)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 430


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The capacity and costs of the combined SVC and TCSC are
determined. The average cost of the SVC with TCSC is
Table 3: SVC capacity and cost
64.66196 and 71.91688 $/KVAR respectively. Also analyzed
Optimal Susceptance Capacity Total cost their susceptance and reactance values are analyzed.
Device
location in p.u. (MVAR) ($/KVAR) 5. Conclusion
3 0.0084 77.3839 102.7569
4 0.0095 70.9543 105.587 The presented method has been executed in MATLAB
10 SVC 0.017 69.0306 102.2995 platform. The anticipated method can be employed for
recognizing the optimal place and power rating of the FACTS
26 0.0408 77.6483 89.3582
gadgets depends on the voltage, maximum API and least cost.
19 0.0428 77.6477 98.8955
Here, BBO and PSO method was examined to improvize the
security of power system depend on the voltage. The
Case 2 projected method was experimented with the IEEE 30 bus
benchmark mechanism. When linking SVC, TCSC and UPFC
This section portrays the power flow, optimal location; in the lines, the voltage values were appraised over and above
voltages, competence and cost of the TCSC devices are their competence and cost. As a result, the anticipated method
investigated. The TCSC is associated with the IEEE 30 BS obtains superior results for improving the voltage stability
depend on their circumstances in Table 4. The optimal and minimizing FACTS installation cost. Then the optimal
location of the TCSC in line is achieved by the BBO location of FACTS device and their ratings were examined.
algorithm lines 4, 6, 12, 22 and 33 correspondingly. Also, the
optimal sizing of the TCSC in line can be gained by the PSO References
algorithm. The results of the total produced power and cost [1] Siva Sankar Akumalla, Sujatha Peddakotla and Seetha Rama
are tabularizing in the subsequent tables. Here, the optimal Anjaneyulu Kuppa, "A Modified Cuckoo Search Algorithm for
Improving Voltage Profile and to Diminish Power Losses by Locating
reactances are analyzed that are 0.0379, 0.1763, 0.116, 0.256 Multi-type FACTS Devices", International Journal of Control,
and 0.3292 respectively. From the outcomes, it is clear that Automation and Electrical Systems, Vol.27, No.1, pp.93-104, 2016.
the anticipated method has protected power flow with less [2] Somasundaram Alamelu, S.Baskar, C.K.Babulal and S.Jeyadevi,
API, voltage instability and cost values. At this juncture, the "Optimal siting and sizing of UPFC using evolutionary algorithms",
International Journal of Electrical Power and Energy Systems, Vol.69,
proposed method successfully preserves voltage profile pp.222–231, 2015.
within the revealed limit (1.0–0.98 pu), which is [3] Nagendra Palukuru, Sunita Halder nee Dey, Tanaya Datta and Subrata
demonstrated in the next segment, Paul, "Voltage stability assessment of a power system incorporating
FACTS controllers using unique network equivalent", Ain Shams
Table 4: TCSC capacity and cost Engineering Journal, Vol.5, pp.103–111, 2014.
[4] Kerur, Prakash, and R. L. Chakrasali. "Power Transfer Capability
Optimal From To Optimal Cost Recognition in Deregulated System under Line Outage Condition
Device Capacity Using Power World Simulator." Journal of Electrical Engineering 3,
location bus bus Reactance ($/KVAR)
no. 4 (2021): 277.
4 1 4 0.0379 1.0164 106.6392 [5] Esmaeil Ghahremani and Innocent Kamwa, "Maximizing
6 2 6 0.1763 1.9361 97.2915 Transmission Capacity through a Minimum Set of Distributed Multi-
12 6 10 TCSC 0.116 0.76157 94.9714 Type FACTS", IEEE Power and Energy Society General Meeting,
22 15 18 0.256 1.2129 102.576 pp.1-8, 2012.
33 24 25 0.3292 1.3847 89.5759 [6] Sajad Rahimzadeh and Mohammad Tavakoli Bina, "Looking for
optimal number and placement of FACTS devices to manage the
transmission congestion", International Journal of Energy Conversion
Case 3: and Management, Vol.52, pp.437–446, 2011.
[7] Yang Huaqing and Yang Wenwen, "The Optimization on FACTS
In the sub section, the combined (SVC and Devices for Network Security", Proceedings of the 2nd International
TCSC)devices are linked in the IEEE 30 BS. Here, the Conference on Computer Science and Electronics Engineering, 2013.
optimal voltage and minimum cost is scrutinized. The [8] K.Ravi and M.Rajaram, "Optimal location of FACTS devices using
Improved Particle Swarm Optimization", International Journal of
magnitude of the 30 bus voltages are evaluated and depicted Electrical Power and Energy Systems, Vol.49, pp.333–338, 2013.
in the following figures. During normal and fault period, [9] A.Rezaee Jordehi, "Particle swarm optimisation (PSO) for allocation
voltage of the BS is calculated. When connecting the of FACTS devices in electric transmission systems: A review",
combined devices in the system, the capacity and cost is International Journal of Renewable and Sustainable Energy Reviews,
Vol.52, pp.1260–1267, 2015.
evaluated. [10] Esmaeil Ghahremani and Innocent Kamwa, "Optimal Placement of
Multiple-Type FACTS Devices to Maximize Power System
Table 5: Combined devices (SVC and TCSC) capacity and Loadability Using a Generic Graphical User Interface", IEEE
cost Transactions on Power Systems, Vol.28, No.2, pp.764-778, 2013.
[11] A.Rezaee Jordehi, "Particle swarm optimisation (PSO) for allocation
Optimal
Devices Susceptance Reactance Capacity Total cost of FACTS devices in electric transmission systems: A review",
location
International Journal of Renewable and Sustainable Energy Reviews,
3 SVC 0.0374 -103.1229 77.3839 Vol.52, pp.1260–1267, 2015.
4 TCSC 0.256 1.4211 77.6482 [12] B.Vijay Kumar and N.V.Srikanth, "Optimal location and sizing of
4 SVC 0.0106 -87.5265 54.5605 Unified Power Flow Controller (UPFC) to improve dynamic stability:
6 TCSC 0.1923 0.73967 69.0234 A hybrid technique", International Journal of Electrical Power and
10 SVC 0.0428 -86.9155 54.9334 Energy Systems, Vol.64, pp.429–438, 2015.
12 TCSC 0.396 0.96148 69.0219 [13] B.Venkateswara Rao and G.V.Nagesh Kumar, "Optimal power flow
26 SVC 0.037 -102.6221 66.4079 by BAT search algorithm for generation reallocation with unified
22 TCSC 0.11 -1.1287 71.1676 power flow controller", International Journal of Electrical Power and
19 SVC 0.0085 -137.0403 70.0241 Energy Systems, Vol.68, pp.81–88, 2015.
33 TCSC 1.082 0.65392 72.7233 [14] ThanhLong Duong, Yao JianGang and VietAnh Truong, "Application
The optimal locations for combined SVC and TCSC are of min cut algorithm for optimal location of FACTS devices
considering system loadability and cost of installation", International
specified in the table 5. Here, the SVC was linked to the Journal of Electrical Power and Energy Systems, Vol.63, pp.979–987,
optimal bus and the TCSC was linked to the optimal lines. 2014.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 431


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
[15] Biplab Bhattacharyya and Sanjay Kumar, "Reactive power planning
with FACTS devices using gravitational search algorithm", Ain
Shams Engineering Journal, Vol.6, No.3, pp.865–871, 2015.
[16] Jafar Jafarzadeh, Mehrdad Trafdar Haq, Seyyed Mehdi Mahaei and
Payam Farhadi, "Optimal Placement of FACTS devices based on
Network Security", 3rd International Conference on Computer
Research and Development, Vol.3, 2011.
[17] R.Narmatha Banu and D.Devaraj, "Multi-objective GA with fuzzy
decision making for security enhancement in power system",
International Journal of Applied Soft Computing, Vol.12, pp.2756–
2764, 2012.
[18] R.Srinivasa Rao and V.Srinivasa Rao, "A generalized approach for
determination of optimal location and performance analysis of FACTs
devices", International Journal of Electrical Power and Energy
Systems, Vol.73, pp.711–724, 2015.
[19] S.Ravindra, Chintalapudi V.Suresh, S.Sivanagaraju and V.C.Veera
Reddy, "Power system security enhancement with unified power flow
controller under multi-event contingency conditions", Ain Shams
Engineering Journal, 2015.
[20] Imran Khan, M.A.Mallick, Malik Rafi and Mohammad Shadab Mirza,
"Optimal placement of FACTS controller scheme for enhancement of
power system security in Indian scenario", International Journal of
Electrical Systems and Information Technology, Vol.2, pp.161–171,
2015.
[21] S.Sreejith, Sishaj P.Simon and M.P.Selvan, "Analysis of FACTS
devices on Security Constrained Unit Commitment problem",
International Journal of Electrical Power and Energy Systems, Vol.66,
pp.280–293, 2015.
[22] S.Ravindra, Chintalapudi V.Suresh, S.Sivanagaraju and V.C.Veera
Reddy, "Power system security enhancement with unified power flow
controller under multi-event contingency conditions", International
Journal of Ain Shams Engineering Journal, 2015.
[23] Majid Moazzami, Mohammad Javad Morshed and Afef Fekih, "A
new optimal unified power flow controller placement and load
shedding coordination approach using the Hybrid Imperialist
Competitive Algorithm-Pattern Search method for voltage collapse
prevention in power system", International Journal of Electrical Power
and Energy Systems, Vol.79, pp.263–274, 2016.
[24] M.Venkateswara Rao, S.Sivanagaraju and Chintalapudi V.Suresh,
"Available transfer capability evaluation and enhancement using
various FACTS controllers: Special focus on system security",
International Journal of Ain Shams Engineering Journal, 2015.
[25] Rabiah Badar and Laiq Khan, "Legendre wavelet embedded Neuro
Fuzzy algorithms for multiple FACTS", International Journal of
Electrical Power and Energy Systems, Vol.80, pp.81–90, 2016.
[26] M. Saravanan, S. Mary Raja Slochanal, P. Venkatesh and J. Prince
Stephen Abraham, “Application of particle swarm optimization
technique for optimal location of FACTS devices considering cost of
installation and system loadability”, Electric Power Systems Research,
2006.
[27] K.Satyanarayana, B.K.V. Prasad, G.Devanand and N.Siva Prasad,
“Optimal Location of TCSC with Minimum InstallationCost using
PSO”, IJCST Vol. 2, No. 1, December 2011.
[28] B Chandra sekhar and N Visali, “Optimal Placement of SVC with Cost
Effective Function Using Particle Swarm Optimization”, International
Journal of Emerging Trends in Engineering Research, Vol. 1, No.2,
2013.
[29] Rafael Zarate-Minano, Thierry Van Cutsem, Federico Milano and
Antonio J.Conejo, "Securing Transient Stability Using Time-Domain
Simulations Within an Optimal Power Flow", IEEE Transactions on
Power Systems, Vol.25, No.1, pp.243-253, 2010.
[30] T.Yu, J.Liu, K.W.Chan and J.J.Wang, "Distributed multi-step Q(k)
learning for Optimal Power Flow of large-scale power grids",
Electrical Power and Energy Systems, Vol.42, pp.614–620, 2012
[31]Ali R. Alroomi, Fadhel A. Albasri and Jawad H. Talaq, “Essential
Modifications on Biogeography-Based Optimization Algorithm”, CS
& IT-CSCP, pp. 141–160, 2013.
[32]Aniruddha Bhattacharya and Pranab Kumar Chattopadhyay, “Biogeography-
Based Optimization for Different Economic Load Dispatch
Problems”, IEEE Transactions on Power Systems, Vol. 25, No. 2,
MAY 2010.
[33]Ling Wang and YeXu, “An effective hybrid biogeography-based
optimization algorithm for parameterestimation of chaotic systems”,
Expert Systems with Applications, Vol. 38, pp. 15103–15109, 2011.
[34] Nasiruzzaman, A. B. M., and Hemanshu Roy Pota. "Transient stability
assessment of smart power system using complex networks
framework." In 2011 IEEE Power and Energy Society General
Meeting, pp. 1-7. IEEE, 2011.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 432


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Comparative Stratification of Steganalysis


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Techniques to Interpret & Target Anomalies


Dhiren Dommeti Siva Ramakrishna Nallapati Dr Venkata Vara Prasad Padyala
Department of CSE Department of CSE Assoc. Professor
Koneru Lakshmaiah Education Koneru Lakshmaiah Education Department of CSE
Foundation Foundation Koneru Lakshmaiah Education
Guntur, India Guntur, India Foundation
dhiren2910dommeti@gmail.com srk.nlpt@gmail.com Guntur, India
varaprasad_cse@kluniversity.in
Venkata Naresh Mandhala
Department of CSE
Koneru Lakshmaiah Education
Foundation
Guntur, India
mvnaresh.mca@gmail.com

Abstract— The art of detecting hidden messages in media is steganography, Audio Steganography, and Video
known as steganalysis. Statistically and visually data is hidden Steganography. The process of detection of this covert
in the media. Using deep learning techniques is evidently communication technique is called steganalysis. There are two
favorable as they are efficient in learning hierarchical data. approaches for steganalysis based on its field of application.
Through this research, we tend to investigate and compare The targeted approach is used when the steganography
various steganalysis techniques and implement classifiers to technique used to encrypt is known and the universal approach
compare the results achieved. Neural networks, Clustering is used when the technique is unknown. Which then leads to
Algorithms, and other Tools are used to design a model for the two sub-approaches. Approaches being blind and semi-blind,
investigation of Experimental Findings. Classifiers like the SVM
the semi-blind approach uses both the cover and stego
classifier, K-NN classifier, Random Forests classifier, MLP NN
classifier, and Naive Bayes classifier are trained and tested to
mediums to determine decision boundaries, whereas the blind
detect images undergoing steganography. The results acquired approach only uses the cover medium. The targeted approach
are compared and analyzed. analyses a medium's statistical characteristics or "features"
before and after embedding them using a specific
Keywords— Steganalysis, Classifiers, Cryptography, steganography technique Although this method produces
Confidentiality, Steganography. mostly accurate results, it is very limited to specific
embedding algorithms and medium formats. The applications
I. INTRODUCTION of Steganalysis include Usage in Law Enforcement, National
In this era, thanks to technology people are utilizing the Security, to evaluate known and unknown steganography
internet for every online service one such service offered to techniques, to secure digital and cipher information, Usage in
everyone is communication, but not all the time Digital Forensics and to detect illegitimate usage and theft of
communication happens under secure channels, sometimes data. Right now, the internet is home to trillions of photos.
the data transfer happens over unprotected networks. or the People use these pictures to communicate their emotions,
data in transit is intercepted and precious info is lost. Various document their life, and pursue other hobbies. Unfortunately,
well-organized tools are available which are capable of criminal organizations may effectively send messages through
compromising the security, and integrity of the data in transit. normal picture transfers thanks to the introduction of image
One of the most effective solutions to tackle these kinds of steganography software. It is impossible to identify illegal
situations is the encryption of data. various cryptographic pictures using the human eye alone because these software
techniques are developed for this purpose. But in programmers aim to make the payload appear to be random
cryptography, the cipher can be visible to the human eye in a noise of the image generated by the sensor of camera and
scrambled form which raises the suspicion of important data electronics. This technology poses a genuine risk to the safety
being transferred. New Techniques which can be referred to of the public. Consequently, scholars have looked into and has
as steganography techniques are under huge exploration to created cutting-edge picture steganalysis methods for
make the data hidden from the perception of the human eye. identifying and fending off this threat. One of the most popular
The Importance of this area is increasing day by day. Though methods of covert communication is image steganography,
Cryptography and steganography might seem similar. Yet, which involves concealing data within an image. In order to
there is a difference. Cryptography is the encryption of the avoid creating observable artefacts and altering the statistical
data by converting plain text to cipher text whereas features of the image, effective image steganography
Steganography is the Hiding of the Info in Plain Sight. Hiding algorithms typically incorporate hidden messages into the
of the data can be achieved using Embedding the data in complex regions of the image. Fig. 1 depicts one instance of
Multimedia like images, audio, video, etc. Another this type: The original image is presented in Fig 1, and the
application is Digital Watermarking. It is a method to claim steganographic image generated by LSB-Steganography.
ownership in which confidential data is embedded. Which is a technique in which we hide messages within
Steganography can be classified as the Process of Implanting images by replacing the image's least significant bit with the
certain data within a multimedia file like audio, image, and message bits to be hidden. Secret messages can be inserted,
even video. For instance, a smaller image can be embedded and the picture can be made unnoticeable by modifying only
inside another Big Multimedia. There are Certain the first most right bit of an image, but if our message is too
Classifications of Steganography which can be listed as image large, it will start modifying the second most right bit and so

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 433


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

on, and an attacker will notice the changes in the picture is Peak signal to noise ratio and mean-square error as the
shown in Fig 2. Firstly, a bit plane of an image is a collection metrics. The advantages include less computational period,
of bits that correspond to a specific bit position in each of the Image is the confidential message and capricious image
binary numbers that represent the signal. Fig 3 displays the 2nd structure is accepted. Yet, the defense strategy is relatively
bit plane of Fig 2 and the hidden text can be seen. But to the low relative to deep learning images. Similar to the method of
human sight, Fig 1 and 2 will look the same. (To make the N. Patel and S. Meena [5]. Though the metrics for this are only
discussion that simpler, we'll refer to the original image and Peak signal-to-noise ratio the advantages and disadvantages
the associated steganographic image as "cover" and "stego," are similar. Secret information in videos is hidden using the
respectively.) LSB method. Sequences of images as video frames sum up to
become a video. The basic LSB substitution method [7] and
an embedded method of LSB substitution and Huffman
encoding methods are used in videos [8]. Dissected videos are
classified into Image frames. In the image frames of the LSB,
these binary bits of secret information are hidden. Mankin et
al investigate LSB matchings as a sequence of image
deprivation to retrieve cover image estimation by wavelet
mitigation with an additional noise proportional to embedding
rate[9]. To train and test the features of the 1-D statistical gray
scale histograms of estimated and test images are utilized with
Fig. 1. Cover Image
SVM as a classifier. The Fisher linear discriminant, k nearest
neighbor, multilayer perceptron, and Gaussian naïve Bayesare
were compared by Ramezani et al [10]. For extracting
features, statistics of histogram and wavelet, adjacency of the
1-D and 2-D histogram’s amplitude of local extrema and
characteristic function of the center of the mass of histogram
are utilized in the approach. To exploit the detection of the
hidden message using multivariate regression and image
quality metrics a Steganalysis methodology is offered by
Avcibas et al [11], which uses the analysis of variance
technique for the identification of appropriate quality metrics
Fig. 2. Stego Image of the image. Which, along with steganography images and
the training set, is fed into multivariate regression. The
objective of picture steganography methodologies is to make
a change that is imperceptible in order to hide a concealed
message in a cover image. The stego has the look of a typical
image, therefore suspicions regarding the data it contains are
unlikely to arise even if a third party finds it. Three general
categories can be used to group the most popular image
steganography techniques: naïve steganography [15], adaptive
steganography [18], and deep learning–based embedding.
Simple steganography techniques like naive steganography
are routinely used on the Internet for amusement. These
Fig. 3. 2nd Bit Plane of Stego Image techniques also produce artefacts that are the easiest to
identify. For instance, by changing the amounts of pixels
II. RELATED WORKS devoid of taking into account the bias, the Least Significant
Statistical steganalysis on a universal scale needs low or Bit approach [15], embeds a covert message into cover image.
even none of the foregoing info of the steganographic Because of this, they are simple to attack just by applying
techniques for the recognition of concealed messages. It historical statistical information of cover images. Right now,
requires a studying-based technique that concerns learning the most useful technique is the adaptive steganography
based on Steganography images despite the algorithms and method. It increases protection by inserting hidden messages
domains. Liu et al suggested a method utilizing back into the cover images' more textured layers, it also employs
propagation neural networking system as classifiers to acquire effective steganographic techniques, such as Syndrome Trellis
subband coefficients incorporating wavelet packet transform- Codes, to lessen the impact of the embedded alterations.
based universal steganalysis method to obtain Histogram Fridrich and Holub [17] built a Wavelet model of the costs of
moments of multi-order absolute characteristic function [1]. each each pixel. Weights (WOW) were obtained by
Chen et al offered a technique to estimate messages hidden in examining changes in the directional high-pass filters' output
images in spatial and JPEG domains. It utilizes alpha- obtained by modifying single pixel. The following year, they
trimmed-mean to distinguish images and stegno-images [2]. improved the additive distortion based on directional residuals
K. A. Al-Afandy et al suggested an approach using 1 RGB acquired from a Universal Wavelet Relative Distortion filter
image dataset and Peak signal to noise ratio and the time as bank Tool (S-UNIWARD) [18]. A developing area of
metrics. The advantages include less computation time. It is research is deep learning-based embedding. In terms of deep
robust in extracting, and embedding and works without learning based implanting techniques, there are four main
dependencies on steganalysis and steganography[3]. Yet it is families: Firstly, Through synthesis: This technique either
less secure and secret information is text. A. Arya and S. Soni takes the produced image as a stego directly or generates
proposed a method[4] using Lena and Baboon dataset [6]. images and subsequently conceals the message. Secondly,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 434


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

creating a possibility map of alterations: In the instances the Naive Bayes classifier. The highest accuracy in the test set
described by Tang et al. and Yang et al., a modification map has been found in random forest learning. The parameter
from the cover picture is created by the generator network, values are set accordingly to decline memory consumption.
making it possible to trick the network that is generally The hike might be caused because of fully grown and
discriminant. Thirdly, by deceiving sophisticated unpruned trees. At each split, the features are randomly
Convolutional Neural Networks based steganalyzers: Tang et permuted. While fitting Random_state is fixed to acquire a
al. [16], for instance, created the ADV-EMB approach, stable deterministic behavior. Secondly, All the classifiers are
capable of modifying the cost of alterations in accordance with loaded. Each of the five classifiers was trained using 56,000
backpropagated gradients from the target networks. Although monochromatic images. Machine learning algorithms are
deep learning based implanting approaches are in the early known to be influenced by parameters. These variables have
stages of development, there are promising indicators. Higher a significant impact on the learning process's outcome.
image steganography accuracy is now feasible because to Parameter tuning is used to achieve high accuracy. The goal
recent developments in neural network and deep learning of parameter tuning is to find the best value for each parameter
algorithms. The usage of hand-crafted features is not in order to improve the model's accuracy. The random forest
necessary with CNN-based steganalysis approaches because compared in Table 2 has several parameters such as max
backpropagation automatically extracts more detailed depth, n estimators, max features, and min samples split.
characteristics from the data. Experts like, Qian et al. [18] Improved and more accurate models will result from intuitive
suggested a customized Convolutional Neural Network optimization of these parameter values.
model, titled GNCNN an effective paradigm made up of three
parts: features were extracted using convolutional blocks, A. Algorithm
classification using fully connected layers, and for high pass Input: Image and Classifier
filtering a preprocessing layers with non-random kernels. The Output: stratify image as stegnographed or clean using the
first CNN-based method that employs advanced, hand-crafted chosen classifier
features to achieve performance on par with conventional
image statistical analysis techniques. Later, they discussed a Begin
variety of ensemble techniques for utilising a set of similarly image = load_image
trained CNNs. Using a method termed maxCNN, Yang et al. vals =array_in_1D(mean_of_numbers_list(image)
showed how information can be included into a CNN for with(axis=2))
steganalysis from the selection channel. Their method gives data = from_image(Kurtosis, Skewness, Std, Range,
features learnt from smooth regions small weights while Median, Geometric_Mean, Mobility, Complexity)
giving features retrieved from complicated texture regions testing_data → Features_test_Dataset
significant weights. A better technique known as Yedroudj- x_test, y_test → testing_data[]
Net, which optimizes the neural network's structure, was x_test = x_test.append(data)
introduced by Yedroudj et al. [19]. Li et al [20] .'s parallel- scaler = scale_each_Feature(feature_range=(0, 1))
subnet CNN, dubbed ReSTNet, considerably improved the x_test = scaler→fit_transform(x_test)
detection effect by combining linear and nonlinear filters. A Evaluation → train-test-datasets
new paradigm called SRNet was proposed by Boroumand that if classifier_prediction((x_test[13999])[0] == 1)
uses several, unpooled convolutional blocks to extract Return ‘Stegnographed image’
sufficient noise residual after initializing all filters at random. else
One of the most effective methods for high detection accuracy Return ‘Clean image’
currently available is SRNet. Although these techniques End
perform noticeably better than conventional detectors, they
are still unable to train on huge images due to hardware
constraints. The accuracy of the detector will be hampered by TABLE I. CONTRAST OF STATE-OF-THE-ART STEGANOGRAPHY
TECHNIQUE
shrinking or cropping the photos before categorization since
weak stegano graphic signals are unique in this regard. An A comparison of cutting-edge steganography techniques
S. No
architecture to detect the JPEG steganalysis signal in low Technique Merit Demerit
signal-to-noise (SNR) situations was proposed by Congcong Content is encrypted
Stego Risk increases as
Sun et al [12]. By concatenating all of the previous layers with 1
Encryption
as it is embedded into
the key exchanges.
the same featuremap size, the proposed 32-layer CNN carrier.
architecture can increase the efficiency of preprocessing and It has a high capacity Digital processing
and is robust against techniques can
reuse the features, improve the flow of information, and 2 SSIS
attacks that are give away the
significantly reduce the training parameters. However, they statistical. data.
still need to improve feature propagation for steganalysis in More the volume
Only a part of the
the spatial domain. 3
Substitution
carrier is
of the stego
techniques content more the
manipulated.
III. WORK DONE risk.
Easier to implement, Can get corrupt
Firstly, the training with data of 56,000 images from the Payload capacity is and is also
4 LSB
still images with LSB steganography features dataset [13] is high and has low vulnerable for
done. Features are scaled in the interval [0:1]. Secondly, the complexity. detection.
train data have been fit classifiers and saved as the .joblib file. Embedding carrier
5 LSB++ Low distortion does not support
Classifiers like the SVM classifier, K-NN classifier, Random compression.
Forests classifier, MLP NN classifier, and Naive Bayes
classifier are trained and tested. As observed in table 1 the
least train and test accuracy comparatively can be observed in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 435


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of which functions should be highly correlated with subjective


evaluation. It is advantageous because, based on pixel value
Original
Steganography
Stego pairs statistical analysis, which is the end result of embedding
image Image
data in an image. Detection of steganographic Artifacts is an
approach that can be used against Various Steganographic
techniques Using certain of the image's attributes, there are
ways to tell the difference between the original and stego
images.
Trained
Classifiers
Training Classifiers V. EXPERIMENTAL RESULTS
The Algorithm implemented returns the type of image
either clean or stego according to the chosen classifier. While
the investigations prove to be precise, The results can be mis-
Steganalysis
Testing stratified in cases of high-resolution and non-monochromatic
Image
images. Yet is proven efficient in cases of LSB
Steganography. This limitation is due to the lack of training
with a wide range of images. A histogram is later plotted with
255 bins. The traditional model of the steganalysis framework
Cover
Adapted from [16] depicts how an original image or a
Stego
steganography image is induced in the trained classifiers. The
images are also tested by steganalysis techniques and diverged
into covers or stegos. The cover image is primarily used to
Fig. 4. Adapted traditional model of steganalysis framework covert the data. The media can be of any preferred format
which undergoes lossless compression. JPEG is the least
IV. ATTAINMENTS AND LIMITATIONS OF THE preferred and BMP is the highly preferred format. A stego
STEGANALYSIS TECHNIQUES. image is acquired after hiding information in the cover image.
A method called RS Steganalysis which targets Various Fig 5. Compares the test and train accuracies of the five
LSB Modification Techniques, specifies a statistical study of classifiers. It is generated using the Matlab platform. It is
the pixels where the change is occurring. It is advantageous based on Table 2. Where Fig 7 and 9 display the histogram of
because, for messages that are dispersed randomly throughout Fig 6 and 8. Kurtosis, Skewness, Std, Range, Geometric
the stego-image, the RS Steganalysis is more accurate. Its Mean, Median, Complexity, and Mobility of the chosen image
demerits include RS Steganography is not more precise for were used to represent histograms.
messages centered in a certain region of the image. Chi square A. Dataset Execution
Attack is a kind of steganalysis technique which targets The classifiers have been experimented with the bossbase
Steganography based on the exchange of pixel, greyscale dataset [14]. Conventionally, the bossbase dataset consists of
colour, or DCT coefficient value pairs. To embed constant 18,000 PNG images, 9000 each, in two folders named ‘cover’
value pairs and message bits, the chi square test compares each and ‘stego’ which contain images that are normal and that
result. It can examine the relationship between factors and find have undergone steganography respectively. The classifiers
discrepancies between real and anticipated values. Its sample are trained with the LSB steganography for steganalysis of
size restrictions and the difficulty of interpretation when the still images - features dataset [13]. This dataset contains eight
independent or dependent variable has 20 or more categories characteristics analyzed from about 70,000 monochromous
are among its drawbacks. RQP Method is a steganalysis colored still pictures taken from the Stanford’s database of the
technique which targets True Colour shapes contained with genome project, The Images are Classified into two
LSB Steganography. The approach is predicated on the idea categories: Undergone LSB steganography (1) and have not
that adding bits to the lower-left corner (LSB) of recurring undergone LSB steganography (0). Kurtosis, Skewness, Std,
colour pixels will enhance the frequency of near colour pairs. Range, Geometric Mean, Median, Complexity, and Mobility
It is a technique that takes advantage of the growing number are the Characteristics analyzed from the plots of the still
of colour pairs that are similar as a result of embedding images. The training dataset contains 56,000 sets of labelled
applications. The size of the secret message can only be pictures (which have and have not undergone LSB
roughly estimated using the RQP approach. Once the number Steganography), 5,600 of which confirm the dataset for each
of distinct colours approaches roughly 50% of the total payload type. The testing dataset contains 14,000 results and
number of pixels, the findings start to become increasingly is divided in the same way as the training dataset. The data is
inaccurate. High resolution raw scans and digital camera imported from the CSV file. They are then scaled in the
photos stored in an uncompressed format typically experience interval of [0:1]. Independent variables are normalized.
this. Additionally, it cannot be used with grayscale pictures. Classifiers are then implemented and saved as the “.joblib”
The approach called palette checking targets palette shaped file. The process of testing and training had been implemented
steganography method. The Pallete rankings feature is an in Kaggle. The execution of the model requires 16 gigabytes
obvious indication of consistent modifications. Due to the of a graphic processing unit. Primarily it is well established
possibility that adjacent indices in a palette can point to and provides free resources in kernels like NVidia K80 GPUs,
distinct colours, substituting LSB with the encoded data 3 central processing units, and 13 gigs of random access
results in substantial colour singularities. Another approach memory. The datasets are publicly available.
called "Image quality metrics based steganalysis" which
targets 'Quantitive index embedding techniques, such as QIM',
Measures of image quality are based on image features, one

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 436


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II. COMPARISION TABLE

Comparison Table
S. No Accuracy
Accuracy
Classifier on train
on test set
set
1 SVM classifier 0.9048 0.9029

2 K-NN classifier 0.9436 0.9294

3 Random Forests classifier 0.9996 0.9317

4 MLP NN classifier 0.9244 0.9197

5 Naive Bayes classifier 0.8984 0.8510


Fig. 8. Stegnographed Image

B. Graphical Representations

Fig. 9. Histogram of the Steganographed image

CONCLUSION
Comparative investigation has been done between
classifiers for the implementation of steganalysis. While the
Fig. 5. This plot describes the Comparison between train set and test set test results of classifiers have had minuscule differences
accuracies. between them, the random forest classifier has the highest
accuracy of all. Histograms have been represented based on
features extracted from the chosen image's Kurtosis,
Skewness, Std, Range, Geometric Mean, Median,
Complexity, and Mobility. Training classifiers with a complex
cover model and a humongous dataset is the current trend to
obtain more accurate results is the current trend in
steganalysis. Yet, support vector machines do not scale
favorably when it comes to feature dimensionality and the
range of the training set. The results can be mis-stratified in
cases of high-resolution and non-monochromatic images. This
can be rectified in future works by training the classifier with
a wider range of datasets.
Fig. 6. Clean Image
REFERENCES
[1] X. Luo, F. Liu, J. Chen and Y. Zhang, Image universal analysis based
on wavelet packet transform, 10th IEEE Workshop on Multimedia
Signal Processing, pp. 780-784, 2008.
[2] M-C. Chen, S.S. Agaian, C.I.P. Chen and B.M. Rodriguez, Alpha-
trimmed image estimation for JPEG steganography, Proc. of IEEE
International Conference Systems, Man and Cybernetics, pp. 4581-
4585, 2009.
[3] K. A. Al-Afandy, O. S. Faragallah, A. Elmhalawy, E.-S.-M. El-Rabaie,
and G. M. El-Banby, ‘‘High security data hiding using image cropping
and LSB least significant bit steganography,’’ in Proc. 4th IEEE Int.
Colloq. Inf. Sci. Technol. (CiSt), Oct. 2016, pp. 400–404.
[4] A. Arya and S. Soni, ‘‘Performance evaluation of secrete image
steganography techniques using least significant bit (LSB) method,’’
Int. J. Comput. Sci. Trends Technol., vol. 6, no. 2, pp. 160–165, 2018.

Fig. 7. Histogram of the clean image

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 437


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[5] N. Patel and S. Meena, ‘‘LSB based image steganography using [14] http://agents.fel.cvut.cz/boss/index.php?mode=VIEW&tmpl=material
dynamic key cryptography,’’ in Proc. Int. Conf. Emerg. Trends s
Commun. Technol. (ETCT), Nov. 2016, pp. 1–5. [15] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, “A digital water
[6] http://www.eecs.northwestern.edu/~faisal/d20/d20.html mark,” in Proc. 1st Int. Conf. Image Process., Nov. 1994, pp. 86–90.
[7] M. V. S. Tarun, K. V. Rao, M. N. Mahesh, N. Srikanth, and M. Reddy, [16] W. Tang, B. Li, S. Tan, M. Barni, and J. Huang, “CNN-based adver
‘‘Digital video steganography using LSB technique,’’ Red, vol. sarial embedding for image steganography,” IEEE Trans. Inf. Forensics
100111, Apr. 2020, Art. no. 11001001. Security, vol. 14, no. 8, pp. 2074–2087, Aug. 2019.
[8] S. S. M. Than, ‘‘Secure data transmission in video format based on [17] V. Holub and J. Fridrich, “Designing steganographic distortion using
LSB and Huffman coding,’’ Int. J. Image, Graph. Signal Process., vol. directional filters,” in Proc. IEEE Int. Workshop Inf. Forensics Secur.
12, no. 1, p. 10, 2020. (WIFS), Dec. 2012, pp. 234–239.
[9] X. Mankun, L. Tianyun and P. Xijian, Steganalysis of LSB matching [18] Y. Qian, J. Dong, W. Wang, and T. Tan, “Learning and transferring rep
based on histogram features in grayscale image, IEEE ICCT, pp. 669- resentations for image steganalysis using convolutional neural
672, 10-12 November 2008. network,” in Proc. IEEE Int. Conf. Image Process. (ICIP), Sep. 2016,
[10] m. Ramezani and S. Ghaemmaghami, towards genetic feature selection pp. 25–28
in image steganalysis, Proc. on 7th IEEE CCNC, pp. 1-4, 2010. [19] M. Yedroudj, F. Comby, and M. Chaumont, “Yedroudj-net: An
[11] I. Avcibas, N. Memon and B. Sankur, Steganalysis using image quality efficient CNN for spatial steganalysis,” in Proc. IEEE Int. Conf.
metrics, In Security and Multimedia Contents, SPIE, 2001. Acoust., Speech Signal Process. (ICASSP), Apr. 2018, pp. 2092–2096.
[12] Congcong Sun, Hui Tian, Wojciech Mazurczyk, Chin‐Chen [20] B. Li, W. Wei, A. Ferreira, and S. Tan, “ReST-Net: Diverse activation
Chang, Yiqiao Cai, Yonghong Chen, Towards blind detection of modules and parallel subnets-based CNN for spatial image
steganography in low‐bit‐rate speech streams, International Journal of steganalysis,” IEEE Signal Process. Lett., vol. 25, no. 5, pp. 650–654,
Intelligent Systems, 10.1002/int.23077, 2022. May 2018.
[13] Julian Miranda, November 21, 2019, "Steganalysis for still images with
LSB Steganography - Features dataset", IEEE Dataport, doi:
https://dx.doi.org/10.21227/gs67-yn65.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 438


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Implementation of Technology to Recognize
Segmented and Non-Segmented Text: A Survey
Sandhya Sharma Sheifali Gupta *Avinash Sharma
Chitkara University School of Engineering Chitkara University Institute of Dept. of CSE,MM Engg college,
and Technology, Engineering and Technology, Maharishi Markandeshwar (Deemed to be
Chitkara University, Himachal Pradesh, India Chitkara University, Punjab, India University),Mullana,Haryana, India
Sandhya.sharma@chitkarauniversity.edu.in Sheifali.gupta@chitkara.edu.in corresponding author’s email:
asharma@mmumullana.org

Lipika Gupta Shaminder Kaur


Chitkara University Institute of Engineering and Technology, Chitkara University Institute of Engineering and Technology,
Chitkara University, Punjab, India Chitkara University, Punjab, India
Lipika.gupta@chitkara.edu.in Shaminder.kaur@chitkara.edu.in

Abstract— There is a need to preserve the historical approaches using Machine Learning techniques and also
handwritten documents for the generations to come. Therefore, Deep Learning techniques. In Machine learning, the features
handwritten text which is available in various scripts needs to using which the network is trained are manually extracted
be digitized and later recognized. Various techniques are while in Deep Learning, instead of manually extracting the
available for the digitization of handwritten text. Digitization features; they are automatically extracted and the model is
of handwritten text helps to access, manipulate and store the trained on those characteristics. Figure 1 is showing the
data for the longer time. Various Machine Learning and Deep basic process of image recognition using Machine Learning
Learning techniques are being implemented for the recognition
technique. First the input images which are to be recognized
of handwritten text. In this paper, a survey has been presented
are given to the model. Once the various features are
for the recognition of handwritten text using various
techniques. This survey will be helpful for the researchers to
manually extracted then they are fed to the Machine
find the various techniques that can be applied for the Learning Algorithms which will predict the output class.
recognition of different handwritten scripts to obtain the Figure 2 is representing the process of image recognition
desired Accuracy. using Deep Learning technique. It can be observed that
images are given directly to the Deep Learning Algorithm
Keywords— Text Recognition, Machine Learning, Deep which will automatically extract as well as recognize the
learning, Accuracy, Segmented and Non-Segmented image and later output will be predicted. By using the
different metrics of the confusion matrix, which are true
I. INTRODUCTION positive (TP), false positive (FP), true negative (TN), and
Digitization of text is helpful in bridging the gap between false negative (FN): Recognition Accuracy can be calculated
computers and humans. Handwritten text which is available as given in expression (1)
in various scripts needs to be converted into its digital form
so that it can be processed and preserved for the longer time.
Handwritten documents are available in various Accuracy = (TP + TN)/ (TP + TN + FP + FN) (1)
organizations like in academic institutes, Government
offices, small vendors, historical places which requires
digitization of those documents. Most of the data in various
government offices is available in physical form which takes
a lot of space and even searching and indexing is also very
difficult. A lot of Ancient data which is handwritten in nature
is also available. Those documents contain the various
methods to treat medically ill patients. So, there is a need of Fig. 1. Image Recognition process with the help of Machine Learning
technology that can convert the physically available Technique
document into soft document for their recognition. But the
recognition of handwritten text with the required accuracy is
still a challenge. Sometimes, the document which is to be
digitized and later recognized is already in the degraded
form, sometimes the documents contain the broken
handwritten characters or the characters in the words are so
closely written which makes them very difficult to recognize. Fig. 2. Image Recognition process with the help of Deep Learning
This survey contains the techniques for the recognition of TechniqueEase of Use
handwritten text which can be used for the recognition of
individual character or complete word. In some papers, II. SURVEY ON HANDWRITTEN TEXT
authors have opted for the recognition of complete word Survey to recognize the various scripts is represented.
without dividing them into individual characters. This Handwritten text is recognized for various scripts like
technique is known as Holistic approach. While in other Devanagri, Gurmukhi, English, Tamil and Bengali etc.
papers, authors have opted for character recognition by Survey has been categorized into two categories for
dividing the word into individual characters. This technique handwritten text. In one section, survey is given using Deep
is known as Analytical approach. Survey consists of the Learning techniques while in the other section; survey is
recognition of the handwritten text for Analytical and holistic

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 439


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

given for the recognition of handwritten text by employing implemented CNN recognition network for the handwritten
Machine Learning techniques. Arabic characters. 97% recognition accuracy is obtained.
Similarly a CNN based model has also been implemented for
A. Survey on the Recognition Accuracy obtained employing the recognition of Swedish handwritten digits. Kusetogullari
Deep Learning Techniques et al[7] has obtained a recognition accuracy of 97.12% for
Text Recognition accuracy obtained for the various 100000 Swedish digits.. Kashif et al[8] has implemented
handwritten text is shown. Pande et al[1] has achieved a ResNet 18 model on Urdu & Manipuri words after their
recognition accuracy of 99.13%. The author has used segmentation while Inunganbi et al[9] has employed CNN
Devanagri handwritten dataset of 92000 handwritten based model for Manipuri script only and obtained an higher
characters. Khan et al[2] used a CNN(Convolutional Neural accuracy as compared to ResNet 18 model. They have
Network) recognition model for the 5298 Urdu hand-written employed Analytical approach for the recognition. Similarly
words. For the recognition, the Urdu word is not segmented [10-15] have also employed Analytical approach using Deep
while complete word is recognized employing Holistic Learning techniques for the recognition of Tamil, Bengali,
approach. Segmentation of Urdu word is a difficult task as Gurmukhi, Devanagari and English Scripts. This section has
the Urdu characters are usually written very close. Hemanth presented a survey for the recognition of text employing
et al[3] has implemented CNN and RNN(Recurrent Neural Deep Learning based models. Table I is representing the
Network) models for the recognition of 115320 English recognition accuracy obtained for different scripts based on
handwritten words. Here also, Holistic technique is Deep Learning techniques. Size of the dataset used for the
employed. Obtained Accuracy is 98%. Similarly Sharma et purpose of recognition along with the approach of
al[4-5] has recognized Gurmukhi handwritten words recognition whether Analytical or Holistic is also mentioned
employing Holistic technique and obtained accuracy is 98% for each script. By employing deep learning techniques,
for 22000 Gurmukhi words and 99.13% for the recognition manual feature extraction is not required. All the features are
of 4000 Gurmukhi words. Recognition of the text written in automatically extracted which are required to train the
Arabic Script is also carried out. Altwaijry et al[6] has also model.
TABLE I. RECOGNITION ACCURACY OBTAINED FOR HANDWRITTEN TEXT EMPLOYING DEEP LEARNING TECHNIQUES

Ref Analytical/Holistic Recognition Accuracy


Script Size of the Dataset Model used
No/Year approach obtained
[1]/2022 Devanagari 92000 characters Analytical CNN 99.13%
[2]/2021 Urdu 5298 words Holistic CNN 95.81%
[3]/2021 English 115320 words Holistic CNN, RNN 98%
[4]/2021 Gurmukhi 22000 words Holistic CNN 98%
[5]/2021 Gurmukhi 4000 words Holistic CNN 99.13%
[6]/2021 Arabic 47,434 characters Analytical CNN 97%
[7]/2021 Swedish 100000 digits Analytical CNN 97.12%
[8]/2021 Urdu & Manipuri 312000 words Analytical ResNet 18 86%
[9]/2021 Manipuri 14700 words Analytical CNN 98.70%
[10]/2020 Tamil 246 Analytical CNN 93%
[11]/2020 Bengali 166K Analytical CNN 96.8%
[12]/2020 Gurmukhi 3500 Analytical CNN 74.66%
98%
[13]/2019 Devanagari 92000 Analytical AlexNet Inception V3
99%
280000 digits and 145600 CNN 99.74%
[14]/2020 English Analytical
letters KNN 99.07%
[15]/2018 Gurumukhi 6000 Characters Analytical CNN 99.3%

TABLE II. RECOGNITION ACCURACY OBTAINED FOR HANDWRITTEN TEXT EMPLOYING MACHINE LEARNING TECHNIQUES

Ref Analytical/Holistic Recognition Accuracy


Script Size of the Dataset Model used
No/Year approach obtained
[16]/2019 Bangla 1800 words Holistic SVM 83.64%
[17]/2021 Pasto 11352 characters Analytical KNN 80.34%
[18]/2019 Gurmukhi 8960 characters Analytical KNN, Decision tree 96.03%
and Random forest
[19]/2018 Bangla 7500 words Holistic MLP 79%
SMO 87%
CVP-SMO 87%
[20]/2016 Gurmukhi 4280 characters Analytical HMM 97.01%
[21]/2015 Gurmukhi 2560 words Analytical MLP 82.06%
[22]/2015 Devanagari 39700 words Holistic SVM 82.81%

[23]/2014 Gurmukhi 18000 words Analytical SVM and KNN 90.08%


[24]/2011 Gurmukhi 3500 characters Analytical KNN 94.12%
[25]/2011 Gurmukhi 7000 characters Analytical SVM,KNN and PNN 95.04%
B. Survey on the Recognition Accuracy obtained Machine learning classifiers like KNN(K-Nearest Neighbor),
employing Machine Learning Techniques SVM(Support Vector Machine), Decision tree, Random
In this section, text recognition survey for various scripts forest etc. have been implemented by various authors for the
employing Machine Learning techniques is given. Various recognition of text. Bhowmik et. al[16] has used SVM based

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 440


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

classifier for the recognition of Bangla handwritten text. & Applied Science Research, 11(3), pp.7140-7145.
Author has recognized `1800 Bangla words without dividing [3] Hemanth, G.R., Jayasree, M., Venii, S.K., Akshaya, P. and Saranya,
R., 2021. CNN-RNN Based Handwritten Text Recognition. ICTACT
them into single units i.e. holistic approach is used instead of Journal on Soft Computing, 12(1), pp.2457-2463.
Analytical. Huang et al[17] has worked on the recognition of [4] Sharma, S., Gupta, S., Kumar, N. and Arora, T., 2021. Postal
pasto characters. Size of the dataset used is 11352 pasto Automation System in Gurmukhi Script using Deep
characters. Obtained Accuracy is 80.34% by using KNN Learning. International Journal of Image and Graphics, p.2350005.
classifier. It can be observed that Huang et al [18] has [5] Sharma, S., Gupta, S., Gupta, D., Juneja, S., Singal, G., Dhiman, G.
and Kautish, S., 2022. Recognition of Gurmukhi Handwritten City
obtained an accuracy of 96.03% for recognizing Gurumukhi
Names Using Deep Learning and Cloud Computing. Scientific
handwritten characters. Author has implemented various Programming, 2022.
machine learning classifiers for the recognition of [6] N. Altwaijry and I. Al-Turaiki, “Arabic handwriting recognition
handwritten text. Sahoo et al [19] has employed ANN based system using convolutional neural network,” Neural Computing and
Multilayer perceptron(MLP) as well as Sequential minimal Applications, vol. 33, no. 7, pp. 2249–2261, 2021, doi:
optimization(SMO) algorithm for the recognition of Bangla 10.1007/s00521-020-05070-8.
[7] H. Kusetogullari, A. Yavariabdi, J. Hall, and N. Lavesson,
words. Highest accuracy obtained is 87%. Accuracy obtained “DIGITNET: A Deep Handwritten Digit Detection and Recognition
for different scripts using various machine learning Method Using a New Historical Handwritten Digit Dataset,” Big
classifiers can be observed in Table II. Gurmukhi text is Data Research, vol. 23, p. 100182, 2021, doi:
recognized [20-21] by using Hidden Markov Model[HMM] 10.1016/j.bdr.2020.100182.
and Multilayer perceptron(MLP), highest accuracy of [8] M. Kashif, “Urdu Handwritten Text Recognition Using ResNet18,”
2021, [Online]. Available: http://arxiv.org/abs/2103.05105.
97.01% is obtained using HMM instead of MLP. Shaw et [9] S. Inunganbi, P. Choudhary, and K. Manglem, “Handwritten Meitei
al[22] has implemented a Machine Learning based model Mayek recognition using three-channel convolution neural network
using SVM algorithm to recognize Devanagari text. of gradients and gray,” Computational Intelligence, vol. 37, no. 1,
Accuracy obtained is 82.81%. Gurmukhi text using pp. 70–86, 2021, doi: 10.1111/coin.12392.
Analytical approach implementing Machine Learning [10] R. K. S, A. Sivamurugan, S. V. M, and K. Shanmugam,
“Digitalization of Tamil Handwritten Characters Recognition Using
algorithms[23-25] has been recognized while highest Convolutional Neural Networks ( CNN ),” no. 2, pp. 262–268, 2020.
obtained accuracy is 95.04%. From the table II, it can be [11] A. Roy, “AKHCRNet: Bengali handwritten character recognition
concluded that highest accuracy of 97.01% is obtained using using deep learning,” arXiv, 2020.
Machine Learning based HMM algorithm [26]. [12] Jindal, U., Gupta, S., Jain, V. and Paprzycki, M., 2020. Offline
Handwritten Gurumukhi Character Recognition System Using Deep
III. CONCLUSION Learning. In Advances in Bioinformatics, Multimedia, and
Electronics Circuits and Signals (pp. 121-133). Springer, Singapore.
Due to the availability of huge amount of handwritten [13] N. Aneja and S. Aneja, “Transfer Learning using CNN for
text, there is a need to digitize the text. Various techniques Handwritten Devanagari Character Recognition,” 1st IEEE
are available to convert the handwritten text into digital International Conference on Advances in Information Technology,
form. This paper represents the Accuracy obtained on the ICAIT 2019 - Proceedings, pp. 293–296, 2019, doi:
10.1109/ICAIT47043.2019.8987286.
recognition of handwritten text employing machine learning [14] S. Hamida, B. Cherradi, H. Ouajji, and A. Raihani, “Convolutional
and deep learning techniques. Accuracy obtained for various Neural Network Architecture for Offline Handwritten Characters
scripts like Gurmukhi, Devanagri, Bangla, Tamil, Manipuri, Recognition,” no. November, pp. 368–377, 2020, doi: 10.1007/978-
Urdu etc. For the recognition of handwritten text, first the 3-030-36778-7_41.
handwritten text is to be converted into digital image using a [15] N. Kumar and S. Gupta, “Offline Handwritten Gurmukhi Word
Recognition Using Deep Neural Networks Gurmukhi text into
scanner. Once the digital image is obtained then some
Devanagari text using suitable unicodes,” International Journal of
preprocessing techniques are to be applied so that a quality Pure and Applied Mathematics, vol. 119, no. 12, pp. 14749–14767,
digital image can be obtained which can be fed to the model 2018.
for its recognition. From the Table I, it can be found that [16] S. Bhowmik, S. Malakar, R. Sarkar, S. Basu, M. Kundu, and M.
highest recognition accuracy obtained is 99.74% to recognize Nasipuri, “Off-line Bangla handwritten word recognition: a holistic
and classify English digits; and letters. The Author has approach,” Neural Computing and Applications, vol. 31, no. 10, pp.
5783–5798, 2019, doi: 10.1007/s00521-018-3389-1.
implemented CNN based Deep Learning model for the [17] J. Huang, I. U. Haq, C. Dai, S. Khan, S. Nazir, and M. Imtiaz,
recognition. From the Table II, it can be concluded that the “Isolated Handwritten Pashto Character Recognition Using a K-NN
highest recognition accuracy obtained is 97.01% is for the Classification Tool based on Zoning and HOG Feature Extraction
Gurmukhi Characters. For this, the Author has implemented Techniques,” Complexity, vol. 2021, pp. 1–8, 2021, doi:
Hidden Markov Model for the purpose of recognition. It can 10.1155/2021/5558373.
[18] A. Garg, M. K. Jindal, and A. Singh, “Degraded offline handwritten
be concluded from the Table I and II that maximum Gurmukhi character recognition: study of various features and
recognition accuracy is obtained by using Deep learning classifiers,” International Journal of Information Technology
based CNN model as compared to the accuracy obtained (Singapore), 2019, doi: 10.1007/s41870-019-00399-3.
using machine learning based model. It has also observed [19] S. Sahoo, S. K. Nandi, S. Barua, Pallavi, S. Malakar, and R. Sarkar,
that the text recognition is limited to few scripts, this can be Handwritten Bangla city name recognition using shape-context
feature, vol. 695. Springer Singapore, 2018.
extended for the recognition of other scripts also that can be
[20] J. Dasgupta, K. Bhattacharya, and B. Chanda, “A holistic approach
utilised in various applications for the automation of various for Off-line handwritten cursive word recognition using directional
systems. feature based on Arnold transform,” Pattern Recognition Letters, vol.
79, pp. 73–79, 2016, doi: 10.1016/j.patrec.2016.05.017.
REFERENCES [21] G. Singh and M. Sachan, “Offline Gurmukhi script recognition using
[1] Pande, S.D., Jadhav, P.P., Joshi, R., Sawant, A.D., Muddebihalkar, knowledge based approach & Multi-Layered Perceptron neural
V., Rathod, S., Gurav, M.N. and Das, S., 2022. Digitization of network,” Proceedings of 2015 International Conference on Signal
handwritten Devanagari text using CNN transfer learning–A better Processing, Computing and Control, ISPCC 2015, pp. 266–271,
customer service support. Neuroscience Informatics, 2(3), p.100016. 2016, doi: 10.1109/ISPCC.2015.7375038.
[2] Khan, H.R., Hasan, M.A., Kazmi, M., Fayyaz, N., Khalid, H. and [22] B. Shaw, U. Bhattacharya, and S. K. Parui, “Offline handwritten
Qazi, S.A., 2021. A Holistic Approach to Urdu Language Word Devanagari word recognition: Information fusion at feature and
Recognition using Deep Neural Networks. Engineering, Technology classifier levels,” Proceedings - 3rd IAPR Asian Conference on

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 441


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Pattern Recognition, ACPR 2015, pp. 720–724, 2016, doi: [25] K. S. Siddharth, M. Jangid, R. Dhir, and R. Rani, “Handwritten
10.1109/ACPR.2015.7486597. Gurmukhi Character Recognition Using Statistical and Background
[23] S. Bansal, M. Kumar, and M. Garg, “A New Approach for Directional Distribution Features,” International Journal on
Handwritten City Name Recognition,” pp. 106–109, 2014. Computer Science and Engineering, vol. 3, no. 6, pp. 2332–2345,
[24] M. Kumar, M. K. Jindal, and R. K. Sharma, “K-nearest neighbor 2011.
based offline handwritten Gurmukhi character recognition,” ICIIP [26] Jacob, I. Jeena. "Performance evaluation of caps-net based multitask
2011 - Proceedings: 2011 International Conference on Image learning architecture for text classification." Journal of Artificial
Information Processing, no. Iciip, 2011, doi: Intelligence 2, no. 01 (2020): 1-10.
10.1109/ICIIP.2011.6108863.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 442


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Attribute Based Encryption in Healthcare
Application
Suresh Kumar S Chidambaram G Dr. S. Vijayalakshmi
Computer Science and Engineering Computer Science and Engineering Computer Science and Engineering
PSG College of Technology PSG College of Technology PSG College of Technology
Coimbatore, India Coimbatore, India Coimbatore, India
sureshmsd1605@gmail.com chidambaramg5@gmail.com svl.cse@psgtech.ac.in

Dhayanandh AT
Computer Science and Engineering
PSG College of Technology
Coimbatore, India
dhayanandhat@gmail.com

Abstract— Data volumes are increasing due to the growth data is stored for medication purposes. Scalable and fine-
of technologies such as IoT, Cloud Computing, and mobile grained access control can be accomplished by giving the
internet. Data encryption is the solution, which protects access privileges to the user (doctor in case of PHRs), to only
data privacy by giving specific access to encrypted data view the medical history of the patient and will have
can be better understood using Attribute-based (ABE) restriction to view other details of the patient.
encryption. When patients use web-based commercial As fascinating as it is, there are still several issues that
systems to store their personal health data, the privacy of need to be addressed before it can be fully accepted. The use
personal health records (PHRs) can be a major problem. of third-party platforms for data storage poses security and
When it comes to establishing policies to control access privacy problems, which are increasingly important in e-
and protect data confidentiality, common access control healthcare systems. Standard access control strategies can be
systems, such as Work-Based Access Control, have major used to solve data security and privacy problems in e-
limitations. In this research work a novel healthcare healthcare. On the other hand, these systems only allow for
application has been developed based on the ABE scheme coarse-grained access controls, which are inadequate in
approach. Advanced Encryption Standard (AES) scaling situations.
algorithm and Secure Hash Algorithm (SHA) are used for Attribute-Based Encryption (ABE), the encryption and
the encryption and decryption processes in the ABE decryption processes of the data is based on the set of
scheme. This allows only designated authorized personnel, attributes. The two types of ABE are Key-policy based
such as a patient or their respective doctors, to access encryption (KP-ABE) [12] and the ciphertext policy-based
personal data recorded in medical records, with a vision to encryption (CP-ABE) [13]. Since its launch, CP-ABE has
improve the privacy and security of user details. been particularly interested in cloud-based access control
systems. For better control of data access in cloud
Keywords —Cryptography, Attribute-Based Encryption, Access environments, several CP-ABE methods have been
Control, Encryption, Decryption, Advanced Encryption Standard formulated. ABE establishes data access rules depending on
many aspects of stored or user data[14]. Allows patients to
share their PHRs by choosing between many users,
encoding records behind a set of symbols without
I. INTRODUCTION registering all users in the system. ABE creates data access
rules depending on a variety of factors such as stored data or
Collaborative e-healthcare is a paradigm that allows user. It allows patients to share their personal health records
healthcare stakeholders to share electronic health to the respective doctors they are consulting and doctors also
information for efficient coordination and high-quality share their specific field, appointment timings so that
patient treatment. In today's healthcare systems, the patient can fix and consult them, etc. to the patients.
paradigm is critical when patients are being treated by
multiple healthcare facilities at the same time [15].
Wearable and embeddable health sensors, as well as II. RELATED WORK
medical records from the healthcare system, can be
utilized to gather electronic health information in Holden et al., [1] performed twenty study interviews with
collaborative e-healthcare systems facilities and other doctors who used electronic health records (EHRs). One of the
places, and is stored in the database. Consider a patient challenges to using an electronic health record, according to
who is being treated at both Hospital-A and Hospital-B at physicians, is system response time. In this context, data
the same time. Consider a patient who is being treated by encryption demands have increased as EHRs move to a cloud-
two hospitals, Hospital A and Hospital B, for a cardiac based storage environment, and the usability issue has arisen
issue and diabetes at the same time. As part of her due to a lack of effective data management solutions for
treatment plan, Hospital-A gives the patient with a encrypted data, including searchability.
wearable health tracker to track her everyday heart rate.
The data from the health trackers is transferred to the
database, where it can be accessed by both Hospital-A and
Hospital-B. In this way, Hospital-demand Bs for frequent
978-1-6654-6084-2/22/$31.00
and duplicated medical examinations is reduced. Patient ©2022 IEEE 443
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The ABAC approach proposed by Livinus Obiora


Zhang et al., [2] suggested a privacy-preserving
Nweke et al., in 2020 [10] proved to be an efficient
technique based on CP-ABE with improved authority
verification efficiency. They preserve the privacy of the data algorithm for providing fine-grained access for illustrated
authority verification phases by deciding whether the user is resources. To identify ABAC's best e-health strategy, a
authorized. Aside from that, he offered a CP-ABE-based survey was conducted in the literature review of the
technique for attaining maximum security by hiding the distribution of ABAC's expertise in the field of health
EHRs' entire access policy. however, take into consideration records.
the higher computing costs and decryption time spent To safely outsource computations to the cloud
because of the recently implemented matching process environment, Li J et al., [11] utilized an inefficient strategy
verification methods. in which the redundant duplicate attributes shared by all
In 2015, Vishal Jagdale et al., [3] created a paradigm and users were utilized. The dummy attribute's linked
a way to control data access to PHRs and cloud servers. By components are never modified. To accomplish scalable and
encrypting all PHR files, ABE encryption method makes it fine-grained data access control of the PHRs, the ABE
easy to control access to data in PHRs. The technique encrypts the complete patient's PHR details through attribute
focuses on a system based on multiple data owners and policy using AES 256 algorithm.
separates data users from secure domains, reducing the
complexity of critical management. During emergencies, the
system allows changes in file features and glass access. III. Attribute Based Encryption Methods
According to the findings of the detailed investigation, the Attribute-Based Encryption is a public key cryptography
model provides a solid framework for assuring the efficient where the encryption and decryption processes are based on
sharing of PHRs. It demonstrates that the ABE-based set of attributes which we specify through policy. To
approach safeguards health records better than other accomplish scalable and fine-grained data access control of
techniques. MA-ABE, an improved ABE approach, allows the PHRs, the ABE approaches encrypt the complete patient's
patients to interact with users from the public domain who PHR details through attribute policy.
have distinct roles and responsibilities. As a result, the new
system enables the dynamic policy management approach Monotonic access structure defined that if A is a set of
while also protecting PHR privacy and security. attributes satisfying an access structure T, then any A′ such
that A⊂A′ also satisfies T. For ex, consider T=A∩B, then
Joshi et al., [4] developed a semantically rich attributed- both A= {A, B} and A′={A, B,C} satisfy T. Non-monotonic
based access control system using the CP-ABE approach access structure: there exists A′ such that A⊂A′ and A′ does
(ABAC). The model evaluates the classified access options not satisfy T. For example, consider T=A∩¬C. Then in the
based on the user's traits and the fields in the EHR. The previous example, only A satisfies T.
patient is not prone to the overhead access policies There are two types of ABE:
regulation in this approach. Both the secure access and
allocation of EHRs are managed by the central system. • Key Policy Attribute Based Encryption (KP-ABE)
A privacy-aware e-health access control system with • Ciphertext Policy Attribute Based Encryption (CP-
policy masking capabilities was proposed by Z.Ying et al., ABE)
[5]. Only the attribute value is concealed in the system, but
the attribute name is transferred to the Cloud environment in
readable ciphertext. In the event of an attack, the data
security will be jeopardized because the attacker will be able
to discover and learn about the policy, resulting in security
leakage.
Miah et al., [6] developed a cloud-based e-Health system
that allows rural healthcare workers in poor nations to
collaborate on diagnosing and treating noncommunicable
diseases. In this method, less experienced health workers in
rural regions record patient health data, which is then
preserved in the cloud and available for analysis and
suggestions to experts stationed far away.
Hui et al., [7] developed a Verifiable Ciphertext Policy
based ABE (VCP-ABE) schemes in an existing central
forum with keyword searches and data access control for
authorized users to support external source encryption,
decryption, as well as confirmation of ciphertext text updates
with a cyber-physical (CPS) system with great computer- Fig 1 ABE Classification
aided function to reduce work on CS and the client side of
the user.
A. KEY POLICY ABE
In IoT -based healthcare systems, Azees et al., [8]
proposed ways for anonymous patient and doctor For health records, confidentiality of information
authentication while ensuring the secrecy of healthcare data except for authorized users and access are critical security
transferred between the various organizations. requirements. In this key policy scheme, the ciphertext is
L. Zhang et al., [9] have created a CP-ABE-based system generated from attributes set and the user key is embedded with
that ensures user access policies are reviewed before access policy. If the set of attributes in the access policy is
accessing health care data, providing stability. Their method satisfied, then the users will be able to decrypt the message.
aims to reduce the coding time before coding the ciphertext
B.
text by adding a few unnecessary features. 978-1-6654-6084-2/22/$31.00 CIPHER-TEXT
©2022 IEEE POLICY ABE 444
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The CP-ABE scheme is more or less like other


traditional access policy mechanisms. It also works in two
ways: senders can set an access control policy that the
recipient attribute groups should follow, and it works by
allocating the identifier groups to the secret key. In this
scheme, ciphertexts are associated with access policy and the
attributes are also associated with user’s private key. The CP-
ABE is mostly used to store sensitive data in the PHRs
system.

CP-ABE approach uses four main steps:

• Setup Phase
• Key Generation Phase
• Encryption Phase
• Decryption Phase.

Setup Phase This phase generates public key PK and a


master key MK which consists of random numbers.

Key Generation Phase (S, MK): The private key (SK) is


Fig 2 AES Workflow [18]
generated by performing OR operation on master key MK
and ASCII value of the attributes list S.
ENCRYPTION:
Encrypt Phase (PK, M, A): This phase takes public key Each round consists of four sub-processes. A single
(PK), the message (M) and result of access policy structure round process is shown below:
(A) as inputs and message is encrypted and outputs
ciphertext CT

Decrypt Phase (PK, SK, CT): This phase takes public key,
ciphertext CT, result of access policy A, and private key SK
as inputs and if the set of access policy satisfies then it
decrypts the encrypted message and returns the original
message M.

C. CP-ABE ENCRYPTION AND DECRYPTION

To make the encryption more secure, two algorithms


Advanced Encryption Standard and Secure Hash Algorithm is
used. AES algorithm is used because of its high encryption
speed but is insecure if key get compromised. Since SHA is a
one-way algorithm, it is used to secure the keys.

a. ADVANCED ENCRYPTION STANDARD:


Fig 3 AES Process [19]
The AES algorithm is a symmetric algorithm that takes the
plain text in 128-bit blocks as input and converts it to
ciphertext using various sized key bits like128, 192, and 256
bits. The algorithm computes the bits as bytes. So, AES
BYTE SUBSTITUTION:
algorithm handles plain text of 128 bits as 16 bytes. These 16
bytes are arranged in 4X4 matrix. The number of cycles in the
The input 16 bytes are replaced by a fixed table (S-box)
algorithm differs and based on the key length. 128-bit size
provided in the design. The result is a 4x4 matrix.
keys use 10 rounds, 192-bit size keys use 12 rounds, and 256-
SHIFTROWS:
bit size keys uses 14 rounds for the encryption process. The
Each row of the 4x4 matrix is shifted to the left. Any falling
algorithm uses 256-bit key which was generated in the Key
entries is again inserted to the right of the row in the matrix. Shift
Generation Phase of CP-ABE Process explained above.
is done as follows –
• The first row is not affected.
• The second row is left shifted by one.
• The third row is left shifted by two places.
• The fourth row is left shifted by three places.
• The result is a new 4X4 matrix consisting of 16
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 445
identical bytes but rotated with respect to each other.
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

For each repetition, the last block output acts as the next
MIX COLUMNS: block input. The whole cycle is repeated until you reach the
ultimate 512-bit block, and then consider the resultant output of
Each of the four bytes of a single column in the matrix is the hash digest which is 256-bit long.
converted by using a special mathematical function. This
function generates new bytes which will replace the original
IV. PROPOSED WORK
bytes in the single and will repeat the same process for all the
columns. The resultant matrix is a 4x4 new matrix consists of In the existing works, one cannot revoke the attribute
16 bytes. This process is not performed in the final round. policy but in our proposed work, one can revoke or delete
the attribute policy structure and it performs encryption and
ADD ROUND KEY: decryption accordingly. We have developed a online
healthcare application that will store one’s personal health
The new 4x4 matrix will now be considered as 128 information (PHRs). We will implement an ABE scheme
bits and performs XOR operation by 128 bits round key. It where we can setup the access policies and revoke them if
will generate ciphertext in the last cycle and else, it starts necessary. The admin can fully control which details of
another similar cycle by translating 128 bits as 16 bytes. doctor/patient to be revealed to the respective users and
manager have the authority to change the secret key
DECRYPTION: (Decentralized network). Both centralized and decentralized
schemes are executed and compared for effectiveness on
The decryption process is the reverse process of the specific cases.
encryption. Each cycle consists of four consecutive processes In KP-ABE, ciphertexts are associated with sets of
– descriptive attributes, and users’ keys are associated with
• Add a round key policies (the reverse of CP-ABE). We stress that in KP-
• Mix columns ABE, the encryptor exerts no control over who has access to
• Shift rows the data that he/she encrypts, except by his/her choice of
descriptive attributes for the data. Rather, he/she must trust
• Byte substitution
that the key-issuer issues the appropriate keys to grant or
As the processes below each round go back, unlike Feistel deny access to the appropriate users. In CP-ABE, the
Cipher, encryption and decoding algorithms must be used encryptor must be able to intelligently decide who should or
separately, albeit closely related. should not have access to the data that she encrypts. So, CP-
ABE Algorithm is used
b. SECURE HASH ALGORITHM:

Secure Hash Algorithm (SHA-256) algorithm is part A. Model Workflow


of the SHA 2 family. It was the successor of the SHA 1,
which was slowly weakening against the malware attacks. The
256 represents the final resultant hash digest value i.e.,
regardless of the plain text size, the hash value will always as
remain 256 bits.
The whole process is divided into five different parts, as
mentioned below:

Padding Bits:

It adds extra bits to the original message, so that the length


of the plaintext is 64 bits will make a 512 multiple. During
addition, the first bit should be one, and the other bits should
be filled with zero.

Padding Length:

The final plain text is added by 64 bits to make a 512


multiple. It can count these 64 characters using modulus in
your real plain text without padding.
Initializing Buffers:

It initializes a set of eight buffers to be used in the cycle


and need to keep 64 different keys in the system, from KE [0]
to KE [63].

Compression Functions:
Fig 4.1 Workflow (Centralized)
The multiple 512 bits blocks is formed. Each block goes
through 64 rounds, the output of each block will act as the
input for the next block.
Output:
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 446
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Admin: In centralized ABE scheme, he/she controls both the


policy and secret key. In Decentralized ABE scheme, admin only
controls the generation or revocation of the policy.

Manager: In decentralized ABE scheme, the generation and the


changing of secret key is controlled by manager.

Patient: He/she can book appointments by viewing doctor’s


detail and are able to store their personal details securely.

Doctor: He/she can approve the chosen appointment slot by


viewing the condition of the patient.

Database: It stores all the patients, doctors, admin, manager


details in forms of tables.

Attribute authority (k) It has several attribute authorities. The


model includes several different jobs (ex: doctor, admin,
manager).

Secret Key (SK) It’s a combination of a random number created


by the admin in centralized ABE scheme and manager in
decentralized ABE scheme.

If and only if, the attributes in the ciphertext match the


attributes in the data user's secret key access policy, the data user
can decode the data. The user's secret key is obtained from the
admin authority (in centralized) and manager (in decentralized)
and is coupled with an access policy.

In centralized scheme, all the work like changing the secret


key and adding and revoking the policies is done by admin
authority. Patients can view the necessary doctor details through
policy and doctors also able to view patient health details. An
illustration is shown in Fig 3.

In decentralized scheme, the tasks are done parallelly


between manager and admin. Manager can change the secret key
and admin can add and revoke the attribute policies. Since, the
Fig 4.2 Workflow (Decentralized) work is done by the two authorities, it takes relatively less time
compared to centralized scheme. An illustration is shown in Fig
At first, the user needs to register. If they already have an 5.2
account, they can sign in with the correct credentials and can
access their respective dashboard. Doctors needs to sign in
and can view the patient information and can also approve the
appointment slots requested by the patients. Patients can view
the doctor’s specializations and can fix the appointment. In
centralized scheme is executed by only giving the access to
single authority (Admin). Only admin can change the secret
key and able to add the attribute policy and can revoke them.
An illustration is shown in Fig 4.2. In decentralized scheme is
executed by giving the access to more than one authority.
Here, there are two authorities: manager and admin. Manager
can change the secret key and admin can be able to add the
attribute policy and can revoke them. An illustration is shown
in Fig 4.2. The detailed explanation is given in project model.
The encryption time by the proposed algorithm is 0.73seconds
and decryption time is 0.858 seconds.

B. Project Model

Model is a simplified version of how things work, which is


used to give us a general overview and the path that we can
follow with our work.
Fig 5.1 System Architecture (Centralized)
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 447
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 6.2 Access Policy

If only, all the doctor (data owner), attribute and patient


Fig 5.2 System Architecture (Decentralized)
(data user) is true, then the policy satisfies and can encrypt the
data which is visible to data user. If the policy does not satisfy,
C. Working of ABE Scheme then we can't encrypt/decrypt the data. An illustration is
shown in Fig 6.2.

Setup: The authority(admin) will generate a public Multiple Authority Attribute Based Encryption (MA- ABE)
key which consists of random numbers. The above-mentioned stages are for single attribute authority
Key Generation: Secret key for specific user is (Eg.: k1 - Admin). There are ‘n’ attribute authorities in a Multi-
given by admin in centralized scheme and manager in Authority ABE scheme, (Eg.: k1, k2, k3…., kn). Each attribute
case of decentralized scheme. authority will play a role in system (E.g.: k1 – Admin, k2 -
Encryption: The ciphertext will be generated using Manager). Multiple authority is having more than only authority
public key and access policy structure. Example set of who can control the system. For ex. If we have two authorities
attributes present in the structure: (admin and manager). Authorities can split and manage the tasks
Decryption: The ciphertext will be decrypted faster. manager can generate/change secret key and admin can be
using secret key. able to add and revoke the attribute policy. If we add few more
authorities, there exists a high security vulnerability by giving
The list of attributes are separated into two sections: the access control to individual authorities.
in first section, it contains the authorities present in
the system and the next section contains the attributes/ ATTRIBUTE REVOCATION
information about the respective authorities.
In CPABE schemes, there may be a chance of dynamically
changing the user's attributes because of expiring of attributes,
revoke of attributes or need of adding new attributes. This
mechanism is called attribute revocation. For example, In the
current covid pandemic situation in which patients flooded
hospitals which out-numbered the number of available doctors
where, details of the patients were shared with other hospital
personnel like nurses to help contain the situation in the hospital.
At times like this we could add, modify, or revoke already
existing policies with new ones that suits the needs of the current
situation. Since by using two encryption algorithms, both internal
and external attacks can be prevented of its strong encryption and
decryption on the PHRs.

Fig 6.1 List of attributes 978-1-6654-6084-2/22/$31.00 ©2022 IEEE 448


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

several other features can be added to the existing model such


V. RESULTS OF CENTRALIZED AND as medicine recommendation and other pharmaceutical related
DECENTRALIZED ABE SCHEMES features.

In centralized scheme, only one authority manages


everything from secret key to adding the revoking the policy. VII. REFERENCES
In decentralized scheme, there are two authorities: manager
and admin. Manager can change the secret key. Admin can be
able to add the attribute policy and able to revoke them. [1] Holden, Richard J. “What Stands in the Way of
When using decentralized ABE scheme, the job is done Technology-Mediated Patient Safety Improvements? A
parallelly, thus taking less time compared to work done by Study of Facilitators and Barriers to Physicians’ Use of
single authority(admin) in centralized ABE scheme. If it is not Electronic Health Records.” Journal of Patient Safety,
done parallelly then the single administrator centralized ABE vol. 7, no. 4, 2011, pp. 193–203. Crossref, doi:
is effective. 10.1097/pts.0b013e3182388cfa.
[2] Zhang, Leyou, et al. “Improving Security and Privacy
In centralized ABE scheme without revocation Attribute Based Data Sharing in Cloud Computing.”
mechanisms, the security is high. Since the policy is the same IEEE Systems Journal, vol. 14, no. 1, 2020, pp. 387–97.
throughout the scheme and with single authority, the security Crossref, doi:10.1109/jsyst.2019.2911391.
is high, and flexibility is low because we cannot change the
[3] M, Raseena, and Harikrishnan G R. “Secure Sharing of
attribute policy. In centralized ABE scheme with revocation
mechanisms, the security is medium. Since the policy can be Personal Health Records in Cloud Computing Using
changed according to the corresponding needs and with single Attribute-Based Broadcast Encryption.” International
authority, flexibility is medium. Journal of Computer Applications, vol. 102, no. 16,
2014, pp. 9–14. Crossref, doi:10.5120/17898-8764.
In decentralized ABE scheme without revocation [4] Joshi, Maithilee, et al. “Attribute Based Encryption for
mechanisms, the security is high. Since the policy is the same Secure Access to Cloud Based EHR Systems.” 2018
throughout the scheme and with two authorities (manager and IEEE 11th International Conference on Cloud
admin), the security is high, and flexibility is low because we Computing (CLOUD), 2018. Crossref,
cannot change the attribute policy. In decentralized ABE doi:10.1109/cloud.2018.00139.
scheme with revocation mechanisms, the security is relatively [5] Ying, Zuobin, et al. “A Lightweight Policy Preserving
high. Since the policy can be changed according to EHR Sharing Scheme in the Cloud.” IEEE Access, vol.
corresponding needs and with two authorities, the security is 6, 2018, pp. 53698–708. Crossref,
high, and flexibility is high. An illustration is shown in table 7 doi:10.1109/access.2018.2871170.
[6] Khanom, Nilufa, and Shah J. Miah. “On-Cloud
TABLE 1 RESULTS Motherhood Clinic: A Healthcare Management Solution
for Rural Communities in Developing Countries.”
ABE SCHEMES SECURITY FLEXIBILITY
Pacific Asia Journal of the Association for Information
CENTRALIZED High Low Systems, 2020, pp. 60–85. Crossref,
(WITHOUT doi:10.17705/1pais.12103.
REVOCATION) [7] Yin, Hui, et al. “CP-ABSE: A Ciphertext-Policy
CENTRALIZED Medium Medium Attribute-Based Searchable Encryption Scheme.” IEEE
(WITH Access, vol. 7, 2019, pp. 5682–94. Crossref,
REVOCATION) doi:10.1109/access.2018.2889754.
DECENTRALIZED Very High Low
[8] Azees, Maria, et al. “An Efficient Anonymous
(WITHOUT
Authentication and Confidentiality Preservation
REVOCATION)
Schemes for Secure Communications in Wireless Body
DECENTRALIZED High High Area Networks.” Wireless Networks, vol. 27, no. 3,
(WITH 2021, pp. 2119–30. Crossref, doi:10.1007/s11276-021-
REVOCATION) 02560-y.
[9] Zhang, Leyou, Gongcheng Hu, et al. “Hidden
VI. CONCLUSION
Ciphertext Policy Attribute-Based Encryption With Fast
We have successfully implemented a flexible and Decryption for Personal Health Record System.” IEEE
revocable attribute-based encryption scheme that helps to Access, vol. 7, 2019, pp. 33202–13. Crossref,
store patient details securely as well as made a website that doi:10.1109/access.2019.2902040.
is user friendly for users to access the sensitive patient [10] Nweke, Livinus Obiora, et al. “Understanding
details and to book slots for checkups for patients and Attribute-Based Access Control for Modelling and
database which consists of patient details for the doctor to Analysing Healthcare Professionals’ Security
view. We have used in-built libraries for AES-256 Practices.” International Journal of Advanced
(Advanced Encryption Standard) and SHA (Secure Hash Computer Science and Applications, vol. 11, no. 2,
Algorithm) algorithms for encrypting the patient details 2020. Crossref, doi:10.14569/ijacsa.2020.0110286.
thus providing the users with only information that is [11] Meng, Fei, et al. “ABDKS: Attribute-Based Encryption
required for a specific circumstance. with Dynamic Keyword Search in Fog Computing.”
We have identified few scopes for future work in our Frontiers of Computer Science, vol. 15, no. 5, 2021.
proposed model. We could add more authorities to the Crossref, doi:10.1007/s11704-020-9472-7.
978-1-6654-6084-2/22/$31.00
already existing model to make it even more effective and [12] Zhang, Shuo, et al. “A Flexible KP-ABE 449
©2022 IEEE Suit for
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Mobile User Realizing Decryption Outsourcing and


Attribute Revocation.” Wireless Personal
Communications, vol. 114, no. 4, 2020, pp. 2783–
800. Crossref, doi:10.1007/s11277-020-07503-y.
[13] Lai, Junzuo, et al. “Fully Secure Cipertext-Policy
Hiding CP-ABE.” Information Security Practice
and Experience, 2011, pp. 24–39. Crossref,
doi:10.1007/978-3-642-21031-0_3.
[14] Stamatellis, Charalampos, et al. “A Privacy-
Preserving Healthcare Framework Using
Hyperledger Fabric.” Sensors, vol. 20, no. 22, 2020,
p. 6587. Crossref, doi:10.3390/s20226587.
[15] Pussewalage, Harsha S. Gardiyawasam, and
Vladimir A. Oleshchuk. “An Anonymous
Delegatable Attribute-Based Credential Scheme for a
Collaborative E-Health Environment.” ACM
Transactions on Internet Technology, vol. 19, no. 3,
2019, pp. 1–22.
[16] Chatterjee, Runa, Rajdeep Chakraborty, and J. K.
Mondal. "Design of Lightweight Cryptographic
Model for End-to-End Encryption in IoT Domain."
IRO Journal on Sustainable Wireless Systems 1, no.
4 (2019): 215-224.
[17] Anguraj, Dinesh Kumar. "Advanced Encryption
Standard based Secure IoT Data Transfer Model for
Cloud Analytics Applications." Journal of
Information Technology and Digital World 4, no. 2
(2022): 114-124.
[18] Dixit, Uma. “Cryptography – Security in E-
Banking.” (2017).
[19] Srisakthi, S., and A. P. Shanthi. "Towards the design
of a stronger AES: AES with key dependent shift
rows (KDSR)." Wireless Personal Communications
114, no. 4 (2020): 3003-3015.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 450


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Data Privatization and Security using Bit Plane


Complexity Segmentation

Suresh Kumar S Chidambaram G Dr. S. Vijayalakshmi


Computer Science and Engineering Computer Science and Engineering Computer Science and Engineering
PSG College of Technology PSG College of Technology PSG College of Technology
Coimbatore, India Coimbatore, India Coimbatore, India
sureshmsd1605@gmail.com chidambaramg5@gmail.com svl.cse@psgtech.ac.in

security. Aphy, from the Greek, signifies security, or


Abstract - Advances in digital communication play encryption, and is a tried and tested method of
an important role in our daily lives in today's encryption. Although they are identified by
world. In general, information security systems fall cryptography, they are not the same. The purpose of
into two categories: encryption and information Steganography is to conceal the existence of a
hiding. The storage and transmission of sensitive message, while cryptography defames the message so
personal data have become a partof everyday life that it cannot be understood. More importantly, the
for professional and personal well-being. purpose of steganography is to hide messages within
Therefore, the issue of secure storage and different pure messages in a way that does not allow
transmission of confidential information is interest any enemy to try and show that there is a next
to many researchers. Steganography is a collective mysterious message out there. Steganography covers a
method to hide sensitive data in unobtrusive digital wide range of media coverage techniques. Among
media such as video, audio, and images. One of the these methods are invisible ink, microdots, computer
biggest challenges in developing steganography tags, secret channels, and comprehensive
systems is finding the right balance between correspondence. The message is embedded in the news
metrices like reliability, security, and data privacy. media in an invisible way so that no one can suspect
This project provides information about how the its existence.
Bit Plane Complexity Steganography (BPCS)
technology is applied to both grayscale and color Steganography image techniques can be grouped
imaging techniques and assesses performance into two main classes. for example, local domain
parameters such as data concealment, security and processes and common domain techniques. In local
stability based on the peak signal-to-noise ratio area settings, a secretmessage is enclosed within the
(PSNR) and Mean Square Error (MSE) with image by using various image pixels. In frequency
various test cases to explain how it works for domain techniques the image is converted to another
using a switch such as a transparent wavelet change
different files and images.
and then the message is covered using any standard
Keywords—Bit Plane Complexity, Cryptography, input techniques. This project focuses on local context
Steganography in image steganography. The image in which the
secret message is covered is called a steganographic
image.
I. INTRODUCTION
There are different categories of strategies in the
local space,
Steganography is a way of concealing confidential
information from another network company without 1. LSB steganography,
explicit evidence of data exchange. Steganography is
similar to encryption, but it hides the message in a 2. RGB based steganography,
vessel image. Only the recipient knows what is 3. total pixel differencing steganography.
happening inside the image. In steganography,
sometimes the user does not think about the level of 4. mapping based steganography,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 451


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

5. palette based steganography, M. Chandra Sekhar and colleagues [6]


propose a new steganographytechnique called bit-
6. collage based on steganography, plane complexity segmentation steganography that
7. spectrum steganography, offers broad bounds for data hiding. This feature can
be used for data hiding techniques because replacing
8. code-based steganography, complex areas of each hatch layer with a non-uniform
and others. All standard steganography procedures double pattern is imperceptible to the human eye.
have a data encryption limit. It can only hide10% (or
less) of the image’s information steps. Gabriel Kamau et al. [7] propose to adapt the
BPCS implementation method using a random
Eiji Kawaguchi and R. O. Eason has found a new selection of CGC bits in the noisy region of the vessel
way to overcome the shortcomings of traditional image
steganographic techniques. This technique called the
Bit Plane Complexity Segmentation (BPCS) Andysah Putera Utama Siahaan et al. [8] proposed
Steganography technique. Data encryption limit is a system that aims to combine steganography with
about half the size of the container. It is being replaced cryptography. The combination of One Time Pad
by all "sound-like" regions on small ship image and BPCS results in the perfect camouflage.
aircraft with private data without deteriorating image
quality. As a result, the BPCS method is chosen. Bit Prof Sasikumar Gurumurthy et al. [9] proposed
plane Complexity Segmentation (BPCS) technique that bit plane complexity segmentation steganography
is one of the steganography ways thatgrouping the is a new steganography technique with greater ability
set of the original information into bit- planes. to hide information. Conversion of complex areas in
each bit plane of a image into binary patterns is
invisible to the naked eye.
II. RELATED WORKS
Saha et al. [10] proposed a steganographic
Xin Liao et al. [1] proposed a new channel- technique based on Exploiting Modification Direction
dependent payload segmentation strategy based on using the array of hash weightage.
channel correction gain probability. It offers better
anti-Steganographic analysis performance than the III. PROPOSED SYSTEM
average payload section and easy color mixing
compared to modern color image Steganographic In the existing systems, several methods like Least
analysis. Significant Bit Insertion, Edge Adaptive Stegan-
ography, etc. are implemented. Even BPCS for the
Cho Do Xuan and colleagues [2] proposed an grey scale images is implemented. BPCS method is
innovative method to improve the quality of very stealthy and reliable, complex. and the
information hiding. It offers a new approach to embedding ability is high compared to other
computing image complexity to providedigital image Steganographic methods like Edge Adaptive and Least
analysis in general and to hide BPCS information. Significant Bit Insertion Algorithm. In our proposed
system, BPCS is implemented for both color and grey
Shivani Jain and colleagues [3] examine scale images and both processes are evaluated based
steganographic approaches and how encryption can on their performance using PSNR and MSE.
be used to support the encryption of patient data by
using encryption to protect patient data. Based on the data hiding capacity and resistant to
attacks, BPCS is the best among the steganographic
Zin Mar Htun et al. [4] proposed using BPCS techniques. A web application is developed to get and
steganography to embed secret information in image protect the user’s data using Bit Plane Complexity
containers that are unaltered by the human eye. The Steganography (BPCS) technique on both gray scale
main standard of this strategy is to divide the binary and color image methods and evaluate their
image into informative and noise-like areas. performance parameters like data hiding capacity and
distortion method based onPeak Signal to Noise Ratio
Sakshi Audi et al. [5] teach the basics of (PSNR), and Steganographic analysis.
cryptography and steganography and compare the
advantages and disadvantages of different types of Data hiding techniques have long been widely used
steganography. to transmit or hide secret messages. Ensuring data
security is a major concern for the users. Businesses,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 452


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

professionals, and consumers may have sensitive data • Embed messages from secret files (text files)
that they want to protect from others. Steganography into cover image files using the BPCS
isvery useful for repelling enemy attacks caused by embedding algorithm.
unauthorized access and malware attacks. Asa result,
the proposed system developed a system that hides • Retrieve Steganographic image file (.png).
data in the image processing process using a bit-plane
complexity segmentation algorithm. Data hiding • Next, we must extract the secret message from
capacity is measured by how much data can be the steganographic image. There are threesteps
embedded in the image. It is evaluated by Mean to extract the original secret message.
Square Error which shows the pixel intensity between • Select the Steganographic image file (.png).
the original and the embedded image. By embedding
the data in an image, the data is prevented from • Using BPCS technology to extract secret
malware attacks and thus ensures that the data stored messages from steganographic imagefiles and get
is secure. original text messages.

Fig. 1. Proposed System Design

The system is shown in two parts: the sending site and


the receiving site. The sender's website uses the BPCS
embedding technique to embed the original text
message in the image file without degrading the image
quality. The sender then receives a steganographic
image file that is sent to the recipient over the web
application. On the receiving end, the recipient
receivesa Steganographic image file from the sender.
Then, the secret message (secret file) is extracted from
the Steganographic image file using the BPCS
extraction method to obtain the original secret
Fig. 2. System Workflow
message. The detailed embedding algorithm is
explained in working of BPCS.

Steps to embed data are as follows:


IV. MODEL WORKFLOW
• Choose a secret file data (any file)
A web application is developed to collect the user’s
• Select the steganographic vessel image file (.png) data that needs to be protected. Users create their
account, and their details are stored in the database.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 453


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The user can login using valid credentials and upload


the file to be embedded within the image. The files are
then stored in the local system from where
steganographic techniques are implemented. The user
can either retrieve the data from the steganographic

image and performance analysis of the steganographic


techniques on both grayscale and color image methods
are evaluated. Hiding the target file using stegano-
graphic module and retrieving the original data by
decoding the extracted data from the embedded image.
The workflow of the web application is illustrated in
fig 2.

V. BPCS TECHNIQUE

BPCS steganography technique is implemented


on both grayscale and color images and their
performances are evaluated. The BPCS Technique is
explained as follows:

• Encode the secret data using Unicode


Transformation Format 8bits (UTF-8) algorithm.
• Transform the encoded data by the user to
equivalent form using blocks. Transform every
block into a binary 8×8-bit image.
• Decompose the standard steganographic image
in its bit planes.
• Divide each bit plane in 8×8-bit blocks and Fig 3. Steganographic Module
compute complexity for each one. Black-and-
white border length is adopted by BPCS
technique to measure the complexity of the
image. VI. WORKING OF BPCS

• If the border is long, then the image is complex, Kawaguchi and Eason first introduced the BPCS
and the image is simple, if the border is short. technique as a solution to the low payload problem of
• The total length of the black and white border in already existing traditional steganographic methods.
the image is equal to the sum of the both the In this technique, the bits are first converted from pure
number of black and white changes along the binary code (PBC) to Canonical Gray coding (CGC).
rows and columns in the vessel image. Embedding the secret user’s data using the CGC bits
pattern improves the imperceptibility(hiding)
• Design a map with noisy blocks and replace them performance by reducing distortions of the noise in the
by information block through Additive white original image bitmap. The images (both color and
Gaussian noise (AWGN) Channel. grayscale) is then divided into multiple bit planes,
• The performance parameters like data hiding classified as "information" or "noise". Noisy bit-planes
capacity and distortion method are evaluated of the vessel image are complex regions. The threshold
based on Peak Signal to Noise Ratio (PSNR), value which is (α is 0.45) is used to determine the bit
and Steganographic analysis. plane complexity of the image by measuring how
often a bit changes from 0 to 1 and from 1 to 0 in
the image’s bit plane.Often α is defined as a criterion
to judge whether the block is complex or not.

α = k/2*m*(m-1)

• k- is the total length of border in a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 454


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

particular block, user’s secret data into noisy bit plane blocks to
effectively secure it. Because this method uses both
the most significant bit (MSB) and the least significant
• m-is the row or column in a block,
bit (LSB) of the vessel's noise block, it offers a much
faster embedding rate than the traditional LSB method,
• α ranges between 0 and 1. which uses only the vessel's LSB.

If a given bit plane’s complexity exceeds a The BPCS embedding procedure is summarized
threshold, it will skip the corresponding embedding below.
process for that block. The complexity of the included
secret is also calculated and, if found below a
threshold, adjusted to make it complex before
• First, Input the vessel image (m * n)
including it in the vessel file. Fora 2n x 2m grayscale • Convert the vessel images from PBC to CGC
black and white image with black as the foreground
area and white as the background area, the blend • Segment each vessel image's bit plane into
would look like this: informative and noise-like regions using a
threshold value of 0.45.
• Two checkerboard schemes Wc and Bc have been • Secret data bytes are grouped into a series of
initialized. where Wc has a whitepixel (e.g. 1) in blocks.
the upper left of the image and a black pixel is Bc
(e.g. 0) in the upper left. • If a block is having less complexity value than the
threshold, it is conjugated again tocreate a more
• The image P is inputted with black pixels(B) in the complex block to embed the data.
foreground area and pixels in thebackground area
are white pixels (W).
• P* is defined as the conjugate of P that satisfies the
below following conditions:
o The shape of the foreground area should be the
same as that of P.
o The foreground area’s pattern is Bc.
o The background area’s pattern is Wc .

Fig. 4. Conjugation Binary Patterns

The following properties apply to conjugation


operations:

• P * = P ō Wc, where 0 means XOR operation.


• P* ≠ P
• If α(P) is the given image’s(P) complexity, then
α(P*) = 1-α(P).
As the Human Visual System (HVS) becomes
more and more sensitive to the patterns which is Fig. 5. BPCS Embedding Framework
represented by an image's information regions, it hides

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 455


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

• Embed each secret block in a noise bit- planes PSNR is used for comparing the value of the
region of the image. required image signal against the value of a corrupting
noise which is in unit decibels. The low PSNR value
• Convert back the original vessel image from CGC indicates the background noise will be more
to PBC. perceptible. So, PSNR should be higher for getting
better image quality.
• Steganographic image is produced as the final
output
255
High payload capacity is the main advantage of the 𝑃𝑆𝑁𝑅 = 20 log10
BPCS technique. Since due to problem of data hiding √(𝟏/𝑵) ∑𝑵−𝟏 ′
𝒊=𝟎 (𝑰𝒊 − 𝑰𝒊 )
𝟐
space, increasing a vessel's payload capacity has a
negative effect on data hiding capacity. In addition, the
vessel's robustness to image processing tasks such as Where, 𝐼𝑖 is the value of a pixel in the original
compression is important to ensure the security of the image and 𝐼𝑖′ is the value of the same pixel after
information it contains. The BPCS cannot allow even embedding, respectively. N is the number of pixels.
the small changes in the image unless the secret data is 255 is the maximum signal value that exists in the
embedded in a higher order of the bit-planes, which original “known to be good” image.
further degrades the vessel's data hiding capacity and
impenetrable capacity. BPCS technique takes around B. STEGANOGRAPHIC ANALYSIS
65 seconds to extract the secret data from the
embedded image if the secret data size is 5MB. If the
data size is less, extracting the secret data will be very The Steganographic noise analysis is performed by
fast and if data size is more, it might take more time. using the tool (29a.ch) to analyze the embedded image.
The BPCS technique embedding framework is shown If the steganographic image is analyzed, just only the
in Fig 5. noisy regions are visible but can't retrieve the data in
it. So, the security is high.

VIII. TESTING
VII. PERFORMANCE EVALUATION
A. Test Case 1
Bit Plane Complexity Steganography (BPCS)
technique on both gray scale and color image methods The original vessel image is color image which is
implemented. Then, performance parameters like data of size 2.62 MB. The data which to be embedded is a
hiding capacity and distortion method based on Peak pdf file which is of size 872 KB. After implementing
Signal to Noise Ratio (PSNR), and Steganographic the BPCS technique, the data will be embedded in the
analysis are evaluated. vessel image. The PSNR value by comparing both
vessel and Steganographic image is 61.5 dB. The
higher the PSNR value, the better will be embedding
A. MSE AND PSNR capacity and the image quality. Even if noise analysis
is performed on the Steganographic image only the
The Mean Square Error (MSE) and the Peak Signal data which is embedded in the noise regions is visible,
to Noise Ratio (PSNR) are the corresponding metrics but the data can’t be retrieved.
which were used to compare the quality of the
steganographic image by comparing both vessel and
steganographic images.

MSE measures the average pixel intensity


Fig 6 TC1 MSE and PSNR Analysis
difference between the original vessel and the
steganographic images. Lower levels of MSE
indicates a better quality image signal.

𝑵−𝟏

√(𝟏/𝑵) ∑(𝑰′𝒊 − 𝑰𝒊 )𝟐
𝒊=𝟎

Fig 7 TC1 Noise Analysis of Steganographic Image

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 456


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

B. Test Case 2

Here, the original vessel image is also a color


image which is of size 766 KB. The data which to be
embedded is a word file which is of size 612 KB. After
implementing the BPCS technique, the data will be
embedded in the vessel image. The PSNR value by
comparing both vessel and Steganographic image is 34
dB. Noise analysis is also performed as shown in fig.
9, and the security is high.

Fig 11 TC3 Noise Analysis of Steganographic Image

D. Test Case 4
Fig 8 TC2 MSE and PSNR Analysis
Here, the original vessel image is also a grayscale
image which is of size 223 KB. The data which to be
embedded is a image file which is of size 130 KB.
After implementing the BPCS technique, the data will
be embedded in the vessel image. The PSNR value by
comparing both vessel and Steganographic image is 53
dB. Noise analysis is also performed as shown in fig.
13 and the security is high.

Fig 9 TC2 Noise Analysis of Steganographic Image

C. Test Case 3 Fig 12 TC4 MSE and PSNR Analysis

The original vessel image is a grayscale image


which is of size 1.8 MB. The data which to be
embedded is a pdf file which is of size 1.3 MB. After
implementing the BPCS technique, the data will be
embedded in the vessel image. The PSNR value by
comparing both vessel and Steganographic image is 35
dB. Noise analysis is also performed as shown in fig.
11 and the security is high.

Fig 10 TC3 MSE and PSNR Analysis

Fig 13 TC4 Noise Analysis of Steganographic Image

E. Test Case 5 (Exception Case)

The original vessel image is a grayscale image


which is of size 2 MB. The data which to be embedded
is a pdf file which is of size 2.3 MB. Here, the BCPS

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 457


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

technique can’t be implemented. The data which is to the Performance evaluation and test cases performed it
be embedded should be always less than the is inferred that the color vessel image with size of 5
steganographic vessel image. If the vessel image is MB or above has better embedding capacity.
less than the data to be embedded, then “embedding is Impenetrable capacity cannot be compromised and a
not possible” message will be displayed. good steganographic method should ensure that the
embedding procedure introduces minimal noise to the
IX. TESTING EVALUATION vessel image. The time taken for embedding and
extracting secret data can be reduced by implementing
In the first two cases, the vessel is color with a combination of two steganographic techniques.
image and in the last two test cases, the vessel image XI. REFERENCES
is grayscale. In test case 1, the MSE value is low. And
PSNR is high. So, embedding capacity should be high [1] X. Liao, Y. Yu, B. Li, Z. Li and Z. Qin, "A New Payload
and distortion measure should be low. Distortion Partition Strategy in Color Image Steganography," in
IEEE Transactions on Circuits and Systems for Video
measure is how the noise modifies in the image. In test Technology, vol. 30, no. 3, pp. 685-696, doi:
case 2 and 3, PSNR value is medium. So, embedding 10.1109/TCSVT.2019.2896270, 2020.
capacity is medium and the distortion measure is little
[2] Cho Do Xuan, “A Proposal to Improve the Bit Plane
high. In test case 4, the PSNR value is high.
Steganography based on the Complexity Calculation
Embedding capacity is high. From all the test cases as Technique” International Journal of Advanced Computer
shown in Table 2 , the color vessel image which is of Science and Applications(IJACSA), 12(6), 2021.
higher size(5MB) performs better. The security by
[3] Jain, Shivani, Shivani Dubey, and Vikas Singhal. "Review
performing noise analysis is high. The graph is also of Steganography Techniques for securing Patient
illustrated in Fig 24 to demonstrate the MSE and Information embedded in Medical Image." International
PSNR for the different test cases. Journal of Scientific Research in Computer Science
Applications and Management Studies, 2020.
TABLE 1 TESTING EVALUATION [4] Htun, Zin Mar, and Zar Ni Zin. "Image Steganography
using Bit Plane Complexity Segmentation." International
Journal of All Research Writings 2.12, 2020.
Test Vessel MSE PSNR Inference
Cases Image (dB) [5] Audhi, Sakshi, and Maruska Mascarenhas. "A
Comparative Study on Different Techniques of
Type Cryptography and Steganography." International Journal
of Information and Computing Science, 2019.
Case Color 0.04650 61.45535 Higher
1 [6] Chandra Sekhar, M, S K. Chandini, V Sai Rohith, V Jhansi
Lakshmi, & M Pavan Kumar. "Data hiding using bit plane
Case Color 25.77889 34.01857 Medium complexity segmentation steganography”, Science
2 Publishing Corporation, International Journal of
Engineering and Technology, 2022.
Case Grayscale 16.74889 35.89095 Medium [7] Gabriel Kamau, Waweru Mwangi , Wilson Cheruiyot. “A
3 Modified Bit Plane Complexity Segmentation
Steganographic Method: Increasing Payload
Case Grayscale 0.29057 53.49629 Higher Imperceptibility and Robustness”, Journal of Theoretical
4 and Applied Information Technology 2019.
[8] Siahaan, Andysah Putera, Utama. "Text Hiding in Digital
Image using BPCS Method" International Journal for
X. CONCLUSION Innovative Research in Multidisciplinary Field , 2017.
[9] Gurumurthy, Sasikumar & A.Valarmozhi, & Priya
Impenetrable capacity of the embedded data is the Mahaboba. "Design and Implementation of Bit plane
important aspect of any steganographic method. While complexity segmentation using steganography in
embedding the data in a digital image the cover image Internet". International Journal of Computer, Electronic
will be modulated in some way. So, the important and Electrical Engineering. 2. 21-25, 2012.
thing is to ensure that the introduced noise does not [10] Saha, S., et al. "Extended exploiting modification
perceptibly degrade the vessel image to guarantee or direction based steganography using hashed-weightage
increase the security of the embedded data. In this Array", Multimed Tools Appl, vol. 79, pp. 20973–20993,
2020.
project, BPCS embedding technique is used to
securely store the information within the CGC
(Canonical Gray Coding) bits of the vessel’s bit
planes. MSE and PSNR results demonstrated the
improvements on the quality of steganographic images
produced by the proposed BPCS technique. Based on

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 458


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Design and Security Analysis of Isoidentity based


Isobeta Cryptosystem
Nilesh Bhosale Rupesh Pohane Siddhant Meshram
Department of Applied Mathematics, Department of Mathematics, Computer Science Department at New
Yeshwantrao Chavan College of Suryodaya College of Engineering and York University,
Engineering, Technology, Room 305, 251 Mercer Street,
Nagpur, M.S., India 441110 Nagpur, M.S., India New York, NY 10012
nileshbhosale897@gmail.com rupeshpohane@gmail.com sidmeshram97@gmail.com

Akshaykumar Meshram* Malabika Adak K. T. V. Reddy


Department of Applied Mathematics, Department of Applied Mathematics, Faculty of Engineering and
Yeshwantrao Chavan College of Yeshwantrao Chavan College of Technology, Datta Meghe Institute of
Engineering, Engineering, Medical Sciences (Deemed to be
Nagpur, M.S., India 441110 Nagpur, M.S., India 441110 University), Sawangi (Meghe),
akshaykjmeshram@gmail.com malabikaadak@yahoo.co.in Wardha, M. S., India 442004
ktvreddy.feat@dmimsu.edu.in
*Corresponding Author

Abstract— Digital data protection frameworks inclusive of requires individual “identity” of his/her connection client and
cryptographic mechanisms and signature crypto mechanisms are the openkey of the 𝒦𝒜𝒞, at one time with his/her closekey,
essential for stable data communication in open network systems. to interconnect with other clients. Hence no open folder
An extensive open-key folder is not necessary for 𝓘𝓓-based crypto compulsory in this mechanism. After all, Shamir did not
mechanisms like 𝓘𝓓 -based crypto mechanisms, the 𝓘𝓓 - succeed to build an identity-based cryptosystem, however
basedsignature mechanisms, else 𝓘𝓓 -basedkey circulation succeed just to build an identity-based signature mechanism.
mechanisms are between the enhanced an opposing for create Thereafter many scholar suggested several classes of ℐ𝒟 -
stable and protected digital data communication for enormous- based cryptographic mechanism. An identity-based key
scale open network systems recommended by Shamir. This article
transmission mechanism is presented by Okamoto [3] in 1988
suggests an isoidentity based isobeta crypto mechanism build on
the generalized isodiscrete isologarithm isoproblem and isointeger
and extensive their mechanism for client recognition
isofactorization isoproblem that is one of the initial presented by Ohta [4]. The above-mentioned mechanism
implementations of Shamir's for security norms. Also, we examine utilized the RSA openkey crypto mechanism having security
the security adverse a conjuration of certain clients in the is built on the computational difficulty of factoring product of
suggested mechanism, and demonstrate the probability of two huge primes. An ℐ𝒟- based crypto mechanism build on
establishing a higher secure mechanism. the discrete logarithm problem presented by Tsujii and Itoh
[5] along with discrete exponent which utilized the ElGamal
Keywords— Cryptography, Isomathematics of first-kind openkey crypto mechanism.
(𝓘𝓕𝓚) , Isobeta cryptographic mechanism, Isodiscrete
isologarithm isoproblem (𝑰𝓓𝓛𝓟) , Generalized Isodiscrete A non-interactive ℐ𝒟 -Based open-key circulation
isologarithm isoproblem (𝓖𝑰𝓓𝓛𝓟) , and Isointeger mechanism presented by Maurer and Yacobi [6] in 1991 in
isofactorization isoproblem (𝓘𝓘𝓕𝓟). which no additional authentication by certificates as the open
keys are oneself authenticated. The amended variant of this
I. INTRODUCTION mechanism presented in [7]. With multi purposes like an
For stable and protected data transmission, essentials to be identification mechanism, ℐ𝒟 -Based signature mechanism,
collective close session key among two clients. Close session and a conference key circulation mechanism required strong
key circulation will be a significant issue as the number of computational efficiency as the computational difficulty of the
clients is expanding in the open network system. The model mechanism is heavy. Factoring and discrete logarithm based
for the open key circulation system (𝒪𝒦𝒞𝒮) presented by open key crypto mechanism presented by L. Harn [8]. A
modified ℐ𝒟 -Based encryption mechanism of integer
Diffie and Hellman in 1976 [1]. In the 𝒪𝒦𝒞𝒮, every client
factorization problem, which is incapable as plaintext is
require to choose a close key and numerate an analogous
converted bit-by-bit and henceforth the output of converted
openkey and save in open directory. The collective closes
plaintext turns into protracted. A mechanism that can transfer
sessionkey will be mutual among binary clients; can be
the entire crypto mechanism build on discrete logarithm the
numerate by some one client, created on his/her individual
ℐ𝒟-based mechanism presented by Wei Bin lee and Kuan
close key and the other client’s open key. The 𝒪𝒦𝒞𝒮 runs an
Chieh Liao [9] in 2004. An ℐ𝒟-based crypto mechanism and
aesthetic approach to simplify the key circulation issue, the
primary thinking is the validation of the open keys utilized in modified ℐ𝒟 -based crypto mechanism build on double
the cryptographic mechanisms. The framework of an identity generalized discrete logarithm problem presented by C.
is presented by Shamir [2] in 1984. In an identity mechanism, Meshram [10-12]. Lightweight crypto mechanisms for end-to-
every client requires to identify himself/herself from key end encryption process in IoT field presented by Chatterjee,
authentication isocenter (𝒦𝒜𝒞) prior to connecting the open Chakraborty and Mandal [13] in 2019.
network system. The 𝒦𝒜𝒞 will approve and give his/her In 2020, crypto mechanisms build on quadratic-
close key if client’s identity is recognized. Thus, a client exponentiation-randomized and partial discrete logarithm

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 459


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

problem presented in [14]. Key exchange protocol build on ˆ ; ξ̂−𝓇ˆ is named as isoinverse of ξ̂ 𝓇 ; (ξ̂𝓇ˆ ,×
𝔗 ˆ ).
isoring isopolynomials coefficient presented in [15]. Lately,
Key exchange protocol and isocrypto mechanism build on B. Mathematical definition of 𝒢𝐼𝒟ℒ𝒫
Santilli’s isomathematics presented in [16-18]. Improvements Let 𝒢̂ be cyclic isogroup of order ℯ̂ such that isonumber
in the cloud safety with crypto mechanisms, deep learning 𝓈̂ ≡ ℊ̂ 𝓉̂ for isonumber 𝓉̂ ∈ [0, ℯ̂ − 1] then ℊ ̂
and block-chain presented by Hari Krishnan Andi [19] in
primitiveisoroot of the isogroup is knowing 𝒢I𝒟ℒ𝒫.
2021.
C. Mathematical definition of ℐℐℱ𝒫
In 2022, isokey interchange protocol, beta and IsoQER
cryptosystem build on isonumber presented in [20-22]. To numerate isoprime isonumbers ℕ ̂ =𝓏 ̂1 ∗ 𝓏
̂2 ∗
In light of the perception that new crypto mechanism 𝓏
̂3 ⋯ 𝓏
̂ℯ , an decomposition for positive isointeger ℕ̂ is
generally encounter security difficulties and privacy concerns knowing ℐℐℱ𝒫.
and numerous crypto frameworks build on integer
factorization & discrete logarithm have been implemented. III. INTRODUCTION OF THE ℐℐℬ𝒞
Isokey creation segment with low computational complexity Establishment for the isocenter and every customer:
for transformation procedure is main role in our crypto
mechanism such as no correction in initial Shamir mechanism. Step 1: Every customer creates a 𝓃̂ −dimensional isobinary
Thus propose crypto mechanism have identical protection as isovector for his/her ℐ𝒟 and records with the isocenter. The
the initial one and preserves entire advantages of the ℐ𝒟-based isocenter stocks it in open/public folder. We indicate
mechanism. customer 𝒿̂′ s ℐ𝒟 by ℐ𝒟𝒿̂ =
In this study, we suggested unique ℐ𝒟 -beta (𝓎̂𝒿̂1 , 𝓎̂𝒿̂2 , 𝓎̂𝒿̂3 , 𝓎̂𝒿̂4 , … … … , 𝓎̂𝒿̂𝓃̂ ), 𝓎̂𝒿̂𝒾̂ ∈ {0,1} , (1 ≤ 𝒾̂ ≤
cryptosystem called isoidentity based isobeta cryptosystem 𝓃̂). (1)
(ℐℐℬ𝒞) . The safety of suggested isobeta cryptosystem on Step 2: The isocenter creates binary isoprime isonumbers 𝒫̂
isomathematics, generalized isodiscrete isologarithm problem and 𝒬̂ , numerate ℕ ̂ = 𝒫̂ ∗ 𝒬̂ . (2)
with individual discrete exponent and isointeger Thus, the isocenter elect an irrational isonumber 𝒹̂, 1 ≤ 𝒹̂ ≤
isofactorization. Our system does not need any shared initial 𝜑(ℕ ̂ ) satisfy gcd (𝒹̂ , 𝜑(ℕ ̂ )) = 1 for iso-Euler function
communications in all data transmission and every ̂ ̂ ̂ ̂ . Then isocenter circulates
𝜑(ℕ) = (𝒫 − 1)(𝒬 − 1) of ℕ
assumption excepting the complexity of the generalized ̂ ̂
(𝒹 , ℕ) as the openkey.
isodiscrete isologarithm problem. Therefore the suggested
system is a tangible model of an ℐ𝒟-based cryptosystem that Every customer can numerate the customer 𝒿̂′𝑠 extended ℐ𝒟
fulfills Shamir’s primal idea [2]. as ℰℐ𝒟𝒿̂ ;
̂
𝒹
ℰℐ𝒟𝒿̂ = (ℐ𝒟𝒿̂ ) (modℕ ̂ ) = (ξ̂𝒿̂1 , ξ̂𝒿̂2 , ξ̂𝒿̂3 , ξ̂𝒿̂4 , … … … , ξ̂𝒿̂𝓀̂ ),
II. RELEVANT MATHEMATICAL DEFINITIONS
̂ξ𝒿̂𝒾̂ ∈ {0,1}, (1 ≤ 𝒾̂ ≤ 𝓀̂) (3)
In this section, we resolve rapidly relevant mathematical
definitions utilizes to design ℐℐℬ𝒞 over isofields. Where 𝓀̂ = |ℕ ̂ | is a bits of ℕ ̂
Step 3: isocenter's conceal data: The isocenter elects an
A. Mathematical definition of ℐℱ𝒦
irrationa huge isoprime 𝒫̂ and 𝒬̂ , numerates ℕ ̂ = 𝒫̂ 𝒬̂ and
Isonumbers ξ̂ = ξ𝔗 ˆ is an element in the rings ℱ̂ = ⃗
createss 𝓃̂ −dimensional isovector 𝓍̂ over 𝒵𝜑(ℕ̂) such that ̂ ∗

ℱ̂(ξ̂, +,׈) where ξ ∈ ℱ, 𝔗 ˆ = 1/𝔍ˆ is a well behaved,


𝓍̂⃗ = (𝓍̂ 1 , 𝓍̂ 2 , 𝓍̂ 3 , … , 𝓍̂ 𝓃̂ ), (4)
invertible and Hermitean quantity external from the original
1 ≤ 𝓍̂ 𝒿̂ ≤ 𝜑(ℕ ̂ )(1 ≤ 𝒿̂ ≤ 𝓃̂) ,
field 𝔗 ˆ = 1/𝔍ˆ ∉ ℱ and ξ𝔗 ˆ is the multiplication in ℱ
ˆ with 𝓍̂ 𝓊̂ ≠ 𝓍̂ 𝓋 ̂(mod𝜑(ℕ ̂ )), 𝓊 ̂≠𝓋 ̂ (5)
equipped with the isoaddition ξ̂ + 𝓇ˆ = (ξ + 𝓇)𝔗
ˆ for 𝓃̂-dimensional binary isovector 𝓊 ̂ and 𝓋 ̂ and stock it as
traditional additive unit 0 = 0𝔗 = 0, ξ̂ + 0 = ξ̂ + 0 =
the isocenter s conceal data. To prevent the inadvertent
ξ̂, ∀ξ̂ ∈ ℱ̂ and the isomultiplication ξ̂ ׈ 𝓇ˆ = ξ̂𝔍ˆ𝓇ˆ = chance of certain customers, closedkeys take care by equation
ξ𝔗 ˆ 𝔍ˆ𝓇𝔗 ˆ = (ξ𝓇)𝔗 ˆ with 𝔗 ˆ = 1/𝔍ˆ is the correct left and right (5). The isocenter elects a super collective isosequences
novel unit (𝔗 ˆ ×
ˆ ξ̂ = ξ̂ × ˆ = ξ̂, ∀ξ̂ ∈ ℱ̂) called isounit
ˆ 𝔗 consistent to 𝓍̂ as 𝓍̂ 𝒿̂′ (1 ≤ 𝒿̂ ≤ 𝓃̂) that ∑1≤𝒿̂≤𝓃̂ 𝓍̂ 𝒿̂′ < 𝜑(ℕ ̂)
satisfy (6)
ˆ ˆ , ξ̂−𝔗ˆ = ξ−1 𝔗ˆ,
ξ̂𝔗 = ξ𝔗 ⃗
to creates the vector 𝓍̂ is to utilize the Merkle and Hellmans
ˆ ˆ
ξ̂𝔗 ׈ ξ̂−𝔗 = ξ̂0̂ = 𝔗 ˆ = 𝔍ˆ−1 ≠ 1, crypto mechanisms [10].
ˆ , ξ̂−𝓇ˆ = ξ−𝓇 𝔗
ˆ, Step 𝟒: Numerates 𝓃̂-dimensional vector 𝓍̂⃗ as
ξ̂𝓇ˆ = ξ𝓇 𝔗
𝓍̂ 𝒿̂ = 𝓍̂ 𝒿̂′ 𝓇̂ (mod𝜑(ℕ ̂ )) (1 ≤ 𝒿̂ ≤ 𝑛) (7)
ˆ = 𝔍ˆ−1 ≠ 1,
ξ̂𝓇ˆ ׈ ξ̂−𝓇ˆ = ξ̂0̂ = 𝔗
for an exclusive isointeger 𝓇̂ satisfy gcd (𝓇̂, 𝜑(ℕ)) = 1 , ̂
ℓ ℓ ̂
ℓ ℓ
ξ̂𝓇 = ξ𝓇 𝔗 ˆ , ξ̂−𝓇 = ξ−𝓇 𝔗
ˆ, where 𝓍̂⃗ = (𝓍̂1 , 𝓍̂ 2 , 𝓍̂ 3 , … , 𝓍̂ 𝑛 ). (8)
ℓ/𝓇 ˆ −ℓ/𝓇 ̂ 0̂ ˆ = 𝔍ˆ−1 ≠ 1,
ξ̂ × ξ̂ = ξ̂ = 𝔗 ̂ ))
Step 5: Elect an exclusive isointeger 𝒸̂, (1 ≤ 𝒸̂ ≤ 𝜑(ℕ
ˆ = ξ̂𝔍ˆ𝔗
ξ̂ ׈ 𝔗 ˆ = ξ̂,
satisfy 𝒹̂ 𝒸̂ ≡ 1(mod𝜑(ℕ ̂ )) (9)
ξ̂ ׈ 𝓇ˆ = ξ𝔗 ˆ 𝔍ˆ𝓇𝔗 ˆ = ξ𝓇𝔗 ˆ ,
ˆ = ξ𝓇 Step 6: Isocenter public data: Numerates 𝓃̂ -dimensional
ˆ 𝔍ˆ𝓇 −2 𝔗
ˆ = ξ/𝓇 2 𝔗
ˆ isovector ℏ ̂ by elects a random isointeger 𝛼̂ of 𝒵̂ ̂∗ as
ξ̂ ׈ 𝓇ˆ −2̂ = ξ𝔗 ℕ
̂ = (ℏ
ℏ ̂1 , ℏ ̂2 , ℏ
̂3 , … … , ℏ
̂𝑛 ), (10)
ˆ is named as isounit, 𝔍ˆ is named as isoinverse of
where 𝔗 ̂𝒿̂ = 𝛼̂ 𝓍̂ 𝒿̂ modℕ
ℏ ̂ (1 ≤ 𝒿̂ ≤ 𝑛), (11)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 460


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

̂ , 𝒹̂ , ℏ
The isocenter notifies all entity (ℕ ̂) as open data. Theorem-1: A 𝓃̂ − dimensional isovector 𝓍̂ ′ over 𝒵̂ℕ̂∗ can
Step 7: Every customer closedkey: customers 𝒿̂′s closedkey determine by (𝓃̂ + 1) customers'
𝒮̂𝒿̂ is numerate by inner isoproduct of 𝓍̂ and ℰℐ𝒟𝒿̂ as 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) which is identical to the genuine
𝒮̂𝒿̂ = 𝓍̂ ℰℐ𝒟𝒿̂ (mod𝜑(ℕ̂ )) = ∑1≤𝒾̂≤𝑛 𝓍̂ 𝒾̂ ξ̂𝒿̂𝒾̂ mod(𝜑(ℕ
̂ )) (12) isocenter's safe data.
Proof: The under-mentioned system of isolinear
IV. SCHEME INITIALIZATION FACTORS congruence's for (𝓃̂ + 1) customers'
𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) conspire;
A. Isocenter conceal data:
ℰℐ𝒟1 𝓍̂1 𝒮̂1
For 𝓃̂ −dimensional isovector 𝓍̂ and isointeger 𝒸̂, the ℰℐ𝒟2 𝓍̂ 2 𝒮̂2
isocenter stock (𝓍̂ , 𝒸̂) as secrete data. ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 (mod𝜑(ℕ ̂ )) (17)
B. Isocenter Public data: ⋮ ⋮ ⋮
For 𝓃̂ −dimensional isovector ℏ ̂ , huge isoprime isonumber [ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂ ] [𝒮̂ ]
𝓃̂+1
̂ ̂
ℕ and arbitrary isointeger 𝒹, the isocenter stock (ℏ ̂ , 𝒹̂ ) as
̂, ℕ There exists an (𝓃̂ + 1) -dimensional isovector 𝓅̂ on the
a public data. isointeger isoring for every ℰℐ𝒟𝒿̂ is an 𝓃̂-dimensional binary
C. Customer i's secretes keys: (𝒮̂𝒿̂ ) isovector satisfy ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ ℰℐ𝒟𝒿̂ = 0
D.Customer i's public data: ℐ𝒟𝑖 is a 𝓃̂ -dimensional We have, ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮̂𝒿̂ = 0(mod𝜑(ℕ ̂ )) (18)
isovector ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮̂𝒿̂ = ℋ ̂ 𝜑(ℕ ̂) (19)
V. PROCEDURE OF THE ISOBETA CRYPTOSYSTEM and consequently ∑1≤𝒿̂≤𝓃̂+1 𝓅̂𝒿̂ 𝒮𝒿̂ = ℋ 𝜑(ℕ) ̂ ̂ ̂ (20)
Thus (𝓃̂ + 1) customers ensure an isointeger isomultiple
To sends data 𝒟 to customer-1 then customer-2 follows ̂ ≠ 0.
of 𝜑(ℕ ̂ ), and compute the isofactorization of ℕ ̂ is ℋ
following procedure;
Therefore, the isocenter's safe data can be determine by (𝓃̂ +
A. Encryption process: 1) customers conspiracy.
̂
Customer-2, numerates 𝜁̂1 from corresponding public data ℏ Theorem-2: the isocenter's secret data 𝓍̂ determine by (𝓃̂ +
and by creates ℰℐ𝒟1 from ℐ𝒟1 ; 2) customers' 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 2) with exalted probability.
̂ Proof: The under-mentioned system of isolinear
𝜁̂1 = ∏ ℏ ̂ξ1𝒿̂ (modℕ
̂)
𝒿̂ congruence's for (𝓃̂ + 1) customers 𝒿̂, (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1)
1≤𝒿̂≤𝑛 conspire;
ξ̂1𝒿̂ (modℕ
̂)
= ∏ (𝛼̂ 𝓍̂ 𝒿̂ ) ℰℐ𝒟1 𝓍̂1 𝒮̂1
1≤𝒿̂≤𝑛 ℰℐ𝒟2 𝓍̂ 2 𝒮̂2
̂ ̂ ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 (mod𝜑(ℕ ̂ )) (21)
= 𝛼̂ Σ1≤𝒿̂≤𝑛 𝓍̂ 𝒿̂ ξ1𝒿̂ mod(𝜑(ℕ)) (modℕ
̂)
̂ ⋮ ⋮ ⋮
= 𝛼̂ 𝒮1 (modℕ ̂)
[ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂ ] [𝒮̂ ]
(13) 𝓃̂+1
Suppose 𝒟(1 ≤ 𝒟 ≤ ℕ ̂ − 1) be a data = ℒ̂ 𝓍̂ (mod𝜑(ℕ ̂ )) (22)
To communicated data 𝒟(1 ≤ 𝒟 ≤ ℕ ̂ − 1) , Customer-2 There exist positive isointegers 𝓅̂𝒿̂ (1 ≤ 𝒿̂ ≤ 𝓃̂ + 1) satisfy
utilized 𝜁1 and elect an arbitrary isointeger 𝒹̂ satisfy gcd
̂ ℰℐ𝒟1 𝓍̂1 𝒮̂1 𝓅̂1
(𝒹̂ , 𝜑(ℕ
̂ )) = 1 to numerate ciphertext ℰℐ𝒟2 𝓍̂ 2 𝒮̂2 𝓅̂2
̂ 𝒹̂ ℰℐ𝒟3 𝓍̂ 3 = 𝒮̂3 − 𝓅̂3 𝜑(ℕ ̂) (23)
𝒞̂ = (𝒟𝛼̂ 𝒮1 ) (modℕ
̂ ).
⋮ ⋮ ⋮

(14) [ℰℐ𝒟𝓃̂+1 ] [𝓍̂ 𝓃̂+1 ] [𝒮̂ ] [𝓅̂𝓃̂+1 ]
𝓃̂+1
B. Decryption process: for the isomatrix ℒ̂ consist of 𝓃̂ linearly independent column
Customer-1 does the following procedure to retrieve the data isovectors over the isointeger isoring.
𝒟 from the ciphertext 𝒞̂ ; Thus equation (23) implies:
𝓍̂1
Customer-1 refers the ciphertext 𝒞̂ to customer-2 through an ℰℐ𝒟1 𝓅̂1
unsecured channel. After receiving ciphertext from ℰℐ𝒟2 𝓍̂ 2 𝓅̂2
Customer-1, He/She numerate ℰℐ𝒟3 𝓍̂ 3 = − ̂)
𝓅̂3 𝜑(ℕ (24)
̂ ̂ ⋮
ξ̂2 = 𝛼̂ φ(ℕ)−𝒮1 (modℕ) = 𝛼̂ −𝒮1 (modℕ) (15) ⋮ ⋮
̂
𝒹 ̂ 𝒹̂ [ℰℐ𝒟𝓃̂+1 ] 𝓍̂ 𝓃̂ [𝓅̂𝓃̂+1 ]
(ξ̂2 ) (modℕ) = (𝛼̂ −𝒮1 ) modℕ (16) [−1]
Utilizing his/her closedkey 𝒮̂1 retrieved customer-2's the data ̂
= ℒ 𝓍̂ ′ ′
(25)
𝒟 by eqn.(15) and (16) to numerate We get 𝓍̂ ′ ≠ (mod𝜑(ℕ ̂ )) for nonsingular isomatrix ℒ̂ ′
𝒹 ̂ 𝒸̂ 𝒸̂ over the isointeger isoring along with Indefeasible probability
̂ ) = (𝛼̂ −𝒮̂1𝒹̂ 𝒟 𝒹̂ 𝛼̂ 𝒮̂1𝒹̂ ) (modℕ
((ξ̂2 ) ∗ 𝒞̂ ) (modℕ ̂) if the isomatrix ℒ̂ in eqn. (22) consist of 𝓃̂ isolinearly
̂
̂ ) = 𝒟(modℕ
= 𝒟 𝒹 𝒸̂ (modℕ ̂) independent isocolumn isovectors over the isointeger isoring.
On the contrary, we get under-mentioned eqn. of isoinear
VI. SECURITY ANALYSIS congruence's:
The safety of suggested ℐℐℬ𝒞 design on the index problem in ℒ̂ ′ 𝓍̂ ′ = 0(mod𝜑(ℕ ̂ )) (26)
the isomultiplicative isocyclic isogroup 𝒵̂ℕ̂∗ , for isounber ℕ
̂= Above outcome invalidate for nonsingular isomatrix ℒ̂ ′
(𝓍̂ ′ = (mod𝜑(ℕ ̂ ))) over 𝒵̂ℕ̂∗ . Det (ℒ̂ ′ ) is isodivisible by
𝒫̂ ∗ 𝒬̂ and 𝜑(ℕ
̂ ) isoEuler function of ℕ
̂.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 461


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

𝜑(ℕ ̂ ) for singular isomatrix ℒ̂ ′ (det ℒ̂ ′ = 0(mod𝜑(ℕ ̂ ))) by 512 customers conspiracy, whereas in our crypto
̂ ∗
over 𝒵ℕ̂ with exalted probability. If isomatrix ℒ represent̂ ′′ mechanisms it is compute by 1024 customers conspiracy.
as above by the other (𝓃̂ + 1) customers among (𝓃̂ + 2) Also, the running cost for encryption isokey creation in our
conspire and det (ℒ̂ ′′ ) is isodivisible by 𝜑(ℕ ̂ ) with exalted crypto mechanisms is half of the prime crypto mechanisms.
The isocenter's open data in the crypto mechanisms is about
probability satisfy 𝐺𝐶𝐷(𝑑𝑒𝑡 ℒ , 𝑑𝑒𝑡 ℒ ) = 𝒹̂ 𝜑(ℕ
̂ ′ ̂ ′′ ̂ ) for a
twice than the prime crypto mechanisms. Additionally
small positive isointeger 𝒹̂ . Thus we can numerate 𝜑(ℕ ̂) generalizations, every ℰℐ𝒟𝒿 is segmentation into 128-
capably and determine the isocenter's safe data is exactly the segments each four bits are feasible.
equal as Attack (Theorem1). Now, we explore the presentation of proposed mechanism
To improvement of security of the crypto mechanisms, the insofar as isonumber of isokeys, computational complexity
isocenter segmentation a 512-dimensional binary isovector and communication costs. The interval run to execute
𝒜̂ into 256 segments, each two bits, satisfy isomodular computation require per bit size of ̂𝔩 = |𝔩̂| as
𝒜̂ = (𝒶̂1 , 𝒶̂2 , 𝒶̂3 , … … 𝒶̂511 , 𝒶̂512 ) below;
= (seg1 , seg 2 , seg 3 , … … seg 511 , seg 512 )
Numerates ℏ ̂(𝒿̂; 𝒾̂𝓃̂) = 𝛼̂ a(𝒿̂;𝒾̂𝓃̂) (modℕ ̂) 1. isoexponentiation= 𝒯_𝑒𝑥𝑝
for every seg 𝒿̂ (1 ≤ 𝒿̂ ≤ 256; 𝒾̂, 𝓃̂ ∈ {0,1}) and circulates to 2. isomultiplication= 𝒯_𝑚𝑢𝑙
all customers. Also, the isocenter numerates every customer's
closed isokey as follows; 3. isosquare computation= 𝒯_𝑠𝑞𝑢
𝒮̂𝓃̂ = ∑1≤𝒿̂≤256 𝓍̂ (𝒿̂; seg 𝓃̂𝒿̂ )(mod𝜑(ℕ ̂ )) and circulates to all 4. isoinverse computation= 𝒯_𝑖𝑛𝑣
customers over an extremely protected channel. This is
precisely the identical as in the prime crypto mechanisms. In 5. isohash function= 𝒯_ℎ𝑎𝑠ℎ
the prime crypto mechanisms, isocenter's safe data is compute

Proposed isoidentity based isobeta crypto mechanism


Secretes key =4
The isonumber of isokeys
Public key =4
Encryption : 𝒯_𝑒𝑥𝑝 +2𝒯_𝑚𝑢𝑙 + 𝒯_ℎ𝑎𝑠ℎ
Isocomputational complexity Decryption : 𝒯_𝑒𝑥𝑝+𝒯_𝑚𝑢𝑙
Encipher : 2𝓃
Isocommunication cost
Deciphertion: 2𝓃

REFERENCES
VII. CONCLUSION
[1] W. Diffie and M.E. Hellman, “New direction in Cryptography”, IEEE
In this study, the suggested crypto mechanism fulfills Trans.Inform.Theory, vol. 22, pp 644-654,1976.
Shamir's prime theories in a rigorous sense. This variant of
[2] Shamir, “Identity-based cryptosystem and signature scheme,”
crypto mechanisms absolutely delivers novel crypto Advances in Cryptology: Proceedings of Crypto’(Lecture Notes in
mechanisms with a more and advanced level of security Computer Science 196). Berlin, West Germany: Springer-Verlag,
created on formulation of ℐℱ𝒦 𝒢𝐼𝒟ℒ𝒫 , and ℐℐℱ𝒫.The vol. 84, pp. 47-53, 1985.
offered crypto mechanisms also involves minimal [3] E. Okamoto, “Key Distribution Systems Based on Identification
processes in encryption and decryption algorithms and Information,” In Advances in Cryptology, Crypto 1987, pp. 194-202.
consequently makes it is much effective. The present LNCS Vol. 293/1988.
crypto mechanism delivers the extraordinary outcome from
[4] K. Koyama, and O. Kazuo, “Identity-based Conference Key
the safety point of view, as we aspect the issue of Distribution Systems” CRYPTO (1987).
simplifying 𝒢𝐼𝒟ℒ𝒫 and ℐℐℱ𝒫 together in the
isomultiplicative isogroup of finite isofields as matched to [5] S. Tsujii, and T. Itoh, “An ID-based cryptosystem based on the
discrete logarithm problem” IEEE Jounral on selected areas in
the other crypto mechanism. One should break 𝒢𝐼𝒟ℒ𝒫 communications, vol. 7, pp. 467-473, 1989.
and ℐℐℱ𝒫 together to break our crypto mechanisms as we
aspect the trouble of simplifying the classical 𝒢𝐼𝒟ℒ𝒫 in [6] U. M. Maurer, Y. Yacobi, “Non-interactive public key cryptography”
the shared isogroups. Cryptology—Eurocrypt’91, New York: Springer, pp. 498–507.1991.

[7] U. M. Maurer, Y. Yacobi, “A non-interactive public-key distribution


system” Des. Codes Cryptogr. , vol. 9(3), pp.305–316, 1996.
ACKNOWLEDGMENT
[8] L. Harn, “Public key cryptosystem design based on factoring and
The authors would like to thank anonymous reviewers for discrete logarithm” IEEE Pro. Comput. Digit. Tech, vol.141, no.3,
their careful and helpful comments. pp.193-195,1994.

[9] W-B Lee and Kuan-Chieh Liao, “Constructing identity-based


cryptosystems for discrete logarithm based cryptosystems” Journal of
Network and Computer Applications, vol. 27, pp. 191–199, 2004.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 462


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[10] C. Meshram, “Modified ID-Based Public key Cryptosystem using [17] M. S. Dani, A. Meshram and C. Meshram., “Santilli’sisofields
Double Discrete Logarithm Problem” International Journal of firstkind based key exchange protocol,” Journal of Physics:
Advanced Computer Science and Applications,Vol. 1, No.6, pp.30- Conference Series, 1913 (1), 012095, 2021. doi:10.1088/1742-
34, 2010 6596/1913/1/012095

[11] C. Meshram, “A Cryptosystem based on Double Generalized [18] A. B. Thatere, A. Meshram, C. Meshram, N. M. Wazalwar, "SIFK
Discrete Logarithm Problem” Int. J. Contemp. Math. Sciences, Vol. based Isobeta Cryptosystem," International Journal of Engineering
6, no. 6, 285 -297,2011. Trends and Technology, Vol. 69.7, pp. 76-79, 2021. doi:
10.14445/22315381/IJETT-V69I7P211
[12] C. Meshram and S. A. Meshram, "An identity based beta
cryptosystem," 2011 7th International Conference on Information [19] H. K. Andi, "Estimating the Role of Blockchain, Deep Learning and
Assurance and Security (IAS), pp. 298-303, 2011. doi: Cryptography algorithms in Cloud Security." Journal of Trends in
10.1109/ISIAS.2011.6122836. Computer Science and Smart Technology, vol. 3, no. 4, pp. 305-313,
2021. doi:10.36548/jtcsst.2021.4.006.
[13] R. Chatterjee, R. Chakraborty, and J. K. Mondal. "Design of
Lightweight Cryptographic Model for End-to-End Encryption in IoT [20] M. S. Dani, A. Meshram, R. Pohane, and R. R. Meshram, “Isonumber
Domain." IRO Journal on Sustainable Wireless Systems, Vol. 1, no. based Iso-Key Interchange Protocol for Network Communication,”
4, pp. 215-224, 2019. doi: 10.36548/jsws.2019.4.002. International Journal of Computer Science and Network Security,
Vol. 22 No. 2 pp. 209-213, 2022.
[14] C. Meshram, M. S. Obaidat and A. Meshram, "New efficient http://paper.ijcsns.org/07_book/202202/20220227.pdf
QERPKC based on partial discrete logarithm problem," 2020
International Conference on Computer, Information and [21] A. Meshram, R. Pohane and R. Thakre, "Developing a framework of
Telecommunication Systems (CITS), Hangzhou, China, 2020, pp. 1- beta cryptosystem based on Santilli's isofields second-kind," 2022
5, doi: 10.1109/CITS49457.2020.9232533. International Conference for Advancement in Technology
(ICONAT), 2022, pp. 1-4, doi:
[15] A. Meshram, C. Meshram, S. D. Bagde and R. R. Meshram., “RIPIC 10.1109/ICONAT53423.2022.9726000.
based key exchange protocol,” Advances in Mathematics: Scientific
Journal, 9(12) (2020) 11169–11177. doi:10.37418/amsj.9.12.97 [22] N. Bhosale, A. Meshram, R. Pohane, M. Adak, D. Bawane and K. T.
V. Reddy, “Design of IsoQER Cryptosystem using IPDLP,” IEEE
[16] M. S. Dani, A. Meshram, C. Meshram, and N. M. Wazalwar., “An International Conference on Emerging Trends in Engineering and
efficient key exchange scheme using santilli’sisofields second-kind Medical Sciences (ICETEMS), 18-19 November 2022 (accepted).
for secure communication,” Advances in Mathematics: Scientific
Journal, Vol. 10, No. 2, pp. 1131–1139, 2021. doi:
10.37418/amsj.10.2.39

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 463


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Privacy Preserving Encryption with Optimal Key


Generation Technique on Deduplication for Cloud
Computing Environment
Sanjeeva Polepaka B Gayathri
Associate Professor, Department of AIMLE, Gokaraju Assistant Professor, Department of Computer Science,
Rangaraju Institute of Engineering and Technology, Bishop Heber College, Affiliated To Bharathidasan
Hyderabad, University, Trichy,
sanjeeva1690@grietcollege.com gaya3arun85@gmail.com
Shahnawaz Ayoub Himanshu Sharma
Shri Venkateshwara University, NH-24, Venkateshwara Associate Professor, Department of Electronics &
Nagar, Rajabpur Gajraula, Dist: Amroha, Uttar Pradesh, Communication Engineering, J B Institute of Engineering
India, and Technology, Hyderabad,
shahnawazayoub@outlook.com himanshu.zte@gmail.com
Yudhveer Singh Moudgil S Kannan
Assistant Professor, Dev Bhoomi Uttarakhand Assistant Professor, Department of Computer Science
University, Dehradun, and Engineering, Malla Reddy College of Engineering,
Uttarakhand, India, Hyderabad,
yudhveer127@gmail.com kannanklt.2009@gmail.com

Abstract—Cloud computing performs a significant part in sources (like software) with on-demand, omnipresent, fast, and
sharing resources and data with other devices via data system access [2]. The aids of CC comprises affordability,
outsourcing. The data collaboration services, as a potential service manageability, and scalability. Furthermore, cloud stowage has
given by the cloud service provider (CSP), is to assist the structure features on demand, leasing pluralism, economy, ease,
consistency and availability of the shared data amongst users. At reliability, versatility, and universality. CC security difficulties
the time of sharing resources, it is a complicated process for would hold up its extensive acceptance [3]. Fig. 1 illustrates the
providing secure writing and access control operations. This study structure of key generation system for CC platform.
develops a Privacy Preserving Encryption with Optimal Key
Generation Technique (PPE-OKGT) for CC environment. The
presented PPE-OKGT technique secures the data prior to storing
in the cloud sever via encryption process. For accomplishing this,
the presented PPE-OKGT technique employs data encryption
technology to secure the input data into a hidden format. Besides,
in order to improve secrecy, the presented PPE-OKGT technique
designs a chaotic search and rescue optimization (CSRO)
algorithm for optimal generation of keys. The promising
performance of the PPE-OKGT technique can be verified using a
set of experimentations. A comprehensive comparison study
reported the enhancements of the PPE-OKGT technique over
other models.

Keywords— Encryption; Cloud computing; Data security; Key


generation; Secrecy

I. INTRODUCTION
The utility of dispersed computing systems and technologies
has progressed intensely in current years. A large amount of Fig. 1. Key generation system for cloud computing
dispersed network techniques, infrastructures, and architectures,
like network, Pervasive, Autonomic, cloud, and so on, were The sharing of CC services stances the trouble of
created by this rise [1]. Cloud computing (CC) is a computing maintaining such facilities safe and protected in illogicality of
network, stereotypically connected through the Internet, which unauthorised admission or usage [4, 5]. Typically, the statistics
cut a dispersed quantity of facilities obtainable to access the subcontracted to the cloud look this test. Network security is ace
operator wants. The secluded book NIST's idea of CC was an of CC key security subjects, which relate to internal and external
outline to provide a shared set of configurable computing occurrences [6]. Cryptographic methods were indispensable to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 464


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

endure safe message of data. Recently, data security was II. PROPOSED MODEL
increasingly concluded a considerable one in the cumulative This study developed a PPE-OKGT technique to assure
quantity of intimate imagery that is interconnected over the security in the CC environment. The presented PPE-OKGT
Cyberspace of community or ended 3rd gathering transmission technique secures the data prior to storing in the cloud sever via
[7]. In this view, varied systems are optional as encoding was encryption process.
hypothetical is the straight and greatest fruitful development to
safeguarding private data. Data decryption and encryption A. Encryption Process
convert the best method for receiving data confidentiality and In this work, the presented PPE-OKGT technique employs
propriety [8, 9]. Finally, there is a leading test as susceptibilities elliptic curve cryptography (ECC) based ElGamal encryption
and hazards are rising by the improvement of loans. Presently, technique to secure the input data into a hidden format. The
typical procedures were enormously raised for provided that ECC-related ElGamal encryption with distinct variables and
safety but in cruel times its principals to high cost and greater steps used are as follows [16]. The preservative homomorphic
use of computing sources [10]. Homomorphic systems were the method grasps by following Eq. (1),
astonishing sorts of systems on the excellent of varied data. 𝐸(𝑚1 ) + 𝐸(𝑚2 ) = 𝐸(𝑚1 + 𝑚2 ) (1)
Song et al. [11] projected a Cloud Secure Storage Where +symbol was envisioned for the preservative
Mechanism called CSSM. To evade data breaches at the storage homomorphic and public key was E. On ECC it is expected that
coat, CSSM united data distributed and dispersion storage for preservative homomorphic encoding. In accordance with the
realizing distributed, encoded, and chucked storage. Moreover, elliptic curve (EC) algebraic structure on limited areas, ECC
CSSM accepted a hierarchical organization method and related ElGamal has been explained. The finite arenas remained
compiled user keywords with secret sharing to avert into two kinds like binary and prime domains 2𝑛 . Throughout
cryptanalytic resources leak. The authors in [12] generate a this present examination, ECs ended major domains stayed
Cloud related Software Defined Network (SDN), it has 100 - scrutinized. The superior class of EC established in Eq. (2) used
mobile Nodes (IOT gadgets), open flow switch and BC related in EC real numbers as,
controllers, investigator, cloud server, and Verification Server. 𝑦 2 = 𝑥 3 + 𝑎𝑥 + 𝑏 (2)
Originally every user can be listed with AS and gain their secret 𝐸𝑟 (𝑎, 𝑏) mentions to the ensuing curve where modulus was
key from AS related to the Harmony Search Optimization 𝑟, the changed co-efficient of formulation expected that a and 𝑏.
(HSO). In the nodes, the packages were encoded through Elliptic The cost of 𝑥 varieties from 0 to 𝑟 and on the curve generally
Curve Integrated Encryption Scheme (ECIES) procedure and not every point. Even with lesser bit size also the ECC
allocated to cloud server. predictable a similar security level by processing overhead
The authors in [13] advanced a chain-related BDNA for decrease if capable of homomorphic and RSA methods.
enhancing security further also with impingement handling. It is
chaining-based BDNA and BDNA method to manage the issue B. Key Generation Process
of impingement with keys. The limits measured are In order to improve secrecy, the presented PPE-OKGT
implementation period in key creation, dependability, number of technique designed the CSRO algorithm for optimal generation
impingements. BDNA depends on binary encoding and to of keys. The location of the lost human is the key stimulation of
improve the safety further, excess 3 codes will be compounded the search and rescue optimization technique for optimized
within the projected machine. The authors in [14] offer well- problems, and the consequence of clues originate in these
organized Identity-based cryptography (IBC) structure for positions determines the solution cost. Here, the better approach
secure cloud storage, called Secure Cloud Storage reveals the best location with further hints [17]. Individual
System (SCSS), which chains dispersed key administration and search for better decisions finished the searching technique
encryption systems and provisions for many PKGs. Throughout while leaving few clues. Nevertheless, the search location for the
forensic soundings, the legal formations use the multiple PKG individual is reserved in a situation matrixes (matrix 𝑋) with the
system for data access, while a clarification locking mechanism corresponding size of memory matrixes, and the left clues are
stops a single authority to access user data owing to trust stored in a memory matrix (matrix 𝑀), 𝑛 × 𝑑, demonstrating the
distribution. The authors in [15] suggest an enhanced identity- problem variable and 𝑛 defines the individual quantity in the
related encryption method where a secure key is made by means group.
of part of an individuality bit string in to evade leakage of users' 𝑋1,1 … 𝑋1,𝑑
identity even if an opponent or assailant deciphers the key or ⋮ ⋱ ⋮
encoded data. 𝑋𝑛,𝑙 … 𝑋𝑛,𝑑
This study develops a Privacy Preserving Encryption with 𝑋
𝐶=[ ]= (3)
Optimal Key Generation Technique (PPE-OKGT) for CC 𝑀 𝑀1,1 ⋯ 𝑀1,𝑑
environment. The presented PPE-OKGT technique secures the ⋮ ⋱ ⋮
data prior to storing in the cloud sever via encryption process. [ 𝑀𝑛,𝑙 ⋯ 𝑀𝑛,𝑑 ]
For accomplishing this, the presented PPE-OKGT technique In Eq. (3), considering arbitrary clues among the attained
employs data encryption technology to secure the input data into clues, the search path is acquired as:
a hidden format. Besides, in order to improve secrecy, the 𝑠𝑑𝑖 = (𝑋𝑗 − 𝐶𝑘 ), 𝑘 ≠ 𝑖 (4)
presented PPE-OKGT technique designs a chaotic search and In Eq. (4), 𝑘 represents a random number amongst 1 and
rescue optimization (CSRO) algorithm for optimal generation of 2𝑁, 𝑋𝑖 and 𝐶𝑘 correspondingly determines the location of 𝑖 𝑡ℎ
keys. The promising performance of the PPE-OKGT technique human and 𝑘 𝑡ℎ clue. It is noted that 𝑖 = 𝑘, 𝐶𝑖 equals 𝑋𝑖 , 𝑘 ≠
can be verified using a set of experimentations. 𝑖. To prevent repeated location, the variable of 𝑋𝑖 cannot be

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 465


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

adapted by stirring in the direction. The SAR technique employs


binomial crossover operators for employing towards the
limitation:
𝑋𝑖𝑗 =
𝑋 −𝐶
𝑀𝑎𝑡𝑟𝑖𝑥𝑋𝑖𝑖𝑖𝑖−𝐶𝑘𝑖𝑘𝑖 ) 𝑖𝑓 𝑓𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (𝐶𝑘 ) > 𝑓(𝑋𝑖 ) 𝑖𝑓 𝑟2 < 𝑠𝑒𝑜𝑟𝑗 = 𝑗𝑟 , 𝑗 = 1, … , 𝑑
{ (5)
𝑋𝑖 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝑋𝑖𝑗
𝑐 + 𝑟1 × (𝑋𝑖,𝑗 − 𝐶𝑘,𝑗 ) 𝑖𝑓 𝑓(𝐶𝑘 ) > 𝑓(𝑋𝑖 )
{ 𝑘,𝑗 𝑖𝑓 𝑟2 < 𝑠𝑒 𝑜𝑟 𝑗 = 𝑗𝑟 , 𝑗 − 1, … , 𝑑
= { 𝑋𝑖,𝑗 + 𝑟1 × (𝑋𝑖,𝑗 − 𝐶𝑘,𝑗 ) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (6)
𝑋𝑖 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Whereas, 𝑐𝑘,𝑗 symbolizes the location of parameter j and the
clue 𝑘. 𝑗𝑟 , 𝑟1 and 𝑟2 represents random integer in [1, 𝑑], [−1,1]
and [0,1], correspondingly. The next phase is about individuals.
Now, exploitation term is implemented based on the existing
position. This phase applies the concept of different clues
connection to the social phase. The location upgraded using the
human 𝑖 is obtained by:
𝑋𝑖′ = 𝑋𝑗 + 𝑟3 × (𝐶𝑘 − 𝐶𝑚 ) (7)
Here, 𝑟3 represents a uniform distribution value within [0,1],
𝑚 and 𝑘 describe two arbitrary values within 1 and 2 𝑁 and 𝑖 ≠
𝑘 ≠ 𝑚. This stage is termed Boundary. In those cases, the
succeeding expression is employed while the solution is
positioned outside the boundary.
(𝑋𝑖𝑗 + 𝑋𝑗max )
𝑖𝑓 𝑋𝑖𝑗′ > 𝑋𝑗max
′ 2
𝑋𝑖𝑗 = (8)
(𝑋𝑖,𝑗 + 𝑋𝑗min ) ′ min
{ 𝑖𝑓 𝑋𝑖𝑗 < 𝑋𝑗
2 𝑚𝑖𝑛
Here, 𝑗 = 1,2, … , 𝑑, 𝑋𝑗 and 𝑋𝑗𝑚𝑎𝑥 characterize the least
and greatest threshold for the variable 𝑗, correspondingly. In
accordance with this stage, the human lost candidate is examined
according to the formerly elucidated method.
𝑋 𝑖𝑓 𝑓(𝑋𝑖′ ) > 𝑓(𝑋𝑖 )
𝑀𝑛 = { 𝑗 (9) Fig. 2. Flowchart of CRSO technique
𝑀𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
′ ′
𝑋 𝑖𝑓 𝑓(𝑋𝑖 ) > 𝑓(𝑋𝑖 )
𝑋𝑖 = { 𝑖 (10) For these reasons like getting hurt, time is critical in
𝑋𝑖 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
positioning lost individuals; therefore, any other delays that take
In which, 𝑛 determines an arbitrary value amongst 1 and 𝑁,
place in searching might result in death. Hence, when an
and 𝑀𝑛 outlines the position of clue number 𝑛 in the memory
individual during the quest doesn’t determine a prominent clue,
matrixes. Fig. 2 defines the flowchart of CRSO technique.
it leaves a novel one with the existing position.
𝑢𝑠𝑛𝑖 + 1 𝑖𝑓 𝑓(𝑋𝑖′ ) < 𝑓(𝑋𝑖 )
𝑢𝑠𝑛𝑖 = { (11)
0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Whereas, 𝑢𝑠𝑛 defines the unproductive search value.
Therefore, the present solution was swapped to accidental
resolution in the solution space as follows.
𝑋𝑖𝑗 = 𝑋𝑗min + 𝑟4 × (𝑋𝑗max − 𝑋𝑗min ) 𝑗 = 1,2, 𝑑 (12)
Whereas, 𝑟4 demonstrates a distribution value within [0,1].
To increase the global optimization ability, the chaotic concept
is incorporated. The chaotic map is used in this study, as given
below.
𝑥𝑖𝑘+1 = 𝑥𝑖𝑘 + 𝐶𝑛𝑎𝑝 × (𝑥𝐵𝐻 − 𝑥𝑖𝑘 ) , 𝑖 = 1,2, … , 𝑁𝛻 (13)
where 𝑥𝑖𝑘 and 𝑥𝑖𝑘+1 denotes position at iterations 𝑘 and 𝑘 + 1
and 𝐶𝑚𝑎𝑝 signifies chaotic map. In the presented method, ten
chaotic maps are utilized to define the random value included in
this work.
III. RESULTS AND DISCUSSION
In this section, the security analysis of the presented PPE-
OKGT model is studied well.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 466


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II
TABLE I DCT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
ECT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER APPROACHES UNDER DISTINCT FILE SIZES
APPROACHES UNDER DISTINCT FILE SIZES
Decryption - Computation Time (sec)
Encryption - Computation Time (sec)
File Size (GB) PPE-OKGT BH-WABE HABE
File Size (GB) PPE-OKGT BH-WABE HABE
1 84 118 127
1 88 119 132
2 179 228 252 2 158 221 269
3 289 339 363 3 487 603 629

Fig. 3. ECT analysis of PPE-OKGT system under distinct file Fig. 4. DCT analysis of PPE-OKGT system under distinct file
sizes sizes

Table 1 and Fig. 3 report a comparative encryption- Table 3 and Fig. 5 report a comparative user key generation
computation time (ECT) assessment of the PPE-OKGT model. time (UKGT) assessment of the PPE-OKGT model. The
The experimental outcomes represented that the PPE-OKGT experimental outcomes represented that the PPE-OKGT model
model has reached minimal ECT values under all file sizes. For has reached minimal UKGT values under all file sizes. For
instance, with file size of 1GB, the PPE-OKGT model has example, with weighted attributes count (WAC) of 10, the PPE-
attained reduced ECT of 88s while the BH-WABE and HABE OKGT model has gained reduced UKGT of 0.54s while the BH-
models have obtained increased ECT values of 119s and 132s WABE and HABE models have obtained increased UKGT
respectively. Similarly, with file size of 2GB, the PPE-OKGT values of 0.95s and 1.52s correspondingly. Similarly, with WAC
approach has reached reduced ECT of 179s while the BH- of 30, the PPE-OKGT model has attained reduced UKGT of
WABE and HABE models have obtained increased ECT values 1.55s while the BH-WABE and HABE models have obtained
of 228s and 252s correspondingly. Furthermore, with file size of increased UKGT values of 2.33s and 3.29s correspondingly.
3GB, the PPE-OKGT approach has attained reduced ECT of Moreover, with WAC of 50, the PPE-OKGT model has attained
289s while the BH-WABE and HABE methods have gained reduced UKGT of 2.05s while the BH-WABE and HABE
increased ECT values of 339s and 363s correspondingly. models have attained increased UKGT values of 3.46s and 5.02s
Table 2 and Fig. 4 report a comparative decryption- correspondingly.
computation time (DCT) assessment of the PPE-OKGT model.
The experimental outcomes represented that the PPE-OKGT TABLE III
model has reached minimal DCT values under all file sizes. For UKGT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
example, with file size of 1GB, the PPE-OKGT model has APPROACHES UNDER WEIGHTED ATTRIBUTES COUNT
reached reduced DCT of 84s while the BH-WABE and HABE User Key Generation Time (sec)
methods have obtained increased DCT values of 118s and 127s
Weighted Attributes PPE- BH-
correspondingly. Likewise, with file size of 2GB, the PPE- HABE
Count OKGT WABE
OKGT model has attained reduced DCT of 158s while the BH-
WABE and HABE models have attained increased DCT values 10 0.54 0.95 1.52
of 221s and 269s correspondingly. In addition, with file size of 20 0.90 1.55 2.55
3GB, the PPE-OKGT model has reached reduced DCT of 487s 30 1.55 2.33 3.29
while the BH-WABE and HABE models have obtained 40 1.71 2.91 3.98
increased DCT values of 603s and 629s correspondingly. 50 2.05 3.46 5.02

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 467


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 6. SCSK analysis of PPE-OKGT system under weighted


Fig. 5. UKGT analysis of PPE-OKGT system under weighted attributes count
attributes count
Table 5 and Fig. 7 report a comparative storage cost of cipher
TABLE IV text (SCCT) assessment of the PPE-OKGT technique. The
SCSK ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER experimental outcomes represented that the PPE-OKGT method
APPROACHES UNDER WEIGHTED ATTRIBUTES COUNT has reached minimal SCCT values under all file sizes. For
example, with WAC of 10, the PPE-OKGT model has attained
Storage Cost of Secret Key (KB)
reduced SCCT of 1.72s while the BH-WABE and HABE
Weighted Attributes PPE- BH- models have obtained increased SCCT values of 2.83s and 4.36s
HABE
Count OKGT WABE respectively. Similarly, with WAC of 30, the PPE-OKGT
10 1.09 2.08 2.91 method has attained reduced SCCT of 3.89s while the BH-
20 1.89 2.72 6.00 WABE and HABE models have obtained increased SCCT
30 2.40 4.38 7.94 values of 6.95s and 8.21s correspondingly. Additionally, with
40 3.43 6.08 9.48 WAC of 50, the PPE-OKGT model has attained reduced SCCT
50 4.46 7.78 12.96 of 6.99s while the BH-WABE and HABE models have gained
increased SCCT values of 10.26s and 11.99s correspondingly.
Table 4 and Fig. 6 report a comparative storage cost of secret TABLE V
key (SCSK) assessment of the PPE-OKGT model. The
experimental outcomes represented that the PPE-OKGT model SCCT ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
APPROACHES UNDER WEIGHTED ATTRIBUTES COUNT
has reached minimal SCSK values under all file sizes. For
example, with WAC of 10, the PPE-OKGT technique has Storage Cost of Cipher Text (KB)
reached reduced SCSK of 1.09s while the BH-WABE and Weighted Attributes PPE- BH-
HABE techniques have obtained increased SCSK values of HABE
Count OKGT WABE
2.08s and 2.91s correspondingly. Similarly, with WAC of 30, 10 1.72 2.83 4.36
the PPE-OKGT model has attained reduced SCSK of 2.40s
while the BH-WABE and HABE models have achieved 20 2.75 4.99 6.72
increased SCSK values of 4.38s and 7.94s respectively. 30 3.89 6.95 8.21
Furthermore, with WAC of 50, the PPE-OKGT model has 40 5.30 8.53 9.94
attained reduced SCSK of 4.46s while the BH-WABE and 50 6.99 10.26 11.99
HABE models have obtained increased SCSK values of 7.78s
and 12.96s correspondingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 468


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

gained increased DET values of 3.00s and 3.27s respectively.


Furthermore, with WAC of 50, the PPE-OKGT model has
attained reduced DET of 3.48s while the BH-WABE and HABE
models have obtained increased DET values of 4.92s and 5.45s
correspondingly.
IV. CONCLUSION
This study developed a PPE-OKGT technique to assure
security in the CC environment. The presented PPE-OKGT
technique secures the data prior to storing in the cloud sever via
encryption process. For accomplishing this, the presented PPE-
OKGT technique employs data encryption technique to secure
the input data into a hidden format. Besides, in order to improve
secrecy, the presented PPE-OKGT technique designed the
CSRO algorithm for optimal generation of keys. The promising
performance of the PPE-OKGT technique can be verified using
Fig. 7. SCCT analysis of PPE-OKGT system under weighted a set of experimentations. A comprehensive comparison study
attributes count reported the enhancements of the PPE-OKGT technique over
other models.
TABLE VI
REFERENCES
DET ANALYSIS OF PPE-OKGT SYSTEM WITH OTHER
APPROACHES UNDER WEIGHTED ATTRIBUTES COUNT [1] Zhang, Y., Xu, C., Cheng, N. and Shen, X., 2021. Secure password-
protected encryption key for deduplicated cloud storage systems. IEEE
Data Encryption Time (sec) Transactions on Dependable and Secure Computing, 19(4), pp.2789-
Weighted Attributes PPE- BH- 2806.
HABE [2] Zhang, Y., Xu, C., Cheng, N. and Shen, X., 2021. Secure password-
Count OKGT WABE
protected encryption key for deduplicated cloud storage systems. IEEE
10 0.70 1.11 1.96 Transactions on Dependable and Secure Computing, 19(4), pp.2789-
20 1.32 2.12 2.25 2806.
30 1.99 3.00 3.27 [3] Suma, V., and Wang Haoxiang. "Optimal Key Handover Management for
Enhancing Security in Mobile Network." Journal of trends in Computer
40 2.98 4.14 4.45 Science and Smart technology (TCSST), no. 04 (2020): 181-187.
50 3.48 4.92 5.45 [4] Vijayakumar, V., Priyan, M.K., Ushadevi, G., Varatharajan, R.,
Manogaran, G. and Tarare, P.V., 2019. E-health cloud security using
timing enabled proxy re-encryption. Mobile Networks and
Applications, 24(3), pp.1034-1045.
[5] Chinnasamy, P., Padmavathi, S., Swathy, R. and Rakesh, S., 2021.
Efficient data security using hybrid cryptography on cloud computing.
In Inventive Communication and Computational Technologies (pp. 537-
547). Springer, Singapore.
[6] Velmurugadass, P., Dhanasekaran, S., Anand, S.S. and Vasudevan, V.,
2021. Enhancing Blockchain security in cloud computing with IoT
environment using ECIES and cryptography hash algorithm. Materials
Today: Proceedings, 37, pp.2653-2659.
[7] Mahato, G.K. and Chakraborty, S.K., 2021. A comparative review on
homomorphic encryption for cloud security. IETE Journal of Research,
pp.1-10.
[8] Rubai, S.M., 2022. Hybrid heuristic-based key generation protocol for
intelligent privacy preservation in cloud sector. Journal of Parallel and
Distributed Computing, 163, pp.166-180.
[9] Hussam, M., 2021. New lightweight hybrid encryption algorithm for
cloud computing (LMGHA-128bit) by using new 5-D hyperchaos
system. Turkish Journal of Computer and Mathematics Education
Fig. 8. DET analysis of PPE-OKGT system under weighted (TURCOMAT), 12(10), pp.2531-2540.
attributes count
[10] Samanta, D., Alahmadi, A.H., Karthikeyan, M.P., Khan, M.Z., Banerjee,
A., Dalapati, G.K. and Ramakrishna, S., 2021. Cipher block chaining
Table 6 and Fig. 8 report a comparative data encryption time support vector machine for secured decentralized cloud enabled
(DET) assessment of the PPE-OKGT model. The experimental intelligent IoT architecture. IEEE Access, 9, pp.98013-98025.
outcomes represented that the PPE-OKGT model has reached [11] Song, H., Li, J. and Li, H., 2021. A cloud secure storage mechanism based
minimal DET values under all file sizes. For example, with on data dispersion and encryption. IEEE Access, 9, pp.63745-63751.
WAC of 10, the PPE-OKGT model has attained reduced DET [12] Velmurugadass, P., Dhanasekaran, S., Anand, S.S. and Vasudevan, V.,
of 0.70s while the BH-WABE and HABE models have attained 2021. Enhancing Blockchain security in cloud computing with IoT
environment using ECIES and cryptography hash algorithm. Materials
increased DET values of 1.11s and 1.96s correspondingly. Also, Today: Proceedings, 37, pp.2653-2659.
with WAC of 30, the PPE-OKGT model has attained reduced
DET of 1.99s while the BH-WABE and HABE models have

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 469


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[13] Attri, J. and Kaur, P., 2021. Enhancing Cloud Security Using Secured
Binary-DNA Approach with Impingement Resolution and Complex Key
Generation. In Sustainable Communication Networks and
Application (pp. 159-171). Springer, Singapore.
[14] Unal, D., Al-Ali, A., Catak, F.O. and Hammoudeh, M., 2021. A secure
and efficient Internet of Things cloud encryption scheme with forensics
investigation compatibility based on identity-based encryption. Future
Generation Computer Systems, 125, pp.433-445.
[15] Gupta, R.K., Almuzaini, K.K., Pateriya, R.K., Shah, K., Shukla, P.K. and
Akwafo, R., 2022. An improved secure key generation using enhanced
identity-based encryption for cloud computing in large-scale 5G. Wireless
Communications and Mobile Computing, 2022.
[16] Chowdhary, C.L., Patel, P.V., Kathrotia, K.J., Attique, M., Perumal, K.
and Ijaz, M.F., 2020. Analytical study of hybrid techniques for image
encryption and decryption. Sensors, 20(18), p.5162.
[17] Anuradha, D., Subramani, N., Khalaf, O.I., Alotaibi, Y., Alghamdi, S. and
Rajagopal, M., 2022. Chaotic search-and-rescue-optimization-based
multi-hop data transmission protocol for underwater wireless sensor
networks. Sensors, 22(8), p.2867.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 470


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
A Comprehensive Survey on Cloud Security
Mechanisms

Dhwani Hakani Palvinder Singh Mann


Computer Engineering Computer Engineering
Graduate School of Engineering and Technology, Gujarat Graduate School of Engineering and Technology, Gujarat
Technological University Technological University
Ahmedabad,India Ahmedabad,India
adf_dhwani@gtu.edu.in asso_psmaan@gtu.edu.in
Abstract— Cloud computing indicates a tremendous breaches, ransomware transfusions, denial-of-service (DoS)
promise for providing on-demand solutions to customers with threats, information breaches, as well as unprotected
increased flexibility even at a lower cost over the internet. programming interfaces. Measured service means a delivery
Cloud service companies efficiently supply their consumers model in which a cloud provider monitors how much a
with a variety of storage options. Cloud users are permitted to particular service each customer consumes within a defined
utilize cloud storage to store their data on the cloud server, period. Numerous companies have evidently started to
which lessens the need for local computer storage and migrate existing operations to the cloud in recent years. As
retrieval. Cloud computing is the set of the resources as well as
per LogicMonitor [3], a major Software as a service
the services that are offered to users through the Internet.
achievement tool for corporate, the overall proportion of
There are several issues as well as challenges raised from the
adoption of the computational paradigm which includes
industrial operations going to the internet would surge to 83
privacy, security, authentication and association. This paper percent by 2020."A prototype for instance having,
aims to introduce new data security ideas in cloud computing. comfortable and on demand approach to the computing as a
In this paper, we have described the specifics of cloud model (e.g. data centers, connections, flash memory,
computing, addressed the principal security issues and implementations, as well as facilities) which can be arriving
discussed primary cloud operations that need to be secured on time but also published to minimal downtime or network
and also discussed the data security-based model for cloud operator communication," as per the National Institute of
computing. Although advancing towards to the paradigm of Standards and Technology (NIST)[4]. Infrastructure-as-a-
on-demand operation, dynamic resource, and transferring it all service (IaaS), the decant, formulating transportation system
to a cloud system, security is the main roadblock towards this with the other strands; platform-as-a-service (PaaS), this
grand approach of computational capacity. Additionally, same mid surface, creates an environment for constructing
various critical aspects such as information security practices, and sponsoring users' application forms; and software-as-a-
firewall-based protection, and access control procedures in the service (SaaS), the top part, offers a communication protocol
clouds also analyzed in depth. This study will benefit research that appears to work as a service over the internet.
and developing network algorithms to address recognized
safety concerns, as well as businesses producing gadgets to
monitor such dangers and potential vulnerabilities.

Keywords — Cloud computing, Security threats, Data


privacy, computational capacity, Authentication, Firewall.

I. INTRODUCTION
Cloud computing (CC) is extensively used in numerous
areas of analytics, notably document sharing, real-time
applications, etc messaging. Cloud computing is a way of
providing services and it is based on the resources which are
being allocated on demand. Innovation that is provided by
the cloud is in various areas like technical as well as financial
opportunities which now have changed the look and feel of
technology and how these businesses can be operated. It Fig. 1 Cloud Computing Model
provides us the computing resources as services through the SaaS stands for "software as a service," and then it refers
Internet. In recent generations, significant CC developments to programs which are housed on such a remote server &
have developed, particularly considerable advancements. provided well over the Internet, such as digital productivity
Because of the usefulness of its operations, which might software and email clients. Rather than buying additional
eventually give efficiency on multiple levels, CC is technology, users can subscribe to web-based software
becoming ubiquitous within both business and government. services to meet their business's demands for a nominal fee.
Safety of the service performance, on either hand, is indeed a Consumers are reliant on suppliers for security. Users do not
main consideration both for the virtual servers and software need particular hardware or software to use SaaS, but they do
solution [1]. Cloud computing protection is an essential need a constant Internet connection.
subcategory of information security that provides a
significant barrier to mainstream advent of cloud technology The PaaS layer, which sits on top of SaaS, enables
[2]. Even though CC supplement on either an Online designers to quickly build & construct Software solutions
connection, participants are prone to a range of attack vectors before deploying those to the PaaS surface. It fully endorses
as well as other security concerns, that can consequences in the software development process and is a cost-effective
potentially devastating consequences like as security alternative for programmers because it focuses attention on

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 471


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

designing and executing programs rather than managing the will be regarded as having been disclosed if an attacker can
core infrastructure. deduce the material's genuine meaning at a high level.
Infrastructure-as-a-service (IaaS), the bottom level, IaaS, One of the most dangerous hazards is a pollution assault,
supplies the underlying technology for something like the which puts data integrity at risk. When a bad individual has
levels just above. Network elements, computers, software access to one or more storage resources, they can
platforms, plus memory were included in IaaS. It enables contaminate the data or a section of it to make it
users to view all information without having to buy any unavailable.
equipment. IaaS is also a cost-effective and speedier way to A storm assault using the User Datagram Protocol, which
run workloads without having to buy or manage underlying leads to two individuals simultaneously, now let us assume
infrastructure; nevertheless, because it relies on Internet A and B. An assailant would send packets to A using a
access, availability is a great concern [5]. fictitious network Address which correlates to B.
Subsequently, assuming B become the genuine originator, A
This next paragraph depicts the fundamental CC
properties. will reply to B, who then reply to A, till the communication
is severed. [8]
II. CLOUD COMPUTING CHARACTERISTICS SYN flooding attack: The above exploit takes advantage of
Cloud technology seems to have the essential the Transmission Control Protocol's (TCP) connection-
distinguishing features. oriented feature, which employs a three-way preamble to
create a relationship for transmitting information across
a) Self-service on request: Each customer could get telecommunication sites.
computing capability like data centers, application The incursion and the Slowloris strategy are similar in in
consumption, including system time [6] through it on self- which both cause diminished, busy traffic. By sending
service. Such solutions are adaptable, and customers imperfect requests without even a revocation systematic
shouldn't need to request aid from telecom operators because fashion which indicates the proposed plan is finished, the
they can simply obtain the essential facilities to customers attacker consumes the all-customer’s opportunity possible
and then do the appropriate actions independently and at any
and forces the network adapter to just queue for such
time.
revocation systematic fashion that accomplishes every
b) Accessibility to a large network Broad network access implementation, that could never be published [9].
(BNA) alludes to the different types of cloud features and Assault on the host by a guest once the attacker discovered a
functionality that seem to be readily available across the vulnerability of virtualization layer, as well as inappropriate
internet via multiplatform (e.g., computers, smartphones host and guest setups.
[7]).These digital competences were typically housed in a
company's cloud infrastructure and run behind the same IV. CLOUD DATA SECURITY MECHANISMS
firewall to give workers more alternatives for accessing the The Generative Data Preservation Rule (GDPR), the e-
cloud - based Services from numerous devices.
Privacy Act, and the impending Cyberspace Legislation all
c) Pooling of resources: Computing information is raise the level for reliable production as well as tracking of
shared utilizing a multi-tenant paradigm in resource pooling, essential information within. The core of privacy act is the
supporting a large number of customers. This technology requirement of disclosure of any current data related to an
enables consumers to change their levels of service at any entity as well as the right to have those records deleted upon
moment, without being constrained by either physical or request.
virtual resources. Rivest-Shamir-Adleman (RSA)-based schemes have an
d) Elasticity that is quick is a crucial principle of CC excessive amount of processing complexity in [10]. The
wherein the functionality are proficiently supplied in just batches signing effectiveness in the huge data context is
about any amount and at any time supporting accelerated poor, as well as the Boneh-Lynn-Shacham (BLS) biometrics
amplification in response to consumer requests such as those technique requires the adoption of a particular hashing
for additional cloud space; in rapid elasticity, many types of algorithm.
services can be provided to users at various scales without The general purpose remedies, which combine four
interruption. technological advancements: (1) careful when dealing
e) Service that is measured Cloud systems continuously package techniques of data adaptability as well as
monitor and control resources in measured service, and the manoeuvrability, (2) personal information responsive
results (Eg: billing, resource utilization) which are given to assistance as well as users to access resources, (3) extensive
users in a transparent manner. data safeguard policy enforcement, and (4) vibrant
information security risk assessment methodology, make it
III. SECURITY THREATS IN CLOUD COMPUTING easier to provide and use apps and systems across the
Furthermore, one of the biggest difficulties with cloud computer science path.
computing is data storage and security. In [11] for the purpose of producing the best privacy-
An inference attack is a data mining strategy that uses data preserving coefficients, a suggested Conditional
analysis to covertly learn information about a database or Autoregressive Value at Risk (CAViaR)-based Bird Swarm
any other topic without having access to it directly. The Algorithm (CAViaR-based BSA) pairing of BSA and
integrity of an entire database may be jeopardized by an CAViaR is used. The objective function was recently created
inferences attacker. Additionally, this sensitive information with privacy and utility in mind.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 472


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Prior improving information transportation, replication, & [12]. The CTA's early version contains the identification
evaluation, presents an effective approach that categorise as service, which enables users to sign across many cloud
well as safeguard mass data. Categorizing the sample into vendors, and the conformance assessment provider, which
two subgroups, public—according to the danger intensity enables users to compare the safety credentials of various
scale of its elements helps evaluate the requirement of cloud vendors.
safeguarding big data migration.
V. CLOUD FIREWALL BASED SECURITY
In the 2018 Generative Data Preservation Rule (GDPR), of
the European Union is created to discourage the practise of Wherein customized kernels and the Debian Macos are
being used to create virtualization technology. A firewalls is
revealing personal information for just a reason which data
indeed a mechanism created to stop network threats. Data
controllers are unaware of. The essential GDPR provisions transmission is filtered by firewall, which might be piece of
pertaining to the delivery, utilisation, and upkeep of internet software. Using Proxmox VE Firewall, infrastructure may be
services and technology are summarised. secured. It enables establishing policies for virtual servers or
For the purpose of safeguarding Big Data in a cloud for certain guests inside a community. You can set up your
computing system, author suggested the Meta Cloud Data firewall rules for all the hosts inside a cluster, and also define
Storage System. That architecture assures that large data is rules for containers and virtual machines. Features like
collected effectively in a virtualized environment and also security groups, firewall macros, IP sets, and aliases help to
that stronger economic discoveries are obtained. make the task easier.
In [13] there are two different types of intrusion detection
TABLE I. COMPARATIVE ANALYSIS OF DATA SECURITY
MECHANISMS systems: network intrusion detection systems (NIDS) and
host-based intrusion detection systems (HIDS)
Author/yea Algorithm Advantage Disadvantage (NIDS).Additionally, the IDS secondary and primary data is
r used
evaluated and software application to the firewall's protection
Knode et CloudTrust More Less accuracy plan to emphasise the significance of the stringent barrier.
al., [2011] Protocol efficiency
(CTP) Through creating a machine code as well as a phase
Ghosh et Cloud Trust More speed More database, authors present a stateful firewall founded on the
al., [2011] Authority computational
customizable data package. When compared to conventional
(CTA) time
Hababeh et Integrated Balance energy High complexity firewalls, this approach will capable of extracting, analyse,
al., [2018] methodology distribution of of proposed then preserve the complete routing of data frames in the data
all nodes solution layer.
Mitrou et European Prolongs Memory
al., [2018] Union General network requirement is The [14] describes the development of a Remote Protocol
Data lifetime and more Investigation firewall (RLPM) to thwart targeted activity by
Protection improves verifying the content pattern of data packet. It uses a
Regulation throughput combination of parallel fast pattern matching (PFMM) and
(GDPR)
reinforcement learning (RL) around the same time, so it
Khattak et General Data Able to Extremely
al., [2019] Protection understand the inefficient for quickly accumulates to something like an ideal outcome. The
Regulation region surface large volume data, surroundings are quickly learned that use the RL technique,
(GDPR) current no confidentiality as well as the identity of the payload is processed
Zhu et al., RSA Enable Complexity is concurrently. RL which is based on the interaction model
[2019] shortening the more between the environment and the agent, instructs the agent
procedure of
the information
for learning the optimal action strategy through feedback
process from the environment corresponding to the agent’s action.
Ayed et al., FogProtect Able to handle Prone to
[2020] the outliers and eavesdropping
Researchers construct a concurrent firewall program
computational called CPFirewall as well as concentrate on FWaaS (Firewall
process as a Service) throughout. These firewall capabilities in
Gajmal et Conditional The design is Integrity is CPFirewall were abstracted, allowing many customers to
al., [2021] Autoregressiv flexible compromised lease fake firewalls to create its individual concurrent
e Value at risk firewalls. Some problems should be addressed for this. For
(CAViaR)-
based Bird
create a regulation abnormality collection enabling
swarm identifying rule anomalies, researchers use a regulation
algorithm technique.
A fresh M/Geo/1 empirical equation is built to give
Public-Key and Private-Key make up RSA. Public-Key performance measurement assessment of such cloud firewall.
is accessible to all users in the public cloud, while the Cloud attackers can use the approach to retrieve relevant
Private-Key is only accessible to individual that initially system metrics, including demand latency, and estimate how
possesses the information. As a result, the CSP (Cloud several assets were required to ensure quality of service
Service Provider) process to reach, and the consumer or (QoS). Many reports have got to the exploitation of QoS
buyer of the cloud performs decryption. metrics, and relatively not much equipment supports the
investigation and remark of QoS metrics of Cloud programs.
To include a central location for establishing and maintaining
the confidentiality solutions from various suppliers, RSA The connection split Xelin Internet Backbone Switch
introduced the Trust Authority (CTA) for Cloud just like a (XIPSwitch), which would be autonomous of different cloud
storage service in cloud, named Trust as a Service (TaaS) computing concepts, is just the implementation framework of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 473


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

such a technique that we present last. The approach also as well as the cloud administrators even though the fog
could address the issue of decentralized cloud system distant service is established beyond registration process.
terminals' firewall penetration in wlans. Establish a basic strategy in [18] that each user has their
The AMRES (Academic Network of Serbia) system own key code that is used to secure the convergence keys
utilizes [15] tools in order to evenly send a significant and send it towards the internet. Unfortunately, a basic
volume of internet traffic to the centralized cloud network access control system like this produces a huge key space as
device. Since some of the techniques can only be used with the number of consumers rises and necessitates that users
Cisco hardware, additional techniques which rely on gateway guard the secret key zealously. In order to achieve this, they
capabilities to route website traffic can be used on the suggest Dekey, a novel structure wherein customers
hardware from any company or even with mainstream effectively divide the convergence information shares across
applications. various servers rather than managing any credentials on
their own.
The following table briefs out an analysis of Cloud
firewall. Here metrics energy consumption defines power Blom's key technique using altered proactive secret sharing
used, throughput defines output, latency is the delay caused is found on [19]. Regarding power systems, particularly the
between source and destination packet arrival time, and computationally intensive secrecy material update can
packet delivery ratio means the ratio of packets delivered to delegated to such a remote server, as well as the unmodified
the total number of generated packets. paired credentials following key physical renewal process
significantly reduce the resources needed.
TABLE II. COMPARATIVE ANALYSIS ON FIREWALL METHODS Memory deduplication will differentiate by decreasing page
Author/ye Method Ene Thr Pack Latency
duplication to supply the demands for memory components;
ar rgy ough et memory fragment allotments memory Resources between
cons put Deliv every string/VMs to minimize impedance for improving
um ery execution [20].
ptio Rati
n o(PD TABLE III. COMPARATIVE ANALYSIS ON KEY MANAGEMENT
R) METHODS
Long et al., Xelin Internet Low High Mo Low
[2013] Protocol Switch Author/y Method Energy Through Encrypt Decrypt
dera ear consump put ion time ion time
(XIPSwitch)
te tion
Ivanovic et AMRES Mod high Lo Modera Graf et Flexible high high low moderat
al., [2013] (Academic erat al., key e
w te [2012]
Network of Serbia) e manageme
network nt
Liu et al., Clusterized Hig Low high High Jang- Portable low moderate moderat low
[2014] framework of h Jaccard key e
cloud firewall et al., manageme
Wang et CPFirewall (Cloud Mod High [2012] nt
low High
al., [2015] Parallel Firewall erat Kao et uCloud, a moderate low high moderat
System). e al., user- e
Dezhabad Dynamic auto- Low Mod [2013] centric key
high High
et al., scalability firewall erate manageme
[2018] nt scheme
Toumi et Hybrid intrusion Mod Low Hig Low Li, et al., Dekey moderate high moderat high
al., [2019] detection system erat [2013] e
h
(Hy-IDS) e Zhou et Blom’s high moderate low high
Li et al., Stateful firewall Mod Mod Hig Low al., symmetric
[2020] erat erate [2015] key
h mechanis
e
Praise et Deep Packet Low High Hig Low m
al.,[2020] Inspection based Adee et Four-step low high low high
h al.,
firewall (RLPM) data
[2022] security
VI. KEY MANAGEMENT MECHANISMS IN CLOUD model
Chatterje Secure and high low moderat high
Secure as well as lightweight multi-factor authentication e et al., lightweigh e
technique for the various cross-platform devices [2022] t multi-
(SELAMAT) was proven to be vulnerable to replication, factor
signal interception, and internal assault upon fog servers in authenticat
[16]. The result is an enhanced, inexpensive, highly security ion
systems strategy for IoT connectivity focused towards scheme for
cross-
cloud. platform
In [17], a lightweight and anonymous mutual authentication IoT
(LAMAS) scheme on basis of cryptography is suggested for systems
protecting fog computing. Without a need for re-registration (SELAMA
or additional calculation, this suggested technique is T)
sufficient to facilitate verification amongst cloud customers Hamada Lightweig low low high low

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 474


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

et al., ht [6] Rashid, A., & Chaturvedi, A,”Cloud computing characteristics and
[2022] Anonymo services: a brief review”, International Journal of Computer
us Mutual Sciences and Engineering, 7(2), 421-426, 2019.
Authentica [7] Samy, G. N., Maarop, N., Abdullah, M. S., Perumal, S., Albakri, S.
tion H., Shanmugam, B., & Jeremiah, P., “Digital forensic investigation
Scheme challenges based on cloud computing characteristics”, International
(LAMAS) Journal of Engineering and Technology (UAE), 2018.
[8] B. B. Gupta And O. P. Badve, "Taxonomy Of DOS And DDOS
VII. RESEARCH PROBLEM Attacks And Desirable Defense Mechanism In A Cloud Computing
Environment," Security And Communication Networks, Vol. 28, No.
Whilst using cloud technology, both customers and 12, 2017
providers face several security concerns and issues. Such [9] O. Yevsieieva And S. M. Helalat, "Analysis Of The Impact Of The
issues may make it harder for customers as well as suppliers Slow Http Dos And Ddos Attacks On The Cloud Environment”,4th
International Scientific-Practical Conference Problems Of
to believe one another. Additionally, when security events Infocommunications. Science And Technology (Pic S&T), Kharkov,
increase, legitimate problems about using online grow. On Ukraine, 2017.
the one hand, service providers must have the capacity to [10] Zhu, H., Yuan, Y., Chen, Y., Zha, Y., Xi, W., Jia, B., & Xin, Y. “A
comprehend and mitigate security risks and issues secure and efficient data integrity verification scheme for cloud-IoT
based on short signature”. IEEE Access, 7, 90036-90044, 2019.
beforehand, throughout, and then after things arise. As a
[11] Gajmal, Y. M., & Udayakumar, R.,”Privacy and Utility-Assisted Data
result, a risk management plan was suggested from the Protection Strategy for Secure Data Sharing and Retrieval in Cloud
standpoint of the cloud service providers to handle a few System”, Information Security Journal: A Global Perspective, 1-15,
vulnerabilities. The primary objectives had to boost the 2021.
adoption of cloud computing across the board and to foster [12] Ghosh A, Arce I,”RSA establishes cloud trust authority to accelerate
more trust amongst customers and cloud providers. cloud adoption”,RSA.
http://www.rsa.com/press_release.aspx?id=11320,2011.
VIII. CONCLUSION [13] Ma, X., Fu, X., Luo, B., Du, X., & Guizani, M., “A design of firewall
based on feedback of intrusion detection system in cloud
The emerging concept of cloud computing provides on- environment”,In 2019 IEEE Global Communications Conference
demand virtual machines. A corporation lose control of the (GLOBECOM) (pp. 1-6). IEEE, 2019, December.
data whenever it opts for cloud computing. The main issue [14] Praise, J. J., Raj, R., & Benifa, J. V. ,”Development of Reinforcement
Learning and Pattern Matching (RLPM) Based Firewall for Secured
is therefore maintaining protection of data including during Cloud Infrastructure'', Wireless Personal Communications, 115(2),
transit and while being kept in the cloud. Any application 993-1018,2020
relying on a developing technology should take into account [15] Ivanovic, I.,”Distribution of web traffic toward the centralized cloud
all potential dangers. The different security concerns firewall system”, In 2013 RoEduNet International Conference 12th
discussed in this paper will undoubtedly help cloud Edition: Networking in Education and Research (pp. 1-4). IEEE,
2013.
customers make smart decisions and cloud service
[16] Chatterjee, U., Ray, S., Khan, M. K., Dasgupta, M., & Chen, C.
provider’s deal with attacks effectively. M.,”An ECC-based lightweight remote user authentication and key
management scheme for IoT communication in context of fog
REFERENCES computing” Computing, 1-37, 2022.
[1] Khalil, I., Khreishah, A. and Azeem, M., “Cloud Computing Security: [17] Hamada, M., Salem, S. A., & Salem, F. M,”LAMAS: Lightweight
A Survey”. Computers, 3(1), pp.1-35, 2014 anonymous mutual authentication scheme for securing fog computing
[2] Gupta, B. and Badve, O., “Taxonomy of DoS and DDoS attacks and environments”, Ain Shams Engineering Journal, 13(6), 101752, 2022.
desirable defense mechanism in a Cloud computing environment.” [18] Li, J., Chen, X., Li, M., Li, J., Lee, P. P., & Lou, W.,”Secure
Neural Computing and Applications, 28(12), pp.3655-3682, 2016 deduplication with efficient and reliable convergent key
[3] Bhamare D, Samaka M, Erbad A, Jain R, Gupta L, Chan HA management”, IEEE transactions on parallel and distributed systems,
“Optimal virtual network function placement in multi-cloud service 25(6), 1615-1625, 2013.
function chaining architecture”,Computer Communications, 2017 [19] Zhou, J., Cao, Z., Dong, X., Xiong, N., & Vasilakos, A. V.,”4S: A
[4] Deka GC, Das PK,”Application of virtualization technology in IaaS secure and privacy-preserving key management scheme for cloud-
cloud deployment model”, Design and Use of Virtualization assisted wireless body area network in m-healthcare social
Technology in Cloud Computing: IGI Global, pp 29–99, 2018. networks”,Information Sciences, 314, 255-276,2015.
[5] Kulkarni and Y. Hu, “Cloud security with virtualized defense and [20] Adithya, M., P. G. Scholar, and B. Shanthini. "Security Analysis and
Reputation-based Trust management”, Proceedings of 2009 Eighth Preserving Block- Level Data DE-duplication in Cloud Storage
IEEE International Conference on Dependable, Autonomic and Services." Journal of trends in Computer Science and Smart
Secure Computing (security in cloud computing), pp. 621- 628, technology (TCSST) 2, 2020.
Chengdu, China, December, 2009

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 475


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
SEHAT: Cloud-based User Sociable Health Care
Assistant System
Sk. Arshiya Sultana Ch. Rupa
Dept. of CSE Dept. of CSE
VR Siddhartha Engineering College(A) VR Siddhartha Engineering College(A)
Vijayawada, India Vijayawada, India
Shaikarshiyasultana1@gmail.com rupamtech@gmail.com

D. Igna Sree G. Sowmya Sree


Dept. of CSE Dept. of CSE
VR Siddhartha Engineering College(A) VR Siddhartha Engineering College(A)
Vijayawada, India Vijayawada, India
ignasridwarapudi@gmail.com ghantasala.sowmyasree@gmail.com

Abstract— Nowadays, people are consulting the doctor depend on others if they want to visit a hospital for their daily
frequently a month for their check-ups, especially senior check-ups. Those people need an assistant who can take them
citizens. Moreover, the majority of individuals have busy to the hospital for their check-ups. There are
schedules and won't have time to accompany the patient. some families who get income on daily wages, and such
If they can, they need to take the time or leave, and for people may or may not go along with the patient. To deal with
that, they have to lose money from their salary. This is this issue, there should be a non-Emergency mobile
going to happen many times in a month. So, to address application that facilitates people to enter their details and
this issue, a proposal is made to build a Health Mobile make them able to select hospitals for their check-ups. From
Application, that provides a list of non-Emergency then a physical assistant from the hospital will come to the
services for the respective hospital appointments and then patient’s doorstep and the assistant will take care of the patient
book an appointment. A physical assistant will come to until they visit the doctor, take medicines and return to their
their doorstep and will take care of them until their whole home.
check-up. At last, they will drop the patient at their home, Based on the Statistical Global Consumer Survey, which
for which very affordable charges will be applied. is conducted in 2022 in several countries of health apps. With
Therefore, with this system one can manage their time a share of 70%, India is by far the most popular country when
effectively and efficiently, who is going along with the it comes to using health apps. According to research from the
patient, allowing them to work on other tasks and saving journal Expert Review of Pharmacoeconomics and Outcomes
money. Research, the number of mobile health applications
Index Terms: Physical assistant, Cloud, Mobile downloaded will increase by 65% by 2020. In addition, data
Application, Non-Emergency Services security and privacy issues with mobile healthcare apps are
the main things that are anticipated to restrain the market's
I. INTRODUCTION expansion. The market for mHealth was dominated by
Most people use mobile application technology for medical applications in 2021, accounting for 97.1% of total
health-related difficulties, where they can get online medical revenue.
reports, online treatment, and online medicine providers [1]. Application Effective for planning years starts from
Most health Apps are developed only from the perspective of January 1, 2022, and the percentage that is to be used in
online treatment for people, medical suggestions in virtual affordable calculations is 9.61%. It is accurate to evaluate
mode, and medicine home delivery, some healthcare apps affordability using either the household income or one of the
belong to a single organization that provides advance three affordability measures. Increasing awareness among the
appointment booking and gives complete details about the people to boost the segment share. However, the majority of
organization and other health care apps provides about food individuals attend a hospital for routine checkups for their
diet and fitness suggestions [1]. The number of visits to own reasons, but they are overlooked simply because they
medical offices rose to 3.2 times annually in 2018. must rely on a companion to accompany them. This can be
In the year 2020, according to a survey, 83.4% of adults, solved by providing a physical assistant by the respective
and 94% of children had a visit to the doctor. The results in hospital, who can take care of them until their whole check-
the Google play store have shown 250 health applications and up.
out of them 22 apps were found to be providing online doctor So, our application is providing physical assistant where
consultation services when the search tag is given as “Health the patients can select their service and can book their
Apps in India”. These mobile apps enable people to contact appointment. After that, they need to fill in their details so that
doctors by sitting at their homes, and also people get their the hospital can have the details related to the patient. Finally,
medicines to their doorstep. These mobile health apps are the physical assistant will come to the patient’s doorstep and
providing services to the public in many ways. takes along with them to consult the doctor
In metropolitan cities, people are busy with their work, and for their daily check-ups.
jobs. Senior citizens and physically challenged people need to The rest of the paper was organized in the following way:

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 476


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Section 2 described the related work. The proposed mobile S. S. Bhat, et al. [5] proposed the Methodology of a mobile
application system is elaborated on in section 3. The results application that is the medical assistant for the expiry tracking
and analysis are illustrated in section 4. Section 5 has a of medicines. It assists people with their medicines by storing
conclusion. information about medicines, tracking the expiration date of
medicines, and alerting people. This application is very useful
II. LITERATURE SURVEY to people because expiry medicines are more dangerous than
D. Liu, et al. [1] proposed a health monitoring, counseling, poison, people should not use expired medicines. It is saving
information gathering, medical assistants, nutrition people's health by alerting them about the expiration of
management, and sports management-based mobile medicines. The main drawback of this app is it does not
application. They must put on wearable technology (such as provide any physical assistance for people.
smart watches, smart bracelets, etc.). The qualified doctor S. Allen, et al. [6] proposed system is an artificial
will next respond to your health-related queries within the intelligence (AI), image processing program that checks
allotted period. They continuously track heart rate images of teeth for dental issues including tooth decay and
fluctuations and issue alerts when abnormal circumstances gingivitis. First, the user has to provide pictures of their teeth.
start to develop. The health management center at your health They have developed an algorithm that was taught by six
center or hospital will be informed in real time of each different dentists, and it will scan those in four seconds. It is
patient's physiological assessment. Consumers may monitor a quick and free dental exam. The software becomes
their blood pressure, blood sugar, and other vital signs daily increasingly tailored as the user provides more data. This
by wearing wearable technology. This app's drawback is that app's drawback is that it only works on iOS due to its platform
busy users with demanding schedules can't effectively utilize need.
it. B. Maryem, et al. [7] developed a mobile-based
S. Oniani, et al. [2] developed an app for the ongoing application that helps in the management of type 2 diabetic
monitoring and management of patients' medical issues based patients, this is especially important for people who live in
on Smart Mobile Medical Computing Systems. They rural regions since they have restricted access to medical
assessed cardiac arrhythmia using Android cellphones and facilities. There are some outputs and four inputs in the
pre-recorded software called LRMA (Long-Run Moving proposed app. This proposal is not applicable to type 1
Average). Diagnoses, information, prevention, treatment, and diabetes. In this app, there are two important components that
communication are all included in these applications for are to be done remotely for the patient’s test results and
healthcare. Their major objective is to develop better-suited glycemic control. This app's disadvantage is that rural
and adaptable medical mobile apps for Georgian residents, residents cannot use it due to poor internet access, and low-
which is an important field of study. It ought to be free to income individuals cannot purchase such smartphones and
download the software. The healthcare application interface tablets.
of this app is restricted to the Georgian language only. L. He, Y. He et al. [8] proposed an app for reducing the
K. M. Ben Hamed, et al. [3] proposed software tracks the chronic pain of old people in nursing homes. As most old
spread of the coronavirus among users when they congregate people are suffering from knee pains, back and neck pains, and
in public areas. Since no one is certain who is infected with many others. In order to cure these pains, they are supposed to
the coronavirus, many individuals are afraid to leave the use this app which records everyday pain, aching detection,
house. The software initially considers the impact of wearing and long-term pain. Mostly the app works on the basis of how
a mask. In addition, users will be able to determine how likely old people are able to manage their behavior and health for
they are to contract the coronavirus. Many existing relieving pain. It would be better if the application provides a
technologies have been used some of them are cloud, doctor’s consultation every 15 days. So, that the old people
Bluetooth, and mobile devices. So, with this app, they can be can ask about their doubts regarding chronic pains.
able to know who is affected with the covid-19 and can G. Samhitha, et al. [9] designed an application for a
maintain some distance, and take appropriate precautions workout tracking system based on Artificial Intelligence.
prior to it. From the user's point of view, the new design This model works by taking users’ videos, and guides based
considers how wearing masks might reduce the rate and alert on the video. This model is useful for every person without
the user of the Covid-19 pandemic in their immediate limitation of age and weight. The limitation of this
neighborhoods. Without worrying about the platform application only guides workouts.
specifics of app deployment, the new design was specified F. Alloatti, et al. [10] proposed methodology of a mobile
from the standpoint of development. This app's flaw is that it application is for patients by voice and multimedia interface.
doesn't give any further information about its functions. This allows patients to take treatment by sitting at their homes
Z. Liang, et al. [4] created the NokoriMe smartphone with the help of a clinical team and caregivers. Patients can
application, which was designed with students' stress from ask a question with the help of a speaker and the answer will
academic expectations in mind. It is used to measure stress come in the format of images or video, which anyone can
levels when it is increasing over time and show them when the understand. The limitation of this app is as it is a virtual
stress is increasing and decreasing. This software is also used assistant it can be used in severe situations.
to track the results of stress such as how it affects things like S. Souiki, et al. [11] proposed mobile application on
sleep quality, etc. Using devices such as track devices. This health for storing health records of patients with the help of
app is only used for students or others who are under stress. the cloud. By giving each patient their own place and giving
The limitations are this application is useful for students, but them access to it through their Google accounts, this program
it does not provide any health assistance. is used to securely store medical records and patient
information. M-health is mostly used when the patient

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 477


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

switches to another doctor in the middle of treatment, that B. App Name: Health Checkup
patient has to explain the problem and treatment will start This app facilitates the users to calculate BMI, BMR,
from the beginning again. So, in this scenario patient use, this Body fat, etc., but sometimes they can’t get appropriate
record stored in the cloud and the doctor can understand results. By seeing the result, they will prefer to take medicines
easily the problem. The limitation of this app is not providing or changes their diet which may lead to other health problems.
any assistance to a patient with health or medically. So, consulting a doctor physically will make everyone’s lives
B. Wen et al. [12] proposed methodology on Health healthy and happy.
Guardian Platform, which prevents disease by detecting early
with provided patient data. This methodology will implement III. PROPOSED METHODOLOGY
in mobile apps, and wearable devices. This platform uses In the proposed system, we have developed a mobile
artificial intelligence, and the cloud to process data and application that helps people especially old people and
envision the disease. It foretells disease with the help of disabled people to consult the doctor without depending on
clinical people. Using this methodology, can detect disease in others, i.e., through physical assistance they can consult the
the early stage and cure it. This will save people’s health. The doctor for their daily checkups. To implement the proposed
limitations of this methodology are just forecasting the system, we have used the following software: Kodular,
disease with the help of provided data, and not providing any Python- Programming language, and Firebase Cloud. The
health assistance to deal with the patient's disease. application was developed by the following system
R. Das, et al. [13] developed a mobile app in which they requirements: 11th Gen Intel(R) Core (TM) i3-1115G4 @
have developed a health center ANM, ASHA workers in the 3.00GHz 2.19 GHz, 8GB RAM, 64-bit operating system,
village are not sufficiently trained and the patients in the x64-based processor. In this app, the system consists of three
village are not properly knowing about their disease and what modules as shown in Fig 1. The three modules are the Patient
they are suffering too. Nowadays each and every person are module, the Doctor module, and the Cloud module.
having a smart device that is used to communicate with each
other. So, they decided to develop an app that has a A. Patient Module
preliminary treatment plan or is advised to visit the doctor. At first, the patient registers into the app if the patient was
The major drawback of this is if the patient is struggling with already a user then he/she login into their account, otherwise
a kidney problem that continuously gives the back pain effect, again he/she will register. During login, if the patient enters
then the app only suggests that the patient is struggling with incorrect credentials, then it will prompt the patient that they
the back pain then the doctor only sees the patient and had given an invalid username/password. After successful
suggests someone, take a back pain medicine even if they are login, the patient is allowed to select one of the services based
unaware that the patient has a renal condition. on their health problem. The services are general checkups,
Raj, Jennifer S, et al. [14] proposed a methodology for pregnant women’s checkups, Asthma checkups, Allergy
handling data such as big data on the basis of the Internet of checkups, Tuberculosis checkups, Pneumonia checkups, etc.
Things. It states that the internet is the main thing that handles If a patient wants a general check-up, he/she will choose that
data that has been generated by the health domain, business service. If the patient is a pregnant woman, he/she will select
domain, etc. But the internet has a limitation of cannot a pregnant women’s check-up. If the patient is suffering from
processing more data. So, this methodology of processing asthma, he/she will select an asthma check-up service. If the
data using the Internet of Things. This proposed methodology patient is suffering from an allergy, he/she will select an
is helpful in health care where IOT health devices are allergy check-up service. If the patient is suffering from
efficient to process data. Pneumonia, he/she will select that service. If a patient wants
Mishra, et al. [15] developed the application of storing to check up on Tuberculosis, he/she will select tuberculosis
information about patients by providing security. This web check-up service. Upon choosing the service the patient will
application with UX/UI interface provides both a patient view book an appointment.
of their data and a doctor view to upload patient data, and the If the appointment was confirmed, then he/she will fill in
patient can book an appointment. and submit the patient’s details. Else the patient needs to book
V. Bhatt, et al. [16] proposed a methodology for the voice because the doctor might be not available. Finally, physical
assistant application DocPal which provides Electronic assistance will come to their home and takes the patient to the
Health Records (EHR) to patients. The patient can operate corresponding hospital for consulting the doctor about their
based on their voice to see and update EHR. It is used to save health checkups. The physical assistant will take care of the
doctors and physicians time in updating patients’ records. patient until their whole checkup and after that, they will drop
Limitations of DocPal are only providing a voice interface for the patient at their home. The steps involved in the Patient
HER not assistance for patient health. module are described in the Algorithm 1.

2.1 Related Apps Algorithm 1: Patient Module


A. App Name: Sminq – Doctor Appointments Step 1: Patient Takes registration(Pr)
It provides online consultations with doctors. Consulting a Step 2: Log in to the mobile app
If ( entered Details (Patient) == details(Pr) )
doctor physically makes more difference than virtually. It
go to step 3
doesn’t provide any physical assistance to those people who
Else go to step 4
are unable to consult doctors physically like old people, or
Step 3: The patient then selects the services i.e.,
blind people.
General Checkup(Gc), Pregnant Checkup(Pc),

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 478


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Asthma Checkup(Ac) If the doctor is not available, then he rejects the


Step 4: Enter valid credentials appointment. If the appointment is confirmed then the
Step 5: Then book an appointment(Ba) corresponding hospital will provide a physical assistant to the
If (Ba==Confirm) patient's home. The physical assistant will go to the patient's
Go to step 7 home and take the patient to a hospital for a check-up. After
Else go to step 6 the check-up of the patient is done, then the physical assistant
Step 6: The doctor is not available. So, try it later. will drop the patient at their home. Algorithm 2 shows the
Step 7: Enter the Patient Details(Pd) process involves in Doctor module.
Step 8: A physical Assistance will come to their home to
pick them for health checkups.
B. Doctor Module
In the doctor module, the doctor registers in the
application. If he is already a user, then he directly login into
the app. The doctor offers services to the patients like general
check-ups, pregnant women's check-ups, and asthma check-
ups. If the patient selects one service and clicks on book
appointment, then the doctor will get a notification. The
majority of doctors confirm appointments.

Fig 1. Proposed Methodology

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 479


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

C. Cloud Module
Algorithm 2: Doctor Module Cloud technology can be useful to access the information of
Step 1: Doctor takes registration(Dr) the user such as login credentials so that they can log in and
Step 2: Log in to the mobile app use it from anywhere to access the information easily. A
If ( entered Details (Doctor) == details(Dr) ) number of applications are being designed and developed
go to step 3 using this application [11-12]. Therefore, this module is used
Else go to step 4 to maintain the details of the patient or doctor. Whenever the
Step 3: The Doctor then offers the services i.e., user signs up for the mobile application then the user will be
General Checkup(Gc), Pregnant Checkup(Pc), added to this cloud. Additionally, this information will be
Asthma Checkup(Ac) utilized to login into their account. The steps involved in the
cloud module are as shown in algorithm 3.
Step 4: Enter valid credentials
Step 5: The Doctor confirms the appointment(Ap) Algorithm 3: Cloud Module
If (Ap == Confirm) Step 1: When the patient or doctor registers into the app then
Go to step 7 it will be updated in the cloud.
Else go to step 6 Step 2: The cloud will keep track of how many members
Step 6: The doctor is not available. So, the appointment was have used this app.
rejected. Step 3: It will also show how many middle-aged, old-aged
Step 7: Physical Assistance will be sent to the people are using this app for consulting doctors.
corresponding patient’s home to pick them up for a Step 4: With this Cloud, we can see the analysis of the app
health checkup. i.e., through graph representation.

IV. RESULTS AND ANALYSIS


Currently, a number of advanced technology-based
applications are playing a vital role and are used by needy
persons. However, as we heard since childhood health is
wealth in such a way no one was needy person-friendly
applications existed with good efficacy. Hence, here
deployed the mobile application. The patient can log in to the
app by giving a username or email and password as shown in
Fig 2.

Fig 3. Sign-in Interface


Fig 4 shows the list of services that are provided to
patients, they can select one service according to their health
problem and can book an appointment.

Fig 2. Login Interface


If a patient is a new user, then the patient signs in to the
app as shown in Fig 3, by entering their username, email, and
password.

Fig 4. Services Interface

As shown in Fig 5, after selecting the service, the user can


book an appointment and know about the doctor to whom
he/she is going to consult.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 480


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 8 Shows a graph that how many users signed into the
app daily. The peak value recorded was 7 daily users. It was
recorded during the month of September. If suppose 4 new
users signed into the app in a day then it will go up to 4 along
the y-axis and if no user signed in then, there will be a
deviation as shown between Sept 14 – Sept 16.

Fig 5. Appointment Interface


In Fig 6, the user must provide personal details like name, Fig 8. Signed users
age, gender, mobile number, and address. So that it can be
used to get an analysis of how many members of a certain age
V. CONCLUSION AND FUTURE SCOPE
are consulting doctors frequently.
A number of advanced technologies are playing a vital
role such as IoT-based and, Web-based applications. The
health app is to make the experience of health care more
efficient and satisfying for all stakeholders who are involved.
Before 2011, there is no source of application to consult a
doctor through online. From 2018-19 the usage of healthcare
apps is 68.7%. In 2020, people had been busy with their
packed schedules as they depend on mobile healthcare
applications. Most of the health care apps are designed for
only online consultations, but in our app, the senior citizen can
consult the doctor for their daily checkups. Daily wage
workers and any other employees may manage their parents'
health and daily check-ups with this app. They may consult a
doctor and make a non-emergency appointment using these
applications. The number of medical consultations is steadily
rising since people's health is declining and they are
concentrating primarily on taking care of themselves. They
Fig 6. Entering Patient Details, Interface are not going to worry about their parent’s health. They
require a doctor's appointment at this time to learn more about
their health. They might learn about their health status and
Fig 7 shows a graph that describes how many users are using take care of themselves by utilizing this software.
this application monthly. It was recorded from the month of
September 1st to October 1st. The pointer is showing the rate
of active users in that monthly period from the range of 0 to
30. REFERENCES
[1] D. Liu, H. -H. Hsieh, W. -D. Tsay and M. -H. Ke, "Analysis on
Functional Demand of Mobile-Health APP for Elders," 2020 IEEE 2nd
Eurasia Conference on Biomedical Engineering, Healthcare and
Sustainability (ECBIOS), 2020, pp. 122-125, doi:
10.1109/ECBIOS50299.2020.9203674.
[2] S. Oniani, G. Marques, I. M. Pires, S. Muhkashavria and N. M. Garcia,
"E-health and M-health applications in Georgia: A review on the free
available applications for Android Devices," 2020 IEEE International
Conference on Big Data (Big Data), 2020, pp. 3793-3796, doi:
10.1109/BigData50022.2020.9378291.
[3] K. M. Ben Hamed and A. Baryun, "Designing a mobile app to trace
Covid-19 using social networks," 2021 IEEE 1st International
Maghreb Meeting of the Conference on Sciences and Techniques of
Fig 7. Monthly Active users

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 481


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Automatic Control and Computer Engineering MI-STA, 2021, pp. 276-


281, doi: 10.1109/MI-STA52233.2021.9464486.
[4] Z. Liang, O. Tatha and L. E. Andersen, "Developing mHealth App for
Tracking Academic Stress and Physiological Reactions to Stress,"
2020 IEEE 2nd Global Conference on Life Sciences and Technologies
(LifeTech), 2020, pp. 147-150, doi:
10.1109/LifeTech48969.2020.1570618580.
[5] S. S. Bhat, K. Shraddha, A. S. Bhavana, and S. S. Rao, "Digital
Medicine Assistant-Health Application for Expiry Tracking," 2021
International Conference on Disruptive Technologies for Multi-
Disciplinary Research and Applications (CENTCON), 2021, pp. 279-
284, doi: 10.1109/CENTCON52345.2021.9687888.
[6] S. Allen, "New Apps Drive Health Care Innovation, Access to Care,"
in IEEE Pulse, vol. 12, no. 2, pp. 28-32, March-April 2021, doi:
10.1109/MPULS.2021.3067176.
[7] B. Maryem, E. Hakima, Y. Ikram and B. Mohamed, "Diabetic patients
and physicians’ acceptability of a mobile health application for
Diabetes monitoring in Fez region (Morocco)," 2020 1st International
Conference on Innovative Research in Applied Science, Engineering
and Technology (IRASET), 2020, pp. 1-4, doi:
10.1109/IRASET48871.2020.9092268.
[8] L. He, Y. He and P. Li, "Research on the Current Status of Chronic
Pain Suffered by Old People in Nursing Homes and their Demand for
Mobile Health Application (APP)," 2021 International Conference on
Public Health and Data Science (ICPHDS), 2021, pp. 90-95, doi:
10.1109/ICPHDS53608.2021.00027.
[9] G. Samhitha, D. S. Rao, C. Rupa, Y. Ekshitha and R. Jaswanthi,
"Vyayam: Artificial Intelligence based Bicep Curl Workout Tacking
System," 2021 International Conference on Innovative Computing,
Intelligent Communication and Smart Electrical Systems (ICSES),
2021, pp. 1-5, doi: 10.1109/ICSES52305.2021.9633841.
[10] F. Alloatti et al., "“Can You Help Me Measure My Blood Sugar?” Co-
design of a Voice Interface to Assist Patients and Caregivers at
Home," 2021 IEEE Symposium on Computers and Communications
(ISCC), 2021, pp. 1-4, doi: 10.1109/ISCC53001.2021.9631519.
[11] S. Souiki, M. Hadjila, D. Moussaoui, S. Ferdi and S. Rais, "M-Health
Application for Managing a Patient's Medical Record based on the
Cloud: Design and Implementation," 2020 2nd International Workshop
on Human-Centric Smart Environments for Health and Well-being
(IHSH), 2021, pp. 44-47, doi: 10.1109/IHSH51661.2021.9378744.
[12] B. Wen et al., "Health Guardian Platform: A technology stack to
accelerate discovery in Digital Health research," 2022 IEEE
International Conference on Digital Health (ICDH), 2022, pp. 40-46,
doi: 10.1109/ICDH55609.2022.00015.
[13] R. Das, S. Mondal and N. Mukherjee, "MoRe-care: Mobile-assisted
remote healthcare service delivery," 2018 10th International
Conference on Communication Systems & Networks (COMSNETS),
2018, pp. 677-681, doi: 10.1109/COMSNETS.2018.8328294.
[14] Raj Jennifer S. "A Novel Information Processing in IoT Based Real
Time Health Care Monitoring System." Journal of Electronics 2, no. 03
(2020): 188-196.
[15] Mishra, Akhilesh, Anuj Jaiswal, Lokesh Chaudhari, and Varsha
Bodade. "Health Record Management System–A Web-based
Application." Journal: Journal of ISMAC December 2022, no. 4
(2021): 301-313.
[16] V. Bhatt, J. Li and B. Maharjan, "DocPal: A Voice-based EHR
Assistant for Health Practitioners," 2020 IEEE International
Conference on E-health Networking, Application & Services
(HEALTHCOM), 2021, pp. 1-6, doi:
10.1109/HEALTHCOM49281.2021.9399013.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 482


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Task Scheduling Algorithms in Fog Computing: A


Comparison and Analysis
Tarun Jagadish Onkar Apte K. Pradeep
Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science
Vellore Institute of Technology Vellore of Institute of Technology Vellore Institute of Technology
Chennai, India Chennai, India Chennai, India
tarunjagadish28@gmail.com oapte971@gmail.com pradeep.k@vit.ac.in

Abstract—In terms of the contexts of devices and applications,


the application execution required in cloud and fog computing
systems is typically heterogeneous. The scaling of these needs on
various architectures is a multi-restriction optimization problem.
Despite all of our efforts, task scheduling in these systems still
faces some interesting difficulties, which makes us curious in how
jobs are routed between various physical devices, fog nodes, and
the cloud. But there has been a lot of study done on job scheduling
in cloud computing systems. However, most studies use a service
provider’s point of view or pursue higher application quality
of service (QoS) levels while addressing this issue. This study
examined the main job scheduling strategies used in cloud and
fog architecture.
Index Terms—Cloud Computing, Task Scheduling, Cloud
Scheduling, Fog Computing

I. I NTRODUCTION
The transition from antiquated to contemporary technolog- Fig. 1. Fog Computing Model
ical computing has recently occurred in the computing world.
Computers and intelligent portable devices are heavily used
by people and enterprises to complete daily tasks [1]. The our comparison and analysis of the different task scheduling
organisation stores the vast volume of data that these gadgets algorithms implemented in the fog computing environment.
generate for further examination. The amount of data created
by sensors and applications has greatly expanded as a result II. R ELATED W ORK
of the IoT sector’s explosive growth. These are the cloud’s Cloud resources, network edge resources, and core network
primary restrictions. Researchers other than Cisco presented a resources can all be used by fog computing. In [4], Fatma
novel prototype in 2012 that they called ”fog computing” [2]. Talaat proposed a fresh, healthcare-relevant Effective Resource
Described as ”a massively virtualized platform that supplies Allocation Methodology (ERAM) for fog environments. The
storage, data, computation, and networking service between IoT Layer, the Fog Layer, and the Cloud Layer are the three
the typical cloud server and edge devices,” fog computing levels that make up the proposed IoT-Fog system. The IoT
is a more advanced type of cloud computing [3]. The pro- layer’s objective is to monitor the patient’s symptoms. The
cess of achieving the task of storing and altering without incoming requests are thought to be handled by the fog layer,
the involvement of a third party using a sizable number of which then routes them to the appropriate server. Data transit
wireless, autonomous, ubiquitous, and decentralised devices to and from the fog layer is controlled by the cloud layer.By
to communicate with the network is known as ”fog comput- using a real-time resource allocation and prediction system,
ing.” Fog computing’s primary objectives are to decrease the ERAM was able to manage resources effectively in a foggy
volume of data processed, analysed, and stored while also environment. In [5], Junaid Akram offers a system model of
increasing effectiveness. Fig. 1 above depicts the fundamental SG paired with a cloud- and fog-based environment. It un-
fog computing model.The fundamental computing components veiled a cutting-edge strategy based on binary particle swarm
of a fog computing model are the edge device, fog node, optimization with inertia weight adjustment via simulated an-
and cloud. A fog node can be any device with storage, nealing. In [6] Omed Ahmed introduced a discrete, opposition-
measurement, and networking capabilities. The cloud server based MFO method that makes use of crossover and mutation
oversees fog nodes, which are in charge of translating services operators. Then, using a hybrid discrete optimization technique
between edge devices and the cloud [4]. This study presents we developed dubbed DMFO-DE that executes one of the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 483


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

DMFO and DE algorithms probabilistically, we merged it D. Edge location


with the DE algorithm. It can choose which algorithm to
Fog computing is implemented at the threshold, allowing
execute more by using the learning automata. The topic of
for the integration of location awareness and support for
task scheduling in the Cloud-Fog computing environment for
endpoints with sophisticated network services, such as gaming
BoT applications was the main emphasis of [7] by Binh
applications [10].
Minh Nguyen. Numerous situations were used to evaluate the
effectiveness of the evolutionary-based TCaS algorithm. The E. Geographic distribution
three other techniques, MPSO, BLA, and RR, were outper-
formed by TCaS in both a Fog environment and a Cloud- Fog requests are widely dispersed and generated by putting
Fog system. The suggested method could adaptably meet the an emphasis on applications and services. For the creation of
user’s need for cost-effectiveness or high performance process- high-quality information flow from fog to vehicles or for the
ing. Samia Ijaz put forth an energy-makespan multi-objective tracking of the information, fog is essential [10].
optimization (EM-MOO) scheduling method in [8] to find a
compromise between the conflicting objectives of minimising IV. D IFFICULTIES IN F OG C OMPUTING
makespan and energy consumption. Asaad Ahmed described The difficulties and challenges that are faced in fog com-
the multiple-entity task allocation problem (META) in [9] and puting are:
introduced a new bipartite graph with fuzzy clustering task
allocation approach called BiFTA that uses a hybrid DAG to A. Security and Reliability
represent independent and dependent tasks for choosing the
most favourable computing nodes for each task. [22] looked The major issue with fog computing is how to enforce
at various task allocation algorithms in the field of swarm security rules. The authentication at various fog node tiers
robotics. Annamalai L researched and analyzed the distributed presents another security issue. Application sandbox usage
bee algorithm, fixed response threshold model, extreme-comm introduces a new issue: trust and privacy. The application for
algorithm and other novel communication methods such as Fog enables processing of user data utilising external hardware
communication through light signals and leader follower and software [10].
approach. In [23], Dr. Dinesh Kumar reviews various task
scheduling algorithms in ubiquitous clouds. The algorithms B. Resource Management
he reviewed were Particle Swarm Optimization, Whale Opti- It makes resource allocation decisions based on user be-
mization, Ant Colony Optimization, Bacterial Foraging, Bat haviour and the likelihood that a resource will be used when
Algorithm, Chaotic Optimization Strategy, Bee Colony Opti- it is needed, which increases efficiency and fairness. A scalable
mization and Genetic Algorithm. He gathered insights into the management method is necessary for the fog. to be set up on
algorithm and concluded that algorithms that were based on one billion tiny devices [10].
the foraging behaviour of insects, reptiles, animals and birds
showed an improved performance as compared to conventional C. Job Scheduling
algorithms.
To increase the system’s dependability and adaptability
III. C HARACTERISTICS OF F OG C OMPUTING in fog, work scheduling assumes a crucial role. The main
justification for assigning a task to a resource with a time
A development of cloud computing, fog computing is useful
constraint is to finish the multiple tasks in the best and most
for IoT-connected objects and also acts as a foundation for
thorough order in order to achieve the most ideal solution.
cloud computing [10]. The following are some of the essential
The work scheduling process in fog computing refers to the
elements of fog computing:
selection of the best available resource for task execution or
A. Heterogeneity computer allocation [10].
In order to compute, supply storage, and give network V. TASK S CHEDULING A LGORITHMS
connectivity between the end user and the cloud server, fog
computing is highly virtualized. Usually, the structure for both To attain the highest level of performance and resource
fog and cloud is comprised of network resources [10]. utilisation, a set of rules and regulations which are known
as task scheduling algorithms are used to allocate tasks to the
B. Large-scale sensor network appropriate resources (CPU, memory, and bandwidth).
Storage resources for the smart grid and cloud-fog environ- As cloud computing is in its initial stages, a scheduling
ment are maintained and monitored over [10]. framework should be implemented in order to improve the
satisfaction of users along with the server providers [11]. The
C. Mobility support parameters can be coupled to prepare an algorithm for resource
To communicate with end devices using the LISP protocol, allocation and scheduling. The framework should consider
which isolates the host from the location identity, applications user input constraints such as deadlines, cost, efficiency,
need mobility supports [10]. makespan and so on.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 484


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A. First Come First Serve (FCFS) global personal values, the equations to update particle veloc-
ity and position are [12].
The most basic and straightforward methods for scheduling
tasks in a cloud environment involve task arrival time. The vit+1 = ωνid
t
+ c1r1(pti − xti ) + c2r2(ptg − xti ) (1)
work will be scheduled and carried out based on whatever task
entered the queue first. It is solely based on arrival time and xt+1
i = xti + νit+1 (2)
takes all other factors into account. The tasks will be arranged th
Where the i particle’s position and velocity in dimension
by choosing the right jobs to do first. The data center will d are denoted by xi t and vi t , respectively. The careful consid-
give the VM that received the job or user request initially the eration of the PSO parameter ω, c1, and c2 is necessary to
responsibility for execution. The virtual machine is given a improve algorithm efficiency. Our ability to quickly compute
job by the data center controller, which then removes it from the best solution is aided by this.
the task queue [12].
After all the jobs have been queued in a cloud environment,
B. Shortest Job First (SJF) the optimization technique is then used to determine the least
This scheduling method uses a strategy in which tasks with waiting periods for each work. These minimal values are used
the shortest execution times are chosen for all tasks. When a to ensure that tasks are completed in the proper order, hence
set of all jobs is not assigned, this procedure starts running reducing waiting times overall. A task is dispatched to this
and keeps going until the set of jobs is empty. In Shortest queue after the queue created algorithm has determined the
Job First, occupations that take up more time or are longer in threshold and determined the task’s most optimal order. After
duration may not be given priority, and tasks that take up more that, the scheduler assigns a task to an appropriate resource.
time always come after small jobs. This algorithm calculates
the completion times of all jobs, then schedules the work on PSO’s primary objective is to assign a user request to a
the resource with the shortest completion times [12]. relevant resource [12]. To plan a work effectively in a cloud
environment, the task scheduling process requires an optimal
C. Round Robin (RR) algorithm that considers the task and resources. The PSO
algorithm takes into account both the resource and the job,
The round robin is a simple illustration of a load balancing helping to maximise resource use and decrease task processing
strategy. For the purpose of equally allocating scheduling time times [12].
across all planned jobs, a round robin system was developed.
In this method, all tasks are placed in a queue list and each E. Ant Colony Optimization (ACO)
work is given a modest amount of time. The primary goal of Ant colony optimization (ACO) takes its cues from the
RR is to evenly distribute the workload among all resources foraging techniques of several ant species. As seen in Fig.
[12]. Round robin uses a cyclical approach. As soon as the 2, these ants leave pheromone trails on the ground to direct
time allotted for the first work has passed, the scheduler will the other ants in the colony in the right direction. Ant colony
move on to the second task [12]. This is a cyclical strategy optimization approaches optimization problems in a similar
in which the controller is given each task at least once before way [14].
the scheduler picks up the first task once more.

Round Robin is an easy method to distribute client requests


amongst a group of servers. The RR load balancer sends the
client requests to each server one by one. After sending to
all the available servers, it goes back and starts sending client
requests from the first server again. This method is not efficient
for client requests in which the load differs significantly [13].

D. Particle Swarm Optimization (PSO)


This population-based meta-heuristic algorithm is inspired
by the social behaviours of flocking birds and schooling
fish [12]. Each particle in the method, which consists of a
collection of particles, indicates a workable solution to the
problem in the given search space [12]. This algorithm, when
started with a set of random particles, finds the best solution
in the problem space. In PSO, we utilise iteration to determine
each particle’s position. These positions are referred to as the Fig. 2. Ant Colony Optimization Model
particle’s personal best Pb and the global best Pg . Position
determined by particle i’s neighbour. After determining both

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 485


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Algorithm 1 Ant Colony Optimization VI. R ESOURCE U TILIZATION AND M EMORY A LLOCATION
Establish parameters and declare pheromone trails Resource usage is the ratio of data center resources, CPU,
while Termination requirement not satisfied do memory, bandwidth, and total capacity as mentioned in [17].
Build Ant Solutions
Search Locally Understanding resource utilization is essential for cloud
Update Pheromones provider reputation. In the majority of data centers, the average
end while resource usage can be as low as 20%. The efficient use of
cloud resources is referred to as ”cloud resource utilization.”
Low resource waste, low costs, and large energy savings are
Build Ant Solutions: A group of m artificial ants constructs
the results of optimal resource utilization. Cloud resource use
solutions using pieces from a finite set of components [14]. A
is already being aided by virtualization, load balancing meth-
usable part of the set N (sp ) is added to the partial solution at
ods, virtual machine consolidation, virtual machine placement,
each step of the construction. N (sp ) is the group of usable
reconfiguration algorithms, and auto scaling cloud computing
elements that can be added to the partial solution without
methods [18]. As long as resources are few compared to
disregarding any of the necessities in Ω.
the rising demand for computers and computing, there is a
The probability with which the ant moves from one vertex
constant need for resource utilization. Using a multi-tenant ap-
a to vertex b is given by the equation [15]:
proach, resources are pooled to service numerous consumers,
α β
(τx,y )(ηx,y ) with various physical and virtual resources being dynamically
pi , j = P β
(3)
α )(η
(τx,y x,y )
assigned and reassigned in response to consumer demand [19].
Here, τ x,y represents the amount of pheromones on edge VII. C OMPARISON OF TASK S CHEDULING A LGORITHMS
x,y and η x,y is the attractiveness of the edge x,y. α and β are For our research we have selected First Come First Serve
parameters that affect the amount of influence that τ and η (FCFS), Shortest Job First (SJF), Round Robin (RR), Particle
respectively have on the final probability of edge selection. Swarm Optimization (PSO) and Ant Colony Optimization
(ACO). FCFS, SJF and RR were chosen as they are tradi-
Search Locally: Before updating the pheromone once solu- tional scheduling algorithms and PSO and ACO are enhanced
tions have been established, it is typical for ants to refine the algorithms for task scheduling in cloud-fog environment which
answers found through local searching [14]. makes the scheduling process more efficient. In Table 1, we
have compared the aforementioned task scheduling algorithms
Update Pheromones: The objective of the pheromone up-
[20]:
date is to enhance pheromone values linked to successful or
prospective solutions and lower the ones with unsuccessful
TABLE I
solutions. Usually, to do this, all pheromone values are (i) C OMPARISON OF TASK S CHEDULING A LGORITHMS
decreased by pheromone evaporation, which removes the trails
that are linked to unsuccessful solutions and (ii) the pheromone Scheduling Scheduling Parameters Merits
Algorithm
levels associated with a particular group of constructive solu- FCFS Arrival time Reduce time complexity
tions are elevated [14]. SJF Task size Reduce the turnaround and ex-
The pheromones trails are updated after all the ants have ecution times.
obtained their solution and either increasing or decreasing the Round Arrival time, time slice Shorten the migration process
Robin and make better use of the re-
pheromone values based on their success based on a rule [16] sources
depicted in the below equation: PSO Inertia, c1 and c2 con- Decrease makespan time and
m stants boost processing speed
X
k ACO Cost, time and phe- Reduces costs and improves re-
τxy ← (1 − ρ)τxy + ∆τxy (4) nomenon updating rule source efficiency
k
ρ is known as the pheromone evaporation coefficient which
VIII. S IMULATION AND C OMPARATIVE A NALYSIS
denotes the rate of pheromone evaporation. ∆τ k xy represents
the total amount of pheromones that are deposited on the A. Methodology
selected edge (x,y) by the kth ant and m is the number of In order to conduct our simulation testing, we used a simu-
ants. In the case of Travelling Salesman Problem, ∆τ k xy is lation tool, CloudSim. CloudSim is an open-source framework
given by which is used for modelling and simulating cloud computing
( infrastructures. It is developed by the CLOUDS Lab organiza-
k Q/Lk if kth uses edge xy in its tour
∆τxy = (5) tion and is completely written in Java. The major classes used
0 otherwise in CloudSim simulation are:
In the above equation Q is a constant that represents the inten- • Cloudlet
sity of pheromones that can affect the rate of the algorithm, • VM
Lk is the total length of the path that the kth ant has travelled. • Host

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 486


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

• Datacenter
• DatacenterBroker
The main components of CloudSim are depicted in Fig. 3
[21].

Fig. 4. Comparative Analysis of Makespan

CloudSim in Fig. 3. From Fig. 4, we can conclude that Particle


Swarm Optimization is the best performing task scheduling al-
gorithm with respect to makespan in cloud-fog system that we
simulated using CloudSim. The ranking of the task scheduling
algorithms in decreasing order of performance from Fig. 4:
Fig. 3. Main Components of CloudSim
1) Particle Swarm Optimization
2) Ant Colony Optimization
We used CloudSim with Eclipse IDE using Java program-
3) Round Robin
ming language for conducting our analysis.
4) First Come First Serve
5) Shortest Job First
In every scheduler, the following steps are followed:
• Create a new instance of the CloudSim simulation with
Fig. 4 was generated by visualizing the makespan of each
three parameters: the number of cloud users, the current task scheduling algorithm in five different scenarios, each
date and time, and the flag for event tracing. having a different number of tasks (100, 150, 200, 250,
• Create a DataCenter using the settings provided. Each
300). From Fig. 4, we can determine that Particle Swarm
DataCenter has only received one Host and PE.
• Create a DatacenterBroker according to the task schedul-
Optimization is approximately 38.3% better than Ant Colony
ing algorithm. Optimization, 38.4% better than Round Robin, 53.5% better
• Create virtual Machines with the given parameters.
than First Come First Serve and 65.4% better than Shortest
• Create Cloudlets with the given parameters and length.
Job First task scheduling algorithm.
• Submit the Virtual Machine and Cloudlet list to the
PSO performs the best for four out of the five testing
DatacenterBroker. samples we used which varied in the number of task ranging
• Start the CloudSim simulation.
from 100-300 in increments of 50. On the other hand, SJF
• After execution, get the Cloudlet list after execution.
performed the worst for three out of the five testing samples.
• This list contains details related to the execution of
Cloudlets like Start Time and Finish Time. Out of the five task scheduling algorithms analysed, Particle
• The makespan for the task scheduling algorithm is cal-
Swarm Optimization came out with the highest performance
culated. in the cloud-fog system. On the other hand, Shortest Job First
B. Frameworks and Tools Used algorithm performed the worst with 65% less performance
compared to Particle Swarm Optimization. This result can be
The programming language that we used for this research attributed to high overhead in SJF (Shortest Job First) where
is Java. The following Java libraries were used: at each step the algorithm has to search for the shortest job.
• cloudsim-3.0.3.jar: contains all the model classes required Whereas in PSO (Particle Swarm Optimization), each particle
for CloudSim in the swarm finds the minimum in a random direction thus
• jswarm-pso 2 08.jar: contains all the interfaces required increasing chances of finding the global minimum when the
for simulating Particle Swarm Optimization such as par- particles are aggregated. Due to high speed of finding the
ticle, fitness function, etc. minimum and performing the subsequent task, PSO (Particle
• commons-math3-3.6.1.jar- contains statistical and math- Swarm Optimization) has the best performance.
ematical components which is required while running a
CloudSim project. IX. C ONCLUSION
Task scheduling in a cloud environment primarily aims
C. Comparison and Analysis to speed up resource utilisation and shorten task execution
We compare the makespan of each of the aforementioned times. In the course of this research we studied various task
task scheduling algorithms in cloud-fog environment using scheduling algorithms pertaining to the cloud-fog architecture

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 487


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

such as FCFS (First Come First Serve), SJF (Shortest Job [16] Yu, H. (2014). Optimized ant colony algorithm by local pheromone
First), Round Robin, PSO (Particle Swarm Optimization) and Update. TELKOMNIKA Indonesian Journal of Electrical Engineering,
12(2), 984-990.
ACO (Ant Colony Optimization). The algorithms were com- [17] Bal, P. K., Mohapatra, S. K., Das, T. K., Srinivasan, K., Hu, Y.
pared based on their scheduling parameters and merits. A brief C. (2022). A Joint Resource Allocation, Security with Efficient Task
description of the aforementioned task scheduling algorithms Scheduling in Cloud Computing Using Hybrid Machine Learning Tech-
niques. Sensors, 22(3), 1242.
has been presented. The task scheduling algorithms were also [18] Mehmood, T., Latif, S., Malik, S. (2018, October). Prediction of cloud
compared based on their makespan in an analysis that we computing resource utilization. In 2018 15th International Conference
conducted using the CloudSim simulation tool in Java. From on Smart Cities: Improving Quality of Life Using ICT IoT (HONET-
ICT) (pp. 38-42). IEEE.
this comparative analysis we can conclude that PSO (Particle [19] Ala’a Al-Shaikh, H. K., Sharieh, A., Sleit, A. (2016). Resource
Swarm Optimization) is the best performing task scheduling utilization in cloud computing as an optimization problem. Resource,
algorithm amongst the algorithms we analysed. There is 7(6).
[20] Pradhan, Arabinda Bisoy, Sukant Das, Amardeep. (2021). A Survey
significant scope for improving the scheduling approaches in on PSO Based Meta-Heuristic Scheduling Mechanism in Cloud Com-
the cloud-fog environment. Prospective algorithms can group puting Environment. Journal of King Saud University - Computer and
different algorithms like PSO and ACO in a sequential or Information Sciences. 10.1016/j.jksuci.2021.01.003.
[21] Keshk, Arabi El-Sisi, Ashraf Tawfeek, Medhat. (2014). Cloud Task
parallel way in order to get a lower makespan and better Scheduling for Load Balancing based on Intelligent Strategy. Inter-
performance. national Journal of Intelligent Systems and Applications. 6. 25-36.
10.5815/ijisa.2014.05.02.
R EFERENCES [22] Annamalai, L., M. Mohammed Siddiq, S. Ravi Shankar, and S. Vignesh-
war. ”A Study on Various Task-Work Allocation Algorithms in Swarm
[1] Xu, Baomin Zhao, Chunyan Hu, Enzhao Hu, Bin. (2011). Job schedul- Robotics.” Journal of Information Technology 2, no. 02 (2020): 123-134.
ing algorithm based on Berger model in cloud environment. Advances in [23] Kumar, Dinesh. ”Review on task scheduling in ubiquitous clouds.”
Engineering Software. 42. 419-425. 10.1016/j.advengsoft.2011.03.007. Journal of ISMAC 1, no. 01 (2019): 72-80.
[2] Ozturk, Celal Hancer, Emrah Karaboga, Dervis. (2015). Dynamic
clustering with improved binary artificial bee colony algorithm. Applied
Soft Computing. 28. 10.1016/j.asoc.2014.11.040.
[3] Capannini, Gabriele Baraglia, Ranieri Puppin, Diego Ricci, Laura
Pasquali, Marco. (2007). A job scheduling framework for large com-
puting farms. Proceedings of the 2007 ACM/IEEE Conference on
Supercomputing, SC’07. 54. 10.1145/1362622.1362695.
[4] M. Talaat, Fatma. (2022). Effective prediction and resource allocation
method (EPRAM) in fog computing environment for smart healthcare
system. Multimedia Tools and Applications. 81. 1-24. 10.1007/s11042-
022-12223-5.
[5] Akram, Junaid Tahir, Arsalan Munawar, Hafiz Suliman Akram, Awais
Kouzani, Abbas MAHMUD, M. A.. (2021). Cloud- and Fog-Integrated
Smart Grid Model for Efficient Resource Utilisation. Sensors. 21. 7846.
10.3390/s21237846.
[6] Ahmed, Omed Lu, Joan Xu, Qiang Ahmed, Aram Rah-
mani, Amir Hosseinzadeh, Mehdi. (2021). Using differential evolu-
tion and Moth–Flame optimization for scientific workflow schedul-
ing in fog computing. Applied Soft Computing. 112. 107744.
10.1016/j.asoc.2021.107744.
[7] Nguyen, Binh Minh Binh, Huynh Anh, Tran Do, Son. (2019).
Evolutionary Algorithms to Optimize Task Scheduling Problem for
the IoT Based Bag-of-Tasks Application in Cloud–Fog Computing
Environment. Applied Sciences. 9. 1730. 10.3390/app9091730.
[8] Ijaz, Samia Munir, Ehsan Ahmad, Saima Rafique, M. Mustafa Rana,
Omer. (2021). Energy-makespan optimization of workflow scheduling in
fog–cloud computing. Computing. 103. 10.1007/s00607-021-00930-0.
[9] Ahmed, Asaad Noaman, Amin. (2019). Fuzzy clustering-based task
allocation approach using bipartite graph in cloud-fog environment. 454-
463. 10.1145/3360774.3360833.
[10] Yi, Shanhe Li, Cheng Li, Qun. (2015). A Survey of Fog Computing:
Concepts, Applications, and Issues. 37-42. 10.1145/2757384.2757397.
[11] Shenai, S. (2012). Survey on scheduling issues in cloud computing.
Procedia Engineering, 38, 2881-2888.
[12] Malik, Babur Amir, Mehwashma Mazhar, Bilal Ali, Shehzad Jalil,
Rabiya Khalid, Javaria. (2018). Comparison of Task Scheduling Al-
gorithms in Cloud Environment. International Journal of Advanced
Computer Science and Applications. 9. 10.14569/IJACSA.2018.090550.
[13] Hidayat, T., Azzery, Y., Mahardiko, R. (2020). Load balancing network
by using round Robin algorithm: a systematic literature review. Jurnal
Online Informatika, 4(2), 85-89.
[14] Dorigo, Marco Birattari, Mauro Stützle, Thomas. (2006). Ant Colony
Optimization. Computational Intelligence Magazine, IEEE. 1. 28-39.
10.1109/MCI.2006.329691.
[15] Runka, A. (2009, July). Evolving an edge selection formula for ant
colony optimization. In Proceedings of the 11th Annual conference on
Genetic and evolutionary computation (pp. 1075-1082).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 488


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Identify Fake Data or Misinformation in Near Real-


Time using Big Data and Sentiment Analytics
1st Parth M Kansara 2nd Dr Kinjal U Adhvaryu
Research Scholar, Professor
Department of Computer Engineering, Department of Computer Engineering,
Gujarat Technological University Shankersinh Vaghela Bapu Institute of Technology,
INDIA Gujarat Technological University
209999913014@gtu.edu.in (parthkansara.1992@gmail.com) India
kinjalvk@yahoo.com

Abstract—Millions of people utilise social networking sites, II. OBJECTIVES


which are important media outlets in everyday life, with some bad
consequences. Spammers have started sending out a lot of useless • Spammers on misinformation have a variety of goals,
and harmful material. The strategies for identifying spammers including distributing false rumours, comments[2].
that propagate bogus information are examined. A taxonomy of • Destructive goals using adverts and a variety of other
misinformation spam detection systems is also provided, which methods, such as supporting several then sending fake
categorises the tactics into four groups depending on their ability
data at random promote. Furthermore, tarnishes OSN
to detect incorrect information. The study presented here will be
useful to researchers seeking for the most recent advancements platforms' reputation[3].
in misleading spam detection in one location. • As a result, it's critical to devise a strategy for detecting
Keywords—Fake data, sentimental analysis, near real-time, big spammers so that remedial action may be done to stop
data. their unwanted activity [4].
I. INTRODUCTION • In the field of misinformation spam detection, several
studies have been conducted. A literature review is also
A. Misinformation Platform included in the study, which admits the presence of
spammers that spread false information. Despite all of
In the disinformation platform, using the Internet type the study that has been done, the literature still has a
throughout has become quite simple. Users can gather vast gap.
amounts of data and knowledge on other users because to • As a result, in order to bridge the gap, we look at the
the growing popularity of social media platforms. Because state of the art in spammer detection and fake user
of the vast volumes of data available on these platforms, identification on disinformation.
fake users are drawn to them. Misinformation has swiftly
• This review also includes a taxonomy of
gained traction as a means of gathering real-time data about disinformation spam detection approaches, as well as a
people. Misinformation is an OSN (Online Social Network)
complete summary field. To categorise these
that lets users to submit anything they want, including news,
approaches into a taxonomy.
thoughts, and even their feelings. Several discussions on a
range of topics, such as politics, current affairs, and III. PROPOSED FRAMEWORK
important events, may be held. When someone spreads false
information, it is promptly disseminated with his or her The four techniques for reporting spammers:
followers, allowing them to reach a far bigger audience. As
online social networks have matured, the need to monitor • Fake Content
and analyse user behaviour has expanded. • Spam Detection Using URLs
• Spam Detection in Popular Topics
B. Understanding the Spammer Analysis • Imitation of User Identification
Spammers have turned transmitting a vast worthless In addition to offering aims, this document existing
damaging information. Allowing for an overwhelming procedures and assists users in recognising the relevance and
amount of spam. Fraudsters can easily dupe a large number efficacy of the recommended methodology [5]. This article
of individuals who are unfamiliar with OSNs. It is also compares the many characteristics to identify Social Media
necessary to resist and control individuals who use OSN [6].
only for the purpose of advertising and so spam other
people's accounts. The detection of spam on social Provide with a single source of information about spammer
networking sites has lately piqued the interest of researchers. detection tools.
Spam detection is a difficult task in order to maintain social
networks secure [1]. It is vital to detect spam on OSN sites • A comparison of potential spam-detection algorithms on
in order to protect users from all forms of hazardous assaults Near Real Time.
and to safeguard their security and privacy.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 489


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

• This section contains an overall analysis and debate, as volume unsolicited has an impact on both real users and
well as a summary of the study and some recommendations resource use. Likelihood transmitting customers
for future research. dissemination dangerous material [17]. Recently, spammer
detection and false user recognition on Near Real Time has
Misinformation's growing popularity draws an increasing big data and sentimental analytics became a major.
number of spammers. Spammers send spammy
misinformations to Near Real Time users in order that Offered methodologies several characteristics, graph
damaging regular [7]. Use of machine learning approaches characteristics, structural characteristics, temporal
to Near Real Time spam detection has been the subject of characteristics [18]. Possibility of consumers disseminating
current research [8]. hazardous information. Spammer detection and false user
recognition in Near Real Time has recently become a key
Furthermore, the possibility of extending erroneous info to focus of big data and emotional analytics. Study's author
customers via fake characters has increased the number of believed it would beneficial scholars breakthroughs on
negative consequences in the distribution of dangerous single platform for Social Media. [19].
substances [9]. The location of spammers and the detection
of bogus clients on social media of discussion informal. The abundance of spam, rumours, and bogus material on
Currently, conduct a study on strategies [10]. Near Real Time diminishes the value of information
included in its messages (or "fake data") during quick onset
Furthermore, fake data methodologies presented, which crisis occurrences. One proposed answer utilise assess a fake
divides processes into four categories data's credibility, or whether a person would find it credible
or trustworthy. In an off-line (post-hoc) situation, analysed
Demonstrated examined characteristics, client issue. We provide a semi-supervised ranking strategy for
characteristics, , diagram characteristics, as well as fake assessing fake data based on their credibility in this research.
data. [11]. Near Real Time, a browser plugin, was installed and utilised
by 1,127 social media users during the first 24 hours [20].
A. Drawbacks:
People are increasingly using Online Social Networks
• Spam detection effective in searches, although spammer (OSNs) to engage and exchange information. While OSNs
detection is more connected with the failure to discover have established themselves as a new medium for
existing spam accounts. information distribution, they are also quickly becoming a
playground for the propagation of disinformation [21].
• If a spammer is found in nature, her account will be
suspended or her IP address will be temporarily blocked, As a result, an OSN (Online Social Network) platform users:
preventing to post. Why recognising the actual work, thus
focusing lives spam message more difficult way [12]. • Spammers
• Non-spammers.
IV. SPAMMERS TO WELL-KNOWN SOCIAL
NETWORKING Usefulness of several approaches for problem fake data.
According to the findings, using restricted qualities available
Information quality on media is becoming increasingly
false data can produce promising results that are competitive
crucial, but examine rectify most erroneous information,
with existing spammer detection algorithms that depend on
"fake news," on is hampered by web-scale data. All three
more expensive user information[22]. Our study is the first
datasets are also publically available, having been aligned
to attempt to generalise results from different datasets about
into a common format [13], yet makes it difficult most
the best classifiers and feature sets for detecting social spam
erroneous information, or "fake news." have been single and
[23].
now [14].
Spammers upload undesired (or irrelevant) information or
A feature analysis identifies qualities with high ratings,
disseminate falsehoods on OSN platforms with harmful
which is consistent with earlier research. We conclude by
intent. We used three learning algorithms in our research:
discussing the distinctions between accuracy and
Naive Bayes, Clustering, and Decision Trees [24].
believability, as well as why non-expert models outperform
journalist models in spotting fakes on social media [15]. The This allows the system to be applied to a huge number of
results of a feature analysis, which are consistent with fake data in a rapid manner, perhaps in real-time or near
previous work, identify traits highly ratings. We wrap off real-time [25]. We investigate the applicability of methods
with a discussion of the differences between accuracy and distinct for problem fake data [26]. Findings suggest
credibility, as well as why non-expert models outperform utilising restricted characteristics accessible fake data, may
journalist models for detecting fakes on social media. get promising results that are competitive when compared to
Donnay [16]Spammers have turned to well-known social existing spammer identification algorithms that rely on more
networking sites to transmit a massive volume of incorrect expensive user features [27], [28], [29], [30].
and harmful information. For example, Twitter has grown to
be one of the most widely utilised websites ever, resulting in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 490


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

We investigate the utility of numerous ways for dealing with for accuracy and F1 scores, however all of them fell short of
bogus data. According to the findings, employing low- 90%.
quality accessible fake data can provide promising results
that are comparable to existing spammer detection Sharma [38] advocate constructing a wholly fake to identify
algorithms that rely on more expensive user data [31]. Our take news using one-class classification. The case study uses
research is the first to attempt to synthesise findings from information like WhatsApp to focus environment start.
several datasets to determine the optimal classifiers and Spammers are a well-known social media tactic since they
feature sets for identifying social spam. may use their accounts for a multitude of reasons [39]. One
of these purposes is to spread rumours, which may have a
Our research is the first to attempt to generalise results about big influence on a certain firm or perhaps the entire society
the best classifiers and feature sets for detecting social spam [40].
across different datasets. This allows the spam detection
system to be applied to a huge number of fake datas in a The discretization technique is crucial to solve this problem
rapid manner [32]. since most real-world categorization learning applications
employ continuous-valued features [41]. It's useful for
V. FEATURE EXTRACTION converting nominal values from non-normally distributed
numeric numbers [42], [43].
Some have looked into the topic of machine learning, while
others have looked into deep learning. Despite this, no study Manzoor [44] conducted a study that looked at several
subject of sentiment analysis has ever been published. linguistic properties that can distinguish between false and
real content. Experimental assessment demonstrates that the
To extract false materials, [33] used, for both simulated and recommended ensemble learner technique performs better
real-world news, outperform linear models. Study has a than individual learners [45]. In this investigation, the KNN
disadvantage in that it had less accuracy when greater n- model did not perform well. The study's ramifications,
grams were used. however, are limited to textual data. Other forms of data
aren't included.
Shaikh [34] discussed two major types of techniques for
detecting fake/false news. The first lesson discussed was Segal [46] created false that surpassed existing algorithms in
linguistic methods, in which the content of deceiving terms of accuracy. The suggested technique captures
communications is removed and deconstructed in order to essential features from fake news datasets before
link language designs to double-dealing. categorising integrates different algorithms.

Ahmad [35] is the author of 41 publications on sentiment Safavian [47] developed algorithm for detecting bogus
analysis (SA). Instead of dealing with false/false/fake news. news. A multimodal approach was utilised in the study to
Furthermore, the lower the average accuracy rate is in a detect bogus news.
sensation problem, the more exploration there is. The work
that will be performed in the future is described in this Lyu [48] created technique detecting false in a research.
document. Study used a fictitious dataset collected from the general
population to figure out how the LSTM and BI-LSTM deep
Hakak [36] The study's restriction of the goals was to learning models function. The models have substantial loss
publish and evaluate the many interpretations of false news rates, with LSTM and BI-LSTM having just a 91.51 percent
and incorrectly worded gossip/rumors. Second, the study's performance rate.
selection of crucial information to signify bogus news was
inaccurate, and the machine learning models' performance Awan [49] developed deep learning-based automatic
was worse. detection algorithms, and machine learning was studied to
counteract the spread of fake news. Research presented
The work of Abdullah [37] on false data identification unique approach for categorising bogus news. The model
approached perspective. According to study's findings. successfully validated two false news datasets, resulting in
Seven different machine learning algorithms were evaluated better than techniques.
TABLE1: PERIODICITY OF EACH SUBJECT
S. No Subject Periodicity Reference
1. News from the government 1356 (Ahmed, et.al2021)[50], (Khalil, et.al)[52], (Mujahid, et.al2021)[56],
(Raza, et.al2021)[57].
2. Middle East 887 (Garcia-Zapirain, et.al2021)[58], (Aftab, et.al2021)[59]
3. News 1565 (Shearer, et.al2021)[60], (Hernon1995)[61], (Zubiaga, et.al2018)[62],
(Vishwakarma, et.al2020)[63]
4. Left News 887 (Zannettou, et.al2019)[64], (Qian, et.al2019)[65], (Qian, et.al2020)[83]
(Guerini, et.al2015)[66]
5. Economics 4765 (Kagan, et.al2014)[67], (Chen, et.al2015)[68]
6. History News 7123 (Adali,et.al2017)[70], (Liu, et.al2019)[69], (Hussein2018)[73]
7. World News 10877 (Flekova, et.al2015)[74]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 491


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

interesting results [80]. The number of urls used to find the


Periodicity user's activity, for example, is calculated by collecting the
user's past 20 false data and calculating the number of urls
used to discover the user's activity.
Government News
Middle East
The average number of mentions is calculated by looking
at the user's last 20 fake data and determining the number
News
of mentions he or she used. The average of hash tags is
Left News calculated by looking at the user's previous 20 errors [81].
Politics For example, urls average is determined by collecting the
user's previous 20 fake data and calculating the number of
Politics News
urls he/she used to discover the user's activity. Mentions
World News average is determined by taking the user's past 20 fake data
and calculating the amount of mentions he or she utilised.
Hash tags average is determined by looking at the user's
Fig.1. Every Subject's Periodicity previous 20 misinformation [82].

VI. SYSTEM ANALYSIS VII. FAKE CONTENT BASED SPAMMER


DETECTION
A. Existing System
The components influenced by the ever-increasing
Spammers are an existing social media strategy since they hazardous substance were investigated etermined to be
may utilise their accounts for a variety of purposes. distributing false information. The writers picked accounts
Spreading rumours is one of these goals, which may that were created shortly after the Boston Marathon
significant perhaps the entire. Because most real-world bombing and were later suspended by social media for
categorization learning applications use continuous-valued breaking the platform's rules and regulations in order to
features, tackling the discretization process is critical to identify the fake accounts. 3.7 million unique users
solving this challenge [76]. It's handy for transforming non- gathered a total of 7.9 million unique fake data [83]. To
normally distributed numeric quantities to nominal values. classify fraudulent material, the authors performed
temporal analysis, determining the temporal distribution of
B. System Study fake data based on the quantity of phoney datas submitted
every hour [84].
All of predicted gain measurements and explanations are
included. In addition, the computation necessitates a cost- • The amount of users who have followed the user
benefit analysis. The cost of the suggested Sentiment accounts.
Analysis. The cost and work required in preserving the
information and created reports outweigh the cost and The spread of bogus information was detected using the
effort involved in avoiding fake news on social media. As a following metrics:
result, this approach is financially viable [77].
➢ social reputation,
B. Technical Feasibility ➢ global engagement,
➢ topic engagement,
Technical feasibility research is an excellent technique to ➢ likability, and
plan for and respond to long-term issues. We utilised PHP ➢ credibility.
for the for the first gained understanding before beginning
the project [78]. Url Based Spam Detection:
C. Module Description • Training dataset
Simplifies task of breaking down a project into modules • Data linked to time
and also aids our understanding of each module's critical
role. The suggested framework's implementation is broken • Factor discretization
down into four modules. Imitation of User Identification
[79]. • Data sampling

The purpose of the quality of the findings, we make sure Antonakaki [86] Spam categorization based on machine
that the quantity of data in each class is balanced. The learning, which will be utilised in the experiment to assess
information from the Near Real Time API yielded some spam detection. The JSON format is processed to extract
features. A dataset has been created for our experiments. the user-based features that have been recognised.
We ensure that the quantity of data in each class is
balanced in order to ensure the quality of the findings. The
data from the Near Real Time API generated some

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 492


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The amount of • The compilation of tweets related to Twitter's hot topics.


The tweets are then analysed once they have been saved in
• Misinformation a certain le format. [94].
• Hash tags • Spam labelling is carried out to search through all
accessible databases for the malicious URL.
• User mentions
• Extraction of features isolates the features construction
• URLs, on the other hand, are among the fake data-based depending on the language model, which utilises language
characteristics. as a tool to determine whether or not the tweets are false
[95].

• To categorise the data set, a short list of tweets that are


described by the set of attributes provided to the classifier
is used to train the model and gather expertise for spam
identification [96].

Fig.2. Fake URL spam detection • Spam detection use a classification approach to receive
tweets as input and categorise them as spam or not.
• The categorization approach is used in spam detection.

B. Fake User Identification

The purpose of data utilised gathered by hand, user's


account, and quantity tweets are all considered in the
categorisation [97], [98], [99]. The dataset included 501
fraudulent and 499 legitimate accounts, with 16 attributes
recognised from information gathered through Twitter
APIs. For the purpose of classifying bogus accounts, two
trials were conducted. The first experiment utilises the
Fig.3. Fake trending topic. Nave Bayes learning algorithm on the Twitter dataset
without discretization, whereas the second experiment
VIII. FAKE USER IDENTIFICATION employs the Nave Bayes learning method after
discretization on the Twitter dataset [100], [101], [102].
The dataset included 501 fraudulent and 499 legitimate These features are based on what people write in their
accounts, with 16 attributes recognised from information messages or content. Spammers distribute stuff.
gathered through Near Real Time APIs. For the purpose of
classifying bogus accounts, two trials were conducted [87], C. Performance Testing
[88]. These features are based what people write in their
messages or content. Spammers use harmful URLs in their It is carried out to evaluate the software's run-time
material to convey false information and advertise their performance in the context of an integrated system.
product [89], [90]. Throughout the testing procedure, several tests are done out
[103], [104]. For example, during white box testing for unit
The following content-based elements are available: testing, the performance of individual modules is
examined.
• Total quantity of bogus data

• Hashtag proportion

• URL proportion

• Mentions proportion status Report of fake data

A. Spam Identification on Popular Issues

Scheufele [91], Field-Fote [92], Taddicken [93]. The first is


spam tweet detection even without previous notice about
the individuals, while the other is linguistic research for
spam detection on a popular topic at the moment.

The five steps of the structure model are as follows:

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 493


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[10] Stafford G. and Yu L. L., “An evaluation of the effect of spam on


Twitter trending topics”, Proceedings - International Conference on
Social Computing 2013.
[11]. Alonso M., Vilares D., Gómez-Rodríguez C., Vilares J. "Sentiment
Analysis for Fake News Detection", Electronics 2021, 10, 1348.
[12]. Rehma A.A., Awan M.J., Butt I. "Comparison and Evaluation of
Information Retrieval Models", VFAST Trans. Softw. Eng., 13, 7–
14, 2018.
[13]. Alam T.M., Awan M.J. "Domain analysis of information extraction
techniques", Int. J. Multidiscip. Sci. Eng., 9, 1–9, 2018.
[14]. Kim H., Park J., Cha M., Jeong J., "The Effect of Bad News and
CEO Apology of Corporate on User Responses in Social Media",
PLoS ONE, 10, e0126358, 2015.
[15]. Pulido C.M., Ruiz-Eugenio L., Redondo-Sama G., Villarejo-
Carballido B., "A New Application of Social Impact in Social
Media for Overcoming Fake News in Health", Int. J. Environ. Res.
Public Health, 17, 2430, 2020.
[16]. Hamborg F., Donnay K., Gipp B., "Automated identification of
media bias in news articles: An interdisciplinary literature review",
Int. J. Digit. Libr., 20, 391–415, 2018.
[17]. Jang Y., Park C.-H., Seo Y.-S., "Fake News Analysis Modeling
Fig.4. Performance Classification Using Quote Retweet", Electronics, 8, 1377, 2019.
[18]. Lazer D.M.J., Baum M.A., Benkler Y., Berinsky A.J., Greenhill
IX. CONCLUSION K.M., Menczer F., Metzger M.J., Nyhan B., Pennycook G.,
Rothschild D. et al., "The science of fake news", Science, 359,
We reviewed approaches for detecting spammers on Near 1094–1096, 2018.
[19]. Kogan S., Moskowitz T.J., Niessner M., "Fake News in Financial
Real Time. Furthermore, we proposed a taxonomy of social Markets; Working Paper", Yale University: New Haven, CT, USA,
media spam detection strategies, dividing them into four 2017.
categories: false content identification, URL-based spam [20]. Lai C.-M., Shiu H.-J., Chapman J., "Quantifiable Interactivity of
detection, spam detection in hot topics, and fake user Malicious URLs and the Social Media Ecosystem", Electronics
2020, 9, 2020.
detection techniques. We also compared the strategies [21]. Wang Y., Xia C., Si C., Zhang C., Wang T., "The Graph Reasoning
offered based on a number of factors, including user and Approach Based on the Dynamic Knowledge Auxiliary for
content characteristics. Furthermore, the strategies were Complex Fact Verification", Electronics, 9, 1472, 2020.
compared in terms of the aims they were designed to [22]. Hua J., Shaw R.J.I., "Corona virus (Covid-19) "infodemic" and
emerging issues through a data lens: The case of china", Int. J.
achieve and the datasets they employed. Researchers Environ. Res. Public Health, 17, 2309, 2020.
should be able to get information about state-of-the-art [23]. Anam M., Ponnusamy V.A., Hussain M., Nadeem M.W., Javed M.,
false data detection systems using the information provided Goh H.G., Qadeer S., "Osteoporosis Prediction for Trabecular
in this review. Bone using Machine Learning: A Review", Comput. Mater.
Contin, 67, 89–105, 2021.
[24]. Gupta M., Jain R., Arora S., Gupta A., Awan M.J., Chaudhary G.,
REFERENCES Nobanee H. "AI-enabled COVID-19 outbreak analysis and
prediction: Indian states vs. union territories", Comput. Mater.
[1] Gupta A and Kaushal R, “Improving spam detection in online social Contin., 67, 1–18, 2021.
networks” International Conference on Cognitive Computing and [25]. Ali Y., Farooq A., Alam T.M., Farooq M.S., Awan M.J., Baig T.I.
Information Process, 2015. "Detection of Schistosomiasis Factors Using Association Rule
[2] Buntain C and Golbeck J, “Automatically identifying fake news in Mining", IEEE Access, 7, 186108–186114, 2019 .
popular Twitter threads” Proceedings - IEEE International [26]. Javed R., Saba T., Humdullah S., Jamail N.S.M., Awan M.J. "An
Conference on Smart Cloud, 2017. Efficient Pattern Recognition Based Method for Drug-Drug
[3] Wang B., Zubiaga A., Liakata M., and Procter R., “Making the most of Interaction Diagnosis", In Proceedings of the 2021 1st International
tweet-inherent features for social spam detection on Twitter”, Conference on Artificial Intelligence and Data Analytics (CAIDA),
arXiv preprint arXiv:1503.07405, 2015. Riyadh, Saudi Arabia, 6–7 April 2021; pp. 221–226.
[4] Erçahin B., Akta O., Kilinç and Akyol C., “Twitter fake account [27]. Nagi A.T., Awan M.J., Javed R., Ayesha N., "A Comparison of
detection”, Proceedings - International Conference on Computer Two-Stage Classifier Algorithm with Ensemble Techniques on
Science Engineering (UBMK) 2017. Detection of Diabetic Retinopathy", In Proceedings of the 2021 1st
[5] Gharge S., and Chavan M., “An integrated approach for malicious International Conference on Artificial Intelligence and Data
tweets detection using NLP”, Proceedings - International Analytics (CAIDA), Riyadh, Saudi Arabia, 6–7; pp. 212–215,
Conference on Inventive Communication Computational April 2021.
Technologies (ICICCT) 2017. [28]. Ahmed H., Traore I., Saad S., "Detecting opinion spams and fake
[6] Benevenuto F., Magno G., Rodrigues T and Almeida V, “Detecting news using text classification", Secur. Priv., 1, e9, 2017.
spammers on Twitter”, Proceedings - Collaboration, Electronic [29]. Conroy N.K., Rubin V.L., Chen Y. "Automatic deception detection:
Messaging, Anti- Abuse Spam Conference (CEAS) 2010. Methods for finding fake news", Proc. Assoc. Inf. Sci. Technol.,
[7] Wu T., Wen S., Xiang Y., and Zhou W., “Twitter spam detection: 52, 1–4, 2015.
Survey of new approaches and comparative study”, Computer & [30]. Hussein D.M.E. "A survey on sentiment analysis challenges", J.
Security 2018. King Saud Univ.-Eng. Sci., 30, 330–338, 2018.
[8] Concone F., De Paola A., Lo Re G. and Morana M., “Twitter analysis [31]. Bondielli A., Marcelloni F., "A survey on fake news and rumour
for real-time malware discovery”, Proceedings - AEIT detection techniques", Inf. Sci., 497, 38–55, 2019.
International Annual Conference 2017. [32]. Bali A.P.S., Fernandes M., Choubey S., Goel M. "Comparative
[9] Eshraqi N., Jalali M., and Moattar M.H., “Detecting spam tweets in performance of machine learning algorithms for fake news
Twitter using a data stream clustering algorithm”, Proceedings - detection", In Proceedings of the International Conference on
International Congress Technology, Communication Knowledge Advances in Computing and Data Sciences, Ghazibad, India, 12–
(ICTCK) 2015. 13; 420–430, April 2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 494


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[33]. Faustini P., Covões T. "Fake news detection using one-class Media Platforms", Interational J. Comput. Appl. Technol., in press,
classification", In Proceedings of the 2019 8th Brazilian 2021.
Conference on Intelligent Systems (BRACIS), Salvador, Brazil, [55]. Awan M.J. "Acceleration of Knee MRI Cancellous bone
15–18; 592–597, October 2019. Classification on Google Colaboratory using Convolutional Neural
[34]. Shaikh J., Patil R. "Fake News Detection using Machine Learning", Network", Int. J. Adv. Trends Comput. Sci. Eng., 8, 83–88, 2019.
In Proceedings of the 2020 IEEE International Symposium on [56]. Mujahid A., Awan M., Yasin A., Mohammed M., Damaševiˇcius R.,
Sustainable Energy, Signal Processing and Cyber Security Maskeliunas R., Abdulkareem K. "Real-Time Hand Gesture
(iSSSC), San Francisco, CA, USA, 16–17; 1–5, December 2020. Recognition Based on Deep Learning YOLOv3 Model", Appl.
[35]. Ahmad I., Yousaf M., Yousaf S., Ahmad, M.O. "Fake News Sci., 11, 4164, 2021.
Detection Using Machine Learning Ensemble Methods", [57]. Awan M.J., Raza A., Yasin A., Shehzad H.M.F., Butt, I. "The
Complexity 2020, 1–11, 2020. Customized Convolutional Neural Network of Face Emotion
[36]. Hakak S., Alazab M., Khan S., Gadekallu T.R., Maddikunta P.K.R., Expression Classification". Ann. Rom. Soc. Cell Biol., 25, 5296–
Khan W.Z. "An ensemble machine learning approach through 5304, 2021.
effective feature extraction to classify fake news", Futur. Gener. [58]. Awan M.J., Rahim M.M., Salim N., Mohammed M., Garcia-Zapirain
Comput. Syst., 117, 47–58, 2020. B., Abdulkareem K. "Efficient Detection of Knee Anterior
[37]. Abdullah A., Awan M., Shehzad M., Ashraf M. "Fake news Cruciate Ligament from Magnetic Resonance Imaging Using Deep
classification bimodal using convolutional neural network and long Learning Approach", Diagnostics, 11, 105, 2021.
short-term memory", Int. J. Emerg. Technol., 11, 209–212, 2020. [59]. Aftab M.O., Awa M.J., Khalid S., Javed R., Shabir H. "Executing
[38]. Sharma D.K., Garg S., Shrivastava P. "Evaluation of Tools and Spark BigDL for Leukemia Detection from Microscopic Images
Extension for Fake News Detection", In Proceedings of the 2021 using Transfer Learning", In Proceedings of the 2021 1st
International Conference on Innovative Practices in Technology International Conference on Artificial Intelligence and Data
and Management (ICIPTM), Gautam Buddh Nagar, India, 17–19; Analytics (CAIDA), Riyadh, Saudi Arabia, 6–7; pp. 216–220,
pp. 227–232, February 2021. April 2021.
[39]. Nasir J.A., Khan O.S., Varlamis I. "Fake news detection: A hybrid [60]. Shearer E., Mitchell A. "News Use Across Social Media Platforms in
CNN-RNN based deep learning approach", Int. J. Inf. Manag. Data 2020", 2021. Available online: https://www.journalism.org/2
Insights, 1, 100007: 90–95, 2021. 021/01/12/news-use-across-social-media-platforms-in-2020/
[40]. Waskom M.L., "Statistical data visualization", J. Open Source (accessed on 3 June 2021).
Softw., 6, 3021, 2021. [61]. Hernon P. "Disinformation and misinformation through the internet:
[41]. Pedregosa F., Varoquaux G., Gramfort A., Michel V., Thirion B., Findings of an exploratory study", Gov. Inf. Q., 12, 133–139,
Grisel O., Blondel M., Prettenhofer P., Weiss R., Dubourg V. 1995.
Scikit: "Machine learning in Python", J. Mach. Learn. Res., 12, [62]. Zubiaga A., Aker A., Bontcheva K., Liakata M., Procter R.
2825–2830, 2011. "Detection and Resolution of Rumours in Social Media: A
[42]. Singh A.K., Shashi M. "Vectorization of Text Documents for Survey", ACM Comput. Surv., 51, 32:1–32:36, 2018.
Identifying Unifiable News Articles", Int. J. Adv. Comput. Sci. [63]. Meel P., Vishwakarma D.K. "Fake news, rumor, information
Appl., 10, 2019. pollution in social media and web: A contemporary survey of state-
[43]. Dey A., Jenamani M., Thakkar J.J., Lexical TF-IDF: "An n-gram of-the-arts, challenges and opportunities", Expert Syst. Appl., 153,
feature space for cross-domain classification of sentiment 112986, 2020.
reviews", In Proceedings of the International Conference on [64]. Zannettou S., Sirivianos M., Blackburn J.; Kourtellis, N. "The Web
Pattern Recognition and Machine Intelligence, Kolkata, India, 5–8; of False Information: Rumors, Fake News, Hoaxes, Clickbait, and
380–386, December 2017. Various Other Shenanigans", ACM J. Data Inf. Qual., 11, 10:1–
[44]. Menard S. "Applied Logistic Regression Analysis", Sage: London, 10:37, 2019.
UK; Volume 106, 2002. [65]. Sharma K., Qian F., Jiang H., Ruchansky N., Zhang M., Liu Y.
[45]. Manzoor S.I., Singla J., Nikita. "Fake News Detection Using "Combating Fake News: A Survey on Identification and Mitigation
Machine Learning approaches: A systematic Review", In Techniques, ACM Trans. Intell. Syst. Technol., 10, 21:1–21:42,
Proceedings of the 2019 3rd International Conference on Trends in 2019.
Electronics and Informatics (ICOEI), Tirunelveli, India, 23–25; pp. [66]. Guerini M., Staiano J. "Deep Feelings: A Massive Cross-Lingual
230–234, April 2019. Study on the Relation between Emotions and Virality", In
[46]. Segal M.R. "Machine Learning Benchmarks and Random Forest Proceedings of the 24th International Conference on World Wide
Regression", Kluwer Academic Publisher: Amsterdam, The Web Companion, ACM: New York, NY, USA,; pp. 299–305,
Netherlands, 2004. 2015.
[47]. Safavian S.R., Landgrebe D. "A survey of decision tree classifier [67]. Dickerson J.P., Kagan V., Subrahmanian V.S. "Using sentiment to
methodology", IEEE Trans. Syst. Man, Cybern., 21, 660–674, detect bots on Twitter: Are humans more opinionated than bots?",
1991. In Proceedings of the 2014 IEEE/ACM International Conference
[48]. Lyu S., Lo D.C.T. "Fake News Detection by Decision Tree", In on Advances in Social Networks Analysis and Mining, IEEE
Proceedings of the 2020 SoutheastCon, Raleigh, NC, USA, 28–29; Computer Society: Washington, DC, USA; pp. 620–627, 2014.
pp. 1–2, March 2020. [68]. Chen Y., Conroy N.J., Rubin V.L. "Misleading Online Content:
[49]. Awan M.J., Rahim M.S.M., Nobanee H., Yasin A., Khalaf O.I., Recognizing Clickbait as “False News”", In Proceedings of the
Ishfaq U. "A Big Data Approach to Black Friday Sales", Intell. 2015 ACM Workshop on Multimodal Deception Detection,
Autom. Soft Comput., 27, 785–797, 2021. WMDD@ICMI 2015, Seattle, WA, USA,; pp. 15–19, November
[50]. Ahmed H.M., Awan M.J., Khan N.S., Yasin A., Faisal Shehzad 2015.
H.M. "Sentiment Analysis of Online Food Reviews using Big Data [69]. Horne B.D., Adali S. "This Just In: Fake News Packs a Lot in Title,
Analytics", Elem. Educ. Online, 20, 827–836, 2021. Uses Simpler, Repetitive Content in Text Body, More Similar to
[51]. Awan, M.J., Rahim M.S.M., Nobanee H., Munawar A., Yasin A., Satire than Real News", In Proceedings of the Workshops of the
Azlanmz A.M.Z. "Social Media and Stock Market Prediction: A Eleventh International AAAI Conference on Web and Social
Big Data Approach", Comput. Mater. Contin., 67, 2569–2583, Media (ICWSM 2017), Montreal, QC, Canada; 759–766, May
2021. 2017.
[52]. Awan M., Khan R., Nobanee H., Yasin A., Anwar S., Naseem U., [70]. Conroy N.J., Rubin V.L., Chen Y. "Automatic deception detection:
Singh V. "A Recommendation Engine for Predicting Movie Methods for finding fake news. In Information Science with
Ratings Using a Big Data Approach", Electronics, 10, 1215, 2021. Impact: Research in and for the Community", Proceedings of the
[53]. Khalil A., Awan M.J., Yasin A., Singh V.P., Shehzad H.M.F. "Flight 78th ASIS&T Annual Meeting, ASIST 2015, St. Louis, MO, USA,
Web Searches Analytics through Big Data", Int. J. Comput. Appl. 6–10; Wiley: Hoboken, NJ, USA, 2015; Volume 52, pp. 1–4,
Technol.. in press. October 2015.
[54]. Awan M.J., Khan M.A., Ansari Z.K., Yasin A., Shehzad H.M.F. [71]. Shu K., Sliva A., Wang S., Tang J., Liu H. "Fake News Detection on
"Fake Profile Recognition using Big Data Analytics in Social Social Media: A Data Mining Perspective", SIGKDD Explor., 19,
22–36, 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 495


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[72]. Shu K., Wang S., Lee D., Liu H. "Mining Disinformation and Fake [92]. Field-Fote E.E. "Fake News in Science", J. Neurol. Phys. Ther., 43,
News: Concepts, Methods, and Recent Advancements. In 139–140, 2019.
Disinformation, Misinformation, and Fake News in Social Media: [93]. Taddicken M., Wolff, L. "‘Fake News’ in Science Communication:
Emerging Research Challenges and Opportunities", Springer Emotions and Strategies of Coping with Dissonance Online",
International Publishing: Cham, Switzerland,; 1–19, 2020. Media Commun., 8, 206–217, 2020.
[73]. Shu K., Liu H. "Detecting Fake News on Social Media. In Synthesis [94]. Kedar H.E. "Fake News in Media Art: Fake News as a Media Art
Lectures on Data Mining and Knowledge Discovery", Morgan & Practice vs. Fake News in Politics", Postdigit. Sci. Educ., 2, 132–
Claypool Publishers: San Rafael, CA, USA, Volume 18, 2019. 146, 2020.
[74]. Hussein D.M.E.D.M. "A survey on sentiment analysis challenges", J. [95]. Ruzicka V., Kang E., Gordon D., Patel A., Fashimpaur J., Zaheer M.
King Saud Univ. Eng. Sci., 30, 330–338, 2018. "The Myths of Our Time: Fake News", arXiv, arXiv:1908.01760,
[75]. Flekova L., Preotiuc-Pietro D., Ruppert E. "Analysing domain 2019.
suitability of a sentiment lexicon by identifying distributionally [96]. Rapoza K. "Can ‘Fake News’ Impact The Stock Market? Forbes
bipolar words", In Proceedings of the 6th Workshop on 2017", Available online:
Computational Approaches to Subjectivity, The Association for https://www.forbes.com/sites/kenrapoza/2017/02/26/can-fake-
Computer Linguistics: Stroudsburg, PA, USA,; 77–84, 2015. news-impact-the-stock-market/ (accessed on 3 June 2021).
[76]. Thorne J., Vlachos A. "Automated Fact Checking: Task [97]. Clarke J., Chen H., Du D., Hu Y.J. "Fake News, Investor Attention,
Formulations, Methods and Future Directions", In Proceedings of and Market Reaction", Inf. Syst. Res., Forthcoming, 2020.
the 27th International Conference on Computational Linguistics, [98]. Kogan S., Moskowitz T.J., Niessner M. "Fake News in Financial
COLING 2018, Association for Computational Linguistics: Markets; Social Science Research Network (SSRN)", Rochester,
Stroudsburg, PA, USA,; 3346–3359, 2018. NY, USA, 2020.
[77]. Elhadad M.K., Li K.F., Gebali F. "Fake News Detection on Social [99]. Domenico G.D., Sit J., Ishizaka A., Nunan D. "Fake news, social
Media: A Systematic Survey. In Proceedings of the IEEE Pacific media and marketing: A systematic review", J. Bus. Res., 124,
Rim Conference on Communications, Computers and Signal 329–341, 2021.
Processing", PACRIM 2019, Victoria, BC, Canada, 21–23 August [100]. Visentin M., Pizzi G., Pichierri M. "Fake News, Real Problems for
2019; IEEE: Piscataway, NJ, USA; 1–8, 2019. Brands: The Impact of Content Truthfulness and Source Credibility
[78]. Bondielli A., Marcelloni, F. "A survey on fake news and rumour on consumers Behavioral Intentions toward the Advertised
detection techniques", Inf. Sci., 497, 38–55, 2019. Brands", J. Interact. Mark., 45, 99–112, 2019.
[79]. da Silva F.C.D., Vieira R., Garcia A.C. "Can Machines Learn to [101]. Di Domenico G., Visentin M. "Fake news or true lies? Reflections
Detect Fake News? A Survey Focused on Social Media", In about problematic contents in marketing", Int. J. Mark. Res.,
Proceedings of the 52nd Hawaii International Conference on Forthcoming, 2020.
System Sciences, Scholar Space: Honolulu, HI, USA; 1–8, 2019. [102]. Bakir V., McStay A. "Fake News and The Economy of Emotions",
[80]. Klyuev V. "Fake News Filtering: Semantic Approaches", In Digit. J., 6, 154–175, 2018.
Proceedings of the 2018 7th International Conference on [103]. Sindermann C., Cooper A., Montag C. "A short review on
Reliability, Infocom Technologies and Optimization (Trends and susceptibility to falling for fake political news", Curr. Opin.
Future Directions) (ICRITO), Noida, India, 29–31; 9–15, August Psychol., Cyberpsychology. 36, 44–48, 2020.
2018. [104]. Scardigno R., Mininni G. "The Rhetoric Side of Fake News: A
[81]. Collins B., Hoang D.T., Nguyen N.T., Hwang D. "Fake News Types New Weapon for Anti-Politics?", World Future, 76, 81–101, 2020.
and Detection Models on Social Media A State-of-the-Art Survey", [105]. Brun I. "National Security in the Era of Post-Truth and Fake News;
In Proceedings of the Intelligent Information and Database Institute for National Security Studies", Tel Aviv, Israel, 2020.
Systems-12th Asian Conference, ACIIDS 2020, Phuket, Thailand; [106]. Belova G., Georgieva G. "Fake News as a Threat to National
Volume 1178, 562–573, March 2020. Security", Int. Conf. Knowl. Based Organ., 24, 19–22, 2018.
[82]. Zhou X., Zafarani R. "A Survey of Fake News: Fundamental [107]. Vasu N., Ang B., Teo T.A., Jayakumar S., Faizal M., Ahuja J.
Theories, Detection Methods, and Opportunities". ACM Comput. "Fake News: National Security in the Post-Truth Era; Technical
Surv., 53, 109:1–109:40, 2020. Report", S. Rajaratnam School of International Studies, Nanyang
[83]. Oshikawa R., Qian J., Wang W.Y. "A Survey on Natural Language Technological University: Singapore, 2018.
Processing for Fake News Detection". In Proceedings of the 12th [108]. Verrall N., Mason D. "The Taming of the Shrewd. How Can the
Language Resources and Evaluation Conference, LREC 2020, Military Tackle Sophistry, ‘Fake’ News and Post-Truth in the
Marseille, France, 11–16 May 2020; European Language Digital Age?", RUSI J., 163, 20–28, 2018.
Resources Association: Paris, France; 6086–6093, 2020. [109]. Gallacher J.D., Barash V., Howard P.N., Kelly J. "Junk News on
[84]. Zhang X., Ghorbani A.A. "An overview of online fake news: Military Affairs and National Security", Social Media
Characterization, detection, and discussion", Inf. Process. Manag., Disinformation Campaigns Against US Military Personnel and
57, 102025, 2020. Veterans; Data Memo 2017.9; Project on Computational
[85]. de Souza J.V., Gomes J. Jr., de Souza Filho F.M., de Oliveira Julio Propaganda; Oxford Internet Institute, University of Oxford:
A.M., de Souza J.F. "A systematic mapping on automatic Oxford, UK, 2017.
classification of fake news in social media", Soc. Netw. Anal.
Min., 10, 48, 2020.
[86]. Antonakaki D., Fragopoulou P., Ioannidis S. "A survey of Twitter
research: Data model, graph structure, sentiment analysis and
attacks", Expert Syst. Appl., 164, 114006, 2021.
[87]. Allcott H., Gentzkow M. "Social Media and Fake News in the 2016
Election", J. Econ. Perspect., 31, 211–36, 2017.
[88]. Wardle C. "Fake News. It’s Complicated. 2017", Available online:
https://firstdraftnews.org/articles/fake-news-complicated/ (accessed
on 3 June 2021).
[89]. Tandoc E.C., Lim Z.W., Ling R. "Defining “Fake News”", Digit. J.,
6, 137–153, 2018.
[90]. Golbeck J., Mauriello M.L., Auxier B., Bhanushali K.H., Bonk C.,
Bouzaghrane M.A., Buntain C., Chanduka R., Cheakalos P.,
Everett J.B. et al., "Fake News vs Satire: A Dataset and Analysis",
In Proceedings of the 10th ACM Conference on Web Science,
WebSci 2018, Amsterdam, The Netherlands,; 17–21, May 2018.
[91]. Scheufele D.A., Krause N.M. "Science audiences, misinformation,
and fake news", Proc. Natl. Acad. Sci. USA, 116, 7662–7669,
2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 496


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Effective Intrusion Detection and Classification using


Fuzzy Rule based Classifier in Cloud Environment
Dr C. Veena,*1 Dr.S.Ramalakshmi,2 Dr.V. Bhoopathy,3 Dr. Minakshi Dattatraya Bhosale,4 C. G. Magadum,5
Abirami.S.K.6
*1
Professor, Department of CSE, Kommuri Pratap Reddy Institute of Technology, Ghanpur (V), Ghatkesar,
Hyderabad, Telangana, India, cveenaprofessor@gmail.com
2
Assistant Professor, Department of Computer Science and Applications, Don Bosco College (Arts and Science),
Karaikal, Puducherry, India, lakshmigana2011@gmail.com
3
Professor, Department of Computer Science and Engineering, Malla Reddy College of Engineering, Secunderabad,
Telangana, India, v.bhoopathy@gmail.com
4
Associate Professor, Faculty of MCA, Yashoda Technical Campus, Satara, Maharashtra, India,
minakshi1168@gmail.com
5
Assistant Professor, Smt. Kasturbai Walchand College, Sangli, Maharashtra, India, magdchet2001@gmail.com
6
Assistant Professor, Department of Computer Science and Business Systems, Sri Eshwar College of Engineering,
Coimbatore, Tamilnadu, India, abiramiskthevan@gmail.com

Abstract—Cloud computing (CC) is the demonstration of the shopping. The uprightness and accessibility of this multitude of
technology that makes use of the substructure for computing in a frameworks should be safeguarded against various dangers [4].
proficient fashion. This sort of computing offers great quantity of Novice programmers, rival partnerships, fear mongers, and,
consequences in augmenting the productivity that verifies the risk surprisingly, unfamiliar states have the rationale and capacity to
handling management and decreases the cost. Intrusion detection do modern assaults against PC frameworks [5]. For that reason,
system (IDS) is widely applied for detecting malicious actions in its the information security field has become imperatively critical
host and the communication network. IDS is a procedure of to the monetary prosperity and well-being of society [6]. The
discovering activities that take place in a network and attempts to
quick expansion and broad application of electronic statistics
fulfill the confidentiality, network, or security accessibility to
handling and electronic business directed over the massive
smear the trust procedure. This article introduces an Effective
Intrusion Detection and Classification using Fuzzy Rule based
operation of the remote and wired correspondence
Classifier (EIDC-FRC) model in Cloud Environment. The goal of organizations, Web application, Internet, and CC combined with
the presented EIDC-FRC model is to determine the occurrence of numerous events of global psychological warfare, raises the
intrusions and normal data traffic in the cloud environment. In necessity for providing safe and secured data framework using
order to achieve this, the presented EIDC-FRC model applies FRC intrusion location, firewalls, and avoidance frameworks,
for data classification process. The parameter tuning of the FRC verification, encryption, programming arrangements and other
model is performed using enhanced bird swarm algorithm equipment [7]. In this battle to get our put-away information and
(EBSA). The FRC is an effective model in pattern recognition that the frameworks, IDPS can end up being a significant device,
offers effective outcomes by the use of linguistic labels in the where it will likely perform early recognition of malevolent
antecedents of the rules. The simulation analysis of the EIDC-FRC movement and perhaps forestall more genuine harm to the
model ensured the enhancements of the presented approach safeguarded frameworks [8]. By utilizing IDPS, one might
compared to recent state of art approaches. distinguish an assault and inform suitable faculty right away or
keep it from succeeding, with the goal that the danger can be
Keywords— Pattern recognition; Machine learning; Cloud contained. IDPS can likewise be an exceptionally valuable
computing; Fuzzy logic; Intrusion; Security apparatus for recording measurable proof that might be utilized
in legal procedures assuming the culprit of a lawbreaker break is
I. INTRODUCTION arraigned [9]. Be that as it may, IDPS execution is thwarted by
Cloud Computing (CC) is an arising advancement on the the high phony problem rate it produces. This is a significant
planet [1]. It is an Internet-based computing modernization, worry in data security because any misleading problems will
through which shared assets like stage, programming, data, and begin a serious effect on the framework, for example, the
stockpiling are provided to clients upon request [2]. CC is a interruption of data accessibility due to IDPS blockage in
modernization through which virtualized and progressive thinking the data to be an assault endeavor [10].
adaptable assets are provided to the client over the Internet. CC This article introduces an Effective Intrusion Detection and
clients don't claim the actual framework, consequently keeping Classification using Fuzzy Rule based Classifier (EIDC-FRC)
away from capital consumption [3]. Individuals depend on PC model in Cloud Environment. The goal of the presented EIDC-
organizations to get news, stock costs, email, and web based FRC model is to determine the occurrence of intrusions and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 497


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

normal data traffic in the cloud environment. In order to achieve performed by the ABC technique by optimizing the values of
this, the presented EIDC-FRC model applies FRC for data biases and linkage weights.
classification process. The parameter tuning of the FRC model Wang et al. [15] intend to use DL for extracting
is performed using enhanced bird swarm algorithm (EBSA). The indispensable feature representations mechanically and realizing
FRC is an effective model in pattern recognition that offers high detection performance proficiently. An effectual stacked
effective outcomes by the use of linguistic labels in the contractive AE (SCAE) approach was modelled for
antecedents of the rules. The simulation analysis of the EIDC- unsupervised feature extraction. Robust and better low-
FRC model ensured the enhancements of the presented approach dimensional features are automatically studied from raw
compared to recent state of art approaches. network traffic by using the SCAE approach, a new cloud IDS
was devised depending upon the basis of the SVM and SCAE
II. RELATED WORKS classifier algorithm. In [16], an innovative hybridization
In [11], a host-related intrusion detection system (H-IDS) is technique for IDS was presented for enhancing the overall
modelled to protect virtual machines in the cloud atmosphere. security of cloud-oriented computing atmosphere. This
Due to the fact, primarily, significant features of all classes were technique employs fuzzy oriented ANN for effectual clustering
through LR, and then, such values were enhanced by utilizing of anomaly while the fuzzy oriented clustering can be
the regularization method. After that, several attacks were maximized through spider-monkey optimized method. This
categorized with an integration of 3 classifiers they are linear hybrid method overcomes the selection process and iterative
discriminate analysis, neural network, and decision tree with the classification of fuzzy clustering method by updating the fitness
bagging method for all classes. In [12], IDS was presented on value automatically.
the basis of an innovative optimized custom Recurrent CNN
which can be modelled for ID with the ALO method. By this III. THE PROPOSED MODEL
method, CNNs are hybridized with LSTM. Therefore, every This article has devised a novel EIDC-FRC model to
assault recognized with the network layer of cloud was recognize the appearance of intrusions and attacks in the Cloud
efficiently classified. Environment. The goal of the presented EIDC-FRC model is to
Krishnaveni and Prabakaran [13] modelled the Ensemble determine the occurrence of intrusions and normal data traffic in
methods for Classification and Network ID in Cloud. Ensemble the cloud environment. Fuzzy classification belonging to rule
Learning majorly aids to enhance the result of all ML constructed models has substantial compensations according to
approaches and to receive robust Classifiers. By utilizing the performance, along with the following and enterprise
Honeynet, Real Time Malicious Network Streams Samples have evaluations [17]. A limited compensation of fuzzy classification
been accumulated, which can be deployed over cloud is the interpretability of classifier rules. Consider that x =
environment. Researchers exploit Unsupervised learning and (𝑥1 , 𝑥2 , … , 𝑥𝐷 ) ∈ R𝐷 is a 𝐷 dimension feature as well as 𝐶 =
supervised learning techniques to classify unknown malicious {𝑐1 , 𝑐2 , … , 𝑐𝑚 } denotes a collection of class labels. Fig. 1 depicts
streams and recognized malicious network streams. Hajimirzaei the structure of FRC.
and Navimipour [14] devise an innovative IDS related to 𝑅𝑖 : 𝐼𝐹 𝑠1 ∧ 𝑥1 = 𝐴1𝑖 𝐴𝑁𝐷 𝑠2 ∧ 𝑥2 = 𝐴2𝑖 𝐴𝑁𝐷 … 𝐴𝑁𝐷
integration of ABC and fuzzy clustering algorithms and MLP 𝑠𝐷 ∧ 𝑥𝐷 = 𝐴𝐷𝑖 𝑇𝐻𝐸𝑁 𝑐𝑙𝑎𝑠𝑠 = 𝑐𝑖 , 𝑖 = 1, … , 𝑅,
network. Abnormal and Normal network traffic packets will be
recognized by the MLP, whereas the MLP training was

Fig. 1. Structure of FRC

In which 𝐴𝑘𝑖 represent the fuzzy term that defines the 𝑘-th 𝑐𝑙𝑎𝑠𝑠 = 𝑐𝑡 , 𝑡 = arg max β𝑗 ,
𝑗=1,2,…,𝑚
features in 𝑖-th fuzzy rules (𝑘 = 1, . . . , 𝐷), 𝑅 indicates the 𝐷
quantity of fuzzy rules and 𝑆 = (𝑠1 , 𝑠2 , … , 𝑠𝐷 ) denotes the
binary feature vector, while 𝑠𝑘 ∧ 𝑥𝑘 denotes the existence 𝛽𝑗 (𝑥𝑝 ) = ∑ ∏ µ𝐴𝑘𝑖 (𝑥𝑝𝑘 ),
𝑅𝑖 𝑘=1
(𝑠𝑘 = 1) or nonexistence (𝑠𝑘 = 0) of classifier features. In a 𝑐𝑙𝑎𝑠𝑠𝑖 =𝑐𝑗
data set {(x𝑝 ; 𝑐𝑝 ), 𝑝 = 1, 2, … , 𝑍} the class labels are shown µ𝐴𝑘𝑖 (𝑥𝑝𝑘 ) indicates the symmetrical association operation
below: for the 𝐴𝑘𝑖 fuzzy at point 𝑥𝑝𝑘 . The quantity of classifier rate is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 498


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

defined as a ratio amongst the quantity of properly allotted class


labels and the common amount of objects to be considered:
1, 𝑖𝑓 𝑐𝑝 = arg max 𝑓𝑗 (𝑥𝑝 ; 𝜃, 𝑆)
∑𝑍𝑝=1 { 𝑗=1,2,…,𝑚
0, 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
𝐸(𝜃, 𝑆) = , (1)
𝑍
In the equation, 𝑓(x𝑝 ; 𝜃, 𝑆) indicates the fuzzy classification
output using the variable 𝜃 and feature S in point x𝑝 . The
technique produces the prime rule bases for the fuzzy
classification that comprises single rule of all the classes. The
rule is complete on the basis of extreme value in the trained
instance 𝑇𝑟 = {(x𝑝 ; 𝑐𝑝 ), 𝑝 = 1,2, … , 𝑍}. In which: 𝑚 indicates
the quantity of classes; 𝐷 signifies the feature amount.
A. Parameter Tuning Fig. 2. TACC and VACC analysis of EIDC-FRC system
The parameter tuning of the FRC system was carried out
utilizing EBSA. BSA is an effectual optimization system with The TACC and VACC of the EIDC-FRC technique are
features of simple process, optimal extensibility, etc [18]. Let 𝑁 investigated on IDS performance in Fig. 2. The figure implied
virtual bird fly and forage for food. Assuming 𝑥𝑖𝑡 (𝑖 ∈ that the EIDC-FRC model has shown improved performance
[1,2, ⋯ , 𝑁]) expose the place of 𝑖 𝑡ℎ bird at 𝑡. The bird acts are with increased values of TACC and VACC. It is evident that the
described as: EIDC-FRC model has reached maximum TACC outcomes.
Foraging behavior is determined as:
𝑡+1 𝑡 𝑡
𝑥𝑖,𝑗 𝑗 = 𝑥𝑖,𝑗 + (𝑝𝑖,𝑗 − 𝑥𝑖,𝑗 ) × 𝐶 × 𝑟𝑎𝑛𝑑(0,1) + (𝑔𝑖,𝑗
𝑡
− 𝑥𝑖,𝑗 ) × 𝑆 × 𝑟𝑎𝑛𝑑(0,1) (2)
Vigilance action is defined as:
𝑡+1 𝑡 𝑡
𝑥𝑖,𝑗 = 𝑥𝑖,𝑗 + 𝐴1 (𝑚𝑒𝑎𝑛𝑗 − 𝑥𝑖,𝑗 ) × 𝑟𝑎𝑛𝑑(0,1) + 𝐴2 (𝑝𝑖,𝑗
𝑡
− 𝑥𝑖,𝑗 ) × 𝑟𝑎𝑛𝑑(−1,1) (3)
Whereas, 𝐴1 and 𝐴2 are demonstrated mathematically as:
𝑝𝐹𝑖𝑡𝑖
𝐴1 = 𝑎1 × exp (− × 𝑁) (4)
𝑠𝑢𝑚𝐹𝑖𝑡 + 𝜀
𝑝𝐹𝑖𝑡𝑙 − 𝑝𝐹𝑖𝑡𝑘 𝑁 × 𝑝𝐹𝑖𝑡𝑘
𝐴2 = 𝑎2 × exp (( )× ) (5)
|𝑝𝐹𝑖𝑡𝑘 − 𝑝𝐹𝑖𝑡𝑙 | + 𝜀 𝑠𝑢𝑚𝐹𝑖𝑡 + 𝜀
𝑎1 and 𝑎2 are constants in 0 and 2. 𝜀 signifies the small
constant. Flight action is represented as:
𝑡+1
𝑥𝑖,𝑗 𝑡
= 𝑥𝑖,𝑗 𝑡
+ 𝑟𝑎𝑛𝑑𝑛(0,1) × 𝑥𝑖,𝑗 (6) Fig. 3. TLS and VLS analysis of EIDC-FRC system
𝑡+1 𝑡 𝑡 𝑡
𝑥𝑖,𝑗 = 𝑥𝑖,𝑗 + (𝑥𝑘,𝑗 − 𝑥𝑖,𝑗 ) × 𝐹𝐿 × 𝑟𝑎𝑛𝑑𝑛(0,1) (7)
The TLS and VLS of the EIDC-FRC approach are tested on
In which 𝐹𝐿 is in 0 and 2. The chaotic process is a property IDS performance in Fig. 3. The figure inferred that the EIDC-
of sensitivity to initial condition. The chaotic signal generated FRC system has revealed better performance with least values
by deterministic approaches is quality of genus‐arbitrariness. Its of TLS and VLS. It is noticeable that the EIDC-FRC method has
curve is determined as initial value and chaos mapping resulted in reduced VLS outcomes.
parameter. Logistic mapping is employed very practically. The
logistic chaotic process was complex dynamical actions, it is
TABLE I
described as variance Eq. (8).
𝜆𝑖+1 = 𝜇 × 𝜆𝑖 × (1 − 𝜆𝑖 ) (8) COMPARATIVE ANALYSIS OF EIDC-FRC TECHNIQUE WITH
EXISTING APPROACHES
𝜆 ∈ [0,1], 𝑖 = 0,1,2, ⋯ , 𝜇 is in 1 and 4. Based on studies, 𝜇
represents the neighboring 4, 𝜆 stands for the neighboring to Accuracy F-Measure
Methods
average distribution betwixt 0 and 1. Meanwhile, this technique (%) (%)
is completely chaotic once 𝜇 is 4. An initial population is a EIDC-FRC 99.85 99.76
crucial part of intelligence optimizing system which controls the C-HMT-BPNN 99.81 99.65
rate of convergence and last solution quality. The logistic HMT-BPNN 99.68 99.71
chaotic mapping can be employed to initialize the population IPSO-NN Model 99.45 99.74
which created complete employ of data solution space to Cuckoo Opt. Model 96.43 96.23
enhance the approach efficiency.
CS-PSO Model 89.70 89.73
IV. RESULTS AND DISCUSSION PSO-SVM Model 96.56 96.26
In order to report the better performance of the proposed BB-IDS 89.62 89.37
EIDC-FRC model, a detailed comparative examination is made. Gaussian Process 92.18 91.84
DNN-SVM Model 98.17 97.92

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 499


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

GA-Fuzzy 97.32 97.29 implied that the GB, BB-IDS, and CS-PSO models have
Fuzzy C-Means 92.60 92.82 portrayed worse results with 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 of 87.44%, 89.37%, and
GB Algorithm 87.47 87.44 89.73% respectively. Simultaneously, the Gaussian Process and
FCM models have shown slightly better 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of
In order to report the better performance of the proposed 91.84, and 92.82% correspondingly. In line with this, the
EIDC-FRC model, a detailed comparative examination is made Cuckoo Opt., PSO-SVM, and GA-Fuzzy models have
in Table 1 and Fig. 4. The results implied that the GB, BB-IDS, demonstrated reasonable 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of 96.23%, 96.26%,
and CS-PSO models have depicted worse results with 𝑎𝑐𝑐𝑢𝑦 of and 97.29% correspondingly. Subsequently, the DNN-SVM, C-
HMT-BPNN, HMT-BPNN, and IPSO-NN techniques have
87.47%, 89.62%, and 89.7% respectively. At the same time, the
demonstrated considerable 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 values of 97.92%, 99.65%,
Guassian Process and FCM models have shown slightly better
99.71% and 99.65% correspondingly. But the presented EIDC-
𝑎𝑐𝑐𝑢𝑦 values of 92.18% and 92.6% respectively. In line with
FRC method has increased maximum performance with
this, the Cuckoo Opt., PSO-SVM, and GA-Fuzzy models have 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 of 99.76%.
demonstrated reasonable 𝑎𝑐𝑐𝑢𝑦 values of 96.43%, 96.56%, and To demonstrate the better performance of the proposed
97.32% respectively. Next, the DNN-SVM, IPSO-NN, HMT- EIDC-FRC method, a detailed comparative inspection is made
BPNN, and C-HMT-BPNN models have demonstrated in Table 2 and Fig. 6. The results implied that the GB Algorithm,
considerable 𝑎𝑐𝑐𝑢𝑦 values of 98.17%, 99.45%, 99.68%, and FCM, and GA-Fuzzy models have depicted worse results with
99.81% respectively. But the presented EIDC-FRC model has TRT of 66.71s, 66.48s, and 65.12s respectively. Simultaneously,
obtained maximum performance with 𝑎𝑐𝑐𝑢𝑦 of 99.85%. the DNN-SVM, and Gaussian Process models have shown
slightly better TRT values of 63.22, and 60.74s respectively. In
line with this, the BB-IDS, PSO-SVM, and CS-PSO models
have established reasonable TRT values of 53.83s, 51.42s, and
46.5s respectively. Next, the Cuckoo Opt., IPSO-NN, HMT-
BPNN, and C-HMT-BPNN techniques have demonstrated
considerable TRT values of 45.21s, 41.14s, 40.1s, and 41.14s
correspondingly. But the presented EIDC-FRC method has
gained maximum performance with TRT of 34.35.
TABLE II
TRT AND TST ANALYSIS OF EIDC-FRC TECHNIQUE WITH
EXISTING APPROACHES

Training Testing Time


Methods
Time (sec) (sec)
EIDC-FRC 34.35 31.35
C-HMT-BPNN 37.54 34.08
Fig. 4. 𝐴𝑐𝑐𝑢𝑦 analysis of EIDC-FRC technique with existing HMT-BPNN 40.10 30.45
approaches IPSO-NN Model 41.14 36.18
Cuckoo Opt. Model 45.21 38.65
CS-PSO Model 46.5 32.44
PSO-SVM Model 51.42 48.05
BB-IDS 53.83 30.47
Gaussian Process 60.74 49.6
DNN-SVM Model 63.22 35.76
GA-Fuzzy 65.12 40.85
Fuzzy C-Means 66.48 51.06
GB Algorithm 66.71 62.67

Fig. 5. 𝐹𝑚𝑒𝑎𝑠𝑢𝑟𝑒 analysis of EIDC-FRC technique with existing


approaches

To better performance of the proposed EIDC-FRC model, a


detailed comparative examination is made in Fig. 5. The results

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 500


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

antecedents of the rules. The simulation analysis of the EIDC-


FRC model ensured the enhancements of the presented approach
compared to recent state of art approaches.
REFERENCES
[1] Krishnaveni, S., Sivamohan, S., Sridhar, S.S. and Prabakaran, S., 2021.
Efficient feature selection and classification through ensemble method for
network intrusion detection on cloud computing. Cluster
Computing, 24(3), pp.1761-1779.
[2] Kanimozhi, V. and Jacob, T.P., 2019, April. Artificial intelligence based
network intrusion detection with hyper-parameter optimization tuning on
the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing.
In 2019 international conference on communication and signal
processing (ICCSP) (pp. 0033-0036). IEEE.
[3] Aljamal, I., Tekeoğlu, A., Bekiroglu, K. and Sengupta, S., 2019, May.
Hybrid intrusion detection system using machine learning techniques in
cloud computing environments. In 2019 IEEE 17th international
conference on software engineering research, management and
Fig. 6. TRT analysis of EIDC-FRC technique with existing applications (SERA) (pp. 84-89). IEEE.
approaches [4] Sandosh, S., Govindasamy, V. and Akila, G., 2020. Enhanced intrusion
detection system via agent clustering and classification based on outlier
detection. Peer-to-Peer networking and Applications, 13(3), pp.1038-
For illustrating the better performance of the proposed 1045.
EIDC-FRC method, a detailed comparative examination is made [5] Chkirbene, Z., Erbad, A., Hamila, R., Mohamed, A., Guizani, M. and
in Fig. 7. The results implied that the GB Algorithm, FCM, and Hamdi, M., 2020. TIDCS: A dynamic intrusion detection and
Gaussian Process models have portrayed worse results with TST classification system based feature selection. IEEE Access, 8, pp.95864-
of 62.67s, 51.06s, and 49.6s correspondingly. Simultaneously, 95877.
the PSO-SVM and GA-Fuzzy models have exposed slightly [6] Kanimozhi, V. and Jacob, T.P., 2019. Calibration of various optimized
better TST values of 48.05 and 40.85s correspondingly. In line machine learning classifiers in network intrusion detection system on the
realistic cyber dataset CSE-CIC-IDS2018 using cloud
with this, the Cuckoo Opt., IPSO-NN, and DNN-SVM computing. International Journal of Engineering Applied Sciences and
approaches have established reasonable TST values of 38.65s, Technology, 4(6), pp.2455-2143.
36.18s, and 35.76s respectively. Next, the C-HMT-BPNN, CS- [7] Wang, Y., Meng, W., Li, W., Liu, Z., Liu, Y. and Xue, H., 2019. Adaptive
PSO, EIDC-FRC and BB-IDS techniques have demonstrated machine learning‐based alarm reduction via edge computing for
considerable TST values of 34.08s, 32.44s, 31.35s, and 32.44s distributed intrusion detection systems. Concurrency and Computation:
correspondingly. But the presented EIDC-FRC method has Practice and Experience, 31(19), p.e5101.
gained maximum performance with TST of 30.45s. [8] Mayuranathan, M., Murugan, M. and Dhanakoti, V., 2021. Best features
based intrusion detection system by RBM model for detecting DDoS in
cloud environment. Journal of Ambient Intelligence and Humanized
Computing, 12(3), pp.3609-3619.
[9] Jaber, A.N. and Rehman, S.U., 2020. FCM–SVM based intrusion
detection system for cloud computing environment. Cluster
Computing, 23(4), pp.3221-3231.
[10] Singh, D.A.A.G., Priyadharshini, R. and Leavline, E.J., 2018. Cuckoo
optimisation based intrusion detection system for cloud
computing. International Journal of Computer Network and Information
Security, 9(11), p.42.
[11] Besharati, E., Naderan, M. and Namjoo, E., 2019. LR-HIDS: logistic
regression host-based intrusion detection system for cloud
environments. Journal of Ambient Intelligence and Humanized
Computing, 10(9), pp.3669-3692.
[12] Thilagam, T. and Aruna, R., 2021. Intrusion detection for network based
cloud computing by custom RC-NN and optimization. ICT Express, 7(4),
pp.512-520.
Fig. 7. TST analysis of EIDC-FRC technique with existing [13] Krishnaveni, S. and Prabakaran, S., 2021. Ensemble approach for network
approaches threat detection and classification on cloud computing. Concurrency and
Computation: Practice and Experience, 33(3), p.e5272.
V. CONCLUSION [14] Hajimirzaei, B. and Navimipour, N.J., 2019. Intrusion detection for cloud
computing using neural networks and artificial bee colony optimization
This article has devised a new EIDC-FRC module to algorithm. Ict Express, 5(1), pp.56-59.
recognize the appearance of intrusions and attacks in the Cloud [15] Wang, W., Du, X., Shan, D., Qin, R. and Wang, N., 2020. Cloud intrusion
Environment. The goal of the presented EIDC-FRC model is to detection method based on stacked contractive auto-encoder and support
determine the occurrence of intrusions and normal data traffic in vector machine. IEEE transactions on cloud computing.
the cloud environment. In order to achieve this, the presented [16] Samriya, J.K. and Kumar, N., 2020. A novel intrusion detection system
EIDC-FRC model applies FRC for data classification process. using hybrid clustering-optimization approach in cloud
computing. Materials Today: Proceedings.
The FRC is an effective model in pattern recognition that offers
effective outcomes by the use of linguistic labels in the [17] Stepin, I., Alonso, J.M., Catala, A. and Pereira-Fariña, M., 2020, July.
Generation and evaluation of factual and counterfactual explanations for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 501


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

decision trees and fuzzy rule-based classifiers. In 2020 IEEE


International Conference on Fuzzy Systems (FUZZ-IEEE) (pp. 1-8).
IEEE.
[18] Xiang, L., Deng, Z. and Hu, A., 2019. Forecasting short-term wind speed
based on IEWT-LSSVM model optimized by bird swarm
algorithm. IEEE Access, 7, pp.59333-59345.
[19] Suma, V. "A Novel Information retrieval system for distributed cloud
using Hybrid Deep Fuzzy Hashing Algorithm." JITDW 2, no. 03 (2020):
151-160

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 502


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Comprehensive Review of Cloud based Multi-


Authority Revocable CPABE Schemes
Shobha Chawla, Neha Gupta
Research Scholar, Professor,
Faculty of Computer Applications, MRIIRS Faculty of Computer Applications, MRIIRS
shobha.chawla@gmail.com nehag2012@gmail.com

Abstract— Security concerns related to the cloud service the access policy associated with the file allows only
model cannot be efficiently addressed using conventional ―administrative staff‖, ―principal‖ or ―HOD‖ of the session
cryptographic techniques. Therefore, Ciphertext Policy ―2022-2023‖ to decrypt the file. Thus, any user who may be
Attribute Based Encryption (CPABE) became the suitable holding any number of attributes must have ―2022-2023‖ as
choice for the data owners to enforce fine-grained access
the value of the ―session‖ attribute and must be playing the
control. Even though the sensitive data resides with Cloud
Service Provider (CSP), however, the data owner has complete role of either ―administrative staff‖ or ―principal‖ or ―HOD‖
control to determine who can access the data. CPABE schemes to retrieve the secret key. This secret key helps the data user
in existing work have been implemented either using single- to successfully decrypt the sensitive file. Given that the data
authority or multi-authority systems. In this work, multi- owner has the authority to determine the access policy,
authority pairing-based revocable CPABE schemes CPABE gained extreme popularity amongst the researchers.
methodology has been thoroughly studied. The methodology However, CPABE has multiple challenges that may lead to
adopted by the existing schemes to revoke malicious users has data breaches.
been analytically compared using various parameters. In Conventional CPABE scheme implemented a single to
addition, the approaches addressing change in users’ roles,
manage system parameters and the key generation of users.
privileges, or attributes have also been critically reviewed.
Subsequently, the challenges and research gaps identified in Although a single attribute authority entity is trustworthy,
the existing schemes have been outlined. Conclusively, in this however, if it gets compromised by the adversary, the
study, the properties required in an efficient multi-authority security of the complete system could be breached. A
pairing-based revocable CPABE framework have been single-authority system becomes impractical if the data
presented as a possible solution to subdue the identified owner includes attributes issued from different authorities to
research gaps. frame the access policy. For example, the data owner
defines the authorized set for access policy as the data user
Keywords— ciphertext policy attribute-based encryption, user should be (―Doctor having specialization in Neurology‖ and
revocation, attribute-level revocation, collusion-resistance, ―Researcher having h-Index >= 20‖). Then, the data user
multi-authority
needs to acquire these attributes from two different
I. INTRODUCTION authorities. Such implementation was not possible to
accomplish using a single-authority system. Consequently,
The conventional management of storage computing by
to address the above-specified issues many authors proposed
businesses or industries underwent a significant paradigm
multi-authority systems [2], [3]. Multi-authority system in
shift as a result of the service model of cloud storage. Cloud
CPABE suggested that multiple authorities may administer
computing boosts computing power and offers service on-
multiple attributes of a user. Thus, it became harder for the
demand with the pay-as-per-usage phenomenon and is
adversary to breach security. Multiple authors have
managed by a third party. Consequently, security concerns
proposed several extensions of multi-authority systems in
are the major challenge and threat for the users of the cloud.
CPABE addressing the key-escrow problems and the
For the past few years, CPABE has received the greatest
drawback of the single-authority system.
attention from researchers. CPABE facilitates data
The multi-authority CPABE systems are mainly of two
confidentiality and eliminates the data owner‘s concern of
types namely: Centralized and Decentralized. The major
losing the sensitive data residing on the cloud. CPABE
difference between both systems is who distributes the
scheme came up with the concept of one-to-many
secret key to the data user. In the centralized multi-authority
encryptions and attained fine-grained access control. The
system central authority distributes the secret key [2].
scheme allows only authorized users to decrypt the data
Whilst in the decentralized multi-authority system attribute
stored on the cloud. CPABE suggested that a data user must
authorities are responsible to distribute the secret key to the
possess certain attributes to acquire a secret key. In addition,
data user [3].
the scheme stated that the data owner determines the access
This paper has critically reviewed the dynamic
policy for the encrypted file. This way, the CPABE scheme
revocation of users‘ access rights in the multi-authority
managed to achieve one-to-many encryptions. Moreover,
CPABE scheme. An efficient revocation mechanism allows
only the data user whose secret key satisfies the access
CPABE to enforce fine-grained access control. Access
policy could get access to the encrypted sensitive file [1].
rights of the user should be instantly revoked whenever the
For instance, in University ―XYZ‖, the administrative
user leaves the system or is traced as malicious. In an
department restricted access to sensitive data only to the
organization, the roles of users change and consequently,
―administrative staff‖, ―principal‖, or ―HOD‖, who are
their access rights. Such changes should be immediately
working as employees in the session ―2022-2023‖. It means
incorporated to deny unauthorized access. Additionally,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 503


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

besides securing data confidentiality, an efficient revocable servers and had been proved secure against brute-force
CPABE scheme should also have a mechanism to avoid attacks.
collusion attacks caused by the revoked users or by revoked A collusion-resistant proxy assisted approach had been
users and the cloud service provider. By and large, the employed by Al-Dahhan et al. [9] to address user
existing state-of-the-art revocation schemes updated the revocation. The presented scheme enforced access control
ciphertext or updated key of non-revoked users or both, to by updating the non-revoked user‘s key; however, the
deny access to revoked users and to provide continual scheme was not scalable.
access to non-revoked users. Such approaches are The construction of a decentralized multi-authority
computationally inefficient. Numerous schemes also CPABE scheme addressing access control through revoking
suggested ciphertext re-encryption; however, the re- users‘ access privileges had been employed by Zhong et al.
encryption increases the size of the ciphertext. [10]. The proposed revocation mechanism addressed the
The structure of the paper has been outlined as follows: issue through expensive computations including secret key
In the second section, existing state-of-the-art is studied. The updating of non-revoked users and re-encryption of
third section analytically compares the studied schemes ciphertext with every revocation request. After re-
based on various parameters. The fourth section discusses the encryption, the data owner outsourced the updated
research challenges to build an efficient revocable ciphertext to the cloud server. The possibility of cloud
framework for the multi-authority CPABE scheme. The fifth servers colluding with the revoked users was not discussed
section presents a possible solution. The paper is concluded in the study.
in the sixth section. Attribute-based access control had been implemented
through the update of the associated attribute group key,
II. RELATED WORK whenever any user loses an attribute [11], [12]. Later, the
This section summarizes the study of existing work approach required an update of the non-revoked users‘ keys
related to the revocation issues in multi-authority CPABE and ciphertext updates to control the revoked users‘ access
systems implemented using bilinear pairing cryptography. privileges. Both the schemes allowed forward and backward
Multiple approaches advocated key updates of non-revoked secrecy, however, the schemes were vulnerable to collusion
users to realize user revocation and ciphertext re-encryption attacks caused by revoked users and CSP. On the other
to enforce attributes level revocation. In the studied hand, L. Li, Wang, and Li [13] updated the group key of a
literature, the least discussion has been observed on the user group and the non-revoked users‘ identity keys when a
possibility of CSP colluding with the revoked users. Almost user gets revoked. Additionally, the ciphertext update was
all the reviewed schemes are dynamic and maintain forward required to achieve attribute-level revocation. The scheme
and backward secrecy. outsourced the computational burden of encryption and
Yang et al. 2012 [4] addressed the attribute-level decryption to fog nodes.
revocation through temporal-based access control by Constant – size ciphertext along with the user revocation
allowing multiple authorities to broadcast an update key for was achieved by Xiao Zhang et al. [14] through ciphertext
the non-revoked users. The keys were broadcasted at each update and non-revoked users‘ key update. The scheme used
time slot after examining the revocation list. The revocation a threshold access policy for access structure. The direct
depended on the selection of the right time slot size; approach used with every revocation increased
consequently, the scheme lacked dynamicity. Furthermore, computational cost. On the other hand, Ciphertext re-
users did not lose their access privileges but rather were encryption had been implemented by Wu et al. in the
disabled for a certain time slot. CPABE scheme designed for Named Data Network to
H., Goyal, and Singla proposed attribute-level revoke the user‘s access rights [15].
revocation by updating the attribute group key with every The scheme proposed by Vaanchig et al. [16] addressed
change in the attributes of the user. Additionally, ciphertext the key-escrow problem and proposed a scheme for
had also been re-encrypted. Such solutions increase revoking malicious users through non-revoked users‘ key
computation overhead if implemented in a dynamic updates. The scheme introduced a dummy attribute and a
environment, therefore, were impractical to implement [5]. user central key. The dummy attribute helped to achieve key
The scheme proposed by Yang et al. 2013 [6] escrow and user- revocation and the user central key helped
implemented attribute-level revocation along with to prevent collusion attacks.
backward/forward secrecy, however, the CSP‘s potential of A multi-authority CPABE scheme for enforcing fine-
colluding with the revoked users was not given enough grained access control in the cloud storage environment was
consideration. The proposed approach for revocation by proposed by Xinyue Zhang et al. [17]. The scheme
Yang et al. 2013 required a key update and ciphertext supported a large universe and CSP re-encrypted the
update, thus, increasing computational overhead. ciphertext to achieve user revocation. As the scheme
Attribute-level user revocation in the proposed CPABE outsourced decryption, the CSP performed partial
by R. Li et al. [7] had been achieved by ciphertext re- decryption and thus, reduced the computational cost of the
encryption, however, the scheme did not address the client.
likelihood of collusion between revoked users and CSP. A dynamic attribute-level revocation had been proposed
The multi-authority CPABE scheme proposed by Xu et by Z. Zhang [18]. Each attribute authority in this scheme
al. [8] employed user revocation through re-encryption of governed certain attributes and computed attribute-based
ciphertext and key by the proxy server. The scheme keys for the data user. During this process, if any attribute of
improved the efficiency of the resource-constrained IoT the user ‗u‘ gets revoked, the tag value of the corresponding
devices by shifting client-side computation to the cloud attribute of the respective user gets updated. Later, on the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 504


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

request of ciphertext by the user, the cloud server re- revoked the access rights of users dynamically and
encrypted the ciphertext, using the assigned tag value. The maintained forward and backward secrecy.
scheme proposed by Z. Zhang modified the tag value to
control the access of the revoked user. This approach IV. RESEARCH CHALLENGES
increased the likelihood of the cloud server colluding with The analytical study of existing work in the previous
the revoked user. section has observed the following challenges amongst the
Dynamic and frequent changes in attributes of users had various multi-authority revocable CPABE schemes:
been addressed by Tu et al. [19]. The scheme updated the  Instantly addressing both the user as well as
attributes group key whenever any user attribute was
revoked. Subsequently, ciphertext had been updated to attribute-level revocation – [4] and [20] are
control users‘ access. temporal-based, thus do not provide dynamic
Multi-attribute CPABE scheme proposed by Sethi, revocation. [7], [8], [9], [10], [14], [15], [16], [17],
Pradhan, and Bera [20] imposed user-level access control and [20] addressed only user-level revocation.
on revoked users by periodically updating the keys of non- Whilst [4], [5], [6], [11], and [19] addressed only
revoked users. The execution of the key update process in attribute-level revocation. Both the revocations are
the scheme was time and demand dependent. The attribute
addressed only by [12], [13], and [18].
authority that holds the revocation list runs this process
when a non-revoked data user holding certain attributes  Revoke users, both at the system and attribute-level
requests for update key at time-period t. The cloud server in without any pre-requisite to update the key of non-
the design proposed by Sethi et al. was semi-trusted server. revoked users or attribute group key – Except [18]
As the scheme was temporal-based and each ciphertext was all the studied schemes updated the key of non-
linked with a time period, hence the cloud server updated revoked users or attribute group key.
the ciphertext after the lapse of every time interval to deny
 Revoke users, both at the system and attribute-level
access to the revoked users. Consequently, instant
revocation was not possible with this approach and periodic without any pre-requisite to update ciphertext or its
ciphertext updates increased computation overhead. re-encryption – Except [4] and [20] all the studied
schemes updated or re-encrypted ciphertext.
III. ANALYTICAL COMPARISON
 Resist collusion – Except [4], [9], and [16] all the
In this section, the revocation approaches of the existing studied schemes are partially collusion-resistant.
schemes studied and reviewed in the previous section have Table I exhibit that the existing studies do not provide a
been analytically compared. The Table I depicts the solution to all the above-mentioned challenges together in
comparison based on the following parameters: one single scheme. The possibility of collusion between
 Type of revocation addressed – User or Attribute- revoked users and cloud service providers has been ignored
Level Revocation in the existing multi-authority CPABE schemes. Exploration
 Resistant to collusion – partial or full (partial of these issues and further research is needed to build a
means only collusion attack by revoked users had framework addressing above-mentioned all the challenges in
been studied; whilst, full means the potentiality of one single scheme.
CSP colluding with the revoked users had also been V. PROPOSED SOLUTION
considered.) In this section, the solution for an efficient framework to
 Pre-requisite of key update of non-revoked users or realize revocation, both at the use-level and attributes level
update of the attribute group key in a bilinear pairing-based CPABE system has been
 Pre-requisite of ciphertext update or re-encryption. proposed. The proposed framework shall have the following
 Fulfillment of forward and backward secrecy. properties:
 A dynamic solution to user revocation without
 Attainment of dynamicity.
updating or affecting non-revoked users‘ secret keys
Table I compares the contribution of existing studies
and the ciphertext.
and the methodology implemented to realize revocation.
 A dynamic solution to attribute-level revocation
The comparison infers various research gaps identified in
without updating the attributes group‘s secret key
the adopted methodology by the existing schemes. The
and the ciphertext re-encryption.
comparison shown in Table I have been displayed in
pictorial form using graphs. As discussed above Fig 1  Provide the least privileges to CSP (For example,
exhibits the type of revocation contributed by the studied CSP should not be authorized to re-encrypt or update
literature. Fig 2 depicts the level of collusion resistance the ciphertext to control access of revoked users) to
achieved by the studied work. Fig 3 expresses the studied make it harder for CSP to collude with the revoked
literature majorly updated secret key of non-revoked users users.
or updated the attribute group key or updated ciphertext or  Use identity and time components to protect against
re-encrypted ciphertext to address the revocation issues. Fig collusion attacks. Incorporation of an identity
3 has also shown that most of the studied literature has component within a secret key allows instant
traceability and refrains revoked users to collude.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 505


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The time component causes the expiration of the key Storage Systems,‖ vol. 8, no. 11, pp. 1790–1801, 2013.
[7] R. Li et al., ―Secure , efficient and revocable multi-authority access
and invalidates it after a time-period. control system in cloud storage,‖ 2016, doi:
10.1016/j.cose.2016.02.002.
VI. CONCLUSION [8] X. Xu, J. Zhou, X. Wang, and Y. Zhang, ―Multi-authority proxy re-
encryption based on CPABE for cloud storage systems,‖ vol. 27, no.
CPABE using single authority and multi-authority 1, pp. 211–223, 2016, doi: 10.1109/JSEE.
systems has been widely studied by researchers. This study [9] R. R. Al-Dahhan, Q. Shi, G. M. Lee, and K. Kifayat, ―Revocable,
has critically reviewed the existing state-of-the-art pairing- decentralized multi-Authority access control system,‖ Proc. - 11th
based revocable CPABE schemes using a multi-authority IEEE/ACM Int. Conf. Util. Cloud Comput. Companion, UCC
Companion 2018, pp. 220–225, 2019, doi: 10.1109/UCC-
system. The study observed that majorly the existing Companion.2018.00088.
schemes have incorporated an indirect approach. Thus, to [10] H. Zhong, W. Zhu, Y. Xu, and J. Cui, ―Multi-authority attribute-
deny access to revoked users, either key of non-revoked based encryption access control scheme with policy hidden for cloud
users was updated or the ciphertext update was storage Multi-authority attribute-based encryption access control
scheme with policy hidden for cloud storage,‖ Soft Comput., vol. 22,
incorporated. Few schemes have employed both the above- no. 1, pp. 243–251, 2018, doi: 10.1007/s00500-016-2330-8.
stated updates to revoke malicious users. Attribute-level [11] Z. Liu, Z. L. Jiang, X. Wang, and S. M. Yiu, ―Practical attribute-
revocation has been addressed by updating the attribute based encryption: Outsourcing decryption, attribute revocation and
group key or ciphertext re-encryption. Such mechanisms policy updating,‖ J. Netw. Comput. Appl., vol. 108, no. January, pp.
112–123, 2018, doi: 10.1016/j.jnca.2018.01.016.
increase computational or storage costs and are impractical [12] G. Ramu, B. E. Reddy, A. Jayanthi, and L. V. N. Prasad, ―Fine-
to implement. The potentiality of CSP to collude with the grained access control of EHRs in cloud using CP-ABE with user
revoked users has received very little attention from the revocation,‖ Health Technol. (Berl)., vol. 9, no. 4, pp. 487–496,
researchers. Eventually, the survey has been concluded with 2019, doi: 10.1007/s12553-019-00304-9.
[13] L. Li, Z. Wang, and N. A. Li, ―Efficient Attribute-Based Encryption
a possible solution. The proposed solution presented the Outsourcing Scheme With User and Attribute Revocation for Fog-
essential properties required in an efficient multi-authority Enabled IoT,‖ vol. 8, 2020, doi: 10.1109/ACCESS.2020.3025140.
bilinear pairing-based revocable CPABE framework to [14] X. Zhang, F. Wu, W. Yao, Z. Wang, and W. Wang, ―Multi-authority
realize revocation, both at the use-level and attributes level. attribute-based encryption scheme with constant-size ciphertexts and
user revocation,‖ no. March, pp. 1–9, 2018, doi: 10.1002/cpe.4678.
In future work, the proposed solution can be implemented [15] Z. Wu, Y. Zhang, and E. Xu, ―Multi-Authority Revocable Access
using pairing-based cryptography. Additionally, the Control Method Based on CP-ABE in NDN,‖ 2020.
experimental results can be compared with the existing [16] N. Vaanchig, H. Xiong, W. Chen, and Z. Qin, ―Achieving
schemes to prove the practicability of the proposal. Collaborative Cloud Data Storage by Scheme with Dual-
Revocation,‖ vol. 20, no. 1, pp. 95–109, 2018, doi:
10.6633/IJNS.201801.20(1).11.
REFERENCES [17] X. Zhang, Y. Chen, X. Yan, and H. Jia, ―Multi-authority Attribute-
[1] J. Bethencourt et al., ―Ciphertext-Policy Attribute-Based Encryption Based Encryption with User Revocation and Outsourcing
To cite this version : HAL Id : hal-01788815 Ciphertext-Policy Decryption,‖ J. Phys. Conf. Ser., vol. 1302, no. 2, 2019, doi:
Attribute-Based Encryption,‖ no. May 2007, 2018. 10.1088/1742-6596/1302/2/022026.
[2] M. Chase, ―Multi-authority attribute based encryption,‖ Lect. Notes [18] Z. Zhang, ―Multi-Authority CP-ABE with Dynamical Revocation in
Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Space-Air-Ground Integrated Network,‖ pp. 76–81, 2020, doi:
Bioinformatics), vol. 4392 LNCS, pp. 515–534, 2007, doi: 10.1109/SAGC50777.2020.00026.
10.1007/978-3-540-70936-7_28. [19] S. Tu, M. Waqas, F. Huang, G. Abbas, and Z. Haq, ―A revocable and
[3] A. Lewko and B. Waters, ―Decentralizing Attribute-Based outsourced multi-authority attribute-based encryption scheme in fog
Encryption,‖ vol. 02, no. subaward 641, pp. 568–588, 2011. computing,‖ Comput. Networks, vol. 195, no. May, p. 108196, 2021,
[4] K. Yang, Z. Liu, Z. Cao, X. Jia, D. S. Wong, and K. Ren, ―TAAC : doi: 10.1016/j.comnet.2021.108196.
Temporal Attribute-based Access Control for Multi-Authority Cloud [20] K. Sethi, A. Pradhan, and P. Bera, ―PMTER-ABE: a practical multi-
Storage Systems‖. authority CP-ABE with traceability, revocation and outsourcing
[5] V. H., D. Goyal, and S. Singla, ―An Efficient and Secure Solution decryption for secure access control in cloud systems,‖ Cluster
for Attribute Revocation Problem Utilizing CP-ABE Scheme in Comput., vol. 24, no. 2, pp. 1525–1550, 2021, doi: 10.1007/s10586-
Mobile Cloud Computing,‖ Int. J. Comput. Appl., vol. 129, no. 1, pp. 020-03202-2.
16–21, 2015, doi: 10.5120/ijca2015906807.
[6] K. Yang, A. Member, X. Jia, K. Ren, and S. Member, ―DAC-
MACS : Effective Data Access Control for Multiauthority Cloud

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 506


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I. Comparison of Revocation Properties

Key Update of
Non-Revoked Forward and
Collusion- Ciphertext Update
S.No. Scheme Type of Revocation Users or Backward Dynamic
resistant or Re-encryption
Attribute Secrecy
Group Key
Attribute-Level
1 [4] Full Yes No Yes No
Revocation
Attribute-Level
2 [5] Partial Yes Yes Yes Yes
Revocation
Attribute-Level
3 [6] Partial Yes Yes Yes Yes
Revocation
4 [7] User Revocation Partial Yes Yes Yes Yes
5 [8] User Revocation Partial Yes Yes Yes Yes
6 [9] User Revocation Full Yes No Yes Yes
7 [10] User Revocation Partial Yes Yes Yes Yes
Attribute-Level
8 [11] Partial Yes Yes Yes Yes
Revocation
9 [14] User Revocation Partial Yes Yes Yes Yes
10 [15] User Revocation Partial Yes Yes Yes Yes
11 [16] User Revocation Full Yes Yes Yes Yes
12 [17] User Revocation Partial Yes Yes Yes Yes
User and Attribute-
13 [12] Partial Yes Yes Yes Yes
Level Revocation
User and Attribute-
14 [13] Partial Yes Yes Yes Yes
Level Revocation
User and Attribute-
15 [18] Partial No Yes Yes Yes
Level Revocation
Attribute-Level
16 [19] Partial Yes Yes Yes Yes
Revocation
17 [20] User Revocation Partial Yes No Yes No

Type of Revocation Type of Collusion Resistance


10 15
8
6
10 Number of
4 Number of Research
2 Research Papers
0 Papers 5
User Attribute Both
Revocation Level
Revocation 0
Partial Full
Fig 1. Type of Revocation Fig 2. Type of Collusion Resistance

Revocation Properties
Number of Research Papers
18
16
14
12
10
8
6
4
2
0
Key Update of Non- Ciphertext Update or Re- Forward and Backward Dynamicity
Revoked Users or encryption Secrecy
Attribute Group Key

Fig 3. Revocation Properties

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 507


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Mantaray Foraging Optimization based Makespan


Enhancement in Cloud based Scheduling
Environment
1 3 5
Dr. Aswini.J Dr. P. John Augustine Dr. S. M. Chithra
Professor / AI&ML Professor, Associate Professor,
Saveetha Engineering College Department of Information Department Of Mathematics,
(Autonomous) Technology, R. M. K. College of Engineering and
Affiliated to Anna University Sri Eshwar College of Engineering, Technology
aswini.jayaraman@gmail.com Kondampatti-Post, Vadasithur-Via, srilakshmivj@gmail.com
Kinathukadavu, Coimbatore
johnaugustine.p@sece.ac.in
*6
2 4
Dr. T. Parasuraman
K. Johny Elma Dr. N. Kopperundevi Assistant Professor,
Assistant Professor Assistant Professor SG-2 School of Physical Education &
Information Technology School of Computer Science and Sports Sciences,
Easwari Engineering College Engineering Hindustan Institute of Technology &
johnyelma.k@eec.srmrmp.edu.in Vellore Institute of Technology, Science,
Vellore, Tamil Nadu Chennai, Tamil Nadu
kopperundevi.n@vit.ac.in parasuramt@hindustanuniv.ac.in

Abstract—Cloud computing (CC) delivers on-demand and organization strategy by decreasing the effort and time needs the
powerful business environments. It can be constructed on top of application of a current trend termed Cloud computing (CC) [2].
virtualized data hubs. Virtualization renders a flexible CC is all over the place, in simple terms it is determined by
infrastructure for cloud. However, scheduling the tasks and accessing and storing programs and data over the Internet rather
managing the resources in virtualized data hubs will be difficult. than computer’s hard-drive. Cloud is a representation of the
Maximizing the virtual machine utilization and minimizing the Internet. Each application in CC is presented as services
total makespan is imperative in the cloud environment. The task consistently and it is necessitated. Therefore, the services
scheduling issue can be indicated as multi-objective optimization
containing servers, application networks, storage, etc., are
problem, which is solved by utilizing optimization methods. This
efficiently and effectively exploited [3]. This leads to massive
study develops a Mantaray Foraging Optimization based
Makespan Enhancement in Cloud based Scheduling Environment
savings concerning time and cost. CC represents a well-known
(MROME-CSE) technique. The presented MROME-CSE shared-computing technique that vigorously transports
technique aims to allocate the resources proficiently in the cloud quantifiable on-demand services through global network. CC
environment. In the presented MROME-CSE technique, the provided users with diverse and limitless virtual resources that
behavior of manta rays is mainly involved. Furthermore, the are attained on-demand and have dissimilar billing standards
MROME-CSE method derived an objective function to allocate 𝒏 (static-oriented and subscription) [4]. Also, the CS (task
individual tasks to 𝒎 heterogeneous accessible resources, thereby scheduling (TS)) delineated independent task mapping
task conclusion period was minimalized and resource was fully procedures on a set of available resources within cloud contexts
exploited. The experimental evaluation of the MROME-CSE (for workflow application) for implementation within user
technique is examined briefly. The experimental outcomes stated specified QoS restriction (cost and makespan). Workflow
the superior performance of the MROME-CSE technique over (communal application related to experimental research
other recent models. including biology, astronomy, and earthquake) was shifted or
migrated toward the cloud for implementation [5]. Fig. 1
Keywords— Cloud computing; Makespan; Resource represents the overview of scheduling-based cloud environment.
scheduling; Optimization algorithm; Mantaray Foraging
Optimization (MRFO) algorithm

I. INTRODUCTION
In the fast-rising global business environments, retaining
quick application expansion in the information technology area
has been cumbersome [1]. Accelerating the software

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 508


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. RELATED WORKS


In [11] the author proposes a hybrid bi-objective
optimization by using SA and task duplication algorithm
(BOSA-TDA) that makes use of two significant heuristics
heterogeneous earliest finish time (HEFT) and duplication
approach for improving canonical SA. Kruekaew and Kimpan
[12] developed the integration of SI technique of ABC with
heuristic scheduling method, termed Heuristic Task Scheduling
with ABC (HABC). This technique is exploited for improving
VMs scheduling solutions for CC within heterogeneous and
homogeneous platforms. It was presented for balancing the
loads and minimizing makespan. The scheduling efficiency of
the CC with HABC was compared to supplement with other SI
techniques: improved PSO (IPSO) with a typical heuristic
approach, ACO with standard heuristic algorithm, and PSO with
typical heuristic approach.
Zeedan et al. [13] recommended method named Enhanced
Binary ABC related Pareto Front (EBABC-PF). The presented
technique begins with listing the task based on priority
determined using Heterogeneous Earliest Finish Time (HEFT)
approach, later receives a preliminary solution through Greedy
Randomized Adaptive Search Procedure (GRASP), and lastly
Fig. 1. Scheduling based cloud environment schedules task to machine through EBABC. Furthermore,
numerous alterations are taken into account with BABC for
Mostly, the QoS parameters involving scalability, execution improving the local searching method through circular shift
time, cost, reliability, load balancing, and energy were operators and then mutation operators on the food source of the
accomplished to extraordinarily sustaining levels through CC population considering the development rates. In [14], a hybrid
[6]. In CC, users might provide many virtualized resources to heuristic-based list scheduling (HH-LiSch) technique is
exploit; nobody can assign tasks manually. Therefore, to assign introduced for resolving the reliant task scheduling
the resource to the virtual machine (VM), the load balancing in HCC system in a bounded number of the FC-VMs. The
(LB) technique becomes crucial [7]. TS optimization is a field innovation of present study is to introduce the novel task priority
of study in IaaS cloud since it is an NP-hard problem. approach, find fitting VM slot time, and exploit task duplication
Nonetheless, the resource heterogeneity and the autonomous method.
attribute within the cloud and the VM implementation require In [15], considered the bi-objective optimization problem of
dissimilar systems for TS in the IaaS CC to be tested and used energy minimization and makespan and developed two
for minimizing the makespan time [8]. The makespan time is scheduling methodologies for independent, deadline-sensitive
directly accountable for the task implementation cost in these tasks in a heterogeneous Cloud platform. The initial technique is
environments. Here, the emphasis is TS that is a large quantity a greedy heuristic with the Linear Weighted Sum method. Next,
in relation to how performance of the CC environments [9]. based on ACO and employs an integration of heuristic search
Once developer makes use of the cloud, they are most likely and positive feedback of data to enhance the solution. Wang et
utilizing shared resource. Certain approaches are utilized for al. [16] focus on how to search for an optimal solution to
mapping resources for multiple users according to the accomplish superior cost-makespan simultaneously with the
requirement. For providing users with an effective solution, the deadline constraints. To resolve these problems, an immune
study requires complicated scheduling algorithm [10]. While PSO technique (IMPSO) is developed that enhances the speed
deploying simple applications, there won’t be lot of trouble, and quality of optimization.
however as complicated applications and information are being
deployed, we needed this algorithm for managing the data III. THE PROPOSED MODEL
center. In this study, we have developed a new MROME-CSE
This study develops a Mantaray Foraging Optimization technique for scheduling the cloud environment. The presented
based Makespan Enhancement in Cloud based Scheduling MROME-CSE technique proficiently allocates the resources
Environment (MROME-CSE) technique. The presented with optimal computation in the cloud environment.
MROME-CSE technique aims to allocate the resources Zhao et al. [17] introduced the MRFO technique, which is a
proficiently in the cloud environment. In the presented parameter less optimization method that was stimulated in three
MROME-CSE technique, the behavior of mantarays is mainly foraging approaches of swarming manta rays: 1) somersault
involved. In addition, the MROME-CSE approach derives an foraging; 2) chain foraging, and 3) cyclone foraging. In
objective function to allocate 𝑛 individual tasks to 𝑚 comparison to the other metaheuristic techniques, user must
heterogeneous accessible resources, thereby the task conclusion determine the population size and the iteration ending condition
time is minimalized and resource was fully exploited. The while applying MRFO.
experimental evaluation of the MROME-CSE technique is
examined briefly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 509


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A. Chain foraging tasks 𝑇𝑎𝑠𝑘 = {𝑇1 , 𝑇2 , … , 𝑇𝑛 } are assigned to 𝑚 processors 𝐶 =


The initial foraging approach stimulates the chain foraging {𝐶1 , 𝐶2 , … , 𝐶𝔪 }. 𝑅 = {𝑅1 , 𝑅2 , … , 𝑅𝔪 } represent the highest
behaviors of swarming MR. To obtain additional food rewards, quantity of resource group of each processor, 𝑅𝑗 denotes the
smaller MRs swim on the back of grown female, which follows highest quantity of resources of processors 𝐶𝑗 , and quantity of
the beat of female pectoral fin, and consume the plankton unused sources required for each task implementation is 𝐻 =
by other MRs it can be mathematically expressed in the {𝐻1 , 𝐻2 , … , 𝐻}. 𝑇𝑗 = ∑𝑖 𝑋𝑖𝑗 = 𝑡𝑖 /𝑣𝑗 determines sum of
following: implementation time of all the tasks allocated on processors 𝑗,
𝑥𝑖𝑑 (𝑡 + 1) whereas 𝑡𝑖 illustrates the implementation time of 𝑖-𝑡ℎ tasks on
𝑥𝑖𝑑 (𝑡) + 𝑟 ⋅ (𝑥𝑏𝑒𝑠𝑡
𝑑 (𝑡)
− 𝑥𝑖𝑑 (𝑡)) + 𝑎 ⋅ (𝑥𝑏𝑒𝑠𝑡
𝑑 (𝑡)
− 𝑥𝑖𝑑 (𝑡)) 𝑖 = 1 minimal processors and 𝑣𝑗 refers to the processor speediness of
={ (1)
𝑥𝑖𝑑 (𝑡) + 𝑟 ⋅ (𝑥𝑖−1
𝑑
(𝑡) − 𝑥𝑖𝑑 (𝑡)) + 𝑎 ⋅ (𝑥𝑏𝑒𝑠𝑡
𝑑
(𝑡) − 𝑥𝑖𝑑 (𝑡)) 𝑖 = 2, … , 𝑁 𝑗-𝑡ℎ processor.
𝑚
𝑎 = 2 ⋅ 𝑟 ⋅ √|log(𝑟)| (2)
Whereas 𝑥𝑖𝑑 (𝑡) indicates the place of 𝑖-𝑡ℎ individuals at 𝑡 𝑓(𝑋) = min (𝐴 ∑ 𝑡𝑗𝑑
time in 𝑑-𝑡ℎ dimensions, 𝑟 represents the arbitrary number 𝑗=1
ranges from zero to one, 𝑎 denotes the weight coefficient, and 𝑚 𝑚 𝑚 𝑚
𝑑
𝑥𝑏𝑒𝑠𝑡 (𝑡) shows the plankton with higher concentration. + 𝐵 ∑ ∑ ∑ ∑ 𝜔𝑖𝑗𝑝𝑞 𝑋𝑖𝑗 𝑋𝑝𝑞 ) (8)
𝑖=1 𝑗=1 𝑝=1 𝑞=1
B. Cyclone foraging
∑𝔪𝑗=1 𝑋𝑖𝑗 = 1, 𝑖 = 1,2, … , 𝑛 (9)
The next foraging approach is derivative from the features of
∑𝑚
𝑖=1 𝐻𝑖 𝑋𝑖𝑗 ≤ 𝑅𝑗 , 𝑗 = 1,2, … , 𝑚 (10)
cyclone foraging. MR gathers together when the plankton
density is higher, and the tail ends might connect to other heads Whereas 𝐴 and 𝐵(𝐴 + 𝐵 = 1) indicate the relative
in a spiral for generating a spiraling vertex in eyes of cyclone. In consequence of whole conclusion period and communication
comparison with chain foraging, an individual follows other in cost from key function, 𝑤𝑖𝑗𝑝𝑞 indicates the 𝑖-𝑡ℎ tasks scheduling
front of them and moves to the food alongside a spiral path: on 𝑗-𝑡ℎ processor and 𝑝-𝑡ℎ task employed on 𝑞-𝑡ℎ processors.
𝑥𝑖𝑑 (𝑡 + 1) To compute the processor time required for every task on
𝑑
𝑥𝑏𝑒𝑠𝑡 (𝑡) +𝑟⋅ 𝑑
(𝑥𝑏𝑒𝑠𝑡 (𝑡) − 𝑥𝑖𝑑 (𝑡)) + 𝛽⋅ 𝑑
(𝑥𝑏𝑒𝑠𝑡 (𝑡) − 𝑥𝑖𝑑 (𝑡)) 𝑖 =1 different VM, the implementation time matrices have been
={ (3) defined by:
𝑑 (𝑡) 𝑑 (𝑡)
𝑥𝑏𝑒𝑠𝑡 +𝑟⋅ (𝑥𝑖‐1 − 𝑥𝑖𝑑 (𝑡)) +𝛽⋅ 𝑑 (𝑡)
(𝑥𝑏𝑒𝑠𝑡 − 𝑥𝑖𝑑 (𝑡)) 𝑖 = 2, … , 𝑁 𝑡𝑖𝑚𝑒11 𝑡𝑖𝑚𝑒12 ⋯ 𝑡𝑖𝑚𝑒1𝑚
𝑇−𝑖+1
𝛽 = 2𝑒 𝑟1 𝑇 ⋅ sin (2𝜋𝑟1 ) (4) 𝑡𝑖𝑚𝑒21 𝑡𝑖𝑚𝑒22 ⋯ 𝑡𝑖𝑚𝑒2𝔪
𝑇=[ ] (11)
Whereas 𝛽 denotes the weight coefficient, 𝑇 represents the ⋮ ⋮ ⋮ ⋮
maximal iteration count, and 𝑟1 indicates a random integer 𝑡𝑖𝑚𝑒𝑛1 𝑡𝑖𝑚𝑒𝑛1 ⋯ 𝑡𝑖𝑚𝑒𝑛𝑚
within [0, 1]. In Eq. (11), 𝑡𝑖𝑚𝑒𝑖𝑗 indicates the implementation time
To prevent early convergence, the MRFO applies Eqs. (5) required for VM 𝑣𝑗 for handling the task 𝑡𝑖 , and 𝑡𝑖𝑚𝑒𝑖𝑗 =
and (6) for forcing the individual to search a new location distant 𝑀𝐼𝑖 /𝑀𝐼𝑃𝑆𝑗 . The assessed period to computer of 𝑛 task on 𝑚
from the existing optimal position by allocating a novel arbitrary sources, characterized as 𝐸, 𝐸 denotes a 𝑛 x 𝑚 matrices. 𝐸𝑖𝑗
position [18]: shows time required to 𝑇𝑖 for running from VM, 𝐸𝑖𝑗 = 𝑐𝑖𝑗 + 𝑒𝑖𝑗 .
𝑑
𝑥𝑟𝑎𝑛𝑑 = 𝐿𝑏 𝑑 + 𝑟 ⋅ (𝑈𝑏 𝑑 − 𝐿𝑏 𝑑 ) (5) Then, VM executes the allocated task collection hours can be
𝑥𝑖𝑑 (𝑡 + 1)
𝑑 𝑑
expressed by 𝐸𝑗 . Since the task assigned to each VM resource
𝑥𝑟𝑎𝑛𝑑 (𝑡) + 𝑟 ⋅ (𝑥𝑟𝑎𝑛𝑑 (𝑡) − 𝑥𝑖𝑑 (𝑡)) + 𝛽 ⋅ (𝑥𝑟𝑎𝑛𝑑
𝑑
(𝑡) − 𝑥𝑖𝑑 (𝑡)) 𝑖
={ (6) has been simultaneously exploited, the implementation time
𝑑 𝑑 (𝑡)
𝑥𝑟𝑎𝑛𝑑 (𝑡) + 𝑟 ⋅ (𝑥𝑖‐1 − 𝑥𝑖𝑑 (𝑡)) + 𝛽 ⋅ (𝑥𝑟𝑎𝑛𝑑
𝑑 (𝑡) − 𝑥𝑖𝑑 (𝑡)) 𝑖 = 2, … , 𝑁 required for every task for implementation was the highest value
𝑑
Whereas 𝑥𝑟𝑎𝑛𝑑 denotes a arbitrary location produced from array 𝐸 indicated as 𝐸𝑡𝑜𝑡𝑎𝑙 :
randomly in the search space, 𝐿𝑏 𝑑 and 𝑈𝑏 𝑑 represents the lower 𝐸𝑗 = ∑ 𝑒𝑖𝑗 + ∑ 𝑡𝑖𝑗 (12)
and upper bounds of 𝑑-𝑡ℎ dimension, correspondingly.
𝑖∈𝑇𝑎𝑠𝑘𝑗 𝑖∈𝑇𝑎𝑠𝑘𝑗
C. Somersault foraging Whereas, 𝑇𝑎𝑠𝑘𝑗 represents the collection of tasks employed
Once MRs determined the food, they implement a sequence on VMs. The matrix 𝑥[𝑖][𝑗] has presented according to the
of backward flips for drawing the plankton towards them. A corresponding connection among VMs and tasks, refers whether
somersault is a frequent, random, cyclical, and local movement the 𝑡𝑖 task has been assigned to 𝑣𝑗 VMs, and is defined by:
which assists MRs optimizes their food intake: 1, 𝑖𝑠 𝑎𝑠𝑠𝑖𝑔𝑛𝑒𝑑 𝑡𝑜 𝑉𝑗
𝑥[𝑖][j] = { (13)
𝑥𝑖𝑑 (𝑡 + 1) = 𝑥𝑖𝑑 (𝑡) + 𝑆 ⋅ (𝑟2 ⋅ 𝑥𝑏𝑒𝑠𝑡
𝑑
(𝑡) − 𝑟3 ⋅ 𝑥𝑖𝑑 (𝑡)) 𝑖 0, 𝑂𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
The presented method assigns each task to a specific
= 1, … , 𝑁 (7)
processor for execution in the state where specific limitations
Whereas 𝑆 denotes the somersault factors that determine the
have been satisfied.
somersault range of the MRs, whereas 𝑆 = 2, and 𝑟2 and 𝑟3
represent two arbitrary integers within [0,1]. IV. RESULT ANALYSIS
The objective of MROME-CSE method was to allocate 𝑛
In this section, the scheduling performance of the MROME-
individual task to 𝑚 heterogeneous accessible sources, in such a
CSE approach is investigated briefly.
way the task conclusion time was minimalized and resource was
fully exploited. It is a varied platform, decentralized, largescale, TABLE I
and features scalability. In the disseminated mechanism, 𝑛 sub‐

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 510


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

MST ANALYSIS OF MROME-CSE SYSTEM WITH OTHER


METHODS UNDER DISTINCT TASKS

Makespan Time
Number of Tasks MROME-CSE eDSOS DSOS
Normal Distribution
100 87 107 144
200 167 207 251
300 257 301 378
400 351 434 521
500 388 541 645
Left-Half Distribution
100 128 175 232
200 252 329 459
300 309 456 570
400 369 560 680
Fig. 2. MST analysis of MROME-CSE system under normal
500 479 570 727 distribution
Right-Half Distribution
100 89 119 209 Fig. 3 shows the MST assessment of the MROME-CSE
200 236 336 449 model under left-hand distribution. The results represented that
the MROME-CSE model has obtained effectual outcomes with
300 283 433 566
minimal MST values in all tasks. For example, with 100 tasks,
400 383 539 659 the MROME-CSE model has provided reduced MST of 128
500 403 489 666 while the eDSOS and DSOS models have obtained increased
MST of 175 and 232 correspondingly. In the meantime, with 200
In Table 1, the comparative study of the MROME-CSE tasks, the MROME-CSE method has provided reduced MST of
model in terms of makespan time (MST) is provided. The results 252 while the eDSOS and DSOS techniques have obtained
implied that the MROME-CSE model has reported reduced increased MST of 329 and 459 correspondingly. Eventually,
MST values under all tasks. with 300 tasks, the MROME-CSE model has provided reduced
Fig. 2 displays the MST assessment of the MROME-CSE MST of 309, while eDSOS and DSOS approaches have gained
model under normal distribution. The results represented that the increased MST of 456 and 570 correspondingly. Then, with 400
MROME-CSE model has gained effectual outcomes with tasks, the MROME-CSE model has rendered reduced MST of
minimal MST values in all tasks. For example, with 100 tasks, 369 while the eDSOS and DSOS models have gained increased
the MROME-CSE model has provided reduced MST of 87 MST of 560 and 680 correspondingly. Finally, for 500 tasks, the
while the eDSOS and DSOS models have obtained increased MROME-CSE approach has provided reduced MST of 479
MST of 107 and 144 correspondingly. In the meantime, with 200 while the eDSOS and DSOS methods have attained increased
tasks, the MROME-CSE technique has provided reduced MST MST of 570 and 727 correspondingly.
of 167 while the eDSOS and DSOS techniques have gained
increased MST of 207 and 251 correspondingly. Eventually, Fig. 4 shows the MST assessment of the MROME-CSE
with 300 tasks, the MROME-CSE method has provided reduced approach under right-hand distribution. The outcomes
MST of 257, while eDSOS and DSOS models have gained represented that the MROME-CSE method has gained effectual
increased MST of 301 and 378 correspondingly. Then, with 400 outcomes with minimal MST values in all tasks. For cases, with
tasks, the MROME-CSE method has rendered reduced MST of 100 tasks, the MROME-CSE approach has rendered reduced
351 while the eDSOS and DSOS approaches have gained MST of 89 while the eDSOS and DSOS models have obtained
increased MST of 434 and 521 correspondingly. Finally, for 500 increased MST of 119 and 209 correspondingly. Meanwhile,
tasks, the MROME-CSE technique has presented reduced MST with 200 tasks, the MROME-CSE model has provided reduced
of 388 while the eDSOS and DSOS approaches have gained MST of 236 while the eDSOS and DSOS methods have attained
increased MST of 541 and 645 correspondingly. increased MST of 336 and 449 correspondingly. Eventually,
with 300 tasks, the MROME-CSE model has provided reduced
MST of 283, while eDSOS and DSOS models have attained
increased MST of 433 and 566 respectively. Then, with 400
tasks, the MROME-CSE model provided a reduced MST of 383
while the eDSOS and DSOS methods obtained increased MST
of 539 and 659 respectively. Finally, for 500 tasks, the
MROME-CSE model has presented reduced MST of 403 while
the eDSOS and DSOS methods have gained increased MST of
489 and 666 correspondingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 511


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

100 4 6 18
200 17 19 31
300 28 35 50
400 41 50 62
500 52 66 80
Right-Half Distribution
100 5 7 12
200 11 16 23
300 18 27 35
400 30 37 46
500 34 44 50

Fig. 3. MST analysis of MROME-CSE system under left-hand


distribution

Fig. 5. RST analysis of MROME-CSE system under normal


distribution

Fig. 5 shows the RST assessment of the MROME-CSE


method under normal distribution. The results represented that
the MROME-CSE model has gained effectual outcomes with
Fig. 4. MST analysis of MROME-CSE system under right- least RST values under all tasks. For example, with 100 tasks,
hand distribution the MROME-CSE model has provided reduced RST of 12 while
the eDSOS and DSOS models have attained increased RST of
In Table 2, the comparative analysis of the MROME-CSE 13 and 26 correspondingly. Meanwhile, with 200 tasks, the
model in terms of response time (RST) is rendered. The results MROME-CSE model has provided reduced RST of 21 while the
implied that the MROME-CSE technique has reported reduced eDSOS and DSOS methods have attained increased RST of 29
RST values under all tasks. and 43 correspondingly. Eventually, with 300 tasks, the
MROME-CSE technique has provided reduced RST of 30,
TABLE II while eDSOS and DSOS models have achieved increased RST
RST ANALYSIS OF MROME-CSE SYSTEM WITH OTHER of 46 and 62 correspondingly. After that, with 400 tasks, the
METHODS UNDER DISTINCT TASKS MROME-CSE method provided reduced RST of 52 while the
Response Time eDSOS and DSOS methods obtained increased RST of 62 and
73 correspondingly. Finally, for 500 tasks, the MROME-CSE
Number of Tasks MROME-CSE eDSOS DSOS model has provided reduced RST of 66 while the eDSOS and
Normal Distribution DSOS models have obtained increased RST of 75 and 90
100 12 13 26 respectively.
200 21 29 43 Fig. 6 exhibits the RST assessment of the MROME-CSE
method under left-hand distribution. The outcomes represented
300 30 46 62
that the MROME-CSE model has gained effectual outcomes
400 52 62 73 with least RST values under all tasks. For example, with 100
500 66 75 90 tasks, the MROME-CSE model has provided reduced RST of 4
Left-Half Distribution while the eDSOS and DSOS techniques have gained increased
RST of 6 and 18 respectively. Meanwhile, with 200 tasks, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 512


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

MROME-CSE methods provided reduced RST of 17 while the


eDSOS and DSOS models obtained increased RST of 19 and 31
respectively. Eventually, with 300 tasks, the MROME-CSE
model has provided reduced RST of 28, while eDSOS and
DSOS approaches have gained increased RST of 35 and 50
respectively. Afterward, with 400 tasks, the MROME-CSE
model provided reduced RST of 41 while the eDSOS and DSOS
models achieved increased RST of 50 and 62 correspondingly.
Finally, for 500 tasks, the MROME-CSE model has provided
reduced RST of 52 while the eDSOS and DSOS methods have
obtained increased RSTs of 66 and 80 correspondingly.

Fig. 7. RST analysis of MROME-CSE system under right-hand


distribution
V. CONCLUSION
In this study, we have developed a new MROME-CSE
technique for scheduling the cloud environment. The presented
MROME-CSE technique proficiently allocates the resources
with optimal computation in the cloud environment. In the
presented MROME-CSE technique, the behavior of manta rays
is mainly involved. Also, the MROME-CSE approach derived
an objective function to allocate 𝑛 individual tasks to 𝑚
heterogeneous accessible resources, thereby task conclusion
Fig. 6. RST analysis of MROME-CSE system under left-hand time was minimalized and resource was fully exploited. The
distribution experimental evaluation of the MROME-CSE technique is
examined briefly. The experimental outcomes stated the
Fig. 7 shows the RST assessment of the MROME-CSE superior performance of the MROME-CSE technique over other
model under right-hand distribution. The outcomes represented recent models.
that the MROME-CSE method has reached effectual outcomes
with least RST values under all tasks. For example, with 100 REFERENCES
tasks, the MROME-CSE method has presented reduced RST of [1] Gupta, S., Iyer, S., Agarwal, G., Manoharan, P., Algarni, A.D., Aldehim,
5 while the eDSOS and DSOS approaches have attained G. and Raahemifar, K., 2022. Efficient Prioritization and Processor
increased RST of 7 and 12 correspondingly. In the meantime, Selection Schemes for HEFT Algorithm: A Makespan Optimizer for Task
Scheduling in Cloud Environment. Electronics, 11(16), p.2557.
with 200 tasks, the MROME-CSE model has provided reduced
[2] Abualigah, L. and Diabat, A., 2021. A novel hybrid antlion optimization
RST of 11 while the eDSOS and DSOS methods have obtained algorithm for multi-objective task scheduling problems in cloud
increased RST of 16 and 23 respectively. Eventually, with 300 computing environments. Cluster Computing, 24(1), pp.205-223.
tasks, the MROME-CSE model provided reduced RST of 18, [3] Chraibi, A., Ben Alla, S. and Ezzati, A., 2021. Makespan optimisation in
while eDSOS and DSOS models obtained increased RST of 27 cloudlet scheduling with improved dqn algorithm in cloud
and 35 correspondingly. Afterward, with 400 tasks, the computing. Scientific Programming, 2021.
MROME-CSE model provided reduced RST of 30 while the [4] Aggarwal, A., Dimri, P., Agarwal, A., Verma, M., Alhumyani, H.A. and
eDSOS and DSOS models reached increased RST of 37 and 46 Masud, M., 2021. IFFO: an improved fruit fly optimization algorithm for
correspondingly. Finally, for 500 tasks, the MROME-CSE multiple workflow scheduling minimizing cost and makespan in cloud
computing environments. Mathematical Problems in Engineering, 2021.
model has provided reduced RST of 34 while the eDSOS and
[5] Natesan, G. and Chokkalingam, A., 2019. Optimal task scheduling in the
DSOS methods have reached increased RSTs of 44 and 50 cloud environment using a mean grey wolf optimization
correspondingly. algorithm. International Journal of Technology, 10(1), pp.126-136.
[6] Kakkottakath Valappil Thekkepuryil, J., Suseelan, D.P. and Keerikkattil,
P.M., 2021. An effective meta-heuristic based multi-objective hybrid
optimization method for workflow scheduling in cloud computing
environment. Cluster Computing, 24(3), pp.2367-2384.
[7] Padmavathi, M., Basha, S.M. and Krishnaiah, V.J.R., 2020, July. Load
balancing algorithm to reduce make span in cloud computing by enhanced
firefly approach. In 2020 International Conference on Electronics and
Sustainable Communication Systems (ICESC) (pp. 896-900). IEEE.
[8] Mohammadzadeh, A., Masdari, M. and Gharehchopogh, F.S., 2021.
Energy and cost-aware workflow scheduling in cloud computing data

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 513


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

centers using a multi-objective optimization algorithm. Journal of


Network and Systems Management, 29(3), pp.1-34.
[9] Mansouri, N. and Ghafari, R., 2022. Cost-Efficient Task Scheduling
Algorithm for Reducing Energy Consumption and Makespan of Cloud
Computing. Computer and Knowledge Engineering, 5(1), pp.1-12.
[10] Dharangan, B., Praveen, J., Rajagopal, S., & Jegajothi, B. (2022, August).
Secure Cloud-based E-Health System using Advanced Encryption
Standard. In 2022 3rd International Conference on Electronics and
Sustainable Communication Systems (ICESC) (pp. 642-646). IEEE.
[11] Hosseini Shirvani, M. and Noorian Talouki, R., 2022. Bi-objective
scheduling algorithm for scientific workflows on cloud computing
platform with makespan and monetary cost minimization
approach. Complex & Intelligent Systems, 8(2), pp.1085-1114.
[12] Kruekaew, B. and Kimpan, W., 2020. Enhancing of artificial bee colony
algorithm for virtual machine scheduling and load balancing problem in
cloud computing. International Journal of Computational Intelligence
Systems, 13(1), pp.496-510.
[13] Srikanth, V., Walia, R., Augustine, P. J., Venkatesh, R., Simla, J., &
Jegajothi, B. (2022, March). Chaotic Whale Optimization based Node
Localization Protocol for Wireless Sensor Networks Enabled Indoor
Communication. In 2022 International Conference on Electronics and
Renewable Systems (ICEARS) (pp. 702-707). IEEE.
[14] Shirvani, M.H. and Talouki, R.N., 2021. A novel hybrid heuristic-based
list scheduling algorithm in heterogeneous cloud computing environment
for makespan optimization. Parallel Computing, 108, p.102828.
[15] Tarafdar, A., Debnath, M., Khatua, S. and Das, R.K., 2021. Energy and
makespan aware scheduling of deadline sensitive tasks in the cloud
environment. Journal of Grid Computing, 19(2), pp.1-25.
[16] Wang, P., Lei, Y., Agbedanu, P.R. and Zhang, Z., 2020. Makespan-driven
workflow scheduling in clouds using immune-based PSO
algorithm. IEEE Access, 8, pp.29281-29290.
[17] Zhao, W., Zhang, Z. and Wang, L., 2020. Manta ray foraging
optimization: An effective bio-inspired optimizer for engineering
applications. Engineering Applications of Artificial Intelligence, 87,
p.103300.
[18] Cao, H., Sun, W., Chen, Y., Kong, F. and Feng, L., 2022. Sizing and
Shape Optimization of Truss Employing a Hybrid Constraint-Handling
Technique and Manta Ray Foraging Optimization. Expert Systems with
Applications, p.118999.
[19] Karuppusamy, Dr P. "Hybrid Manta Ray Foraging Optimization for
Novel Brain Tumor Detection." Journal of Soft Computing Paradigm
(JSCP) 2, no. 03 (2020): 175-185.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 514


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
A Novel Deep Learning Mechanism for Workload
Balancing in Fog Computing
Maganti Venkatesh1 S Naveen Kumar Polisetty2 Srilakshmi.CH3
Associate Professor, Department of CSE, Assistant professor, Assistant Professor,
Aditya Engineering College, St.ann's college of engineering and R.M.D Engineering College,
technology, chirala, Tamil Nadu ,India
Jawaharlal Nehru Technological
Andhra Pradesh, India sricsbs@gmail.com
University Kakinada naveenmtech28@gmail.com
Kakinada, Andhra Pradesh, India.
venkateshm@aec.edu.in P. Neelima6
Rabinarayan Satpathy5 Assistant Professor, Department of CSE
PraveenKumar. K4 Professor CSE (FET)and Director VC School of Engineering
Assistant professor, Department of IT, Office Sri Padmavati Mahila Visvavidyalayam
VFSTR deemed to be University,
Sri Sri University, Tirupati, AP, India
Guntur, Andhra Pradesh,
India Cuttack, Odisha, India neelima.pannem@gmail.com
kpk_it@vignan.ac.in rabinarayan.satpathy@gmail.com

Abstract— In addition to cloud computing, fog computing has composed, aggregated & transmitted for storage and
recently been developed in order to provide services as a treatment starting IoT networks to cloud server. In reality,
modern distributed paradigm. Using the fog network, storage Cloud Computing presents a result that is transferred to
and computation can be extended to the edge of the system, centralized data centers for the storage and management
which besides providing local awareness and support for
function [4].
mobility, can resolve the problem of delay-sensitive
Internet of Things (IoT) applications frequently
applications’ service calculation. Fog networks must maintain
a proper load balance in order to avoid the problem with require an increasing number of sensors and a longer latency
certain fog nodes which are under-loaded or overloaded. As a between them and a control center. [1,2] These critical
result of load balancing, Quality of Service (QoS) applications typically necessitate strict Task Examination
characteristics such as consumption of resources and Disruption (TED), which is the total amount of time
bandwidth can be improved. This paper investigates a working between the time the task enters the system and the end of
charge distribution list in an IoT–fog–cloud collaboration the process.
system to reduce job latency and meet the QoS requirements of For the existing cloud computing infrastructure,
as many late sensitive IoT applications as possible. Besides, the
developing delay-sensitive IoT applications has created
problem of allocating workloads in such an IoT-based
more and more challenges. TSD contains not only the time
cooperation scheme is first considered, which suggests
optimum workload allotment between nearby fog nodes and required for calculation, but also the time required for
the cloud in order to reduce work provision delays. The queuing & network interruption. Even though cloud
stability is then examined using Lyapunov's drift and penalty computing offers a high-performance computer service [3–
theory, which analyzes the steadiness of IoT-fog-cloud queue 5] which is cheap, easily expandable and on-demand, it uses
scheme. large amount of information transmitted from IoT devices to
distant cloud centers which consume a vast amount of
Keywords— Workload, Fog Computing, Deep Learning, Cloud bandwidth resources and cause a considerable network
Computing delay. The development of delay-sensitive IoT applications
has become the bottleneck of cloud computing [6,7].
I. INTRODUCTION Because fog nodes are widely distributed, fog
The IoT (Internet of Things) permits to gather and exchange computing originates in the cloud and is a geographically
data for delivery services with trillions of physical objects. distributed paradigm, delivers networking power and
These services include environmental surveillance, compute closer to end-users and IoT devices. [1]. In cloud-
management of the infrastructure &house computerization only designs, the majority of the information that requires
[1]. In addition, IoT can provide people and computers with preparation, investigation, and capacity is transferred to
millions of objects for learning and interacting. Specifically, cloud workers, which may have an adverse impact on
sensors, tools and services are part of these objects [2]. The inertness, security, flexibility, and unwavering quality. The
IoT combine the cyber world and the objective planet; cloud, on its own, faces challenges in meeting the incredibly
hence, the interaction between man and the world is low latency requirements of location-aware and delay-
changed [2]. sensitive applications; however, the proximity of the mist
IoT, in particular sensors, are usually confronted layer to IoT gadgets may dramatically reduce dormancy and
with difficulties due to limited resources which often impact address the issues of incredibly low latency [11][12]. Mist
service quality & client knowledge [3]. Information is now

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 515


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

processing consistently associates with and upholds the algorithm [16]. More importantly, this work considered that
cloud, making a novel age of uses and administrations. fog node middleware is computationally more compatible
than end devices but is less computational than cloud. A fog
II. RELATED WORKS computing IoT based model was proposed by Ma et al. A
genetic algorithm for dropping the nodule of failure &
In 2016, Ruilong Deng et al., [5] explored the transfer power use was proposed based on the model. In order to
between cloud and fog computing's energy usage and evaluate its performance, Yousefpour et al. proposed a
transmitting delays. Cloud & fog nodes would be used to three-stage fog system mathematical model. A threshold
distribute workload, according to the researchers' findings. method was employed to download the result to decrease
The method saved energy and reduced response [18][19]. the work time. Nan et al. also utilized the Cloud of Things
The method provided an approximation of workload (CoT) scheme, which included end policy, fog nodes & a
assignment format and divided the workload into three cloud center, to evaluate its performance.
subproblems: total fog node delays, total cloud delays, and III. SYSTEM ARCHITECTURE
network transmission delays. The drawback of this system,
however, is that certain nodes consume high energy,
sometimes affecting the efficiency of the network computer
loads [13].
The workload distribution using genetic algorithms
and BIP was implemented by AdilaMebrek et al. In the
work, energy consumption & service class are two
fundamental criteria for the performance of fog processing
[17]. The 3 types of energy consumption are total usage,
usage per unit area, and usage per unit time of energy in the
processing and storage of user requests. Two problems
include the sum of transmission delays for the user request
between the target unit of the data center and cloud delays in
data processing and storage. The time frame is separated
into two subproblems. In this work, the fog design was
created as a unidirectional chart that utilized diverse
inherent BIP optimization methods. The downside of the
method is that the energy consumption is unchanged and the
IoT is delayed at low and medium scales [14].
A general IoT-based applications framework and Fig. 1. General framework for IoT-fog-cloud architecture
latency minimization policies for fog-processing devices
were proposed by Ashkan Yousefpour et al. The policy was Figure 1 depicts a framework for an IoT-fog cloud
designed to reduce IoT service delay. The objective of their architecture. Each layer of the three-layer architecture has a
study was to determine the response time for a task [15]. different computational capability. IoT includes "things"
The proposed models make decisions based on light or and home consumers, fog would include nodes, and cloud
heavy processing, so that the application is accepted by the includes dispersed cloud servers, among many other
fog node as long as the policy response falls below a components. There are various processing units available to
predetermined level. A neighboring node or the cloud will the cloud server. The network's fog layer prevents
handle the request if it does not. Fog machines are called in unnecessary transmission and performs certain cloud-based
when there are a lot of requests for light treatment. The functions [7]. Due to the capabilities of each layer, it is
incapability to start investigating multiple possibilities in a essential to determine the appropriate allocation of workload
distributed is one of the method's drawbacks. Another to each layer [10]. Decision-making is depended on criterion
drawback is that it is not able to ascertain to either assign the for improving the allocation of workload. The following
application to fog or cloud platforms on the processing criterion are:
delay.
Furthermore, researchers determined on job A. Delay: IoT submissions like virtuality, real-time
discharge depending on a model of a 3-tier fog scheme. Like applications and sensors may demand below several
Li et al., the three-level mathematical model, Wu et al. milliseconds of latencies [4]. To reduce latency, it's best to
proposed a scheme, which included end devices, fog-node process information at the IoT-fog-cloud architecture layer
middleware, and a cloud centre. The template was based on which is the nearest.
the suggested energy consumption, a task offloading

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 516


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

B. Bandwidth: IoT is exponentially generating information. to the dimensions used in this investigation, the findings can
Data pre-processing prior sending to the network decrease be used as the basis for a comparison of other studies.
the duration of the information, thus reducing bandwidth
utilization [4].

C. Energy: At the network's edge [5,] there is a trade-off


between the energy to process the data and the energy
required to move the data to another location.

The assignment of workload is not an easy task, as


the criteria for resource assignment (as indicated above) are
very closely linked [10]. Object layer energy constraints Fig. 2. Research Method Steps
necessitate that the workload be transferred to the fog or
cloud layer, for instance. As a result, the latency increases 4.1 Planning the Review
dramatically when this workload is sent to the higher layers. It is essential to begin the planning process with an
Workload assignment criteria must therefore be established, understanding of the rationale for conducting a
and prioritization should be given to selecting the best comprehensive investigation and the findings that will be
assignment strategy based on these criteria. presented in the revision protocol that follows:
4.1.1 To find out why the systematic review is being done in
Load Balancing the first place, the inspiration is recognized & the input of
Load balancing in the Mist framework encourages the efficient check is validated.
distribution of responsibility across assets in a similar way, 4.1.2 Making a plan for the study
planning to provide types of assistance indefinitely if The motivations are defined by the Research
provision and multi-implementation instances fails and the Questions (RQs). Based on the replies, it can be concluded
help part fails, as well as proper resource utilization. that load balancing systems are effective.
Because server farms have a variety of hosts and exhibit
unique traffic characteristics, a suitable load balancing 4.2 Reviewing the Situation
system is required in mist registering to improve the display The second phase begins with the selection of articles and
of applications and network utilisation [20]. As a progresses to the extraction of data and the synthesis of
mechanism, load balancing distributes workload among information.
numerous assets to prevent overburdening or under 4.2.1 Choose the most relevant studies
burdening. Load balancing is performed by using either As part of the second phase of conducting research,
physical equipment or software to divide the load among picking publications is followed by data extraction. The
multiple assets. purpose of this subsection is to demonstrate how the next
stage of the systematic search searches for and selects
Load Balancing Metrics articles.
Several metrics are required to evaluate a load balancing
mechanism and compare it to previous mechanisms in order Heuristic Methods
to determine which mechanism is superior and to recognise For specific optimization issues, heuristic approaches are
the pros and cons associated with it. Some qualitative entirely based on "experience," with the goal of finding the
paradigms are required for the metrics. There are numerous best answer through "trial-and-error" in the shortest possible
qualitative metrics used in various articles. period. Heuristic techniques' solutions may not be the
greatest or most ideal, but are often far superior to an
IV. METHODOLOGY educated estimate.
In contrast to a semi review, a literature review [5]
eliminates prejudice and maintains a precise sequence of Meta-heuristic Methods
operational phases to evaluate literature. Figure 2 illustrates Meta-heuristic methods are concern and can be used to
a comprehensive study supported by really independent and solve a wide range of problems. All recent higher-level
assessed review methods for gathering, interpreting, and techniques are now referred to as "meta-heuristics." In
documenting the outcomes of the study. The rules in [5], modern meta-heuristics, diversification and intensification
have been received with three-stage study, planning, are two distinct approaches. In order to create a meta-
execution, and documentation. An external assessment of heuristic strategy that is both persuasive and effective, it is
each phase completes the study. A comprehensive crucial to find a middle ground among variation and
classification of the examined studies is offered. According intensity.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 517


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. RESULTS

Fig. 6. Evaluation metrics in fog computing load balancing


techniques
Implementation Outputs:

Fig. 3. Only-fog workload allocation

Fig.7. Packet Estimation

Fig. 4. The mean task service delay calculated with different


algorithms for each of the three IoT regions

Fig. 8. Adversary Node and Packet Status

VI. CONCLUSION
An issue related to fog-cloud workload allocation has been
addressed in this study. Fog energy usage and cloud
postponement in computation fog and cloud workloads are
traded off in an issue process model that has been proposed.
The suggested methodology for assigning workload in an
IoT-fog cloud architecture meets energy consumption and
Fig. 5. The proportion of load balancing methods in fog delay criteria, as shown by the simulation solution of
computing replicating three directing and coordinating the activities
situations, including solitary, just, and fog-cloud.

REFERENCES
[1] [1] F. Bonomi, R. Milito, J. Zhu, and S. Addepalli, "Fog computing
and its role in the internet of things," in Proceedings of the first
edition of the MCC workshop on Mobile cloud computing, 2012:
ACM, pp. 13-16.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 518


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[2] [2] A. Yousefpour et al., "All one needs to know about fog computing
and related edge computing paradigms: A complete survey," Journal
of Systems Architecture, vol. 98, pp. 289-330, 2019/09/01/ 2019.
[3] [3] N. Auluck, A. Azim, and K. Fizza, "Improving the Schedulability
of Real-Time Tasks using Fog Computing," IEEE Transactions on
Services Computing, pp. 1-1, 2019.
[4] [4] S. Aslam and M. A. Shah, "Load balancing algorithms in cloud
computing: A survey of modern techniques," in 2015 National
Software Engineering Conference (NSEC), 2015: IEEE, pp. 30-35.
[5] [5] P. Brereton, B. A. Kitchenham, D. Budgen, M. Turner, and M.
Khalil, "Lessons from applying the systematic literature review
process within the software engineering domain," Journal of Systems
and Software, vol. 80, no. 4, pp. 571-583, 2007/04/01/ 2007.
[6] [6]. Dastjerdi, A.V.; Buyya, R. Fog computing: Helping the internet
of things realize its potential. Computer 2016, 49, 112–116.
[CrossRef]
[7] [7.] Ning, Z.; Kong, X.; Xia, F.; Hou, W.; Wang, X. Green and
sustainable cloud of things: Enabling collaborative edge computing.
IEEE Commun. Mag. 2019, 57, 72–78. [CrossRef]
[8] [8]. Masip-Bruin, X.; Tashakor, G.; Jukan, A.; Ren, G.J. Foggy
clouds and cloudy fogs: A real need for coordinated management of
fog-to-cloud computing systems. IEEE Wireless Commun. 2016, 23,
120–128. [CrossRef]
[9] [9]. Bonomi, F.; Milito, R.; Zhu, J.; Addepalli, S. Fog computing and
its role in the Internet of Things. In Proceedings of the 1st Edition of
the MCC Workshop on Mobile Cloud Computing, Helsinki, Finland,
17 August 2012; pp. 13–16. Sensors 2019, 19, 3830 23 of 24
[10] [10]. Chen, X.; Jiao, L.; Li, W.; Fu, X. Efficient multi-user
computation offloading for mobile-edge cloud computing.
IEEE/ACM Trans. Netw. 2016, 24, 2795–2808.
[11] [11] Kumar, M.S. and Prakash, K.J., 2019. Internet of things: IETF
protocols, algorithms and applications. Int. J. Innov. Technol. Explor.
Eng, Volume-8 Issue-11, pp.2853-2857.
[12] [12] Kumar, M.S. and Harshitha, D., 2019. Process innovation
methods on business process Reengineering.International Journal of
Innovative Technology and Exploring Engineering (IJITEE)Volume-
8 Issue-11, PP.2766- 2768.
[13] [13] Ganesh D, Kumar TP, Kumar MS. A Dynamic and adaptive
learning mechanism to reduce cross layer attacks in cogntive
networks. Materials Today: Proceedings. 2020 Dec 31.
[14] [14] Natarajan, V. Anantha, Ms Macha Babitha, and M. Sunil Kumar.
"Detection of disease in tomato plant using Deep Learning
Techniques." International Journal of Modern Agriculture 9, no. 4
(2020): 525-540.
[15] [15] Gampala, Veerraju, M. S Kumar, C. Sushama, and E. Fantin
Irudaya Raj. "Deep learning based image processing approaches for
image deblurring." Materials Today: Proceedings (2020).
[16] [16] Natarajan, V. Anantha, M. Sunil Kumar, Rizwan Patan, Suresh
Kallam, and Mohamed Yasin Noor Mohamed. "Segmentation of
Nuclei in Histopathology images using Fully Convolutional Deep
Neural Architecture." In 2020 International Conference on
Computing and Information Technology (ICCIT-1441), pp. 1-7.
IEEE, 2020.
[17] [17] Peneti, S., Kumar, M. S., Kallam, S., Patan, R., Bhaskar, V., &
Ramachandran, M. (2021). BDN-GWMNN: Internet of Things (IoT)
Enabled Secure Smart City Applications. Wireless Personal
Communications, 1-17.
[18] [18] Balaji, K. "Load balancing in Cloud Computing: Issues and
Challenges." Turkish Journal of Computer and Mathematics
Education (TURCOMAT) 12, no. 2 (2021): 3077-3084.
[19] [19] Balaji, K., P. Sai Kiran, and M. S Kumar. "Resource Aware
Virtual Machine Placement in IaaS Cloud using Bio-Inspired Firefly
Algorithm." Journal of Green Engineering 10 (2020): 9315-9327.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 519


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Qos-Aware Video Streaming based Admission


Control and Scheduling for Video Transcoding in
Cloud Computing
Venkateswara Reddy B Khader Basha Sk Roja D
Assistant Professor Assistant Professor Assistant Professor
Dept. of CSE Dept. of CSE Dept. of CSE
Chalapathi Institute of Technology Chalapathi Institute of Technology Chalapathi Institute of Technology
Guntur, AP, India Guntur, AP, India Guntur, AP, India
bvreddymtech@gmail.com khaderbasha576@gmail.com rojad510@gmail.com

ABSTRACT: Power and other computing resources can be I. INTRODUCTION


stored and processed in cloud computing environments. Over the years, there has been a significant change in
Depending on the features of the clients' devices, video how people watch videos. Traditional TV systems are
streams, whether they are live or on-demand, often need used as well as Internet-based video streaming on PCs,
to be transcoded or converted (such as supported formats, laptops, and smart phones. Digital video streaming is
bandwidth, and spatial resolution, for example). increasingly popular among internet users. The
Currently, streaming service providers maintain multiple demanding requirements for video streaming services
transcoded versions of the same video to serve various include a high-quality communication channel and a
client devices because transcoding is a computationally
constant, uninterrupted data flow [1]. As a result, there
expensive and time-consuming process. To eliminate
jitters in accepted streams while transcoding, a task are attractive advantages to using such services in cloud
scheduling mechanism is included. To ensure that the environments to enhance the Quality of Experience
consumer receives continuous video content delivery, this (QoE) of end users. Examples of services include
technique involves cutting a tiny number of video frames multiple route video transmission, cache systems, and
from a video segment. In this evaluation, admission video transcoding. If the end user's device is not
control and scheduling based on QoS -aware video streams capable of displaying 1080p videos, the transcoder
is the new task scheduling method for video recording that service can be used to convert the video from 8 Mbps
is suggested. With the help of this framework, streaming (1080p) to 5 Mbps (720p) with no visible quality loss.
platform services have made efficient use of cloud
This allows for a bigger number of users while still
resources while following to the Quality of S ervice (QoS )
standards for video transmissions. The technologies are maintaining acceptable QoE.
advancing a scheduling technique that is QoS -aware to
effectively map video streams to cloud resources in order Video streaming currently accounts for almost all
to deliver high QoS . The performance of this analysis is United States(US). Internet traffic, according to the
calculated on different aspects such as Accuracy, Qos and Global Internet Phenomenon report [2]. According to
Recall. In this approach the QoS -aware video streaming Cisco Systems, Inc.1, streaming traffic will continue
based admission control and scheduling for video expanding. The server-side processing power needed to
transcoding in cloud computing will give the best broadcast many videos may be considerable. As a
outcomes.
result, compressed formats like MPEG-4 and H.264 are
KEYWORDS: Video Transcoding, Cloud Computing, frequently used for digital video storage and
Admission Control, Scheduling, Resource Allocation. transmission in order to maximize media utilization.
Most of the time, client-side devices that play and
stream videos only support a small number of existing
video formats. videos from one compression format to
another. As desired video streaming services ought to
provide the real-time video transcoding that is both the
fastest and most efficient.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 520


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Video transcoding necessitates the use of a large units for video encoding and decoding are called
cluster-based distributed system due to its MacroBlocks (MB), and each frame in a GOP has
computationally demanding nature. IaaS clouds, such as several segments made up of numerous
Amazon Elastic Compute Cloud (EC2), provide all of MacroBlocks(MB).
the resources required to create a dynamically scaled
tier of transcoding servers. They presented a prediction- Video footage is initially recorded using a specific
based dynamic resource allocation technique to scale format, frame rate, bit rate, and spatial resolution. Once
video transcoding service on a particular IaaS cloud in on the streaming servers, the video is then uploaded.
the prior analysis. Although, server overload cannot be Typically, streaming servers must take into account
prevented by resource allocation alone. As a result, an client network capacity, gadget resolution, screen
admission control mechanism should be added to resolution, and video codec when converting the video
improve resource allocation in order to limit the source. The "Video transcoding" is the common name
incoming load on servers and prevent overload. for each of these modifications and changes.

Clients of video streams have certain QoS The remaining of the analysis is organised in the
requirements. In general, video streams must be manner listed below. The literature review is discussed
received immediately. A transcoding process that was in Section II, QoS-aware video streaming based
left unfinished at the time of presentation may create admission control and scheduling for cloud computing
this delay, or it could happen at the start of the video video transcoding in cloud computing Section III
stream. It must be encoded with a high bit rate in order discusses, Section IV discusses the findings analysis,
to produce video information of a good quality. and Section V conclusion.
Although, the transmission of video content
necessitates a significant amount of network bandwidth II. LITERATURE SURVEY
due to the high bit rate. In order to maintain a smooth
stream, streaming service providers frequently need to X. Li, M. A. Salehi, and M. Bayoumi et. al. [3]
re-encode the bitrate of their video broadcast due to the Transcoding videos on customers devices is impractical
varied network circumstances of their customers. due to restrictions in processing power and power
sources. The storage of multiple transcoded versions of
In this analysis, they provide a scheduling and the same video for use by various client devices is one
admission control method based on video streaming approach to the problem of video transcoding.
that is QoS-aware for a layer of video transcoding Although, this method calls for a significant amount of
servers that is dynamically scalable. In order to make processing power and a lot of storage space. However,
decisions regarding admission control, this strategy this method necessitates massive storage resources and
makes use of the transcoding servers queue waiting powerful processors.
time. They refer to the first delay in this study as the
missed presentation deadline and the second delay as F. Jokhio, S. Lafond, A. Ashraf, and J. Lilius et. al. [4]
the video stream initiation delay. Previous research has a method for allocating cloud resources that strikes a
shown that most streaming users do not finish watching balance between cost, efficiency, and storage is offered
videos. However, they evaluate a stream provider's by video transcoding. In this analysis, the case of video-
quality depending on how quickly the video starts on-demand is taken into consideration, where each
playing. Accordingly, to expand the fulfillment of the video contains previous execution time data (e.g.,
clients, the video web based QoS request is considered historical transcoding time). Utilizing this historical
as well as limiting the beginning postponement without data, the described scheduling and resource allocation
missing the presentation deadline time. methods schedule GOPs and ascertain the cloud's VM
count.
A video stream is made up of many sequences. Multiple
Group Of Pictures (GOP) are created for each F. Lao, X. Zhang, and Z. Guo et. al. [5] A video stream
sequence, each GOP beginning with the sequencing can be divided into different levels such as sequence
transport protocol. A GOP is basically a grouping of level, GOP level, frame level, segment level and
edges starting with an intraframe and going on with a macroblock level for the transcoding process. Multiple
few P-or B-directional expectation outlines. GOP can GOPs at the sequence level can each be separately
be divided into two groups: both open and closed GOP transcoded. At the other extreme, the transmission and
Since there are no relationships between the GOPs in a transcoding times are determined by the size of each
closed-GOP, each GOP can be transcoded sequence. In contrasted to that, frames, pieces, and
independently. In open-GOP, however, there is a macroblocks are linked geographically and temporally.
dependent on other GOPs. The fundamental processing

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 521


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

As a result, their processing becomes complex and make purchases that include financial transactions. At
slow. suitable intervals, a recurrent pattern of workload is
assumed.
S. Muppala and X. Zhou et. al. [6] Reporting the
CoSAC (Coordinated Session-Based Access Control) III. QOS-AWARE VIDEO STREAMING BASED
approach to providing access control for multi-tier web ADMISSION CONTROL AND SCHEDULING
applications through single-session access control. FOR VIDEO TRANSCODING
CoSAC uses Bayesian networks as a Machine Learning Figure 1 shows the block diagram of QoS-aware video
technique and furthermore offers inter-level streaming based admission control and scheduling for
coordination. By connecting each session admission video transcoding. The architecture displays the order
control with a load deferral method, it reduces the of events that occur when customers ask streaming
number of sessions rejected. service providers for videos.

T. Deneke et. al. [7] Provides a centralized transcoding


technique that divides video streams into different sizes Video Video Video
Video
and distributes them between processors to save video Response Request Repository
Repositor
rendering and startup performance. Consequently, the y
descriptive scheduling approach can reduce the average
start delays of a number of video streams without
significantly reducing the rate of deadline incidents.

F. Jokhio, S. Lafond, T. Deneke, and J. Lilius et. al. [8] Streaming Server
Transcoding time for spatial resolution reduction is
shown to be impacted by video segmentation. The
video streams are separated into Groups of Pictures for
this study (GOP). Each transcoding task in this situation
Master Controller And Resource Allocator
has to deal with many GOPs. The transcoding section is
constructed by taking into account a number of GOPs.
Each transcoding task in this situation has to deal with
many GOPs. The video stream is typically split into
GOPs, each of which is transcoded separately, to Video Splitter Video
prevent unnecessary communication lag across multiple
Manager
cloud servers (i.e., virtual machines). But initial
research indicates that transcoding segments with a
GOP is easier to arrange.
Batch Startup Transcodin
J. Almeida, C. Francalanci, I. Cunha, D. Ardagna, and Queue Queue g VM
V. Almeida, M. Trubian et. al.
[10] a single strategy for allocating resources and
controlling access to a virtualized platform that houses VM Provision
multiple web applications, with each Virtual Machine Update ing
(VM) running a distinct web service application. As VM Pro
well as addressing customers Quality of Service (QoS) vision Elasticity
needs and reducing resource use costs, optimization
Manager (EM)
intends to boost the provider's income. By only
processing the subset of requests that maximises
profitability and dynamically modifying the percentage
of capacity allocated to each Virtual Machine (VM),
this approach limits the amount of incoming workload.
Fig. 1. T he Block Diagram of QOS-Aware Videp Streaming
Based Admission Control and Ssheducling for Video T ranscoding
Y. A. Shaaban and J. Hillston et. al. [11] the use of a
congestion control strategy is provided in a Cost-Based
Admission Control (CBAC). However, there will be an streaming server, which then determines whether the
extra fee if the user decides to submit the request again requested video is offered by the video store. It begins
within the busy time. The concept is only appropriate streaming a video once it locates one in the required
for e-commerce websites if the majority of customers format. However, it will split the requested video and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 522


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

send it for re-encoding if it discovers that it was only strategies. The EM generates VMs and connects them
saved in a different format or resolution than the one to the VM cluster when a video stream's or table
that was requested. A copy of each transcoded video is queue's QoS degradation rates increase. Similar to this,
kept for a certain amount of time (usually several days) EM's resource provisioning policies remove virtual
in the video store to prevent the transcoding process machines (VMs) from the VM cluster when they are
from being repeated too often.The resource allocator underutilized to save the streaming service provider
and master controller are the primary creators of money.
transcoding server cluster Virtual Machines.
To determine whether the assigned VMs are adequate
The targeted playback speed of the video stream and to satisfy the QoS requirements, EM is conducted
the anticipated transcoding server speed are the main periodically and depending on events. The scheduler is
factors that determine how resources are allocated and informed about the most recent configuration of the
distributed. VM cluster and the set of allocated virtual machines is
updated by EM. It is the responsibility of EM in the
Video Splitter: They analyze each GOP as a separate CVSS architecture to implement cloud resource
work with a separate deadline. The first frame's purchase depending on client demand rate. With VMs
presentation time determines a GOP's deadline. from the cloud provider being dynamically allocated or
Customers think about video on-demand streaming, deallocated, EM supports resource provisioning
where the GOP has to finish its transcoding but ignores capabilities for this purpose. The transcoding scheduler
its deadline (like Netflix and YouTube). In this is then instructed by the procedures to account for the
approach, close-GOP types where each GOP can be modifications in its task mapping decisions. While
processed independently are considered. Allocating conforming to QoS requirements for video streaming,
GOPs to the encoding server is the responsibility of the provisioning strategies attempt to keep costs to the
transcoding job scheduler, also known as the stream provider to a minimum. Scale up quickly and
transcoding scheduler. The goal of the scheduler is to scale down gradually is the guiding philosophy of EM's
meet the minimum start delay and minimum timeout resource provisioning practises.
error rate requirements for customers for video streams.
Cloud distributor provides VMs to process the GOP
In the scheduling queue, several GOPs from various tasks. The homogeneity of the allocated VMs is
video streams are mixed together. Additionally, the assumed for the purposes of this analysis. Future
scheduler has no information of or doesn't make any analysis will be done in the scenario of heterogeneous
assumptions about the GOP's pattern of arrival. A VMs. Data needed for GOPs is preloaded before
different queue, the startup queue, is monitored to execution in each VM's local queue. Even after the
shorten the time it takes for video streams to start up. local queue is entirely full, the scheduler still assigns
Initial GOPs are delivered to the startup queue, which GOPs to VMs. Due to the homogeneous of all allocated
has a higher priority than the batch queue, for each new VMs, the local queue sizes for all transcoding processes
video stream. GOP-specific data is placed into each are the same.
VM's local queue before GOP transcoding is carried out
to prevent performance delays. Variability in a virtual GOP processes in local queues are assumed to be
machine's performance can also be attributed to other scheduled along FCFS paths and the scheduler is
virtual machines that share a physical host with the notified whenever space becomes available in the VM's
virtual machine in the cloud datacenter. For example, local queue to allocate a VM GOP. To produce the final
the performance of a neighboring Virtual Machine (i.e. transcoded) video stream, organizing all of the
(VM) will differ if there is no such neighboring VM transcoded GOPs in the desired order is an important
because the VM will suffer from memory access if it part of video compression. The stream that has been
has a lot of memory accesses. transcoded is returned to the video repository for client
access through the video integration.
To meet customer QoS requirements and save
expenditures its spending on streaming providers, EM IV. RESULT ANALYSIS
regulates the transcoding performance of virtual The suggested QoS-aware video streaming admission
machines in video transcoding and QoS-aware video control and scheduling for cloud computing video
streaming-based access control scheduling and resizes transcoding is examined in this section. The suggested
virtual machine clusters accordingly. For this reason, model's performance is evaluated using the following
EM dynamics (such as) Virtual Machines are allocated definitions for True Positive (TP), True Negative (TN),
and released from cloud providers according to False Negative (FN), and False Positive (FP):
customer needs by flexible resource provisioning

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 523


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

True Positive (TP): TP is the total number of correctly Table 1. Performance Analysis
classified actually positive predictive instances that are
all positive predictions. Video
streaming Video
True Negative (TN): The total number of actually Performance based on streaming
negative, correctly classified negative predictive Metrics scheduling for
instances is known as the TN. VT
QoS 99.1 76
False Positive (FP): FP is the total number of positive (%)
prediction instances that are not actually positive and
are labelled as having error. Accuracy (%) 98 82
False Negative (FN): The amount of completely
incorrectly classified, actually neutral, negative
predictive instances, or FN, is given. Recall 93 85
(%)
In a network, a collection of techniques known as
Quality of Service (QoS) is utilized to make sure that The above table shows that the Video streaming based
high-priority traffic and applications can operate on scheduling for VT gives the higher QoS, accuracy
effectively within a constrained network capacity. By and recall.
providing differentiated management and capacity
allocation to specific network traffic flows, QoS
solutions achieve this.

Accuracy: It is described as being the proportion of


correctly identified occurrences to all instances, and it
is provided as

Recall: The ability to find all relevant instances in a


dataset is revealed by recall. That is, categorization
models recognise all relevant events in a memory and
are expressed as Fig. 2. Qos Performance
Comparison Between Methods
(2)
In this comparision the above graph shows that Video
The performance analysis of the proposed QoS-aware streaming based on scheduling for VT has higher QoS.
video streaming based admission control and
scheduling for video transcoding in cloud computing
based on is shown in Table 1

Fig. 3. Accuracy Performance


Comparison Between Methods

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 524


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[3] C. V. N. Index, “Forecast and methodology, 2014-2019,” 2015.


[4] X. Li, M. A. Salehi, and M. Bayoumi, “Cloud-based video
In this comparision the above graph shows that Video
streaming for energy- and compute-limited thin clients,” in the
streaming based on scheduling for VT has higher Stream2015 Workshop at Indiana University, Oct, 2015.
accuracy. [5] F. Jokhio, A. Ashraf, S. Lafond, and J. Lilius, “A computation and
storage trade-off strategy for cost-efficient video transcoding in the
cloud,” in Proceedings of the 39th IEEE Conference on Software
Engineering and Advanced Applications (SEAA), pp. 365–372, 2013.
[6] F. Lao, X. Zhang, and Z. Guo, “Parallelizing video transcoding
using map-reduce-based cloud computing,” in Proceedings of IEEE
International Symposium on Circuits and Systems, pp. 2905–2908,
2012.
[7] S. Muppala and X. Zhou, “Coordinated session-based admission
control with statistical learning for multi-tier internet applications,”
Journal of Network and Computer Applications, vol. 34, no. 1, pp. 20
– 29, 2011.
[8] T . Deneke, “Scalable distributed video transcoding architecture,”
Master’s thesis, Abo Akademi University, 2011.
[9] F. Jokhio, T. Deneke, S. Lafond, and J. Lilius, “Analysis of video
segmentation for spatial resolution reduction video transcoding,” in
Proceedings of IEEE International Symposium on Intelligent Signal
Processing and Communications Systems (ISPACS), pp. 1–6, 2011.
[10] R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and
Fig. 4. Recall Performance Comparison Between R. Buyya, “Cloudsim: a toolkit for modeling and simulation of cloud
Methods computing environments and evaluation of resource provisioning
algorithms,” Software: Practice and Experience, vol. 41, pp. 23 –50,
2011.
In this comparision the above graph shows that Video [11] J. Almeida, V. Almeida, D. Ardagna, I. Cunha, C. Francalanci,
streaming based on scheduling for VT has higher and M. T rubian, “Joint admission control and resource allocation in
Recall. virtualized servers,” J. Parallel Distrib. Comput., vol. 70, no. 4, pp.
344–362, Apr. 2010.
[12] Y. A. Shaaban and J. Hillston, “Cost-based admission control for
V. CONCLUS ION
internet commerce QoS enhancement,” Electronic Commerce
Research and Applications, vol. 8, no. 3, pp. 142 – 159, 2009.
In this approach, including on transcoding of video [13] M. A. Mesa, A. Ramirez, A. Azevedo, C. Meenderinck, B.
streams utilizing cloud resources, they described access Juurlink, and M. Valero, “Scalability of macroblock-level parallelism
for h. 264 decoding,” in Proceedings of the 15th IEEE International
management and scheduling for video transcoding Conference on Parallel and Distributed Systems (ICPADS), pp. 236–
based on streaming video QoS information The 243, 2009.
scheduling system in the design takes into account the [14] Y. Sambe, S. Watanabe, Y. Dong, T . Nakamura, and N.
QoS requirements of video streams. It based on Wakamiya, “High-speed distributed video transcoding for multiple
rates and formats,” IEICE Transaction on Information and Systems,
admission control judgments on how long each vol. 88, no. 8, pp. 1923–1931, 2005.
transcoding server's queue is open. This offers a decent [15]Sai Srinivas Vellela, Dr. A. Murali Krishna, “On Board Artificial
balance between price and QoS. Additionally, it lowers Intelligence With Service Aggregation for Edge Computing in
jitter in approved streams, rejects less streams, avoids Industrial Applications” Journal of Critical Reviews ISSN- 2394-
5125 Vol 7, Issue 07, 2020
servers from being overloaded, and drops only a small [16]Madhuri, A., Jyothi, V. E., Praveen, S. P., Sindhura, S., Srinivas,
percentage of video frames. The purpose of this V. S., & Kumar, D. L. S. (2022). A New Multi-Level Semi-
analysis is to reduce the amount of time that video Supervised Learning Approach for Network Intrusion Detection
streams start late and maximise QoS. The outcomes of System Based on the ‘GOA’. Journal of Interconnection Networks,
2143047.
the experiments demonstrate that the provided
scheduling strategy offers high QoS. The best outcomes
have been determined by calculated performance
metrics on several areas, such as Accuracy, QoS, and
Recall.

VI. REFERENCES

[1] Sai Srinivas Vellela , Dr.R.Balamanigandan, Dr.S.Phani Praveen,


“ Strategic Survey on Security and Privacy Methods of Cloud
Computing Environment”, Journal of Next Generation T echnology,
ISSN: 2583-021X, Vol. 2, Issue 1, May 2022.
[2] R. Immich, E. Cerqueira, and M. Curado, "Efficient
highresolution video delivery over vanets," Wireless Networks, Feb
2018. [Online]. Available: https://doi.org/10.1007/s11276-018- 1687-
2

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 525


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Soft Computing based Machine Learning Techniques


for Optical Communication Networks
Dr.A.Vasantharaj
P.Malini Associate Professor
Assistant Professor
Excel Engineering College
Vivekananda College of Technology for Women
Namakkal, India.
Triuchengode, India. vasanth.eec@excelcolleges.com
pm22112021@g mail.co m
S.Karpakam
S.Preethi Assistant Professor
Assistant Professor Sri Eshwar College of Engineering
Kongu Engineering College coimbatore, India.
Erode, India. karpakaparamasivam@gmail.co m
preethi.s.ece@gmail.com

U.Sasikala S.Irfan basha


Assistant Professor UG Scholar
J.K.K.Munirajah College of Technology K.Ramakrishnan College of Engineering
Coimbatore, India. irfanbg007@gmail.com
sasi302009@gmail.co m

Abstract: Massive amounts of extremely far-off data their own. ML makes it possible for machines to perform jobs
are now being sourced from the telecommunications networks. that have historically been handled by people. [4,5,6] With the
Additionally, this information may be acquired via network expectation that more design-related procedures would soon
business traces, network logs, warnings, signal quality indicators,
be automated and that machine control of the communication
drug addicts' behavioral data, and other sources. Advanced tools
are required to collect useful data.. Machine learning is one of network will become the norm, the notion of automating such
these fantastic technologies (ML), which is considered as one of professions has attracted a lot of interest in the networking
the most promising tactical answers for analyzing network data community. Applications of machine learning in many
and automation. The recent increase in network difficulty networking settings.
contributes to the abandoning of ML techniques in the context of
optical communication networks. In this study high-level Machine learning for optical networking is one of the
overview of networking and ML to optic dispatches are networking [7, 8, 9] applications on which this study focuses.
analyzed. This article, outlines the problem, review the relevant Due to its high capacity, cheap cost, and a multitude of other
literature, and provide experimenters and analysts interested in
this field an introduction to machine learning. By providing new enticing features, optical networks constitute the main physical
possible exploration guidelines to encourage more advancement infrastructure of all large-provider networks worldwide.
in this field, we infer the research. Even if recently reasonable
investigation documents have appeared, machine learning's In reality, cross-layer situations, where data analysis
application to optical networks is still in its infancy. at the physical subcaste, such as covering Bit Error Rate
(BER), [10, 11, 12] can prompt modifications at the network
subcaste, including routing, diapason, and assignments of
Keywords: BER, OSNR, Neural Networks, Optical modulation formats, are very beneficial, ML operations are
Communications and Networking, Data Analytics, Machine particularly helpful. [13, 14, 15] From a networking
Learning, and Network Monitoring. standpoint, several changes in the knowledge aero plane and
I. INT RODUCT ION later the control aero plane show the escalating complexity of
the underlying transmission systems. [16,17,18] In response to
The branch of data science known as machine the increased need for flexibility in allocating optic network
learning (ML) [1,2,3] provides machines with appropriate resources on the knowledge aeroplanes, a new optical network
data enables them to learn how to solve a specific issue on structure known as the Elastic Optical Network (EON)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 526


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

conception(12)-(15) has arisen. In contrast to traditional


fixed-grid WDM networks, EON enables flexible (nearly
continuous) bandwidth allotment.

These techniques makes it possible to draw conclusions


about important qualities that cannot be quickly or directly
measured from data’s collected from various types of
observers (e.g., signal quality, business samples, etc.). Many
are conceivable and could be covered in the following
sections. Some of the anticipated optic sphere operations
include fault quantization, intrusion discovery, physical
inflow security, impairment-apprehensive routing, low-
periphery design, and business -apprehensive capacity
reconfigurations. Control rudiments like SDN regulators,
network lyricists, and optical performance observers work at
network location. Figure 1: Supervised Learning: a dataset of pathways,
wavelengths, modulation, and BER is used to prepare the
II. A SUMMARY OF METHODS OF OPTIQUE algorithm. After that, the BER is extrapolated to fit fresh
NETWORKS FOR MACHINES TO LEARN inputs.
(A) Supervised learning:
1) Parametric models:
This phase provides a high-level overview of a number of The feature during this case can be a combination of a
the most effective machine learning techniques. Due to the tough and fast reasonably parametric foundation functio ns.
plethora of literature on the subject, a thorough examination These fashions estimate a relentless set of variables the
of every ML approach would fall outside the purview of this utilization of coaching data. Following the gaining
section, and compendiums are similar to the abecedarian knowledge of stage, the coaching records are also discarded
book format. The most significant ML methods employed in due to the actual fact the prediction corresponds to new data.
the studies listed in the remaining parts of this study are Only the realized parameters w are accustomed compute
briefly reviewed in this phase. We next present some inputs. In terms of analytical and numerical complexity,
fundamental context for the anthology to help readers parametric designs with a linear combination of constant
comprehend the balancing components of this check paper. nonlinear foundation functions do the best.
We categories the algorithms into three main groups, as A NN gains knowledge by reducing its propensity to
shown in the diagram. in Fig. 1. These orders—supervised make errors when valuing the set of parameters w given a
literacy, unsupervised literacy, and underlying literacy—are training set. Several error characteristics are used, depending
discussed in the following sections. Semi-supervised literacy, on the level of difficulty and the output units' activation
a cross between supervised and unsupervised literacy, is feature. The overall rectangular errors are often employed in
additionally bandied. regression models, whereas the go entropy error feature is
used for classification.
2) Nonparametric models:
The large choice of parameters in nonparametric
strategies is determined through the education set. These
strategies shop a subset or the entire coaching records at the
identical time and appoint them at some point of production.
Basis features in SVMs are headquartered on coaching
samples, with the coaching method choosing a subset of the
elemental functions. The cardinality of the coaching dataset is
often a good deal smaller than the wide selection of chosen
groundwork features and education samples that must be
stored.

SVMs assemble a linear choice boundary that's as a


protracted way far from the coaching samples as possible.
Only the help vectors that are closest to the separators are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 527


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

saved. A nonlinear optimization trouble with a convex goal (C)methods of semi-supervised learning
feature must be solved to make your mind up the parameters
of SVMs, that environment friendly algorithms exist.SVMs
have the good thing about being during a position to embed
statistics into a greater dimensional house during which
records factors will be linearly distributed.

(B)Unsupervised learning:

Among the most successful unsupervised functions


learning methodologies are market research, social
community analysis, and gene clustering. In unsupervised
learning, the coaching dataset is used. It only consists of a
collection of x policies, or a mapping of environmental states
into actions to be taken while instantly relating to the
environment. With only evaluative input as the reward, the
RL prototype enables merchants to appear by experimenting
with various moves and altering their behaviour. The long -
term effectiveness of the agent should be maximized. As a Figure 3:During the pattern phase of the self-training process,
result, the agent takes into account both the immediate an unlabeled factor is compared against labelled facts before
rewards and the long-term costs of its decisions. The two key being added back to the set of labelled statistics.
components of RL are trial-and-error and dawdle reward.
(D)Reinforcement Learning (RL)

Reinforcement Learning (RL), which is used to handle


applications like automation, finance (investment decisions),
and stock management, aims to swiftly associate with the
environment by using a policy, or a mapping between
environmental states and motions that need to be made. By
testing with a single form of movement and adjusting their
behaviour using just evaluative input, or the incentive, the RL
prototype enables sellers to do research. The performance of
the agent must be maximised throughout time. As a result, the
agent weighs both the short-term advantages of its choices and
their long-term drawbacks. The two essential elements of RL
are dawdled reward and trial-and-error learning.
Figure 2: The algorithm discovers strange patterns in the data,
such as wavelengths, routes, BER, and modulation.

Semi-supervised gaining knowledge of approach are a


combination of the preceding two brought above, which
they're accustomed remedy issues within which the majority
of the education samples are unlabeled, with solely some
exceptions. There are labeled statistics factors available. The
apparent gain is that a wealth of unlabeled records factors is
with ease there in many domains are available. Semi-
supervised about to know is used for the identical purpose. Figure 4:Reinforcement Learning cycle
Applications like supervised gaining knowledge of are
specifically beneficial. When labeled records factors are (E) Model selection, overfitting, and underfitting
scarce or prohibitively costly acquiring and
utilisingthereunlabeled records can assist performance. In this part, we go over a typical ML algorithm issue and
possible solutions. Even if we are authorities on supervised

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 528


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

mastering techniques, the discussion is still important. Being of this section provide a high-level overview of the primary
too big or too little has a flip side, which is model selection. applications of ML in optical networks, which are shown in
When the model is simply too complicated for the sho rt Figure 6 and emphasize the potential benefits of ML. A
dataset, overfitting happens (for example, a excessive comprehensive assessment of the preliminary results may
quadratic order within the instance of regression with potentially be the next step. The network and physical layers
quadratic foundation features or a big kind of concealed are both covered by Divisions IV and V.
neurons within the case of a neural network). In this case, the
model will match the educational data too closely, including Relevant computer mastering techniques: ML regression
noisy samples and outliers, but it will also result in poor algorithms are often skilled to exactly expect post-amplifier
generalization, or incorrect predictions for brand-new data energy tour in response to the addition/deletion o f positive
points. On the other hand, choosing models that are no longer wavelengths to/from the machine thanks to the availability of
sophisticated enough to capture important informative previous records obtained via monitoring community status.
features results in underfitting (for example, once we use a
linear mannequin to healthy polynomial data). Recognizing formats for modulation (MFR).

Modern optical transmitters and receivers offer a


great deal of flexibility with regard to the used bandwidth,
provider frequency, and modulation scheme, making it
possible to adapt the evaluation to the popular BER and
optical attain in an easily extensible networking context. It is
not always feasible to find out this option in increase at the
reception side as long as any coherent optical modulation
arrangement is applied on the transmission side. This could
also affect right sign demodulation, which could affect how
signs are processed and detected.

Figure 5: Differences between improper and excessive


fitting

III.DESCRIPTION OF THE PURPOSE OF OPTIQUE


NETWORKS AND SYSTEMS FOR MACHINE
LEARNING

The use of ML and data analytics approaches can be


advantageous in a variety of circumstances. These instances
are divided into two categories in this document: 1) cases that
are cashed in, and 2) cases that are utilized by the community Figure 6: Optical network assisted by ML Framework
layer. The remainder of this section summarizes the major
functions of ML in optical networks, as graphically depicted Relevant laptop studying strategies encompass the
in Fig. 6, and explains why ML is always advantageous.
utilization of supervised ML, which allows quickly direction
Sections IV and V offer a thorough assessment of recent
decision and carrier provisioning through concurrently taking
research for usage scenarios including the physiological layer
under consideration a quantity of parameters, inclusive of the
and community layer, respectively.
incoming carrier request as nicely because the contemporary
community country information. This eliminates the want for
The use of data analytics and machine learning techniques can sophisticated community price evaluations .
be advantageous in a variety of circumstances. These use
cases are separated into use instances for the physical layer
and then the social layer in this study. The last few sentences

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 529


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. DEEP STUDY OF MACHINE LEARNING IN B. Timescales


DOMAIN OF PHYSICAL LAYER
The sheer idea that unique functions can also have very
The QoT estimate comprises calculating transmission specific durations during which monitored information
excellent metrics as OSNR, BER, Q-factor, CD, or PMD manifests visible and advantageous sample variations has
using measurements obtained directly from the subject using received little attention up to this point (e.g., growing old
optical overall performance monitor devices mounted at the would reason issue conduct to differ slowly over time,
receiver side and/or on the basis of mild direction whereas visitors varies shortly and at a spread of timescales,
characteristics. In order to detect flaws and malfunctions, QoT like burst, daily, weekly, and yearly).
estimate is frequently used in two scenarios: monitoring the
transmission quality of already-deployed light routes, and Community failure recovery is another exciting and
forecasting the transmission quality of new light paths using developing area for ML applications combined with SDN
data from already deployed ones. manipulation. Modern optical community management
systems are frequently set up as rule-based specialized
The whole size and most hyperlink size of the candidate mild systems, which is to say that they cover typical failure
path, the range of hyperlinks travelled, the extent of tourists to situations with a set of professional regulations (IF
be transferred, and therefore the modulation structure to be conditions> THEN actions >). Such rules are specialized and
used for transmission are amongst the weather the classifier predictable, often in the range of a few tens, and thus cannot
accepts as input. The classifier determines the particular account for all possible failure scenarios.
combos of routes and modulation codes that are most
altogether likelihood to satisfy the BER requirements. C. Data availability
Commercialization and standardized practices Even
Different ML algorithms and regulations are often utilized though it is just getting started, ML's us e of optical networking
hoping on the utilization instances and functions of interest, as has already caught the attention of vendors of optical tools and
we will see from the quality dialogue during this section. As a community operators, and it is anticipated that this interest
result, as proven in Fig. 10, For the next-generation optical will take an unexpected turn soon. We also see some things
networks, one may also imagine a transparent control plane that need to be done for low-margin optical community
with a number of ML algorithms and rules. The estimated planning, visitors prediction, anomaly detection, Error-aware
control plane in Fig. 10 will be in contrast to the network's rerouting, QoT estimate escalation for margin discount, and
"brain," which constantly converses with the "network body" additionally, standardization organizations have been looking
(i.e., a variety of components like transponders, amplifiers, at the application of ML to resolve networking challenges.
links, etc.), reacts to "stimuli" (i.e., statistics produced by the
network), and consists of out unique "actions" (i.e., course VI.CONCLUSION
computation, digital topology (re)configurations, accompany
the flow classification, etc In this study, to achieve a variety of applications, robust
DL algorithms were introduced in optical communication. In
V.DISCUSSION AND FUTURE DIRECTIONS order to execute channel estimation, mode demodulation,
optical signal analysis, impairment diagnosis, OPM, DSP, and
A.ML methodologies spectral analysis, CNN was utilized to investigate information
from image data, including LP mode, OAM mode, eye,
Ways to instruct information processing systems. We constellation, and ADTP, AAH, and spectrum diagrams. To
keep in mind that the vast majority of current research using perform signal pre-distortion and post-compensation, network
ML in optical networks relies on offline data, supervised traffic forecasting, and defect warning analysis, RNN was
learning methods, during which the ML algorithms are applied to handle sequential data, including digital signal
assumed to be familiar with historical records prior to being waveform, network traffic data, and equipment condition
used to accumulate large datasets under destructive characteristics. To reconsider traditional
operational conditions. Networks are typically presided and modeling approaches and enhances end-to-end learning
assisted by conventional sketch techniques that reduce the performance, a data-driven channel modeling scheme was
likelihood of F. (at the speed of community underutilization proposed. To guarantee that the training data were adequate
resources). and diverse, GAN was used to supplement picture data and
sequential data. In order to achieve self-configuration and
adaptive allocation of optical networks, DRL was finally
implemented. In future, it is anticipated that DL will continue

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 530


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

to make improvements in optical communication by enabling 19. J. Shanmugasundaram, G. Raichal, G. Dency Flora, P. Rajasekaran, and
V. Jeevanantham, “Classification of epileptic seizure using rotation
more intelligent and adaptive techniques. forest ensemble method with 1D-LBP feature extraction,” Materials
T oday: Proceedings, 2021.
REFERENCE

1. .H.Kaushal and G. Kaddoum, "Optical Communication in Space:


Challenges and Mitigation T echniques," in IEEE Communications
Surveys & T utorials, vol. 19, no. 1, pp. 57-96, Firstquarter 2017, doi:
10.1109/COMST .2016.2603518.
2. . J. . -P. Goedgebuer, P. Levy, L. Larger, C. . -C. Chen and W. T .
Rhodes, "Optical communication with synchronized hyperchaos
generated electrooptically," in IEEE Journal of Quantum Electronics,
vol. 38, no. 9, pp. 1178-1183, Sept. 2002, doi:
10.1109/JQE.2002.802025.
3. .El Naqa, Issam, and Martin J. Murphy. "What is machine learn ing?."
In machine learning in radiation oncology, pp. 3-11. Springer, Cham,
2015.
4. 4. Carbonell, Jaime G., Ryszard S. Michalski, and T om M. Mitchell.
"An overview of machine learning." Machine learning (1983): 3-23.
5. . Mitchell, T.M. and Mitchell, T.M., 1997. Machine learning (Vol. 1,
No. 9). New York: McGraw-hill.
6. . Z. Gong, P. Zhong and W. Hu, "Diversity in Machine Learning," in
IEEE Access, vol. 7, pp. 64323-64350, 2019, doi:
10.1109/ACCESS.2019.2917620.
7. F. Q. Lauzon, "An introduction to deep learning," 2012 11th
International Conference on Information Science, Signal Processing and
their Applications (ISSPA), 2012, pp. 1438 -1439, doi:
10.1109/ISSPA.2012.6310529.
8. X. Du, Y. Cai, S. Wang and L. Zhang, "Overview of deep learning,"
2016 31st Youth Academic Annual Conference of Chinese Association
of Automation (YAC), 2016, pp. 159-164, doi:
10.1109/YAC.2016.7804882.
9. . Schulz, H., Behnke, S. Deep Learning. KünstlIntell 26, 357–363
(2012). https://doi.org/10.1007/s13218-012-0198-z
10. Y. Xin et al., "Machine Learning and Deep Learning Methods for
Cybersecurity," in IEEE Access, vol. 6, pp. 35365-35381, 2018, doi:
10.1109/ACCESS.2018.2836950.
11. Janiesch, C., Zschech, P. & Heinrich, K. Machine learning and deep
learning. Electron Markets 31, 685–695 (2021).
https://doi.org/10.1007/s12525-021-00475-2
12. Baştanlar, Y., Özuysal, M. (2014). Introduction to Machine Learning.
In: Yousef, M., Allmer, J. (eds) miRNomics: MicroRNA Biology and
Computational Analysis. Methods in Molecular Biology, vol 1107.
Humana Press, Totowa, NJ. https://doi.org/10.1007/978-1-62703-748-
8_7
13. Janiesch, C., Zschech, P. & Heinrich, K. Machine learning and deep
learning. Electron Markets 31, 685–695 (2021).
https://doi.org/10.1007/s12525-021-00475-2
14. Khalighi, Mohammad Ali, and Murat Uysal. "Survey on free space
optical communication: A communication theory perspective." IEEE
communications surveys & tutorials 16, no. 4 (2014): 2231-2258.
15. Zibar, Darko, Molly Piels, Rasmus Jones, and Christian G. Schäeffer.
"Machine learning techniques in optical communication." Journal of
Lightwave T echnology 34, no. 6 (2015): 1442-1452.
16. Zibar, Darko, Molly Piels, Rasmus Jones, and Christian G. Schäeffer.
"Machine learning techniques in optical communication." Journal of
Lightwave T echnology 34, no. 6 (2015): 1442-1452.
17. N. Senthilkumar, M. Manimegalai, S. Karpakam, S. R. Ashokkumar,
and M. Premkumar, “Human action recognition based on spatial–
temporal relational model and LST M-CNN Framework,” Materials
T oday: Proceedings, 2021.
18. N. Senthilkumar, S. Karpakam, M. Gayathri Devi, R. Balakumaresan,
and P. Dhilipkumar, “Speech emotion recognition based on bi-
directional LST M architecture and deep belief networks,” Materials
T oday: Proceedings, 2021.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 531


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Spot Fire: An Intelligent Forest Fire Detection


System Design With Machine Learning
K. Revathi T. Tamilselvi R.Arunkumar
Associate Professor, Department of Associate Professor, Department of Assistant Professor, Department of
Computer Science and Engineering, Computer Science and Engineering, Computer Science and Engineering,
Panimalar Engineering College, Panimalar Engineering College, Rajalakshmi Institute of Technology,
Chennai, India Chennai, India Chennai, India
neyadharshini@gmail.com tamilselvime@gmail.com arunkumar.r@ritchennai.edu.in
T. Divya
Assistant Professor, Department of
Computer Science and Engineering,
Panimalar Engineering College,
Chennai, India
jothidivya97@gmail.com

Abstract— Wildfires do irreparable damage to forest and by common public. This makes every individual being
ecosystems and increase global warming by releasing carbon accountable for their actions towards the environment. In
dioxide and other pollutants into the atmosphere. As order to build the application, an effective sensing unit is
individuals breathe in excessive levels of pollution, the developed which monitors the environmental condition of
accompanying smoke and haze can travel great distances and the location and alert in case of fire. This is an example of
cause public health emergencies. Uncontrolled wildfires reactive mode of the application which serves upon
destroy property and natural tourist attractions, contaminate occurrence of the fire. In order to predict the futuristic trends
water supplies, and cripple economies every year, resulting in of fire pattern, machine learning algorithms are applied to
billions of dollars in economic harm. The predominant aim of
enable the application to act proactively.
this work is to preserve the environment and prevent forest
fire through monitoring the ambient conditions, mapping fire The beneficiaries of the application are classified into
prone zones. In order to do so, a sensory unit which is capable three groups:
of performing regular assessment of location is discussed.
Further appropriate machine learning model to ascertain the i) Government and Forest Officials
wildfire condition as early is investigated with great interest. ii) Fire Fighters who used to work on controlling the
spread of forest fire and
Keywords—Forest fire, Linear regression, Machine learning,
Principal component analysis, Wireless sensor networks iii) Common Public
In recent days, all are looking for mobile based
I. INTRODUCTION applications for its effective usage. On their mobile devices,
Globally, circumstances are now more prone to fire due the respective officials as subscribers get email and SMS
to climate change, forest degradation, and fragmentation. alerts. Additionally, the authorized user of the interactive
Fires, whether started by humans or by lightning, are more mapping on web portal design, one can pick and see fires
likely to spread over wider regions and burn at higher that happened during a certain time period using a time
temperatures in hotter and drier conditions. Forests that have slider, or they can overlay the data with other data, including
been damaged by logging, illness, and deforestation are also land-cover data, to determine the extent of the forest fire's
more prone to fire. devastation.
The statistical report on wildfire over the year 2021
published on January 13, 2022, states that India observed a II. RELATED WORK
count of 345,989 wildfires in the duration of November 2020 Zouiten Mohammed et al. [2] conducted a deep
to June 2021 [1]. This would be the highest reading so far for investigation on suitability of machine learning algorithms in
this time period in the nation. According to data presented in detecting wildfires. Researchers can use this algorithm to
the Rajya Sabha on December 16, 2021 by the minister of forecast forest fires and locate risk zones. By giving alerts
state for the union environment named Ashwini Kumar and presenting on maps based on geographical treatments for
Choubey, minimum of 258,480 wildfires were recorded in better effectiveness and scenario analysis, a system utilizing
2018–19, making them the second-highest thus far. Madhya machine learning algorithm on geo-data would be able to
Pradesh saw an increase in forest fires of 87.6% from 2017 signify the relevant parties and representatives in real time.
to 2021, whereas Maharashtra saw an increase of 13.4%. Rony Teguh [3] presented an application to use community
Forest fire risk can be decreased via prescribed burning, reporting via smartphones in order to identify the risk and
better infrastructure upkeep, awareness-raising and fire spread of fire in peat lands as early as feasible.
prevention education, and regulatory interventions like fire Smys et al. [4] investigated long range technology in
bans. Forest resilience to fire is increased through preventing detecting forest fire risky area through deployment of
deforestation and forest degradation. wireless sensor network to assess environmental changes and
The preliminary objective of the proposed system is to demonstrated its efficacy using simulator tool. Ali Khan et
bring real time applications on forest fire detection and al. [5] conducted a deep survey to reveal the significance of
control activities that easily accessible to respective officials machine learning in the process of assessing forest fire in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 532


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

advance. They proposed a transfer learning solution over aerial vehicles. For a variety of aerial photos, the method
VGG19 to achieve improved prediction accuracy as 95%. attained good accuracy.
The proposed model was evaluated against the machine
learning approaches like linear regression, k-nearest Peter Peinl et al. [13] detailed a Web application that the
neighbor, random forest, naïve bayes and SVM. Fulda University of Applied Sciences created and put into
use for the ASPires project. The programme increases the
Raghad K. Mohammed [6] applied deep neural network capabilities offered to Crisis Management Centers (CMC).
in order to predict forest fire patterns. Artificial Neural The CMC staff has access to real readings from sensors
Network (ANN) is widely exploited in the majority of placed in test locations, such as national parks, as well as
human endeavours in the current world. The authors images captured by cameras positioned on Unmanned Aerial
recommend using deep learning technology with transfer Vehicles (UAVs) or stationary observation towers in the
learning to extract aspects of wildfire, smoke pattern of fire vicinity of a real or simulated wildfire. Data are sent to the
and smoke quality. From the dataset, which consists a Aspires cloud and quickly delivered via an open interface to
number of 1,102 photos for each fire and smoke class, they the Web application.
employed an Inception-ResNet-v2 network that has already
been trained on the ImageNet dataset. The performance The following list provides the top most mobile
applications built in evaluating forest fire with ambient
metrics like classification accuracy, specificity, precision,
recall and F1-Score were all 99.09%, 100%, 98.08%, conditions over the smart phone.
99.09%, and 98.30%, respectively. • Fire Map
Seyd Teymoor Seydi et al. [7] introduced a deep learning • Wildfire Map
framework for detecting active fires from the burning
biomass, called Fire-Net, based on Landsat-8 images. For a • AFIS Wildfire Map
more accurate portrayal, the authors specifically combine the • Alert Cops
optical (Red, Green, and Blue) hues with thermal modalities
from the photos. Additionally, the network makes use of the • First Aid
residual based convolution network, allowing for the • Foc Control: Forest Fire Prevention
extraction of more detailed features from the sparse datasets.
Experimental results demonstrate robust detection of small • Fireguard Wildfire Tracker – Google Play Store
active flames and overall accuracy of 97.35 percent. For this • FireFringe – Google Play Store
study, images from forests in Amazon Rainforest, Australia,
Central Africa, Chernobyl (Ukraine), North America, and Each works for the specific purpose like locating fire in
where forest fires are frequently reported, were used. map, alerting respective personnel’s for corrective actions.
Here the proposed application will provide all the significant
Anupam Mittal et al. [8] in their article narrated the operations (education, monitoring, mapping, and alerting) as
impact on machine learning algorithms in detecting forest single application.
fire. They summarized the wireless sensor network for forest
fire detection also evaluated various machine learning
algorithms like ANN, decision trees and support vector III. PROPOSED MODEL FOR WILDFIRE DETECTION
machine (SVM). The SVM exhibited better performance in Researchers of interest in this domain strongly believed
predicting forest fire. Pragati et al. [9] developed an IoT that the continuous assessment of atmospheric changes helps
based sensory circuit to read environmental state and in diagnosing forest fire risk zones. In aligned with the
continuously assessed the same with the help of machine proposed system is to develop an effective model for regular
learning algorithm in detecting fire. To reduce false monitoring of the environmental condition and predicting the
prediction, decision tree is employed in this work. Sonal Sigh fire in advance with the help of a handy design of sensory
[10] developed a way for incorporating machine learning circuit which is cost effective and low energy model. It is
algorithm over color detection techniques to find wildfires planned to be implemented through various phases listed and
and notify authorities of their location. In addition to this, explained below.
knowledge of wildfire incidence and risks associated with it
is practiced. Soundarya Goski et al. [11] conveyed that due A. Sensing Hardware Design
to forest fires, carbon dioxide emissions are at an all-time
The Sensing Unit (SU) is constructed as a nearly
high. By increasing tree planting and making climate change
spherical form to withstand outside forces and with
a global priority, we may decrease wildfires. The
characteristics to guard against damage from the hard
accomplishment of this task will benefit from a dependable
circumstances present in tropical forests. The SU is used to
fire control system. Also executed an artificial intelligence
measure the following parameters: CO level, light intensity,
based framework to extract information on forest fire and act
temperature and humidity [14]. The SU is organized as three
accordingly.
layers. The lithium-ion battery is intended to be placed in the
Wonjae Lee et al. [12] developed an unmanned vehicle to uppermost layer, while the connection board,
control forest fire through detecting the wildfire of interest microcontroller, and voltage regulator are intended to be
with satellite images. Low temporal and spatial resolution of placed in the middle layer. The sensors mounted at bottom
satellite pictures prevents its utility for early wildfire layer as looking downward, also viable to observe the
identification. Unmanned aerial vehicles can deliver high aforementioned environmental variables. Thus SU is
definition photos for wildfire identification at a reasonable designed in a way to track atmospheric values in
cost. Deep convolutional neural networks were used to create coordination with a micro-controller, transceiver module,
a wildfire detection system that makes use of unmanned and power components. Batteries are utilized as the primary

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 533


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

power source and solar panels are used as the backup power take the transceiver's antenna outdoors. The rear side of the
source to deliver power to the sensor node as in Figure 1. SU is attached to the mounting brackets and supporters for
the node on the tree trunk.
In the proposed model, to compute forest fire index
(FRI), the land elevation, its cover, surface temperature, and
slope are accounted as the natural parameters, whereas the
proximity to settlements and roads are treated as the
anthropogenic factors. The FRI is expressed as shown in
Equation (1) as follows:
(a) (b) FRI   Wi  Ci (1)
Fig. 1 Design of sensing unit presenting a) Spherical Outlook and b)
Inertial Components of it (Source: Dampage et al.) Where Ci stands for various classes within each variable
and Wi is the relative weight of the variable. The process
To guard against the damaging impacts of weather flow of machine learning model for the proposed model is
elements including rain, strong gusts, and foreign items like illustrated in Figure 2 and elaborated in the following section
leaves, all of the sensors are permanently mounted looking B & C. The section B discusses the preprocessing and C
downward. A hole from the outside of the SU is intended to focuses classification algorithm.

Fig. 2. Process flow of the proposed model


6: Apply K-Means Clustering as follows:
B. Deploying pre-processing
6.1: Obtain the cluster centers as ―C‖
This phase is responsible for preparing the data for
analytics by eliminating the noisiness with appropriate 6.2: Compute the Euclidean Distance
techniques listed below: 6.3: Choose the pixels whose Euclidean distance is minimum
between the cluster and pixel.
• Filtering
6.4: Recalculate the new cluster center once the segregation is
The process attempts to clean and remove noisy completed for all the pixels using the following formula:
structures out of it by ignoring missing values from the
tabular dataset.
(2)
• Representation where vi is the new cluster center, xi is the Euclidean distance of pre
cluster center ci.
The formulated dataset for classification is prepared
via feature extraction. For effective feature extraction, a 6.5: Reprise the steps from 6.2 to 6.4 until a certain condition is met
variation of principal component analysis (PCA) named or simply for few number of iterations.
hierarchical clustering PCA (HCPCA) is planned to be
deployed and its generic algorithmic steps are captured in C. Algorithm for Forest Fire Detection
Table I as below. The variation displayed by dataset In this model, a novel classification technique is
components is shown by covariance, which is a square proposed by improving the random forest algorithm with
matrix. Covariance is calculated between two variables and linear in order to anticipate desired condition properly. The
is used to assess how the two variables fluctuate together. proposed classifier is hybridization of random forest with
TABLE I. FEATURE EXTRACTION USING HCPCA linear regression model. In random forests, accounting each
significant attributes, various decision trees is build. Based
1: Obtain the input in the form of m*n matrix on its error rate computed through out of bag (OOB) method,
2: Determine the covariance matrix the trees with less error rate are chosen for prediction. OOB
3: Derive the Eigen matrix and eigenvalues of the covariance matrix attempts to create bootstrap dataset from original. The
bootstrap dataset is composed by replacing samples in
4: Obtain a feature vector by selecting principal components original dataset i.e. adding some duplicates. However the
5: Formulate clusters of new dataset size of bootstrap dataset must be of original. The OOB
dataset is the resultant of difference between original

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 534


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

bootstrap dataset which is given in Equation (3). Further to D. Dataset Description


improve the classification accuracy, linear regression is To predict forest fire, the dataset named ―forestfires.csv‖
annotated in order to optimize the classification results which from kaggle is utilized in this work [15]. By using this one
are demonstrated in Equations (4) & (5). The Table II given
can calculate the burned area which is a resultant of forest
below contains the suggested algorithm's basic structure.
fire. It consists of thirteen (13) attributes covering
TABLE II. ALGORITHM TO DETECT FOREST FIRE
metrological data of land area, fuel and fire behavior
indices. The sample of dataset is provided in Table III.
1: Partition the dataset employing decision tree
There are three fuel moisture groupings, or codes, in the
1.1: For each significant features ∀a selected via Fire Weather Index (FWI) System. These are actually stands
HCPCA do for content of fuel moisture but are typically represented as
1.2: For each value x do unit less codes as a % of dry weight. The FWI system
1.3: Compose decision tree to yield output decision requires weather observational data to be captured from a
regular incident location and duration. In order to translate
trees namely DT1,DT2,…DTn
to moisture contents, they are really transformed each day as
2: Compute error rate through OOB part of the everyday or hourly computations.
ˆ
D DD (3) Under the cover of a forest canopy, fuel moisture of
forest litter fuels is represented by the Fine Fuel Moisture
Where D is the original dataset, D̂ is the bootstrap
dataset and D is the OOB dataset.
Code (FFMC). For shaded litter fuels, it is meant to
3:Optimize the decision tree by filtering attributes having approximate moisture conditions with a 16-hour time lag.
high scope (i.e., less error rate) with the linear The Duff Moisture Code (DMC), which has a scale of 0 to
regression model through formulas given in: 101, indicates the fuel moisture of organic matter that has
n decomposed beneath the litter. According to the system's
 g (n)  DT  n x
0
1 1  n2 x2    nn xn (4)
inventors, it mimics fuel moisture with a 15-day (or 360-
n hour) time interval. It is open to interpretation and unit less.
 g (0)  gain   wi xi (5)
n
0
The Drought Code (DC), resembling the Keetch-Byrum
0
Drought Index, characterizes deep soil drying and may offer
Where DT is the decision tree, ni is the feature vector,
insight into live fuel moisture stress. It provides an
xi is the training samples and wi is computed weight
approximation of the fuel moisture state with a time interval
reflecting the significant feature.
of 1272 hours, or 53 days. It has a maximum value of 1000
and has no units.
TABLE III. SAMPLE READINGS FROM DATASET

X Y month day FFMC DMC DC ISI temp RH wind rain area

7 5 Mar Fri 86.2 26.2 94.3 5.1 8.2 51 6.7 0.0 212.88
7 4 Oct Tue 90.6 35.4 669.1 6.7 18.0 33 0.9 0.0 278.53
7 4 Oct Sat 90.6 43.7 686.9 6.7 14.6 33 1.3 0.0 0.0
8 6 Mar Fri 91.7 33.3 77.5 9.0 8.3 97 4.0 0.2 746.28
8 6 Mar Sun 89.3 51.3 102.2 9.6 11.4 99 1.8 0.0 1090.84

The spread rate of fire is capture through Initial Spread


Index (ISI), which is one of the behavioural component of
wildfire. To estimate a spread potential, it incorporates
surface wind speed and fine deal fuel moisture. For
predicting fire behaviour, ISI is a crucial input.

E. Evaluation Results
To pinpoint the complete efficiency, the proposed
classifier is exercised on the above mentioned dataset. The
cross validation strategy used is 80:20. The proposed
machine learning model is implemented using R Fig. 3. Prediction of damage per month
programming. From the attributes, one can measure the And from the above graphic damages can be predicted
damages caused by the wildfire, attributed into five over months with the help of R programming in about 10 ms
classification labels namely low, moderate, high, very high and the following things are deduced:
and no damage and it is captured in Figure 3.
 August saw a majority of small (less than 1 hectare)
fires

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 535


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

 In just 3 months—august, July, and September—the the region of fire. The dataset chosen is prepared for
extremely substantial damages (>100 hectares) classification after completing the necessary pre-processing
occurred. tasks such as cleaning, noise removal and feature extraction.
Then deep learning algorithm which is combination of linear
The root mean squared error, or RMSE, is the statistic regression and random forest is exercised over the data in
used most frequently to assess the performance of linear order to predict fire patterns in advance. It gives the accuracy
regression models and the mathematical formula to compute as 98.76%. The error rate estimated by the model is found to
the same is given in Equation (6). be >0.5, which is accounted as ―good‖ model.
n In order to improve the proactive measure regarding the
(y i  yˆ i ) 2 fire region, the geographical dataset will be the best choice.
RMSE  i 1
(6) Further deep learning model can be implemented as a mobile
n application for its realization over the beneficiaries.

Where yi is the predicted result, ŷ i is the actual result and ACKNOWLEDGMENT


n is the total responses. The main goal is to evaluate how The author 1 is derived the concept, prepared the article
inaccurate/wrong the model's predictions are in relation to by implementing. The author 2 supervised and revised the
the actual values that were observed. A high RMSE is article upon her suggestions. The author 3 and 4 helped in
therefore ―bad‖ whereas a low RMSE is ―excellent‖. The implementation and edition.
residual in the formula is the distinction between the
observed and anticipated values. The average of all squared
residuals is known as the mean squared error (MSE). The REFERENCES
metric is then returned to the response variable scale by the
RMSE simply taking its square root. The graphic associated [1] Kiran Pandey, ―Forest Survey Report 2021: Forest fire counts up 2.7
with error rate is given in Figure 4. times‖, https://www.downtoearth.org.in/news/forests/forest-survey-
report-2021-forest-fire-counts-up-2-7-times-81123, Last accessed on
14th January 2022.
[2] Zouiten Mohammed, Chaaouan Hanae and Setti Larbi, ―Comparative
study on machine learning algorithms for early fire forest detection
system using geodata‖, International Journal of Electrical and
Computer Engineering (IJECE), vol.10, no.5, pp. 5507-5513, 2020.
[3] Rony Teguh, F. F. Adji, Benius and Mohammad Nur Aulia,
―Android mobile application for wildfire reporting and monitoring‖,
Bulletin of Electrical Engineering and Informatics, vol.10, no.6, pp.
3412- 3421, 2021.
[4] S. Smys and Jennifer S. Raj, ―Assessment of Fire Risk and Forest
Fires in Rural Areas Using Long Range Technology‖, Journal of
Electronics and Informatics, vol. 2, no. 1, pp. 38-48, 2020.
[5] Ali Khan, Bilal Hassan, Somaiya Khan Ramsha Ahmed and Adnan
Abuassba, ―DeepFire: A Novel Dataset and Deep Transfer Learning
Benchmark for Forest Fire Detection‖, Mobile Information Systems,
(a) pp. 1-14, 2022.
[6] R. K. Mohammed, ―A real-time forest fire and smoke detection
system using deep learning‖, International Journal of Nonlinear
Analysis and Applications‖, vol.13, no.1, pp. 2053-2063, 2022.
[7] Seyd Teymoor Seydi, Vahideh Saeidi, Bahareh Kalantar, Naonori
Ueda and Alfian Abdul Halin, ―Fire-Net: A Deep Learning
Framework for Active Forest Fire Detection‖, Journal of Sensors, pp.
1-14, 2022.
[8] Anupam Mittal, Geetika Sharma and Ruchi Aggarwal, ―Forest Fire
Detection Through Various Machine Learning Techniques using
Mobile Agent in WSN‖, International Research Journal of
Engineering and Technology (IRJET), vol.3, no.6, pp.702-706, 2016.
[9] Pragati, Sejal Shambhuwani and Piyusha Umbrajkar, ―Forest Fire
Detection Using Machine Learning‖, International Journal of
Advance Scientific Research and Engineering Trends, vol.4, no.12,
pp. 6-12, 2020.
[10] Sonal Singh, ―Color Detection Technique to Curb Forest Fire‖,
(b) International Journal of Engineering Research & Technology
(IJERT), vol.11, no.1, pp. 1-14, 2022.
Fig. 4. Efficiency plot presenting a) Observed vs. Predicted and b)
[11] Soundarya Goski, Shubhangi Shinde, Priyanka Kulkarni and S. M.
Residuals vs. Predicted
Patil, ―Forest Fire Detection Using Deep Learning and Image
The results clearly states that the proposed model Recognition‖, International Research Journal of Engineering and
Technology (IRJET), vol.9, no.5, pp. 1453-1455, 2022.
evaluated to have low error rate which lies in the range of
0.4-0.5 at most. [12] Wonjae Lee, Seonghyun Kim, Yong-Tae Lee, Hyun-Woo Lee and
Min Choi, ―Deep Neural Networks for Wild fire Detection with
Unmanned Aerial Vehicle‖, In Proc. of IEEE International
IV. CONCLUSION Conference on Consumer Electronics (ICCE), vol. 6, pp.1-6, 2017.
[13] Peter Peinl, Micha Heiderich, Ivan Chistov, Jugoslav Achkoski,
The work detailed a smart design of a sensing unit. The Nikola Kletnikov, Igorche Karafilovski, Nikola Manev, Rossy
calculation of the forest risk index (FRI) is used to ascertain Goleva, Alexander Savov, Ivelin Adreev and Angelin Nedelchev,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 536


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

―End-User Application for Early Forest Fire Detection and system using wireless sensor networks and machine learning‖,
Prevention‖, In Proc. of 14 Annual International Conference on Scientific Reports, vol. 12, Article no. 46, pp.1-11, 2022.
Computer Science and Education in Computer Science, pp. 1-19, [15] P. Cortez and A. Morais, ―A Data Mining Approach to Predict Forest
2018. Fires using Meteorological Data‖ In J. Neves, M. F. Santos and J.
[14] Udaya Dampage, Lumini Bandaranayake, Ridma Wanasinghe, Machado Eds., New Trends in Artificial Intelligence, Proceedings of
Kishanga Kottahachchi and Bathiya Jayasanka, ―Forest fire detection the 13th EPIA 2007 - Portuguese Conference on Artificial
Intelligence, December,Guimaraes, Portugal, pp. 512-523, 2007.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 537


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

PDF Malware Detection System based on Machine


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Learning Algorithm
Pruthvi Priya P M Dr. Hemavathi P
Computer Science and Engineering, Assistant Professor, Computer Science
(M.Tech Student) and Engineering,
Bangalore Institute of Technology Bangalore Institute Technology
Bangalore, India Bangalore, India
pruthvipriya.pm@gmail.com hemavathip@bit-bangalore.edu.in

Abstract—In this digital system, the data is transferred you may find business logic, links, buttons, form fields, audio,
through online in the several form. Safety measures are and video. The free Acrobat Reader tool makes it simple to
employed in critical places like healthcare, banks, etc. view PDF files on Windows or Mac OS, and they may be
Nowadays the application of machine learning for solving electronically signed. Many detection techniques, including
problems has increased. Adversarial examples are the learning-based, keyword-based, tree-based, and code-based
term used to describe such variations. Early research ones, have been developed to overcome the challenges posed
mostly concentrated on machine learning models for by PDF malware assaults. The primary method used by
image process after moved to other applications, such as malware authors to distribute malicious PDF documents is
JavaScript. JavaScript can be used to take advantage of
those for malware detection. Finding adversarial
vulnerabilities in PDF readers and web browsers.
examples for ML-based PDF malware detectors is the
part of work. Machine learning has apparently delivered A method known as generative adversarial networks is an
extraordinary and, in some cases, human-competitive intriguing new advancement in machine learning (GANs).
performance in classification tasks. Hackers can attack GANs, or generative models, create new data instances that
and extract the data easily. This proposed work has resemble your training data. GANs, for instance, are capable
considered generative adversarial networks (GANs) to build of producing visuals that resemble photos of human features
variant PDF malware without any problem that may be although when such pictures don't actually belong to any other
identified as benign by using several existing classifiers while living being. It has been demonstrated that even a small
preserving the original harmful behavior to address the amount of noise added to the initial input may easily fool the
challenge. Features extraction method, which includes special majority of frequently used neural networks into classifying
features derived from malicious PDF files, to quickly produce objects incorrectly. Surprisingly, the model has greater
an evasive variant PDF. The PDF GAN is used for the malware confidence in the incorrect forecast than it does in the true one
detection in PDF files. after introducing noise. This opponent occurs because most
machine learning methods only train from a tiny quantity of
Keywords— malware analysis, Portable Document Format data, a significant drawback that leaves them open to
(PDF), Generative Adversarial Network (GAN) overfitting. The translation between the source and the load is
I. INTRODUCTION also almost linear. Because the boundaries separating the
different classes are really constructed of linearity, even a
A number of safety-critical industries, such as healthcare, small alteration in a feature's position might result in incorrect
transportation, and aerospace, may currently utilize cyber data categorization.
physical systems (CPS) as a combination of the rapid
development of computer, networking, and sensor The three components of generative adversarial
technologies. Machine learning approaches have become networks (GANs) are as follows:
more widely used in recent years to address control and • Generative: To understand how data is produced using a
decision-making issues in a range of cyber-physical systems. probabilistic model, or generative model.
A cyber-physical system may classify items in a typical
application and then carry out operations depending on the • Adversarial: A model is trained in an adversarial
determined classification. It appears that machine learning has environment.
produced exceptional results for categorization tasks,
• Networks: For training purposes, deep neural networks
sometimes even matching human ability. Attackers can
are used as artificial intelligence (AI) systems.
quickly overcome these learning-based systems by
purposefully generating hostile situations or making small In GANs, both a generator and a discriminator are
modifications to the input data that result in incorrect present. The Generator creates samples of data in an effort
categorization during testing. to trick the Discriminator (such as an image, audio, etc.).
The Discriminator, on either hand, aims to distinguish
Our world is a PDF world. We are aware that utilizing
between authentic and fake samples. Since both the
PDFs allows you to do your most important tasks. We
Generators and the Discriminator are genetic algorithms,
developed the Portable Document Format, generally called as
they interact with one another throughout the training stage.
a PDF, to present and interchange documents uniformly
Each time the operations are performed, the Generator and
independent of software, hardware, or operating system. The
Discriminator get better at what they're doing.
PDF is now maintained by the International Standards
organization as an open platform (ISO). In PDF documents,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 538


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. RELATED WORK A new deep learning-based malicious PDF file detector
Using a visualisation tool created by Soon Heng Tan called MMPD may now be installed on mobile robots [14].
Mavric and Chai Kiat Yeo [1], the infection in PDF may be The system's hardware resources are being used judiciously in
viewed. Shellcode can be executed at any time once it has the interim, and performance has not significantly changed as
been saved in the computer's memory. Bytes in a file are a whole. Utilizing the fvGAN, Yuanzhang Li et al.[15] created
translated into pixels of various colours that resemble a two- adverse relevant features in the subspace that were later turned
dimensional heat map in the suggested online binary into instances of adversarial malware.
visualisation application. A human analyst can discern They [Velayati and Fard] [16] presented a novel MVL
between the existence of Js and – security in a PDF document technique that makes use of a number of feature sets and
by mapping several colour schemes. Using data mining supplementary data to identify files. M. Mimura [17] proposed
techniques, Samir G. Sayed and Mohamed Shawkey [2] a novel approach for detecting macro malware in a dataset
demonstrated a novel strategy for identifying phoney PDF with an asymmetric distribution. The models employed
files. The feature selection stage is used to choose the right include Doc2vec and Latent Semantic Indexing (LSI).
number of characteristics to extract from Pdf document in
order to obtain a high detection performance and a reduced Tajuddin Manhar Mohammed et al. [18] created a
false alarm with the least amount of computing cost. straightforward yet effective holistic technique based on
signal and statistical analysis of malware binaries to recognize
To determine whether vulnerabilities are exploited in the PDF malware [19].
pdf malware, Xin Zhou et al. [3] merged bioinformatics,
genetics, and the exploitable malware gene for pdf. Malware We looked into potential malware detection classifiers and
detection and classification are done using the PDF SR Gopaldinne et al. studied the file structure and operation
exploitable malware gene [4]. According to [5], Yun Feng and of PDF files [20][21]. Yuntao Wang [22] provided an
others, a method has been devised to automatically extract and explanation of how PDF files function. They devised a method
detect any potentially compromised personal data from a PDF to recognize malicious JavaScript-based documents. We were
document. able to identify more targets than with just the prior static
detection method thanks to the addition of de-obfuscation to
To help with comprehension of the variations in how these the static analysis.
two forms of JavaScript distribute keywords, Antoine Lemay
and Sylvain P. Leblanc [6] looked at the JavaScript code of III. METHODOLOGY
malicious and benign PDF files retrieved from VirusTotal
A. Overview
Intelligence. Through image processing, Andrew Corum et al.
[7] have suggested learning-based methods for detecting PDF In the existing models uses a binary display of PDFs to
infections. The PDF files are transformed utilizing image detect malware. The existing technique trains robust
visualization techniques into grayscale images. Then, utilizing classifiers for PDF malware that have robustness qualities that
the photos, a variety of visual traits of both dangerous as well can be verified. And illustrate a malware classifier's worst-
as non-malicious Pdf documents are retrieved. Finally, case behavior. Verified robustness properties are satisfied by
classification models for fresh PDF files are developed using the training classifiers.
learning techniques. Limitations of the existing system are: It is challenging to
Sushmetha, N. et al. [8] proposed a novice method that distinguish dangerous data from original data that looks
focuses on sanitising PDF files rather than identifying and similar. The PDF file's complex file structure makes it easier
removing dangerous PDFs. Based on a collection of malware for the harmful information to escape detection. Increase the
samples called Contagio Dump, sanitizes all potentially unlimited attackers' evasion cost. The current evasion tactics
harmful PDF samples without any false positives or negatives take a long time to collect each sample.
being found. N. Nissim and co-authors [9] have studied With the help of the GAN approach, the model can detect
vulnerabilities and malware delivery techniques with a similar malware by learning from a collection of train data and
scope. Sec-Lib assists large digital libraries in spotting phone producing data that has the same features.
PDF documents. A machine learning-based layer is used to
detect newly discovered malware, while a deterministic layer 1) Structure of PDF file
is used to identify known malware. A PDF document structure consists of four components,
as illustrated in Figure 1: the head, the content, cross-reference
H.-M. Sun et al. [10] proposed a methodology based on table and footer. A PDF file consists of seven-bit ASCII
the detection of malicious Open XML documents. This characters throughout, with the probable exception of some
framework's architecture is focused on the ideas of spots that could include binary data. The file's header contains
automation, adaptability, and customization. A brand-new the format version, such as % PDF-1.7. The body portion of
descriptive structure for the chosen documents. [11] Then, as the document contains the document's objects and data.
a unified system, we presented a two-tiered concept for
identifying bogus documents. The eight various types of items that a PDF can support. A
dictionary object has value pairs, as related to a names object,
S. C. Vitel et al. [12] explored and provided a method that which only has unique values. The given numbers used to
seeks to maximize detection rate while minimizing the amount identify things show whether they are the primary objects that
of false positives. In this cutting-edge area of research, make up dictionaries or the indirect objects. The mapping data
Hossain and Ayub [13] employed cutting-edge approaches to for arbitrary and direct access is maintained in a cross-
experimentally determine the best parameter selections for reference table, so an item can be located without needing to
such highly flexible algorithms. search the file. Remember that while rendering a PDF, readers

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 539


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

begin showing the information from the footer at the bottom file, contained material may cause memory spraying, allowing
of a file. malicious payloads to be executed. The PDF is a complex file
format, it is easy to embed any kind of file in a PDF document,
PDF file contains the contents which is no in display and attacker can include the malware code to PDF file.
format. A PDF file must first be transformed into an image Malware in PDF file can steal the data that present in the file.
(view) format before its contents can be displayed. To help
users discover a certain object more quickly, the trailer B. PDF-GAN
provides the offset number needed for the PDF reader to Two neural networks compete with one another in a
recognize the cross-reference table. Consider an example i.e., machine learning (ML) model known as a generative model
trailer << /Size 7 /Root 3 0 R >> startref 2006 %EOF. In this, (GAN) to produce predictions that are more accurate. GANs
the offset is 2006 bytes, ‘/Size’ indicates the number of items often work independently and gain knowledge via playing
in cross-reference table. The cross reference table contains all cooperative zero-sum games.
the objects which is in the file.
The discriminator and generator are the two genetic
algorithms that comprise a GAN. The discriminator is de-
convolutional neural network, whereas the generator is
convolutional neural network. The generator's goal is to
provide results that consumers could mistake for real data.
Finding out if the outputs it obtains were created purposefully
is the discriminator's goal.
Training a GAN has two parts:
• Part 1: When the Generators are not in use, the
discriminator is still being trained. The network only
experiences forward propagation during this period;
there isn't any back propagation. The Discriminator is
Fig. 1. PDF structure placed to the test to determine if it can accurately
recognize them as real after being trained on real data
The cross-reference flows object, an offsets to the cross- for n epochs. At this point, the Generator also trains the
reference table's starting (starting with the xref keyword), and Discriminator with fictitious data to see how well it can
the % EOF end-of-file marker are all found in the footer of a identify them as such.
PDF file.
• Part 2: The Generator is being instructed, but the
In the absence of a cross-reference stream, the footer is Discriminator isn't. We may use the expectations to
followed by the trailer term and a dictionary that contains the training the Generator and advance from the
information that would typically be in the dictionaries of the Discriminator's previous state once the Discriminator
cross-reference flow object: has been taught using the Generator's faked data.
• References to the catalogue, also referred to as the tree After a few iterations of the aforementioned process, the
structure's root object (/Root). bogus data is manually checked to see if it still seems
authentic. If the training seems appropriate, it is over; if not,
• The cross-reference table's size (/Size) indirect object it is allowed to continue for an a few epochs.
count.
C. Proposed system
• Additional optional details
For training the GAN model the dataset consists of
2) Types of malware in PDF file samples of 15000 files data. Which consists of the details of
PDF malware consists of three types of attacks, JavaScript PDF files such as object, end object, trailer, xref, pages,
attack, ActionScript attack and File-embedding attack. Each JavaScript, OpenAction, embedded files and etc.
of the three forms of PDF attack is explained.
By classification of malware would preclude PDF would
(1) JavaScript script that can be injected in one or more have a negative effect on PDF performance by preventing
objects is used in JavaScript-based attacks to exploit a GAN from accurately recognizing the structural distinctions
vulnerability. JavaScript is a source-compiled, interpreted from benign and malicious PDFs. GAN's The tree
language. This implies that the attacker must always provide representation may be used to generate a feature set. Every
the attack's source code. Attackers use intricate obfuscation of link between a base and a node is treated as a feature, together
the data to make it as tough to read as they can to offset this with its value. By converting features into dictionaries, the
disadvantage. feature abstraction is carried out (i.e., keys and values). Any
value of a text type was finally converted into the numerical
(2) ActionScript-based attacks leverage PDF files'
value 1, and any value submitted as a set of values is converted
capacity to read Flash content. To accomplish this,
into the array's average.
ActionScript code, including such storage damage or
corrupted file code, is generally incorporated in ShockWave The architecture of proposed PDF GAN model is shown
Flash. in the Fig. 2. A generator, discriminator, adversarial classifier,
and surrogate classifier compose the model. The generator and
(3) The ability of Adobe Reader to read and scan PDF file
discriminator receives the input data. The generator generates
which includes the information of other file types, such as
the data which is similar to original input data. The generated
pictures (such as bitmap or tiff) and fonts, makes file-
data is given as input to the classifier and discriminator. The
embedding assaults profitable (e.g., ttf). When viewing a PDF

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 540


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

discriminator compare the input data and generated data. The PDF file. The admin can login and view the details. The user
discriminator calculates a standard error on whether the has to select PDF file for malware detection in file. The Fig.3
manufactured data are comparable to the structure of the shows the home page for malware detection. Fig. 4 shows the
original input data after generator produces a PDF that closely user upload pdf file page. Fig. 5 and Fig. 6 are the results of
resembles the raw data. malware detection in pdf file.
The surrogate classifier converts the produced data into a The PDF GAN model is trained with dataset and it takes
prediction score, and the results are then utilized to train a the training time approximately 3 to 5 minutes. Finishes
classifier. Through the use of machine learning, the training surrogate PDF classifier in: 0:00:18. The evaluation/
classification collects additional learning and hardens against performance metrics of surrogate classifier are Accuracy:
unidentified characteristics. To produce a modified form of 0.9360 - Precision: 0.9376 - Recall: 0.9474 - F1Score: 0.9425.
the standard PDF with predicted outcomes that are the reverse
of the original PDF, the generator learn using original PDF.

Fig. 2. PDF GAN model Fig. 3. Home page

The discriminator and the classifiers each get the


generator output, which starts with the input x and produces
x'. Given an input of x, the surrogate classifier generates a
prediction score, whereas the discriminator generates the
probability that x = x'. While the generator's learning goal is
to lower the classifier's prediction score, the discriminator's
learned target to assess whether a produced PDF is in the
original form x. The classifier uses the generated data from
generator and prediction score from surrogate classifier. The
generator has to generate the data which is similar to input
data. The classifier compares the prediction score which is
used as labels and generated data and calculate the score
between them, until the score is low this process is repeated.
The PDF-GAN model is trained and the classification of Fig. 4. User upload PDF file page
malware is determined.
The GAN architecture is considered in the form of neural
networks similar to concept of visual representation learning.
100 epochs and 10% of the training dataset are used. Each
layer has a kernel size of 3 with a stride of 1 for the whole
network. The generator contains four levels, with the top layer
having 64 filters, the second layer having 32 filters, a third
layer having 16 filters, and the fourth layer having 8 filters.
Every layer uses batch normalization, with the exception of
the final layer, which uses ReLU for the activation function.
The first layer of a discriminator and classifier has n input size
filters, the second layer has n * 2, the third layer has n * 4, the
fourth layer has n * 8, and the fifth layer has n input feature
size filters. Tanh is employed as the objective function for
each layer when a sigmoid function is used, with the exception Fig. 5. User results for non malware file
of last layer. One layer network is utilised for surrogate
classifier.
IV. RESULTS
The proposed system offers a web-based visual user
interface. The Django framework, CSS, HTML, and Java
server are used to create the web pages. The administrator and
user interfaces are created. The user interface provides login
page for credentials, and after buttons for select and upload

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 541


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[10] H. -M. Sun, C. -E. Shen and C. -Y. Weng, "A Flexible Framework for
Malicious Open XML Document Detection based on APT Attacks,"
IEEE INFOCOM 2019 - IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), 2019, pp. 2005-
2006, doi: 10.1109/INFCOMW.2019.8845281.
[11] M. Yu et al., "A Unified Malicious Documents Detection Model Based
on Two Layers of Abstraction," 2019 IEEE 21st International
Conference on High Performance Computing and Communications;
IEEE 17th International Conference on Smart City; IEEE 5th
International Conference on Data Science and Systems
(HPCC/SmartCity/DSS), 2019, pp. 2317-2323, doi:
10.1109/HPCC/SmartCity/DSS.2019.00322.
[12] S. C. Vitel, G. Balan and D. B. Prelipcean, "Improving Detection of
Malicious Office Documents Using One-Side Classifiers," 2019 21st
International Symposium on Symbolic and Numeric Algorithms for
Scientific Computing (SYNASC), 2019, pp. 243-247, doi:
10.1109/SYNASC49474.2019.00041.
Fig. 6. User results for malware file [13] S. M. Hossain and M. A. Ayub, "Parameter Optimization of
Classification Techniques for PDF based Malware Detection," 2020
23rd International Conference on Computer and Information
V. CONCLUSION Technology (ICCIT), 2020, pp. 1-6, doi:
10.1109/ICCIT51783.2020.9392685.
In the proposed system, an approach to identifying
malware in PDF files has been developed using machine [14] Y. Cui, Y. Sun, J. Luo, Y. Huang, Y. Zhou and X. Li, "MMPD: A
Novel Malicious PDF File Detector for Mobile Robots," in IEEE
learning techniques. Following a strong feature selection step, Sensors Journal, doi: 10.1109/JSEN.2020.3029083.
the algorithm is created using a generative adversarial network [15] Yuanzhang Li, Yaxiao Wang, Ye Wang, Lishan Ke, Yu-an Tan, “A
methods. By using generative adversarial network method the feature-vector generative adversarial network for evading PDF
malware in PDF is classified. The classification step makes malware classifiers”, Information Sciences, Volume 523, 2020, Pages
use of the best characteristics picked during the feature 38-48, ISSN 0020-0255, https://doi.org/10.1016/j.ins.2020.02.075.
selection stage to determine whether or not the provided PDF [16] E. Velayati and S. M. Hazrati Fard, "PEDM: Pre-Ensemble Decision
file is harmful. In future, the implementation is applied to Making for Malware Identification and Web Files," 2020 6th
International Conference on Web Research (ICWR), 2020, pp. 33-37,
other format files such as documents, ppts, and others. doi: 10.1109/ICWR49608.2020.9122322.
REFERENCES [17] M. Mimura, "An Improved Method of Detecting Macro Malware on an
Imbalanced Dataset," in IEEE Access, vol. 8, pp. 204709-204717,
[1] S. H. T. Mavric and C. K. Yeo, "Online binary visualization for Pdf 2020, doi: 10.1109/ACCESS.2020.3037330.
documents," 2018 International Symposium on Consumer [18] T. M. Mohammed, L. Nataraj, S. Chikkagoudar, S. Chandrasekaran
Technologies (ISCT), 2018, pp. 18-21, doi: and B. S. Manjunath, "HAPSSA: Holistic Approach to PDF malware
10.1109/ISCE.2018.8408906. detection using Signal and Statistical Analysis," MILCOM 2021 - 2021
[2] S. G. Sayed and M. Shawkey, "Data Mining Based Strategy for IEEE Military Communications Conference (MILCOM), 2021, pp.
Detecting Malicious PDF Files," 2018 17th IEEE International 709-714, doi: 10.1109/MILCOM52596.2021.9653097.
Conference On Trust, Security And Privacy In Computing And [19] Chao Liu, Chenzhe Lou, Min Yu, S.M. Yiu, K.P. Chow, Gang Li,
Communications/ 12th IEEE International Conference On Big Data Jianguo Jiang, Weiqing Huang, A novel adversarial example detection
Science And Engineering (TrustCom/BigDataSE), 2018, pp. 661-667, method for malicious PDFs using multiple mutated classifiers,
doi: 10.1109/TrustCom/BigDataSE.2018.00097. Forensic Science International: Digital Investigation, Volume 38,
[3] X. Zhou, J. Pang, F. Liu, J. Wang, F. Yue and X. Liu, "Pdf Exploitable Supplement,2021, 301124, ISSN
Malware Analysis Based on Exploit Genes," 2018 12th IEEE 26662817,https://doi.org/10.1016/j.fsidi.2021.301124.
International Conference on Anti-counterfeiting, Security, and [20] S. R. Gopaldinne, H. Kaur, P. Kaur, G. Kaur and Madhuri, "Overview
Identification (ASID), 2018, pp. 16-20, doi: of PDF Malware Classifiers," 2021 2nd International Conference on
10.1109/ICASID.2018.8693126. Intelligent Engineering and Management (ICIEM), 2021, pp. 337-341,
[4] Vivekanandam, B. "Design an Adaptive Hybrid Approach for Genetic doi: 10.1109/ICIEM51511.2021.9445341.
Algorithm to Detect Effective Malware Detection in Android [21] Vinothkanna, Mr R. "A secure steganography creation algorithm for
Division." Journal of Ubiquitous Computing and Communication multiple file formats." Journal of Innovative Image Processing (JIIP)
Technologies 3, no. 2 (2021): 135-149. 1, no. 01 (2019): 20-30.
[5] Y. Feng, B. Liu, X. Cui, C. Liu, X. Kang and J. Su, "A Systematic [22] Y. Wang, "The De-Obfuscation Method in the Static Detection of
Method on PDF Privacy Leakage Issues," 2018 17th IEEE Malicious PDF Documents," 2021 7th Annual International
International Conference On Trust, Security And Privacy In Conference on Network and Information Systems for Computers
Computing And Communications/ 12th IEEE International Conference (ICNISC), 2021, pp. 44-47, doi: 10.1109/ICNISC54316.2021.00016.
On Big Data Science And Engineering (TrustCom/BigDataSE), 2018,
pp. 1020-1029, doi: 10.1109/TrustCom/BigDataSE.2018.00144.
[6] A. Lemay and S. P. Leblanc, "Is eval () Evil : A study of JavaScript in
PDF malware," 2018 13th International Conference on Malicious and
Unwanted Software (MALWARE), 2018, pp. 1-10, doi:
10.1109/MALWARE.2018.8659374.
[7] A. Corum, D. Jenkins and J. Zheng, "Robust PDF Malware Detection
with Image Visualization and Processing Techniques," 2019 2nd
International Conference on Data Intelligence and Security (ICDIS),
2019, pp. 108-114, doi: 10.1109/ICDIS.2019.00024.
[8] N. Sushmetha, N. Rai and M. Mehra, "PDF Sanitizer," 2019
Innovations in Power and Advanced Computing Technologies (i-
PACT), 2019, pp. 1-5, doi: 10.1109/i-PACT44901.2019.8959957.
[9] N. Nissim et al., "Sec-Lib: Protecting Scholarly Digital Libraries From
Infected Papers Using Active Machine Learning Framework," in IEEE
Access, vol. 7, pp. 110050-110073, 2019, doi:
10.1109/ACCESS.2019.2933197.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 542


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
A Deep Learning Approach to Analyze Diabetic
Retinopathy Lesions using Scant Data

Devendra Singh* Dinesh C. Dobhal Saurabh Pargaien


Department of Computer Science and Department of Computer Application, Department of Electronics and
Engineering Graphic Era University, Dehradun Communication Engineering
Graphic Era Hill University Uttarakhad, India Graphic Era Hill University, India
Bhimtal Campus, India dineshdobhal@gmail.com saurabhpargaien@gmail.com
devendrasuno@gmail.com

Amrita Verma Pargaien Janmejay Pant Himanshu Pant


College of Pharmacy Department of Computer Science and Department of Computer Science and
Graphic Era Hill University Engineering Engineering
Bhimtal, India Graphic Era Hill University Graphic Era Hill University
0309amrita@gmail.com Bhimtal Campus, India Bhimtal Campus, India
geujay2010@gmail.com himpant7@gmail.com

Abstract—One of the most dangerous effects of diabetes is methods divide data into two categories, DR and no DR.
diabetic retinopathy, which, if ignored, results in lifelong Convolutional neural networks (CNNs), a subtype of deep
blindness. Early detection, which is crucial for successful learning, have a long history of use in image processing and
treatment outcomes, is one of the key obstacles. Unfortunately, interpretation, especially in the field of medical imaging.
it takes a skilled human to accurately evaluate fundus images
to determine the exact diabetic retinopathy stage. Millions of
Network architectures created specifically for managing
people can benefit from the detecting step's simplification. The picture data were often established with practical
identification of diabetic retinopathy is one area where applications and outperformed other methods for difficult
convolutional neural networks (CNN) have been successfully tasks like handwritten character recognition in the 1970s [2-
utilized. Early detection may prevent the possibility of 3]. However, until many developments, including the
permanent and complete blindness. Therefore, an efficient creation of dropout and rectified linear units, as well as the
screening system is needed. We proposed a system that can concomitant increase in computing power via graphics
classify various stages of diabetic retinopathy to facilitate the processor units, neural networks weren't practicable for
screening process. more difficult image identification applications (GPUs) [4].
Keywords— Diabetic Retinopathy (DR), Confusion metrics,
Large CNNs are already being used to an astounding degree
Machine learning (ML), Deep Convolutional Networks, Transfer to solve extremely challenging picture identification jobs
Learning, Visual Geometry Group 16(VGG16), Visual Geometry involving numerous object classes. The annual ImageNet
Group 19(VGG19). and COCO competitions are only two examples of the many
cutting-edge image classification projects that use CNNs
nowadays [5-6].
I. INTRODUCTION
Diabetes-related retinal degeneration, or diabetic II. LITERATURE SURVEY
retinopathy, is also referred to as diabetic eye disease. When The test picture dataset is categorized using the training data
diabetes has been present for 20 years or longer, it can and labeled classes as the basis for supervised classification.
impact up to 80% of diabetics. Despite these alarming A training dataset with labeled classes is used to identify the
numbers, research suggests that at least 90% of these new categorized classes after extracting the features from the
instances might be avoided with good care and diligent pictures. The retrieved parameters for classification listed
monitoring of the eyes. The likelihood of developing the severity of the disorders associated with diabetic
diabetic retinopathy increases with the duration of a person's retinopathy.
diabetes. According to the International Diabetes Federation, Blood vessels in fundus images are automatically segmented
552 million people will have diabetes worldwide by 2030, by M. Melinscak et al. [7]. Blood vascular segmentation is
up from an estimated 366 million in 2011. accomplished using a deep max-pooling convolutional
Numerous features must be weighted and their locations neural network. For optimal precision, a 10-layer
determined to classify DR. Clinicians must spend a lot of architecture was used, however, small image patches were
time on this. Once taught, computers can classify data used in the process. For shrinking and reshaping the fundus
considerably more quickly, allowing them to assist images, preprocessing is included. It featured two extra fully
physicians in real-time classification. There has been an connected layers and two further fully convolutional and 4-
ongoing study in computer imaging on the effectiveness of max pooling layers for vascular segmentation. Additionally,
automated grading for DR, and the results are positive. the accuracy of this approach was around 0.94. Artificial
Support vector machines and k-NN classifiers, among other neural networks combined with preprocessing techniques
automated methods, have drawn a lot of interest in the were first used by Gardner et al [8]. as a screening tool for
detection of DR features [1]. Most of these categorization

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 543


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
diabeticDVD
retinopathy.
Part Number:From the sub-images,
CFP22CB5-DVD: this technique
ISBN: 978-1-6654-6083-5
extracted characteristics. Backpropagation neural networks
played a significant role in it. A collection of diabetes
features is included in the fundus photos, which are
compared to the fundus images used for ophthalmologist
screening. 93.1%, 91.7%, and 73.8%, respectively, of
exudates, arteries, and hemorrhages were detected.
For automatic detection and categorization, a unique two-
step hierarchical classification method was presented [9].
Algorithms like GMM, SVM, KNN, and AdaBoost are used
to separate lesions from non-lesions. Their list of the top 30
qualities includes things like the variance of the red and
Green channels, the object's ISAT, the main and minor axis
length, etc. The DREAM system attained 100% sensitivity.
Additionally, it was found that the range of each image's
average computation time for DR severity was 59.54 to 3.46
seconds. The overall feature reduction has an impact on the
average computation time.
The abnormalities discovered in the fundus photographs by
Jayakumar Lachure et al. [10] include retinal micro-
aneurysms, hemorrhages, exudates, and cotton wool patches.
using digital fundus images to find red and bright lesions.
Preprocessing includes finding microaneurysms using
morphological operations, and features are recovered for
classification, including GLCM and structural features.
Using 100% and 90% sensitivity, this SVM classifier was Fig. 1. Proposed machine learning pipeline
tuned.
3.1 Augmentation
In the color variability and contrast retinal pictures, Giraddi
et al. [11] detected exudates. Early detection classifiers for The fundus photos are gathered from several datasets and
SVM and KNN have undergone comparative examination. taken using various cameras, each with a different field of
For a smaller number of false positives, they extracted vision, clarity, blurriness, contrast, and image size.
texture features from GLCM. The SVM classifier and KNN Adjustments are performed to brightness, contrast, and
classifier eventually had true positive rates of roughly 83.4 image flipping in data augmentation. The open-access
and 92 percent, respectively. As a consequence, KNN beats Indian Diabetic Retinopathy Image Dataset (IDRID) is the
SVM for both texture and color features. first database of the Indian population [16]. We have
selected a subset of IDRID images which includes 282
The crucial concept of randomly dropping units and their images in four categories including 81 images for
connections during training is presented by Srivastava et al. microaneurysms (MA), 40 images for soft exudates (SE), 81
[12]. His work dramatically lowers overfitting and images for hard exudates (EX), and 80 images for
outperforms previous regularization methods. further hemorrhages (HE) as shown in table 1.
enhances neural network performance in areas such as
speech recognition, document categorization, and vision. Table 1 Dataset Description

The main goal is to segment the vessels, exudates, and other Severity Level Training Testing Total
methods [13] [14] [15] to identify the microaneurysm while
maximizing the accuracy rate. Additionally, adding Microaneurysms (MA) 54 27 81
additional preparation steps like a deblurring technique Soft Exudates (SE) 26 14 40
before detection, segmenting blood vessels, rotating cross
Hard Exudates (EX) 54 27 81
sections, mathematically simulating boosting light intensity,
Hemorrhages (HE) 53 27 80
and morphological restoration adds to the complexity.
3.2 Pre-processing
III. RESEARCH METHODOLOGY
The spatial data of the fundus photos was worked for the
deep convolutional neural network. Instead of working
directly with color images, grayscale representations are
frequently employed for extracting descriptors because
doing so simplifies the process and requires less
computational power. We have used the OpenCV python
library to convert color images to grayscale. Resizing the
photos is one of the main preparation stages. VGG16 and
VGG 19 pre-trained Deep Neural Networks use a default
input image size of 224x224 so we have to provide the
image to its default size for training.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 544


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5 the first two has a dense unit of 4096-layer
fins (one for each
3.3 VGG16 class). The soft-max layer is the last one. In all networks, the
fully connected layers have the same configuration. The
final classification layer forecasts the likelihood of each
class using softmax activation.

3.5 Inception v3

Inception-v3 is a convolutional neural network with 48


layers. A pre-trained version of the network that has been
trained on more than a million photographs is present in the
ImageNet database. [17]. Other deep learning methods have
been employed to recognize diabetic retinopathy [18] [19].
By changing the Inception designs from past versions,
Inception v3's main objective is to use less computational
power. Rethinking the Inception Architecture for Computer
Vision, a 2015 essay, made this suggestion. Inception
Networks (GoogleNet/Inception v1) have been
demonstrated to be more computationally effective than
VGGNet in terms of the number of parameters the network
generates and the effectiveness of the needed labor (memory
Fig. 2. VGG16 architecture
and other resources). When modifying an Inception
2014's ILSVR(Imagenet) competition was won using the Network, care must be taken to avoid losing the
convolution neural net (CNN) architecture VGG16. One of computational advantages. It becomes challenging to adapt
the best vision model architectures to date, according to an Inception network for different use cases because the new
many. The most distinctive feature of VGG16 is that, rather network's effectiveness is unclear. In an Inception v3 model,
than concentrating on having many hyper-parameters, they several network optimization strategies have been proposed
focused on using 3x3 filter stride-1 convolution layers and to relax the restrictions and make model adaption simpler.
consistently employed 2x2 filter stride-2 padding and max The methods include regularization, dimension reduction,
pool layers. Convolution and max pool layers are arranged factorized convolutions, and parallelized calculations.
in this manner continuously throughout the entire
architecture. Two fully connected layers (FC) are the result,
and a softmax is used as the output after that. The number IV. RESULTS
16 in VGG16 stands for the 16 layers with weights. This
network has over 138 million parameters, making it a Table 2: VGG-16 Confusion matrix using different
sizable network. techniques

3.4 VGG19 2 (a) Logistic Regression Classifier Confusion matrix

Fig. 3. VGG19 architecture [20]

This architecture primarily contains 3 types of layers: a


convolution layer to extract the feature from the image by
using a variety of filters, a max-pooling layer to reduce the 2 (b) Random Forest Classifier Confusion matrix
size of the image and to extract the feature from the feature
map produced by these filters present in the convolution
layer, a flatten layer to convert batches of feature maps into
1D tensors, and finally three fully-connected layers, where

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 545


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

2 (f) AdaBoost Classifier Confusion matrix


2 (c) Neural Network Classifier Confusion matrix

2 (d) SVM Classifier Confusion matrix

Table 3: Accuracy of the Test dataset

Table 2 (a-f) represents VGG-16 Confusion matrix using


different techniques and the results obtained from these
classifiers are summarized in table 3 that shows that if
2 (e) Gradient Boosting Classifier Confusion matrix VGG-16 is used as a feature extractor then logistic
regression achieved highest classification accuracy i.e. 90.4
as compared to other classifiers.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 546


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
Table DVD
4: Part
VGG-19 Confusion matrix
Number: CFP22CB5-DVD: using different
ISBN: 978-1-6654-6083-5
techniques

4 (a) Logistic Regression Classifier Confusion matrix 4 (d) SVM Classifier Confusion matrix

4 (b) Random Forest Classifier Confusion matrix 4 (e) Gradient Boosting Classifier Confusion matrix

4 (c) Neural Network Classifier Confusion matrix


4 (f) AdaBoost Classifier Confusion matrix

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 547


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
6 (c) Neural Network Classifier Confusion matrix

Table 5: Accuracy of the Test dataset

6 (d) SVM Classifier Confusion matrix

Table 4 (a-f) represents VGG-19 Confusion matrix using


different techniques and the results obtained from these
classifiers are summarized in table 5 that shows that if
VGG-19 is used as a feature extractor then logistic
regression achieved the highest classification accuracy i.e.
89.4 as compared to other classifiers.
Table 6: Inception v3 Confusion matrix using different
techniques
6 (a) Logistic Regression Classifier Confusion matrix

6 (e) Gradient Boosting Classifier Confusion matrix

6 (b) Random Forest Classifier Confusion matrix

6 (f) AdaBoost Classifier Confusion matrix

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 548


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
Table
DVD Part 7: Accuracy
Number: of the Test
CFP22CB5-DVD: dataset
ISBN: 978-1-6654-6083-5 learning,” in 2015 IEEE International Advance Computing
Conference (IACC), 2015, pp. 617–622.
[11] S.Giraddi, J Pujari, S.Seeri, “Identifying Abnormalities in the Retinal
Images using SVM Classifiers”, International Journal of Computer
Applications(0975-8887), Volume 111 – No.6,(2015)
[12] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R.
Salakhutdinov, “Dropout: A simple way to prevent neural networks
from overfitting,” J. Mach. Learn. Res., vol. 15, no. 56, pp. 1929–
1958, 2014.
[13] E. M. Shahin, T. E. Taha, W. Al-Nuaimy, S. El Rabaie, O. F. Zahran,
and F. E. A. El-Samie, “Automated detection of diabetic retinopathy
in blurred digital fundus images,” in 2012 8th International Computer
Engineering Conference (ICENCO), 2012, pp. 20–25.
[14] X. Chen, W. Bu, X. Wu, B. Dai, and Y. Teng, “A novel method for
automatic Hard Exudates detection in color retinal images,” in 2012
International Conference on Machine Learning and Cybernetics,
2012, vol. 3, pp. 1175–1181.
[15] V. Zeljkovic, M. Bojic, C. Tameze, and V. Valev, “Classification
Table 6 (a-f) represents Inception v3 Confusion matrix using algorithm of retina images of diabetic patients based on exudates
detection,” in 2012 International Conference on High Performance
different techniques and the results obtained from these Computing & Simulation (HPCS), 2012, pp. 167–173.
classifiers are summarized in table 7 that shows that if [16] P. Porwal et al., “Indian diabetic retinopathy image dataset (IDRiD):
Inception v3 is used as a feature extractor then the Neural A database for diabetic retinopathy screening research,” Data (Basel),
network achieved the highest classification accuracy i.e., vol. 3, no. 3, p. 25, 2018.
[17] “ImageNet,” Image-net.org. [Online]. Available: https://www.image-
89.7 as compared to other classifiers. net.org/. [Accessed: 08-Oct-2022].
[18] A. Sajan, K. Anamika, and M. S. M. Kurian, “Diabetic Retinopathy
Detection using Deep Learning,” Int. J. Eng. Res. Technol.
V. CONCLUSION AND FUTURE SCOPE (Ahmedabad), vol. 10, no. 4, 2022.
This research work has used three pre-trained models [19] M. Z. Atwany, A. H. Sahyoun, and M. Yaqub, “Deep learning
VGG16, VGG19, and Inception v3 to perform feature techniques for diabetic retinopathy classification: A survey,” IEEE
Access, vol. 10, pp. 28642–28655, 2022.
extraction. Then, Logistic Regression, Random Forest, [20] Constantin, Ibtissam, Joseph Constantin, and André Bigand. "On the
Neural Network, SVM, Gradient Boosting, and AdaBoost use of deep active semi-supervised learning for fast rendering in
classifiers are applied in the process of DR image global illumination." Journal of Imaging 6, no. 9 (2020): 91.
classification. VGG16 pre-trained model with Logistic
Regression classifier gives an accuracy of 90.4% which is
the highest accuracy as compared to other classifiers. So, we
selected the VGG16 pre-trained model as a feature extractor
with logistic regression as a classifier. Every time a new
image is fed to our proposed model, it will be classified with
an accuracy of 90.4%. To generalize our model, we will
increase the number of photos in the future.
REFERENCES
[1] M. R. K. Mookiah, U. R. Acharya, C. K. Chua, C. M. Lim, E. Y. K.
Ng, and A. Laude, “Computer-aided diagnosis of diabetic retinopathy:
a review,” Comput. Biol. Med., vol. 43, no. 12, pp. 2136–2155, 2013.
[2] K. Fukushima, “Neocognitron: a self organizing neural network
model for a mechanism of pattern recognition unaffected by shift in
position,” Biol. Cybern., vol. 36, no. 4, pp. 193–202, 1980.
[3] Y. Lecun et al., “Handwritten digit recognition with a back-
propagation network,” in Advances in Neural Information Processing
Systems (NIPS 1989), Denver, CO, Oxford, England: Morgan
Kaufmann, 1990.
[4] V. Nair and G. E. Hinton, “Rectified linear units improve restricted
Boltzmann machines,” Toronto.edu. [Online]. Available:
https://www.cs.toronto.edu/~fritz/absps/reluICML.pdf. [Accessed: 08-
Oct-2022].
[5] S. Ioffe and C. Szegedy, “Batch Normalization: Accelerating deep
network training by reducing internal covariate shift,” arXiv [cs.LG],
2015.
[6] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for
image recognition,” arXiv [cs.CV], 2015.
[7] M. Melinscak, P. Prentasic, and S. Loncaric, “Retinal vessel
segmentation using deep neural networks,” in Proceedings of the 10th
International Conference on Computer Vision Theory and
Applications, 2015.
[8] G. G. Gardner, D. Keating, T. H. Williamson, and A. T. Elliott,
“Automatic detection of diabetic retinopathy using an artificial neural
network: a screening tool,” Br. J. Ophthalmol., vol. 80, no. 11, pp.
940–944, 1996.
[9] S. Roychowdhury, D. D. Koozekanani, and K. K. Parhi, “DREAM:
diabetic retinopathy analysis using machine learning,” IEEE J.
Biomed. Health Inform., vol. 18, no. 5, pp. 1717–1728, 2014.
[10] J. Lachure, A. V. Deorankar, S. Lachure, S. Gupta, and R. Jadhav,
“Diabetic Retinopathy using morphological operations and machine

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 549


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Comparison of Machine Learning Algorithms for


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Pigment Epithelial Detachment Classification using


Shape and Curvature Features

T. M. Sheeba Dr. S. Albert Antony Raj Dr. M. Anand


Research Scholar, Associate Professor and Head, Assistant Professor,
Department of Computer Department of Computer Department of Networking and
Applications, Applications, Communications,
College of Science and Humanities, College of Science and Humanities, College of Engineering and
SRM Institute of Science and SRM Institute of Science and Technology,
Technology, Technology, SRM Institute of Science and
Kattankulathur, Chennai, India Kattankulathur, Chennai, India Technology,
E-mail: sheebamailbox@gmail.com E-mail: hod.dca.ktr@srmist.edu.in Kattankulathur, Chennai, India
E-mail: manandinbox@gmail.com

Abstract—In data mining and machine learning, feature


selection is a crucial research area. The objective of feature
selection is to solve the high dimensionality issue. In order to
acquire the highest performance subset of the unique features
without any change, it entails choosing the pertinent
characteristics and eliminating the unrelated, identical, and
noisy ones. This work compares the feature selection processes
used by K-Nearest Neighbor (KNN), Linear Discriminant
Analysis (LDA), Random Forest (RF), and Support Vector
Machine (SVM) and among other procedures. Random Forest
outperforms the other three methods in terms of performance,
precision, and computational efficiency.

Keywords— Feature Extraction, Feature Selection, Machine


Learning, Pigment Epithelial Detachment

I. INTRODUCTION
In machine learning, feature selection can result in good
learning outperformans, improved learning precision,
improved model interpretability and reduced computing
expense. The feature selection process is the main highlighting Fig. 1. Feature selection techniques
of this work, which offers a comprehensive and organised
outline of feature selection kinds, approaches, and techniques B. Wrapper Method
from both the data and algorithm viewpoints. The Wrapper methodology treats choosing feature sets as
To effectively reduce data, feature selection techniques a search issue in which several combinations are created,
can be employed in data pre-processing. This is helpful in assessed, and contrasted with one another. To assess a set of
locate precise data models. Many searching methods have features and provide model performance scores, a predictive
been suggested in the literature. Feature selection is mostly model is utilised. The classifier determines how well the
used for grouping, regression and classification problems. Wrapper technique performs. Based on the classification
findings, the best subset of features is chosen.
The machine learning processes are built upon the
beginning parts of current machine learning pipelines: feature
selection and feature extraction. The Fig. 1 shows various
feature selection techniques.
A. Filter Method
This approach filters features based on the dataset's
general properties , such as correlation with the dependent
variable. There is no predictive model used while using the
filter approach. When there are a lot of characteristics, this
strategy is usually quicker and more effective. prevents
overfitting, but occasionally may not choose the optimal
features.
Fig. 2. Filter method

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 550


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The authors of this study [11] intend to develop software


that de-noises the collected photos. Following feature
extraction from the GLCM matrix, these features were pre-
processed before being classified using the BP MLP classifier.
Local Binary Patterns were used as the texture feature by the
authors of this article [12]. They conducted their research and
used probabilistic neural networks (PNNs) for categorization.
They are processed using fuzzy binary pattern and fuzzy
colour histograms to extract the texture and colour attributes.
Additionally, Probabilistic Neural Networks are employed for
classification. This paper uses a genetic algorithm, number
[13]. The authors [14] developed the colour, form, and a
number of textural parameters, which are assessed from them.
Decision tree, KNN, and SVM are the classifiers in use. The
Fig. 3. Wrapper method Tangential Direction based technique is thought to be utilised
for segmentation by the authors of this study [15]. Then colour
C. Embedded Method
channels and histograms are produced. For classification
The feature selection method is incorporated into the learning purposes, KNN classifier is utilised. This research [16] divides
algorithm in embedded techniques. The decision tree the surface of the 3D model into fine, flat, and steep sections
algorithm is the most used embedded approach. Decision tree depending on its curvature.
algorithms divide the sample set into smaller subgroups and
choose a feature in each iterative phase of the tree growth The authors of this study [17] present various image
process. processing methods for identifying the type of sickness. It is
possible to restrict the limit the knowledge of pesticide used
II. LITERATURE REVIEW base on their quality and quantity. [18], [19] Every edge
The authors of this research [1], [2], [3] make use of point's curvature is calculated in computer science because
software that can identify the input image that matches it the corners are defined as edge points with the highest absolute
closest. Textural characteristics are used for this identification. curvature values. The original image's edges are first extracted
The best of these traits were chosen for classification after using the Canny edge detector, and then each edge point's
being evaluated on each leaf separately. There is no separate curvature is calculated using a nearby statistical approach.
classifier employed here, however this kind of feature
selection will yield better results. The favourable outcome
rates are noted at the end. With the aid of the shape feature, III. METHODOLOGY
the writers of this paper [4], [5], [6] determine which test The training photos were used to extract the form features.
image matches it the most. The shape's attributes include The photos with clever edge detection were used to extract the
things like aspect ratio, area, and perimeter. Later, SVM form features, and the GLCM matrix was used to recover the
classifier was employed for classification purposes. The remaining data. Now, the features of the test picture are
paper's authors [7] concentrate on the images' form calculated when a test image from test data is entered to
characteristics. Both dimensional and a-dimensional elements Matlab. A specific label was assigned to each type of image.
are included in the form features. And they employed the A message box identifying the name of the image will be
KNN classifier for classification. And it was discovered that displayed based on these labels generated by the classifiers.
the classifier accuracy would be higher if only the best set of Identification is done using classifiers like KNN, LDA,
features were taken into account. Random Forest, and SVM. Multiple hyper planes will be used
The authors of this study [8], [9] investigated software by the SVM for categorization. The Euclidean distance and
development with training data, pre-processing, picture the closest neighbours will also be determined by KNN.
segment, and feature extraction. The facial feature points are
located in this paper [10] by computing and examining the 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (1)
curvatures of pre-processed 3-D face profiles. The accuracy is also assessed from the confusion matrix
utilising the True Positive, True Negative, False Positive, and
False Negative values. The accuracy value is calculated by
adding the True Positive and True Negative values to the total
number of data points. Then a comparison is done between
them based on the accuracy levels that these classifiers
produce.
A. Image Acquisition
It is referred to as the act of obtaining an image from a
hardware based source, to process in image processing. It is
the major step in the workflow series because the process
cannot start without an image input. The captured image is
entirely unprocessed. In this paper we used the images, which
were acquired from an eye hospital. The fig. 6 shows sample
Fig. 4. Embedded method images.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 551


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Energy:
The energy of the grey image will be determined by adding
the squared elements of the GLCM matrix. Any image's
energy value will always fall between 0 and 1. A constant
picture will result in an energy value of 1. Another word that
replaces energy is uniformity.

𝐸𝑛𝑒𝑟𝑔𝑦 = ,
(P )2 (4)
Homogeneity:
There will be a specific link between the diagonal and
other GLCM elements. The concept of homogeneity denotes
this connection. The homogeneity value will never be more
than or equal to 1.

Entropy:
It denotes unpredictability and it is an example of a
statistical measure that can describe the texture of a picture.

𝐸𝑛𝑡𝑟𝑜𝑝𝑦 = ,
−ln(P )P (6)
Fig. 5. Proposed system
Mean:
When we look at an image, the mean tells us how intense
B. Feature Extraction each pixel is.
The feature extraction is the major step in image
𝑀𝑒𝑎𝑛 = ∑ , mP (7)
processing to apply it in machine learning. The shape features
are extracted from images using canny edge detection and Standard deviation:
other features are retrieved from the GLCM matrix produced
from the grey scale picture. These characteristics include It is a measurement that shows how an image's mean or
energy, contrast, eccentricity, major axis length, minor axis average has changed.
length, homogeneity, correlation, and energy. The best group
of features are taken into consideration rather than these entire SD = ∑ , P (m − μ) (8)
features in order to provide a good result.

C. Classifiers
SVM
A machine learning algorithm called the support vector
machine employs hyper planes to distinguish between each
class. The hyper planes are located precisely using the support
vectors.
LDA
Fig. 6. Image samples
Linear Discriminant Analysis (LDA): This technique finds
Contrast: a new feature space to assignment the data into while still
The contrast determine the intensity variance between each using a linear classification model [20]. The study has
pixel and each of its neighbours over the entire image. If we employed the default Scikit-learn working model with the svd
take a look at a stable image, its contrast value will be 0. This solver and 0.0001 tolerance rate.
disparity is also sometimes referred to as variance. KNN
𝐶𝑜𝑛𝑡𝑟𝑎𝑠𝑡 = ∑ , 𝑃 (𝑚 − 𝑛) (2) The k-nearest neighbor algorithm, or KNN, bases its
operation on the closest neighbours. Since the training data set
also has labels, ‘supervised KNN’ is taken into consideration.
Correlation: As a result, when the test image is applied, the label will be
determined base on the image's neighbours.
It is a measurement that determines how each pixel in a
complete image is connected to its neighbours. The Random Forest
correlation lies in the range of -1 to 1.
Random Forest is one of the supervised machine learning
( )( ) approach. Random forest is used for machine learning
𝐶𝑜𝑟𝑟𝑒𝑙𝑎𝑡𝑖𝑜𝑛 = (3) problems involving both classification and regression. This
,
approach is based on the ‘ensemble learning’ concept.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 552


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. FEATURE EXTRACTION Classifiers like KNN, SVM, LDA, and RF will identify the
labels for the sample images in accordance with the learned
A. Shape Feature: labels, and in response, a message box will be presented
Shape features are crucial because they offer a different indicating the image and the result is shown in Tables 1 and 2.
way to describe an object than by defining it in terms of its
most crucial properties and they minimise the quantity of When the features were pooled and tested, the Random
information that must be saved. The algorithm consists of Forest model outperformed the other three classifiers. Based
crest point categorization, crest lines tracing, and a curvature on a review of the literature, we discovered that past research
approximation technique. did not evaluate the RF model for the classification of PED
diseases. So, in addition to KNN, LDA, and SVM models, RF
B. Curvature Feature: was incorporated as one of the classifiers. In three separate
Curvature is any of a number of closely related geometric scenarios, the effectiveness of these classifier models was
notions in mathematics. The curvature, as the name implies, is assessed using the Shape and Curvature features. The results
the deviation of a curve or a surface from a straight line or a of our RF model were as follows: for binary classification, we
plane. were able to attain accuracy rates for shape and curvature
feature combinations of 84.67% and 82.78%, respectively.
V. RESULTS AND DISCUSSIONS Multi-class categorization also revealed 82.57% and 83.68%.
The Fig. 7 illustrates how the photographs have been In all binary and multi-class classifications, RF performed
appropriately resized to meet the requirements without losing better for shape features than any other examined
any information. These pictures are employed in additional classification model, and combining features improved
Processing. classification accuracy. According on our observations, this
classifier's major benefits are dimensionality reduction and
quicker execution. One of the most complex classification
techniques was the RF classifier. The fig. 10 shows the binary
class classification and fig. 11 shows the multi class
classification.

TABLE I. BINARY CLASS CLASSIFICATION

Accuracy Classifier models


Features
rate KNN LDA SVM RF
Fig. 7. Original Image Shape Accuracy 76.26 83.58 83.58 84.67
Fig. 8 displays the photos that have been grayscaled. The Curvature Accuracy 75.35 74.34 80.45 82.78
first conversion of the collected images to grey allows for the
calculation of the grey level co-occurrence matrix.

Fig. 8. Grayscale Image

The binary pictures are then created using the grayscale


photos. Binary graphics typically have two colours and are
typically black and white. These pictures have clever edge
detection. Fig. 9 displays the shape features that were taken
Fig. 10. Binary class classification
from these pictures.

TABLE II. MULTI CLASS CLASSIFICATION

Accuracy Classifier models


Features
rate KNN LDA SVM RF
Shape Accuracy 73.26 81.58 80.48 82.57
Curvature Accuracy 74.65 78.84 82.55 83.68

Fig. 9. Binary Image

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 553


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[11] B. T. Gunjan, Arpitam Chatterjee, “Study on the potential of combined


glcm features towards medicinal plant classification,”CIEC 2016.
[12] I. K. Yeni Herdiyeni, “Fusion of local binary patterns feature for
tropical medicinal plants identification,”ICACSIS 2013. [8] A. G. S. S.
P. Kelina Sahaya Rajesh, C. Kumaravelu, “Studies on identification of
medicinal plant variety based on nir spectroscopy using plant leaves,”
2013.
[13] R. A. Mohd Shamrie Sainin, “Feature selection for malaysian
medicinal plant leaf shape identification and classification,”ICCST
2014.
[14] L. R. Madhuri Bandara, “Texture dominant approach for identifying
ayurveda herbal species using flowers,” MERCon 2019.
[15] A. G. S. N. Krithika, “An individual grape leaf disease identification
using leaf skeletons and knn classification,”ICIIECS 2017.
[16] Kuansheng Zou, Zhaojun Zhang, Jianhua Zhang, “A 3D Model Feature
Extraction Method Using Curvature-based Shape Distribution”, 2015
Fig. 11. Multi Class Classification 12th International Conference on Fuzzy Systems and Knowledge
Discovery (FSKD).
[17] Nidhis, A.D.; Pardhu, C.N.V.; Reddy, K.C.; Deepa, K., “Cluster based
VI. CONCLUSION paddy leaf disease detection, classification and diagnosis in crop health
monitoring unit ,”Lecture Notes in Computational Vision and
The accuracy of classification may change depending on Biomechanics 2019.
the amount, quality, and feature combinations of the images. [18] Amrutha M Raghukumar, Gayathri Narayanan, “Comparison Of
In this work, we used four classification models to compare Machine Learning Algorithms For Detection Of Medicinal Plants”,
two fundamental features. Using shape and curvature feature- 978-1-7281-4889-2/20/$31.00 ©2020 IEEE.
based classification, we found that RF performed improved in [19] Ming Li , Jia-ZhuQ Wang , Ling-Ling Li , Cui-Hua Li, “Curvature
Statistic Comer Detection”, 978-1-4244-4543-1/09/$25.00 ©2009
binary as well as multiclass cases. To improve classification IEEE.
accuracy, classification model can be tested in the future with [20] H. Mandelkow, J. A. de Zwart, and J. H. Duyn, “Linear discriminant
varying image quality, quantity, and characteristics. Low analysis achieves high classification accuracy for the bold fmri
classification accuracy is a result of the large feature response to naturalistic movie stimuli,” Frontiers in human
dimension. Therefore, it is important to select feature neuroscience, vol. 10, p. 128, 2016.
combinations that offer the best performance using a
multilayer or hybrid classifier will help to increase
classification accuracy in a similar manner. The features were
extracted from the preprocessed retinal images and
categorised use KNN, LDA, SVM and RF classifiers
according to how the algorithm operates. The accuracy for RF
was obtained as the best feature selection model when
simulated with MATLAB R2019a.

REFERENCES
[1] Kdnuggets.com /2021/06/ feature selection-overview.html
[2] https://towardsdatascience.com/feature-selection-using-random-
forest-26d7b747597f
[3] R. V. A. G. T. Sathwik, R. Yasaswini, “Classification of selected
medicinal plant leaves using texture analysis,”4th ICCCNT - IEEE -
31661 ,Tiruchengode, India, July 4 -6, 2013.
[4] M. N. D Venkataraman, “Computer vision based feature extraction of
leaves for identification of medicinal values of plants,”ICCIC 2016.
[5] Vijayakumar, Dr T. "Selective Image Enhancement and Restoration for
Skin Cancer Identification", Journal of Innovative Image Processing 1,
no. 1 (2019): 1-10.
[6] Pandian, A. Pasumpon. "Identification and classification of cancer cells
using capsule network with pathological images." Journal of Artificial
Intelligence 1, no. 01 (2019): 37-44.
[7] C.-M. E. A. V. Ionel-Bujorel P av aloiu, Robert Ancuceanu, “Important
shape feature for romanian medicinal herb identification based on leaf
images”,E-Health and Bioengineering Conference (EHB), 2017.
[8] V. T. E. Sandeep Kumar, “Leaf feature based approach for automated
identification of medicinal plants,”ICCSP April 3-5, 2014.
[9] M. Anand and Dr. C. Jayakumari, “Study of retina image segmentation
algorithms from optical coherence tomography(OCT) images”, Jour of
Adv Research in Dynamical & Control Systems, Vol. 9, No. 4, pp. 125-
134, 2017.
[10] Lei Yunqi, Li Qingmin, Song Xiaobing, Shi Zhenxiang, Chen Dongjie,
“3D Face Hierarchical Recognition Based on Geometric and Curvature
Features”, 978-1-4244-5273-6/09/$26.00 ©2009 IEEE.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 554


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Deep Learning Network for Object Detection Under


the Poor Lighting Condition
Chethan L S1 , S. Uma Maheswari2 , Seeram Srinivasa Rao 3 , Naveen Mukkapati4 , C. S. Sundar Ganesh 5 , Ashok Kumar6
1
Computer Science and Engineering, PESITM, SHIMOGA, Shivamogga, Karnataka 577204, India,
chethan.ls@pestrust.edu.in
2
Department of Electronics and Communication Engineering, Easwari Engineering College, Chennai - 600089, Tamil
Nadu, India,umamaheswari.s@eec.srmrmp.edu.in
3
Department of Mechanical Engineering,KoneruLakshmaiah Education Foundation,Vaddeswaram 522302,Andhra
Pradesh, India,ssrao@kluniversity.in
4
Department of Computer Science and Engineering,RVR & JC College of Engineering,Guntur - 522019, Andhra
Pradesh, India,naveenkumar105@gmail.com
5
Department of Electrical and Electronics Engineering, Karpagam College of Engineering, Myleripalayam, Coimbatore
641032, Tamil Nadu, sundarganesh.cs@kce.ac.in
6
Department of Computer Science,BanasthaliVidyapith, Banasthali-304022,Rajasthan, India,kuashok@banasthali.in

Abstract— Object detection is a part of image processing I. INT RODUCT ION


that holds great importance in this modern world. To
locate things in images or videos, a computer vision
Image processing is a part of computer vision that
approach called object detection is utilized. To identify
holds a lot of importance in various applications. Generally,
items in both still photos and moving films, numerous
image processing means the analysis of patterns and aspects
algorithms and models have been created. One of the
of an image. Nowadays, object detection has become a key
main issues with such object detection algorithms is that
process of image processing. Generally, an image may
they struggle to accurately identify things in images with
consist of anything like a vehicle, an animal, or a human
poor lighting. This study tries to develop the best deep
being, and even a blurred shot. Object detection is a process
learning algorithm that can be used to predict items
where models developed using a certain algorithm predict
from photos with very little or no lighting to address this
the presence of a particular object or all the objects present
issue. For this,from GitHub, a dataset of images of
in the image. Various algorithms and models were
various objects, such as tables, cats, and dogs, has been
developed to detect objects from both images and videos.
compiled. After categorization, the collected dataset is
There are various types of object detection like face
examined using two factors. The images are then
prediction, object prediction, moving object prediction , etc.
preprocessed utilizing picture format conversion and
Many machine learning and deep learning models were
histogram equalization. Two different deep learning
found to be extremely effective in the prediction process.
models were produced by two different algorithms. The
However, these object prediction techniques also consist of
YOLO algorithm and the speedier RCNN algorithm are
their disadvantages. One of the major drawbacks of such
the two algorithms. The models are then trained and
object detection algorithms is that they cannot predict
evaluated using the preprocessed dataset. The
objects with very high accuracy when the images are not in
performance of the models during training and
the best lighting. To resolve this issue, this study aims the
validation is assessed using a metric called the AP score.
finding the best deep learning algorithm that can be used to
The YOLO algorithm has the better AP score overall,
predict objects from the images with very low or no
according to the analysis of the AP score. The YOLO is
lighting. For this purpose, two deep learning models were
once again determined to be superior when the findings
constructed and compared. The construction and
are displayed in a bar graph for easier understanding.
comparison of the two models are explained clearly in the
The YOLO algorithm's prediction results are also
upcoming chapters.
examined, and it is discovered that even under
conditions of extremely poor lighting, the algorithm can II. LIT ERAT URE SURVEY
correctly predict the presence of one or more objects.
Image processing is used in various fields like
Keywords— Image processing, object detection, deep medicine and defense. A study [1] by a team of researchers
learning models, data collection, AP score from China used image processing in the development of a
framework which is capable of classifying the magnetic
resonance images of the human spine. This framework can
be used as a preliminary test for various spine diseases. This
model is developed based on the algorithm named 3D graph
convolutional segmentation network. Experiments pro ved

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 555


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

that this model can provide great accuracy in the prediction object even in poor lighting. The models are then put to
of spinal injuries and diseases. Another study [2] by the test to determine which approach can be utilized to
researchers in China used image processing in the analysis identify objects in photographs with poor lighting and
of positron-emission tomography (PET) scan images. The brightness.
usage of non-linear descriptors increased the accuracy and
the efficiency of the model. In the end, the model provided IV. DAT A COLLECT ION AND PREPROCESSING
an accuracy value of 98%.
This chapter discusses the data collected and the
Object Detection is a part of image processing that preprocessing techniques used on the data.
is used in various applications. A study [3] uses object
detection in the detection of a vanishing point of a moving A. Data collection
object. This model was developed to help the analysis which
is done in the railway sector. This model is developed using The images used in this study are collected from a
the convolutional neural network algorithm. The researchers single database [9]. This dataset consists of various images
found that the usage of auxiliary data can visibly increase of everyday objects like tables, people, dogs, etc. These
the accuracy of the model. Another study[4] by a group of photographs have low or weak lighting making it tougher
researchers from the USA uses object detection in 3D for the image processing algorithms to detect objects. The
images. This analysis was done on panoramic LIDAR sample format of the data is shown in figure 1.
images and is used to predict pedestrians. This model uses
various technologies like gamma-ray analysis, analysis of
radiological data, etc. This model proved to predict the
presence with great accuracy.

The faster RCNN algorithm is already used in


various applications of object detection. A study [5] from
the researchers of Indonesia used this algorithm in the
modeling of night-time human occupancy. This study uses
various color spaces like RGB, CIEXYZ, CIELAB, etc. The
usage of various color spaces increased the accuracy of the
object prediction. Though the model is found to work well,
the accuracy level of the model is just 54% making it a weak Figure 1. Sample dataset
model. Another study[6] uses faster RCNN in the analysis
of CT images of lungs to predict tuberculosis. This study The class column in the table represents the type of
also uses another algorithm named U-net and found that the object. All the available objects are given a number and the
faster RCNN is better than the U-net algorithm in class is based on that number. In this study, the numbers of
tuberculosis detection. the objects are as follows. Table (1), People (2), Motorbike
(3), Dog (4), Cup(5), Chair(6), Bicycle(7), Boat(8),
The YOLO algorithm is found to be one of the Bottle(9), Bus(10), Car(11), Cat(12). The light column also
strongest algorithms in predicting the presence of objects. A consists of various values. They are the Low(1),
study [7] from a group of researchers from China used this Ambient(2), Object(3), Single(4), Weak(5), Strong(6),
algorithm in the development of a model which is capable of Screen(7), Window(8), Shadow(9), and Twilight(10). The
detecting smoking in public places. The researchers used the indoor or outdoor column consists of two values indoor and
YOLOv5 algorithm. The model can provide an accuracy of outdoor. The sample images from the dataset are shown in
95% by the end of the research. Another research [8] uses figure 2.
YOLO in the prediction of abnormal behavior in the crowd.
Just like the other research that uses YOLO, this study also
proved to have greater accuracy and precision in predicting
abnormalities in a crowd.

III. M AT ERIALS AND M ET HODS

A dataset of pictures of numerous objects,


including bikes and other bicycles, is gathered from
GitHub. Then, a few approaches are used to preprocess
this dataset. The preprocessed dataset is then divided into
testing, training, and validation portions. Two separate Figure 2. Sample images
deep algorithms will be used to create two deep learning
models. The faster RCNN and the YOLO algorithm were From figure 2, it can be seen that the images are
the two algorithms selected for this study. The taken in low or dull lighting. As mentioned before, the
preprocessed dataset is then used to train and evaluate the dataset consists of various images of various objects. The
models, allowing them to recognize the existence of an distribution of the images in the dataset is shown in figure 3.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 556


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 3. Distribution of object classes

Though different objects have different percentage, the distribution of the images based on the
percentages, all the percentages are more or less the same. lighting also plays a major role in this study. Thus, the
The object that is present the most is the dog and it has a images were categorized based on the lighting. The results
percentage of 11 and the least percentage is 7 which is the of this analysis are shown in figure 4.
amount of five different objects. Just like the object

Figure 4. Distribution of images based on lighting


From figure 4, it can be seen that the images with
low ambiance have a large part in the dataset and the images
C. Histogram Equalization
with shadows have a very small part.

A method for changing image intensities to


B. Image Format Conversion improve contrast is histogram equalization. This is achieved
by successfully extending the intensity range of the image
The images in the dataset are of the format RGB and spreading out the most common intensity levels [11].
which can be tough for the deep learning models to analyze. When the useful data of the image is represented by close
Thus, the images are converted into YUV format for easier contrast values, this strategy typically raises the total
and more effective analysis[10].This conversion is done to contrast of numerous photos.
directly manipulate the brightness of the image. A colour
image pipeline frequently uses the YUV colour model. As
opposed to a "direct" RGB representation, it allows for a
smaller bandwidth for the chrominance components when
encoding a colour image or video.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 557


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

D. Data split up Two distinct algorithms were used to create two deep
learning models. The two algorithms are the YOLO
The entire dataset has to be split into three parts – algorithm and the faster RCNN algorithm. The preprocessed
training, validation, and testing. The training and the dataset is then used to train and evaluate the models.The
validation together have 5890 images and the 1473 images performance of the models during training and validation is
are used for testing. analyzed based on a parameter called the AP score. The AP
score of both algorithms is shown in table 1.

V. CONST RUCT ION OF DEEP LEARNING M ODEL Table 1. AP score of both algorithm

Model AP AP50 AP75


A. Faster RCNN
Faster 28.7 51.4 26.2
Faster RCNN is the updated form of fast RCNN RCNN
which was developed in the year 2015. The sets of regions YOLO 30.8 60.7 28.6
are created using a region proposal method by faster R-
CNN. Faster R-CNN, also known as the region proposal
network, has an additional CNN for obtaining the regional Table 1 shows that at all three stages, the YOLO algorithm
proposal[12]. Since there is no need to continuously feed the outperforms the faster RCNN method in terms of AP score.
convolutional neural network 2000 region proposals, "Fast The outcomes are displayed as a bar graph for easier
R-CNN" is faster than R-CNN. Instead, a feature map is comprehension. In picture 5, this graph is displayed.
produced from the convolution operation, which is only
performed once per image. Because it has three completely
interconnected layers, it is more efficient[13].

B. YOLO

You Only Look Once, sometimes known as


YOLO, is one of the most widely used real-time object
identification systems. The term YOLO itself is self-
explanatory in that the algorithm only needs one scan to
provide great results. The usage of this algorithm reduces
the multiple-step process in the previous algorithms . Yolo
makes the final predictions with just one forward pass
across the network[14]. The main benefit of adopting
YOLO is its outstanding speed; it can process 45 frames per
second. This is one of the best object detection algorithms
and has demonstrated performance that is comparable to R-
CNN algorithms [15].
Figure 5. Performance of both algorithm
VI. RESULT AND DISCUSSION The YOLO method is more accurate than the faster RCNN
algorithm at detecting objects from photos with low or bad
A dataset consisting of images of various objects lighting, much like the tabular results and the bar graph
such as tables, cats, dogs , etc. is collected from GitHub. The indicate. Figure 6 displays the YOLO algorithm's expected
collected dataset is then classified and analyzed based on output.
two parameters. The parameters are the type of object and
the lighting of the image. The images are then preprocessed
using image format conversion and histogram equalization.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 558


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 6. Prediction of the YOLO algorithm

From figure 6, it can be seen that the YOLO lighting. This deep learning model can be integrated with
algorithm can accurately predict the presence of objects the surveillance cameras and it’ll be easier for it to predict
even in low lighting. It should also be noted that the some unknown or unusual presence without any human
algorithm can predict two different objects from a single interaction. This model can be upgraded and used in various
image. This figure acts as proof of the statement that the applications like security systems, image analysis in
YOLO algorithm is good in predicting the object from the industries, etc.
images with low lighting.

REFERENCE
VII. CONCLUSION [1] S. Pang et al., "SpineParseNet: Spine Parsing for Vo lumetric MR
Image by a T wo-Stage Segmentation Framework With Semantic
Image Representation," in IEEE Transactions on Medical Imaging, vol.
A dataset of pictures of diverse items, including 40, no. 1, pp. 262-273, Jan. 2021, doi: 10.1109/T MI.2020.3025087.
tables, cats, and dogs, is gathered from GitHub. Followin g [2] W. Yang et al., "Predicting CT Image From MRI Data T hrough
classification, two factors are used to examine the acquired Feature Matching With Learned Nonlinear Local Descriptors," in IEEE
T ransactions on Medical Imaging, vol. 37, no. 4, pp. 977 -987, April
dataset. The photos are then preprocessed using histogram 2018, doi: 10.1109/T MI.2018.2790962.
equalization and image format conversion. Two distinct [3] L. Xingxin, Z. Liqiang, Y. Zujun and W. Yanqin, "Adaptive auxiliary
algorithms were used to create two deep learning models. input extraction based on vanishing point detection for distant object
The two algorithms are the YOLO algorithm and the detection in high-resolution railway scene," 2019 14th IEEE
International Conference on Electronic Measurement & Instruments
quicker RCNN algorithm. The preprocessed dataset is then
(ICEMI), 2019, pp. 522-527, doi:
used to train and evaluate the models. Based on a measure 10.1109/ICEMI46757.2019.9101454.
known as the AP score, the performance of the models [4] M. R. Marshall et al., "3-D Object Tracking in Panoramic Video and
during training and validation is evaluated. After the LiDAR for Radiological Source–Object Attribution and Improved
Source Detection," in IEEE Transactions on Nuclear Science, vol. 68,
analysis of the AP score, it is found that the YOLO no. 2, pp. 189-202, Feb. 2021, doi: 10.1109/T NS.2020.304764 6.
algorithm has the better AP score in all aspects. For clearer [5] Y. H. Yeu, M. I. Shapiai, Z. H. Ismail and H. Fauzi, "Investigation on
understanding, the results are also plotted into a bar graph Different Color Spaces on Faster RCNN for Night -T ime Human
and again the YOLO is found to be better. The prediction Occupancy Modelling," 2019 IEEE 7th Conference on Systems,
Process and Control (ICSPC), 2019, pp. 118 -121, doi:
results of the YOLO algorithm are also analyzed and, in the 10.1109/ICSPC47137.2019.9068000.
end, it is found that the algorithm can accurately predict the [6] A. Yang, X. Jin and L. Li, "CT Images Recognition of Pulmonary
presence of one or more objects even with very poor T uberculosis Based on Improved Faster RCNN and U-Net," 2019 10th

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 559


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

International Conference on Information T echnology in Medicine and International Conference on Communication Systems and Network
Education (ITME), 2019, pp. 93-97, doi: 10.1109/ITME.2019.00032. T echnologies, 2011, pp. 597-600, doi: 10.1109/CSNT .2011.128.
[7] Y. Ma, J. Yang, Z. Li and Z. Ma, "YOLO-Cigarette: An effective [12] F. Yang, H. Yu, K. Silamut , R. J. Maude, S. Jaeger and S. Antani,
YOLO Network for outdoor smoking Real-time Object Detection," "Parasite Detection in T hick Blood Smears Based on Customized
2021 Ninth International Conference on Advanced Cloud and Big Data Faster-RCNN on Smartphones," 2019 IEEE Applied Imagery Pattern
(CBD), 2022, pp. 121-126, doi: 10.1109/CBD54617.2021.00029. Recognition Workshop (AIPR), 2019, pp. 1-4, doi:
[8] T . Zhou, L. Zheng, Y. Peng and R. Jiang, "A Survey of Research on 10.1109/AIPR47015.2019.9174565.
Crowd Abnormal Behavior Detection Algorithm Based on YOLO [13] X. Xiao and X. T ian, "Research on Reference T arget Detection of
Network," 2022 2nd International Conference on Consumer Deep Learning Framework Faster-RCNN," 2021 5th Annual
Electronics and Computer Engineering (ICCECE), 2022, pp. 783-786, International Conference on Data Science and Business Analytics
doi: 10.1109/ICCECE54139.2022.9712684. (ICDSBA), 2021, pp. 41-44, doi: 10.1109/ICDSBA53075.2021.00017.
[9] https://github.com/cs-chan/Exclusively-Dark-Image-Dataset [14] M. Mahendru and S. K. Dubey, "Real T ime Object Detection with
[10] T hang Minh Le, K. Akie, T. Hori, H. Hatae and H. Watanabe, "T hree Audio Feedback using Yolo vs. Yolo_v3," 2021 11th International
images blending engine supporting multicolor formats, various color Conference on Cloud Computing, Data Science & Engineering
depths with small-gate size and high-quality image for SOC design," (Confluence), 2021, pp. 734-740, doi:
2009 IEEE 8th International Conference on ASIC, 2009, pp. 187 -190, 10.1109/Confluence51648.2021.9377064.
doi: 10.1109/ASICON.2009.5351577. [15] Z. Li and J. Wang, "An improved algorithm for deep learning YOLO
[11] R. Chauhan and S. S. Bhadoria, "An Improved Image Contrast network based on Xilinx ZYNQ FPGA," 2020 International
Enhancement Based on Histogram Equalization and Brightness Conference on Culture-oriented Science & T echnology (ICCST), 2020,
Preserving Weight Clustering Histogram Equalization," 2011 pp. 447-451, doi: 10.1109/ICCST 50977.2020.00092.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 560


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ML based Parkinson’s Disease Identification using


Gait Parameters
Lokaiah Pullagura 1 , Nilofer Kittad 2 , G. Diwakar3 , V.Sathiya4 , Ashok Kumar5 , Mrutyunjaya S Yalawar6

1
Department of Computer Science & Engineering, Jain University, Ramanagara 562 112, Karnataka, India,
lokaiah75@gmail.com
2
Department of Computer Engineering, Cummins College of Engineering for women, Pune 411052,
Maharashtra, India, kittadnilofer@gmail.com
3
Department of Mechanical Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra
Pradesh 522302, India, diwakar4236@kluniversity.in
4
Department of Computer Science & Engineering, Panimalar Engineering College, Chennai, Tamil Nadu
600123, India, deviviji2000@yahoo.co.in
5
Department of Computer Science, Banasthali Vidyapith, Banasthali-304022, Rajasthan, India,
kuashok@banasthali.in
6
Department of Computer Science and Engineering, CMR Engineering College, Hyderabad 501401,
Telangana, India, muttusy@gmail.com

Abstract— Parkinson's disease (PD) is characterized by chronic healthcare expenses. Using the currently recognized criteria,
central nervous system deterioration. Tremor, stiffness, the diagnostic error rate [1] is close to 20%. Furthermore,
difficulty in movement and difficulty of walking are the most because PD symptoms fluctuate throughout the disease's
prominent symptoms in the initial stages. There is presently no
course, medication must be regularly changed. The
treatment for PD. Doctors often describe a variety of motor
symptoms to establish a diagnosis of PD. Traditional techniques worldwide PD burden has almost doubled in the previous 25
of diagnosis, on the other hand, may be susceptible to years [2], largely due to increased life expectancy and longer
inaccuracy since they rely on subjective assessment of illness duration. Roughly 10 million people across the world
movements that human eyes might find difficult to recognize. have PD. To make a clinical diagnosis of PD, both motor and
However, early non-motor indications of Parkinson's disease non-motor symptoms must be pres ent. The clinical diagnosis
can be subtle and caused by a wide range of health conditions of PD has lower accuracy of 74% if handled by non -
other than Parkinson's disease. As a result, early detection of specialists and 80% if handled by specialists; this is
Parkinson's disease is difficult because these symptoms are especially problematic in the earlier phase of the disease.
frequently ignored. In addition, there are no completely
Non-motor symptoms have recently been included in the
trustworthy diagnostic techniques available. To overcome the
problem, - Machine Learning (ML) approaches to gait data is
medical diagnostic criteria for PD proposed by the
proposed in this study. The process of solution contains five Movement Disorder Society. More diagnostic resources are
sections: 1) Genuine gait data is collected from standard needed, nevertheless, to ensure accuracy. Predicting fatality,
websites, 2) The collected data is processed to clean it, which sickness, injuries, and neurodegenerative illnesses makes gait
contains smoothing and outliers removal techniques, 3) The efficiency a universal health metric[3]. Gait impairments are
processed data is further given to the feature extraction common in PD and might appear early or develop over time.
technique to get important attributes, 4) The extracted features They may aid in the early detection of symptoms.
are applied on the ML models namely Naïve Bayes (NB), K- Furthermore, there is evidence that they are present in the
Nearest Neighbour (KNN) and Decision Tree (DT), 5) Finally,
prodromal phase and may be able to identify disease risk in
the model is validated using metrics to identify best ML model.
addition to the potential for unique PD phenotypes. Overall,
Keywords— Parkinson, Statistics, Smoothing, Outlier, this could pave the door for more customized therapies and
Machine Learning Model, Accuracy. scientific research. Mean gait characteristics include step
length, step velocity, step width, step duration, swing time,
and stance time, whereas dynamic gait characteristics include
I. INT RODUCT ION variability and asymmetry in these variables [4]. Based on
factor analysis, researchers established a complete
The clinical evaluation of a Parkinson's disease
conceptual gait model that organized these spatiotemporal
(PD) patient is the gold standard for both diagnosis and
tracking of disease progression.The lack of objective and gaits features into five domains (pace, rhythm, variability,
asymmetry, and postural control) in PD.
quantifiable biomarkers for diagnosis and symptom
monitoring results in significant direct and indirect

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 561


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Data from [5] healthy subjects' gait analysis was severe type of freezing and, as a res ult, falling was proven in
used to divide the gait cycle into four parts. Output from this study.
sixteen forces and three inertial measurement sensors on
every leg was used to compile the gait dataset. They II. M ET HODS AND TECHNIQUES
evaluated three classifiers utilizing these characteristics and
compared their results.Finally, by collecting important Physionet is mined for gait data. Information on
attributes from many sensors and utilizing an MLP classifier, both healthy individuals and people with PD was included in
a high level of accuracy may be maintained when the dataset. Therefore, we must process the collected data to
recognizing gait cycle phases. It has been proposed that make it suitable for subsequent processing. To clean up the
phase classification can be used to detect periodic stages of raw data, methods like smoothing and outlier detection are
the gait cycle in both healthy and PD patients.This paper's employed. This aids in achieving high categorization
[6] goal is to review the state of the art in ML and precision. The statistical techniques used in feature
DL methods for classifying PD. The most effective extraction isolate relevant characteristics in the final product.
categorization of PD was identified with the use of DL and Classification models are then used, following feature
ML techniques. A variety of categorization strategies find extraction. ML models such as DT, KNN, and NB are
fruitful deployment in their respective contexts.The precision implemented. After that, we use constructive metrics to
with which a ML classifier can divide data into categories. assess the ML models. This will aid in determining which
Among DLtechniques, the deep neural network has the model is superior for separating PD patients from healthy
highest accuracy (99.49%). According to the findings of individuals. Everything that goes into the process
numerous studies, AI looks to be evolving into a powerful
learning tool with considerable potential applications for data
scientists and neurologists.

In article [7], a linear classifier-based technique for


recognizing changes in gait phases across time was
described. The method is a generalization of rule- and
threshold-based event detection methods. Linear classifiers,
which are parametric models, require suitable values to
correctly categorize the gait phases. We show a modified
Support Vector Machine (SVM) and proceed to optimize
with a hybrid meta-heuristic technique combining a Genetic
Algorithm and a Simulated Annealing Algorithm to calculate
these less-than-ideal sets of values. The proposed solution
outperformed the threshold-based system while requiring the
user to be conversant with the specific qualities of the inertial
signal being processed.To classify gait problems due to two
major diseases, stroke and PD, from ground contact force
(GCF) data, an algorithmic approach is provided in the paper
[8]. The gait of a subject is jointly trained into 3 categories
(stroke, PD, and healthy) using the cutting-edge
ML technique of multi-task feature learning (MTFL). Use
information gathered from a study including human
participants, specifically five people with PD, three people
with stroke impairments, and three healthy people, to assess
the efficiency of the suggested approach. The ev aluation
demonstrates that the suggested method can successfully
differentiate between stroke and PD from normal gait. As a
bonus, the methodology aids in selecting crucial gait aspects,
which is useful for learning the distinguishing factors
between normal and abnormal gaits and developing
individualized therapies.The journal [9] describes a gait
study of 41 PD persons, both with and without FoG, while
they did a normal walk, a motor dual task, and a cognitive
test. Despite detailed statistical analysis of clinical,
demographic, geographical, and temporal data, no
statistically significant difference existed between PD
patients with and without FoG. As a result, we ran the spatial Fig. 1. PD identification steps
and temporal properties of the gait through a ML analysis
based on tree-based approaches. Because of the high levels III. COLLECT ION AND PROCESS OF DAT A
of precision and reliability, the results were encouraging. The
efficacy of utilizing ML to identify individuals with a mild This chapter discusses the collection of data and its
form of FoG who are at high risk of developing a more processing techniques.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 562


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
A. Data Collection a result, a smoothing technique must be used to remove the
inherent noise in the data. We used goodness -of-fit statistics
This study made use of an open-access gait dataset
to apply a single moving average to the data for both legs to
from Physionet [10]. This gait dataset was collected by three
determine the true meaning of the data. In both the
distinct groups of researchers at Israel's Tel-Aviv Sourasaky
Parkinson's disease and healthy data sets, small variances in
Medical Centre's Laboratory for Gait & Neurodynamics . The
the data are canceled out and useful information is recovered
gait dataset's three gait patterns are influenced by walking
using the moving average method [14]. It is a technique for
ona treadmill, on levelground, and with Rhythmic Auditory
analyzing data points by calculating their average (M). This
Simulation (RAS). Utilizing correlation-based
operation is repeated once again, and the next average of M
spatiotemporal components of gait data, this research will
numbers is computed.
enhance the early identification of PD. The count of 73
healthy volunteers and 93 PD patients provided data
An outlier is a data point that deviates significantly
regarding their gait. To evaluate the stride-to-stride
from a normal distribution's mean. To measure the
characteristics of PD subjects, the walking sequence was
divergence from the mean, a predetermined cutoff value,
acquired under three various situations.The ages, genders,
determined by a fixed factor of the standard deviation, is
and races of the willing volunteers who gave their gait data
utilized. To provide a relevant conclusion, our experimental
for the study are shown in Table 1. The distribution of
inquiry employs an outlier identification method on both sets
healthy and PD data used in this research is given in figure 2.
of data from the subjects.

IV. FEAT URE EXT RACT ION


Table 1.Demographics of Physionet data To begin with gait recognition, feature extraction is
necessary. By estimating the fluctuating amplitudes of
Group Subjects Male Female sixteen sensors, we conduct a statistical study of the gait
Dataset sequence of both healthy and PD subjects.When comparing
Ga (Yogev Healthy 18 10 8 the two groups' means, medians, and standard deviations
et al. 2005) shown in Figure 3, we see that the PD patient's sensor
PD 29 20 9 readings at 2 feet exhibit more variation in mean value than
[11] Patient those of the healthy patients. Because of the greater
Ju Healthy 26 12 14 variations in mean value, we use the median of the VGRF
(Hausdorff sensor data as a robust biomarker for PD
PD 29 16 13
et al. 2007) categorization.Figure 3 shows the feature extraction of data
Patient
[12] results using statistical methods.
Si (Toledo Healthy 29 18 11
et al.
PD 35 22 13
2005b) [13]
Patient

Fig. 3. Feature extraction result

V. CLASSIFICAT ION
This chapter deals with the classification model
employed in this research for PD detection.
Fig. 2. Demographics of Physionet data
A. NB
B. Data Process The NB Classifier [15] is among the most effective
The gait of PD patients and healthy participants is and straightforward classification methods. Depending on
measured experimentally over time using vertical force Bayesian Networks, whichisa pictorial representation of a
sensor readings. Random fluctuations affect the obtained collection of random variables and their dependent
time series signal. Two examples of preparatory processing relationships, this method is used.Bayesian Networks contain
used to gait data are area smoothing and outlier detection. As several effective inferences and learning mechanisms. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 563


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
only requirement is that the dataset's characteristics be C. DT
autonomous. Some relationships between the features in the
dataset have resulted via species evolution, albeit these Classifier generating systems are heavily used in
dependencies do not appear to be very substantial. For data mining. While there are other categorization methods in
classification, the NBtechnique is utilized since it assumes ML, this study focuses on the DT technique. Decision trees
that the properties of the input dataset are unrelated. This are well-known to be a powerful tool used in a variety of
method begins by assigning a probability value to every fields, including ML, image processing, and pattern
occurrence in the database. Following the provision of the identification [17]. Each DT compares a numerical feature
input data, the probability score of each patient's pattern is against a threshold value, and the model advances one step at
calculated. Consequently, we categorize the patterns a time. Constructing conceptual concepts is significantly
according to the probability allotted to them. The Nave easier than finding numerical weights for neural network
Bayes classifier is a straightforward probabilistic method that connections between nodes. Cluster analysis is where DT
uses Bayes' theorem and a tight independence constraint to excels. DT is also a popular categorization approach in data
make predictions. mining. Nodes and branches make up each tree. Each node in
the graph represents a set of features for a particular
The probability of input data with label is: classification job, and the values that these nodes might take
are determined by the related subsets. Because of its intuitive
( )
analysis and accuracy across multiple data sources, decision
( ) [1] trees have been widely used in a variety of scenarios.
The categorization of a sequence in a particular VI. RESULT S AND DISCUSSION
input data is determined by the class label with the highest
The ML model is trained and tested using the
conditional probability. metrics. The result of each model is plotted in figure 4. The
B. KNN below figure contains the information onthe confusion
matrix. The main elements in the matrix are TP, TN, FP, and
One of the most basic ML algorithms is the K FN. The True Positive is the abbreviation of TP and it is used
closest neighbor (KNN) approach. This algorithm determines to represent the number of PD data identified correctly, and
where samples belong in the broadest possible category of k True Negative is the abbreviation of TN and it is used to
nearest neighbors based on how they are distributed among represent the number of healthy subject data identified
their neighbors. It's safe to assume that K is a somewhat low correctly, Similarly the False Positive and False Negative are
positive integer. When k equals 1, the sample is simply the abbreviations of FP and FN. And it is the count of
assigned to the group consisting of its immediate neighbors. incorrect prediction of PD and healthy data by the ML
Numbers less than 10 can be used as K values to separate model. The three ML model’s confusion matrices are given.
related groups rather than combine them. The ideal K-values The TP is denoted by blue color, TN is denoted by cement,
are 3, 5, and 7. Since it is quick, nonparametric, and easy to FP is represented by green, and FN is implied by red. The TP
implement, the k-nearest neighbor method can be used in a and TN count is maximum and FP and FN counts are
wide variety of contexts. The KNN approach works well for minimum.
classification, but it takes a long time and requires trial and
error to determine the best k value. If you have some data,
you can use it to pick the optimum value for k [16]. Ask
increases, the impact of noise on the classification weakens,
but the line separating the classes becomes less distinct.

Fig. 4. Confusion matrix of ML model at the testing phase

The metrics like accuracy are first evaluated for ML


models like NB, KNN, and DT. The values achieved are
96.38%, 95.78%, and 93.37%. The highest specificity was
attained by NB as a value of 95.58% and the lowest value of
90.14% by DT. Next to specificity, sensitivity is taken, the
greater value is 96.93% which is the result of the NB model

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 564


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
and the lower value of 95.78% is the result of DT. Then the NB gives 96.93%, KNN produces 96.37%, and DT’s 94.3%.
maximum 96.93% and minimum 92.85% value of Positive All the above-mentioned details are given in table 2 and
Predictive Value (PPV) were produced by NB and DT. figure 5 is the graphical representation of the details. The
Similarly, the maximum 95.65% and minimum 94.11% metrics and their value are taken on the x and y-axis of the
value for Negative Predictive Value (NPV) was generated by graph in figure 5. The bar plot is used to visualize the data.
KNN and DT model. Then, precision is taken and the values The NB model’s values are represented in green color and
of 96.93%, 95.87%, and 92.85% are the outcome of NB, KNN’s by blue color, finally orange is sued for DT.
KNN, and DT. Finally, F1-score metrics are analyzed and

Table 2. Performance metrics of PD identification using ML model

Model Formula NB KNN DT

Accuracy 96.3855 95.7831 93.3735

Specificity 95.5882 94.2857 90.1408

Sensitivity 96.9388 96.875 95.7895

PPV 96.9388 95.8763 92.8571

NPV 95.5882 95.6522 94.1176

PRECISION 96.9388 95.8763 92.8571

F1-SCORE 96.9388 96.3731 94.3005

Fig. 5. Performance analysis of PD identification using ML model

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 565


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
VII. CONCLUSION [10]. Dataset accessed on 10 October 2019, ‘Gait in Parkinson’s Disease:
Available online:’, https://www.physionet.org/content/gaitpdb/1.0.0/
The inability to carry out daily tasks is one of the [11]. Yogev G, Giladi N, Peretz C, Springer S, Simon ES, Hausdorff JM.
many effects of PD, a progressive neurodegenerative disease “ Dual tasking, gait rhythmicity, and Parkinson's disease: which
of the brain. Various therapeutic signs, including motor and aspects of gait are attention demanding?” Eur J Neurosci, 2005, vol.
22, no. 5, pp. 1248-56. doi: 10.1111/j.1460-9568.2005.04298. PMID:
non-motor symptoms, are used by neurologists in confirming 16176368.
a PD diagnosis. Ratings of this nature heavily rely on the [12]. Hausdorff JM, Lowenthal J, Herman T , Gruendlinger L, Peretz C,
knowledge and practice of the medical professionals Giladi N. “ Rhythmic auditory stimulation modulates gait variability
involved, as well as being subjective and ineffective. in Parkinson's disease”, Eur J Neurosci. 2007, vol. 26, no. 8, pp.
2369-75. doi: 10.1111/j.1460-9568.2007.05810. PMID: 17953624.
Considering the importance of gait in determining a person's [13]. Frenkel-T oledo S, Giladi N, Peretz C, Herman T , Gruendlinger L,
mobility, it makes sense that it would be a useful biomarker Hausdorff JM. “ T readmill walking as an external pacemaker to
for identifying subjects as healthy or impaired by PD. This improve gait rhythm and stability in Parkinson's disease”. Mov
Disord. 2005, vol. 20, no. 9, pp. 1109-14. doi: 10.1002/mds.20507.
work aims to aid neurologists in their everyday PD diagn osis
PMID: 15929090.
by developing an automatic PD diagnosis assessment system [14]. Mullineaux, David & Irwin, Gareth. “ Error and anomaly detection for
based on an analysis of the gait patterns of healthy and PD intra-participant time-series data”. International Biomechanics, vol. 4,
participants using three different ML algorithms. This is pp. 28-35, 2017, doi: 10.1080/23335432.2017.1348913.
accomplished by compiling authentic gait data. Smoothing [15]. Paul Helman, Robert Veroff, R. Susan Atlas and Cheryl Willman “ A
Bayesian Network Classification Methodology for Gene Expression
and outlier removal methods are used to clean the gathered Data”, Journal of Computational Biology, vol. 11, no. 4, pp. 581-615.
data. Important characteristics are extracted from the doi:10.1089/cmb.2004.11.581, 2004.
processed data using a method called feature extraction. [16]. Campos, O. Guilherme Zimek, Arthur; Sander, Jörg; Campello,
After applying the retrieved features to the three ML models, Ricardo J. G. B.; Micenková, Barbora; Schubert, Erich; Assent, Ira;
Houle, Michael E. "On the evaluation of unsupervised outlier
At last, metrics are used to determine which ML model is the detection: measures, datasets, and an empirical study". Data Mining
most successful. By every metric, the NB mode is superior to and Knowledge Discovery, 2016, vol. 30, no. 4, pp. 891 927.
the other two models. When comparing NB and DT, the doi:10.1007/s10618-015- 0444-8. ISSN 1384-5810.
[17]. G. Stein, B. Chen, A. S. Wu, and K. A. Hua, “Decision tree classifier
former has a higher accuracy of 96.3855% and the latter has
for network intrusion detection with GA-based feature selection,” in
a lesser accuracy of 93.3735%. Proceedings of the 43rd annual Southeast regional conference, vol. 2,
2005, pp. 136–141, doi: 10.1145/1167253.1167288

REFERENCES
[1]. Rizzo G, Copetti M, Arcuti S, Martino D, Fontana A, Logroscino G.
“ Accuracy of clinical diagnosis of Parkinson disease: A systematic
review and meta-analysis”. Neurology. 2016, vol. 86, issue. 6, pp.
566-76. doi: 10.1212/WNL.0000000000002350.
[2]. Dorsey, E. R. et al. “ Global, regional, and national burden of
Parkinson’s disease 1990–2016: a systematic analysis for the Global
Burden of Disease Study”,T e Lancet Neurology, 2016, vol. 17, pp.
939–953, doi: 10.1016/S1474-4422(18)30295-3 (2018).
[3]. Lord S, Galna B, Rochester L. “ Moving forward on gait
measurement: toward a more refined approach”, Mov Disord. 2013,
vol. 28, no. 11, pp. 1534-43. doi: 10.1002/mds.25545. PMID:
24132841.
[4]. Lim, L. et al. “ Measuring gait and gait -related activities in
Parkinson’s patients own home environment: a reliability,
responsiveness and feasibility study”. Parkinsonism & related
disorders, vol. 11, pp. 19–24, 2005.
[5]. S. Krutaraniyom, K. Sengchuai, A. Booranawong and J.
Jaruenpunyasak, "Pilot Study on Gait Classification Using Machine
Learning," 2022 International Electrical Engineering Congress
(iEECON), 2022, pp. 1-4, doi:
10.1109/iEECON53204.2022.9741586.
[6]. I. Nissar, W. A. Mir, Izharuddin and T . A. Shaikh, "Machine
Learning Approaches for Detection and Diagnosis of Parkinson’s
Disease - A Review," 2021 7th International Conference on
Advanced Computing and Communication Systems (ICACCS), 2021,
pp. 898-905, doi: 10.1109/ICACCS51430.2021.9441885.
[7]. J. C. Pérez-Ibarra, A. A. G. Siqueira and H. I. Krebs, "Identification
of Gait Events in Healthy and Parkinson’s Disease Subjects Using
Inertial Sensors: A Supervised Learning Approach," in IEEE Sensors
Journal, vol. 20, no. 24, pp. 14984-14993, 15 Dec.15, 2020, doi:
10.1109/JSEN.2020.3011627.
[8]. I. Papavasileiou, W. Zhang, X. Wang, J. Bi, L. Zhang and S. Han,
"Classification of Neurological Gait Disorders Using Multi-task
Feature Learning," 2017 IEEE/ACM International Conference on
Connected Health: Applications, Systems and Engineering
T echnologies (CHASE), 2017, pp. 195-204, doi:
10.1109/CHASE.2017.78.
[9]. C. Ricciardi et al., "Classifying patients affected by Parkinson’s
disease into freezers or non-freezers through machine learning," 2020
IEEE International Symposium on Medical Measurements and
Applications (MeMeA), 2020, pp. 1-6, doi:
10.1109/MeMeA49120.2020.9137317.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 566


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Brief Analysis on Machine Learning Classifiers


for Intrusion Detection to Enhance Network Security
Spandana Mande1 Nandhakumar Chanumolu Kiran Ch Naga Priyanka4
School of Computer Science Ramachandran2 Kumar3 School of Computer Science
and Engineering, VIT-AP School of Computer Science School of Computer Science and Engineering, VIT-AP
University, Amaravati, and Engineering, VIT-AP and Engineering, VIT-AP University, Amaravati,
spandana.mande@gmail.co University, Amaravati, University, Amaravati, priyanka.chadalavada89@g
m nandhakumarr03@gmail.co mounikakiran.138@gmail.c mail.com
m om

Abstract Signature-based and anomaly-based detection systems are the


most common types of IDSs [2]. Anomaly behaviour
Network-based applications present new threats and character libraries and network data are used to develop
necessitate new security measures, which necessitate greater signature-based intrusion detection systems, such as Snort
attention to speed and accuracy. The rapid expansion of intrusion detection systems. Despite their excellent detection
malicious activity with the attacks poses substantial dangers rates, these IDS are difficult to spot when an attack is
to network security despite the numerous new security launched against a different network segment [3]. In order to
technologies that have been developed. Intrusion Detection detect intrusions, anomaly-based intrusion detection systems
Systems (IDS) are extensively relied upon by network build models based on typical network behaviour and detect
managers to catch these kinds of network intrusions in the anomalies that diverge from that behaviour are considered.
act. Detecting intrusions using machine learning is one of the For unknown anomalous behaviour, such IDSs have a high
most common ways, in which models are learned from data recognition efficiency but a low overall detection rate and a
to distinguish between regular and anomalous traffic. Despite high false alarm percentage [4].
the prevalence of machine learning methodologies, there
hasn't been much research into machine learning algorithms Monitoring network traffic with an IDS allows for the
for intrusion detection. When it comes to protecting sensitive identification of malicious activity. Intruders that bypass
information and systems, the Network Intrusion Detection security measures can be found and stopped in their tracks
System (NIDS) is a must-have model. If a NIDS detects more with this tool. Its major role is to monitor the network for any
threats than false alarms, it is considered to be a good tool for indications of intrusion and report them to the administrator
security. Intrusion detection systems that are able to adapt to [5]. The two primary types are anomaly detection and abuse
the ever-changing nature of network threats are built using detection. Preparation for signatures of known assaults forms
machine learning techniques. It's still unclear how effective the basis for abuse detection. While the FAR is low, the
and appropriate these machine learning approaches are for accuracy is low as well [6]. In theory, regular database
detecting advanced hostile attempts. In terms of accuracy, updates could fix this issue, but in practise, doing so would
precision, recall, and training time cost, this study analyses be impracticable and expensive. Therefore, techniques for
the most common machine learning classifier approaches for identifying abnormal behaviour have developed. Profiling
intrusion detection. Developers can use this comparison to user behaviour is the focus of anomaly detection [7]. An
help them select the best NIDS development method. anomaly is defined in this technique as a divergence from a
KDD99, CSE-CIC-IDS2018 and UNSW-NB15 datasets are predefined model of user activity.
used in the evaluation of the adopted basic machine learning
classifiers. Classifiers like Decision Tree (DT), Random
Forest, Support Vector Machine, Logistic Regression and K-
Nearest Neighbour (KNN) are tested in the experiments. The
classifiers working, limitations are briefly discussed in this
manuscript.
Keywords: Machine Learning, Intrusion Detection, Network
Security, Classifiers, Network Intrusion, Data Loss.
1. INTRODUCTION
Because of the rapid growth of the Internet, network security
is becoming an increasingly important topic. In the subject of
network security, the detection of anomalous behaviour is a
major concern [1]. Analysis of network data and detection of
anomalous network behaviours are performed by IDSs. Fig 1: Intrusion Detection System

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 567


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

There is a wide range of attacks on the network's content when working with the MalGenome dataset. The author has
because of the large volume of data; new invasions are proposed employing specific characteristics to improve the
occurring on a daily basis. Detecting intrusions is a necessary outcomes in the future. Network Intrusion Detection System
first step in preventing network data from being breached or (NIDS) was built by Khan et al. [4] using multiple machine
misused [8]. Numerous solutions have been devised in order learning classifiers. Tests on the various classifiers'
to protect the network from numerous invasions and performance were conducted using the NSL-KDD dataset.
malicious actions. There are several ways to safeguard a The Random Forest (RF) classifier surpasses all the others in
network from dynamic intrusions, but network intrusion this study. An accuracy rate of 97% is achieved as a result of
detection is one of the most promising solutions [9]. To this method. Although multiclass classifiers are needed, there
distinguish between intrusive and typical network activity, is still a need in the market.
the Intrusion Detection System classifies data into multiple
categories. Several ML approaches have been developed to Even though numerous taxonomies for IDSs have been
achieve effective and intelligent intrusion detection models. proposed, none has gained widespread acceptance. At now,
Only a handful of studies have looked at machine learning the two most popular models for detection are signature-
algorithms for detecting intrusions [10]. Over-fitting the based and anomaly-based models. A signature-based method,
model for a certain dataset can lead to inaccurate results also known as abuse detection, can be used to spot an
being provided by Machine Learning (ML) classifiers. Thus, intrusion. While signature-based intrusion detection systems
the findings are not easily generalizable and difficult to can spot most or all previously observed attacks [5], they fall
duplicate [11]. short when it comes to spotting novel or modified attacks.
Another method that works well for finding intrusions is
In this paper, we focus on providing a thorough analysis of anomaly detection. Many studies have focused on the
several machine learning techniques for intrusion detection application of anomaly detection to the fields of intrusion
[12]. It is our goal to analyse popular machine learning detection and computer security. Anomaly-based IDS
approaches in order to better understand how they perform in systems model typical system or network traffic behaviour,
real-world intrusion detection scenarios. Features, hyper and any divergence from this pattern that exceeds a threshold
parameter tuning sensitivity, and overall effect are all out of is flagged as suspicious. IDSs that rely on anomalies to detect
balance. It is important to consider all three of these aspects threats produce more false positives than signature-based
when employing ML techniques for intrusion detection. IDSs. Anomaly-based IDSs face serious challenges when it
Features are selected in such a way that a complex classifier comes to defining normal behaviour and figuring out how to
is avoided [13], which may over-fit the data [14]. A high represent it computationally in a system or network context
hyper parameter sensitivity suggests that it may be difficult to [6].
tune the detection system appropriately for other datasets, and
methods that manage the class imbalance problem better are Statistics-based anomaly-based IDS monitor regular network
more practical in practise for intrusion detection [15]. activity, such as bandwidth usage, protocol configurations
[7], and ports and devices connected to the network, and alert
IDS is designed to be constantly monitoring and analysing the administrator or end user when abnormal traffic is
network traffic and events so that the organization's security discovered. Time series and multivariate models are also
can be safeguarded and computers in the network may be subdivided into single and multivariate models, respectively.
discovered [16]. In order to keep the system safe from Univariate models, for example, use independent Gaussian
unwanted access, an IDS gathers data about the network random variables to describe each variable's permissible
environment, filters out unnecessary data, and then makes a range [8]. The correlation between two or more variables is
determination about whether or not the behaviour is normal taken into account in the multivariate model.
[17]. Despite the fact that a study of cloud-based network
intrusion detection [18] analysis can be obtained online, An intrusion detection model combining SVM and Extreme
machine learning-based intrusion detection research for Learning Machine (ELM) was presented by Nugroho et al.
multimedia platforms is scarce [19]. [11]. KDD 99 was used for the analysis. Using this proposed
model, the accuracy was 93 percent and the training time was
2. LITERATURE SURVEY significantly reduced. Only known assaults benefit from this
method, and novel attacks necessitate the use of more
Intrusion detection research is the focus of this section, which accurate classifiers. Sharma et al. [12] described an Artificial
aims to provide an overview. Many researchers have worked Neural Network-based trained system for detecting DDoS
on machine learning classifiers, and the following are only a attacks. With older datasets, the ANN achieved 92 percent
few of their accomplishments: In order to detect mobile accuracy; with updated datasets, the ANN achieved 94
malware Private, Otter et al. [2] used ML classifiers such as percent accuracy; Based on the dataset, the ANN model's
RF, J-48, Multilayer Perceptron (MLP), Naïve Bayes (NB) accuracy can be improved. As a result, there is a pressing
and K Nearest Neighbour (KNN). The evaluation was need for an accurate and comprehensive dataset.
conducted with the aid of Weka Tool. ML classifiers were
tested for accuracy using a variety of performance metrics, An IDS adaptive design based on Extreme Learning
including the True Positive Rate (TPR) and False Positive Machines was discussed by Meneghello et al. [14]. The
Rate (FPR), precision, recall, and the f-measure. RF evaluation used the NSL-KDD dataset. A satisfactory
Classifier was able to achieve an accuracy of 99.99 percent percentage of detection and false positives were discovered

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 568


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for innovative and well-known assaults. Suragala et al. [17] models, cannot be applied to train deep networks. Thus,
proposed an intrusion detection PSO-FLN classifier. To ANNs are classified as shallow models, as opposed to the
ensure the accuracy of the findings, they were cross-validated deep models.
against the KDD99 benchmark dataset. In terms of accuracy,
PSO-FLN outperforms ELM and FLN classifiers. There are a
few classes that don't work with this method, such as R2L. 3.1 Support Vector Machine
According to the review of the literature, the majority of
studies have relied on older datasets for validation. A lack of In Support Vector Machine (SVM), the goal is to locate a
fresh threats and an imbalance in network audit data are the hyperplane with a maximum margin of separation in the n-
main drawbacks of these datasets. ML classifiers may be dimensional feature space. Because the separation hyperplane
trained incorrectly if they are trained on data that is not is only influenced by a limited number of support vectors,
evenly distributed. It is possible to detect new assaults using SVMs can produce satisfying results even with short training
the newly created dataset. When compared to other sets. SVMs, on the other hand, are susceptible to noise in the
classifiers, the RF classifier produces superior results. Multi- vicinity of the hyperplane. It is possible to use SVMs to
classification still needs more attention, despite the fact that tackle linear problems. Kernel functions are commonly
binary classification has received a lot of attention. utilised when dealing with nonlinear data. It is possible to
split the original nonlinear data using a kernel function,
3. MACHINE LEARNING CLASSIFIERS FOR which transforms the original space into a different space.
INTRUSION DETECTION SVMs and other machine learning algorithms are full with
Supervised and unsupervised learning are the two most kernel trickery.
common methods of machine learning. Labelled data is 3.2 K-Nearest Neighbour
essential for supervised learning. Even though data labelling
by hand is time consuming and expensive in supervised The manifold theory is at the heart of K-Nearest Neighbour
learning, it is the most used method in IDS. Unsupervised (KNN). It is more likely that a sample will belong to a class if
learning approaches, on the other hand, tend to perform most of its neighbours do as well. This means that the
worse at detection than supervised learning methods. Figure 2 classification result is only influenced by the top-k nearest
depicts the most prevalent machine learning techniques used neighbours. The KNN model's performance is highly
in IDSs. NSK-KDD dataset is considered for analysis. NSL- influenced by the parameter k. Overfitting is more likely
KDD is an alternative data set proposed to address when k is small, because the model becomes more complex
shortcomings in the original KDD'99 dataset. Due to the ask gets smaller. To the contrary, the more complex the
scarcity of publicly available data sets for network-based model is, and thus the worse its fitting ability. First, all of the
IDSs, we believe the updated KDD data set can serve as a training data is stored in this lazy learning method. This data
useful benchmark for comparing the performance of various is used during categorization to look for correlations between
IDSs. However, the data set still has some of the issues raised the incoming data and the existing data. Data is sorted into
by McHugh and may not be an accurate representation of categories based on how similar they are to previously
actual networks. collected data. Euclidean distance is used to calculate it.
Using K-nearest neighbours, the test data is assigned to a
class. Accuracy may improve if K is raised higher. However,
it is more commonly used for classifying data rather than
regression.
3.3 Naïve Bayes
Naïve Bayes is based on the notion of attribute independence
and conditional probability. Conditional probabilities for
different classes are calculated for each sample by the Naive
Bayes classifier. It is determined that the sample falls into
class MOP (maximum probability). For both two-class and
multi-class classification issues, this algorithm can be
Fig: 2 Various Machine Learning Methods employed. Probabilities of every characteristic relating to a
class are employed for prediction. Furthermore, it assumes
An Artificial Neural Network (ANN) is designed to replicate that each feature's chance of belonging to a specific class
the way the human brain functions. Many hidden and output value is unaffected by the probability of other features.
layers are found in the architecture of neural networks. The Probability is referred to as conditional probabilities, when
units in neighbouring strata are completely interconnected. the feature's value is already known. Each class's probability
Since an ANN may potentially approximate any function of an instance can be calculated, and then the best class value
with a large number of units, it has a high capacity for fitting, can be chosen. The formula for calculating the conditional
especially for nonlinear functions. Training ANNs takes a probability is
long time because of their intricate model structure. In
addition, backpropagation, the algorithm used to train ANN

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 569


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

𝑛
cluster. Distance is used as a similarity criterion in the K-
𝑃(𝑋 = 𝑥|𝑌 = 𝑐𝑘) = ∏ 𝑃(𝑋 (𝑖) = 𝑥 (𝑖) |𝑌 = 𝑐𝑘) means algorithm. If the distance between two data elements
𝑖=1 is low enough, they are more likely than not to be clustered
together in the same location. When dealing with nonconvex
The Nave Bayes method reaches its optimal result when the
data, the K-means algorithm performs poorly. The
attribute independent hypothesis is met. Nave Bayes does not
initialization condition and parameter K are also important to
function well on attribute-related information with Logistic
the K-means algorithm. It is therefore necessary to conduct a
Regression because it cannot satisfy that hypothesis in reality.
large number of experiments before determining an
A logarithm linear model, such as the LR, uses a parametric
appropriate parameter value.
logistic distribution to calculate the probability of various
classes, as 3.7 Logistic Regression
𝑤𝑘 ∗𝑥
𝑒 Predictive models produced utilising this method have the
𝑃(𝑌 = 𝑘|𝑥) =
1 + ∑𝑘−1
𝑘 𝑠 𝑤𝑘 ∗𝑥 potential to positively impact on network analysis. In order to
improve decision-making, you can utilise these models to
In this case, k is equal to 1, 2,.., K The sample x is placed in better comprehend relationships and make predictions about
the class with the highest probability. The construction of an what will happen next. Manufacturers' analytics teams can
LR model is straightforward, and the training of such a model employ logistic regression analysis as component of a
is quick. LR, on the other hand, is unable to handle nonlinear statistics software suite to uncover a correlation between
data, which limits its use. It can be used to sort data into machine part failures and how long parts are kept in stock,
binary or many classes. Fitting data to a Logistic function for instance.The sigmoid function, which is used in the
predicts an event's probability of occurrence. Zero and one logistic function, is a cost function.
are possible values for this function's output. Class 1 and
class 0 are separated by the median value of 0.5. Class 1 1
𝐹(𝑥) =
output is defined as greater than or equal to 0.5, while class 0 1 + 𝑒 −(𝑥)
output is defined as less than or equal to 0.5.
4. RESULTS
3.4 Decision Tree
Classifiers were evaluated in their default options and
The decision tree (DT) algorithm organises information by without any processing of the dataset in the first part of the
applying a set of predefined rules. The model's tree-like form experiment. We employed Stratified Cross-Validation of 10-
makes it accessible to everybody. The decision tree technique folds to train the classifiers on the NSL-KDD training dataset
allows for automated feature exclusion. In the course of and then applied the trained models to the testing dataset.
education, students construct and prune their own mental NSL-KDD also offered the testing datasets for comparison. A
trees. A decision tree model is constructed by an algorithm pre-processing step used to pick out only the most relevant
that iteratively selects the most relevant features, which are features from the NSL-KDD dataset was performed in the
then used to expand the branches off the root node. The second stage. NSL-KDD recommended 41 features, 14 of
decision tree is a basic method of classification. The random which we selected using the InfoGainAttributeEval method
forest and excessive gradient boosting (XGBoost) are two combined with Ranker's ranking system.
examples of sophisticated algorithms that are made up of
multiple decision trees. It is widely used because of how well Sensitivity and specificity measurements are commonly used
it predicts and organises data. In DT, a branch represents a to evaluate the performance of an ML model. Specificity is
sometimes known as the true negative rate (TNR), whereas
test on an attribute, and a leaf node interprets the result of the
sensitivity is referred to as the true positive rate (TPR). The
test by displaying a class label. For classification tasks, DT
false positive rate of the classifiers on the considered dataset
uses few computational resources and works well with both
categorical and continuous inputs. Training this tree topology is shown in Figure 3.
is computationally intensive in multi-classification scenarios.
3.5 Random Forest
In 2001, Breiman came up with the idea of random forest.
This method is based on the proximity search and can be used
both for regression and classification. The classifier is based
on a decision tree. It is possible to use random samples to
form decision trees, and then predictions are made from each
tree and the best answer is determined by voting. Image
categorization, feature selection, and recommendation
engines are just some of the uses of random forests.
3.6 K-Means
K-means is a common clustering approach, where K is the set
of nodes and the means is the average of the attributes in each

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 570


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Table 3: Parameters Evaluation on UNSW-NB15 Dataset

Fig 3: False Positive Rate of ML Classifiers


The recall levels of the considered classifiers that are applied
on the dataset is represented in Figure 4.
This paper analysis the precision, recall and accuracy levels
of machine learning classifiers on the considered
KDD99,CSE-CIC-IDS2018 and UNSW-NB15 datasets are
shown in Table 1,2 and 3. The parameters evaluated are
(𝑇𝑃 + 𝑇𝑁)
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 =
(𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁)
𝑇𝑃
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 =
(𝑇𝑃 + 𝐹𝑃)
𝑇𝑃
𝑅𝑒𝑐𝑎𝑙𝑙 =
(𝑇𝑃 + 𝐹𝑁)

(2 ∗ 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ∗ 𝑅𝑒𝑐𝑎𝑙𝑙)
𝐹 − 𝑀𝑒𝑎𝑠𝑢𝑟𝑒 =
(𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 + 𝑅𝑒𝑐𝑎𝑙𝑙)
Table 1: Parameters Evaluation on KDD99 Dataset

Fig 4: Recall Levels of ML Classifiers


The comparison of the performance levels of the considered
classifiers are represented in Figure 4.

Table 2: Parameters Evaluation on CSE-CIC-IDS2018


Dataset

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 571


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES
[1]. Z. Yan and Y. Xu, "A multi-agent deep
reinforcement learning method for cooperative load
frequency control of a multi-area power
system", IEEE Trans. Power Syst., vol. 35, no. 6, pp.
4599-4608, Nov. 2020.
[2]. D. W. Otter, J. R. Medina and J. K. Kalita, "A
survey of the usages of deep learning for natural
language processing", IEEE Trans. Neural Netw.
Learn. Syst., Apr. 2020.
[3]. C. Li, J. Wang, H. Wang, M. Zhao, W. Li and X.
Deng, "Visual-texual emotion analysis with deep
coupled video and danmu neural networks", IEEE
Fig 5: Comparison of Performance Levels Trans. Multimedia, vol. 22, no. 6, pp. 1634-1646,
Jun. 2020.
[4]. F. A. Khan, A. Gumaei, A. Derhab and A. Hussain,
The training and testing levels of the ML classifiers are "A novel two-stage deep learning model for efficient
represented in Figure 6. The NB classifier observes less network intrusion detection", IEEE Access, vol. 7,
pp. 30373-30385, 2019.
training and testing time levels.
[5]. T. Su, H. Sun, J. Zhu, S. Wang and Y. Li, "BAT:
Deep learning methods on network intrusion
detection using NSL-KDD dataset", IEEE Access,
vol. 8, pp. 29575-29585, 2020.
[6]. K. Zhu, Z. Chen, Y. Peng and L. Zhang, "Mobile
edge assisted literal multi-dimensional anomaly
detection of in-vehicle network using LSTM", IEEE
Trans. Veh. Technol., vol. 68, no. 5, pp. 4275-4284,
May 2019.
[7]. Q. M. Alzubi, M. Anbar, Z. N. M. Alqattan, M. A.
Al-Betar and R. Abdullah, "Intrusion detection
system based on a modified binary grey wolf
optimisation", Neural Comput. Appl., vol. 32, no.
Fig 6: Training and Testing Levels
10, pp. 6125-6137, May 2020.
[8]. B. Riyaz and S. Ganapathy, "A deep learning
approach for effective intrusion detection in wireless
networks using CNN", Soft Comput., vol. 24, no.
22, pp. 17265-17278, Nov. 2020.
5. CONCLUSION [9]. P. Mishra, V. Varadharajan, U. Tupakula and E. S.
Internet-based risks are multiplying at an exponential rate as Pilli, "A detailed investigation and analysis of using
technology improves. As a result, experts have come up with machine learning techniques for intrusion
a slew of ways to combat these risks. Various machine detection", IEEE Commun. Surveys Tuts., vol. 21,
learning classifiers for intrusion detection have been trained no. 1, pp. 686-728, 1st Quart. 2019.
on older datasets in the literature, limiting the accuracy of [10]. T. Treebupachatsakul and S. Poomrittigul, "Bacteria
their detection. As a result, the most recent dataset must be classification using image processing and deep
used to train machine learning classifiers. Based on a given learning", Proc. 34th Int. Tech. Conf. Circuits/Syst.
taxonomy, a number of ML classifiers have been tested for Comput. Commun. (ITC-CSCC), pp. 1-3, Jun. 2019.
their ability to detect intrusions. The results of these tests [11]. K. Nugroho, E. Noersasongko, Purwanto, Muljono
have been used to evaluate the effectiveness of these and H. A. Santoso, "Javanese gender speech
classifiers. The NSL-KDD data set is used to evaluate these recognition using deep learning and singular value
classifiers. TPR and FPR have been used to compare the decomposition", Proc. Int. Seminar Appl. Technol.
classifiers in order to determine which one is the most Inf. Commun. (iSemantic), pp. 251-254, Sep. 2019.
accurate and precise. Machine learning technologies are [12]. A. R. Sharma and P. Kaushik, "Literature survey of
being used to detect assaults in IDS and to create a successful statistical deep and reinforcement learning in natural
IDS in this work. Researchers are concerned about the language processing", Proc. Int. Conf. Comput.
security of data in computer-based systems. Based on the Commun. Autom. (ICCCA), pp. 350-354, May
limitations of existing classifiers, there is a strong necessity 2017.
to design an efficient and effective classifier for accurate [13]. Y. Xin, L. Kong, Z. Liu, Y. Chen, Y. Li, H. Zhu, et
intrusion detection. al., "Machine learning and deep learning methods

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 572


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

for cybersecurity", IEEE Access, vol. 6, pp. 35365-


35381, 2018.
[14]. F. Meneghello, M. Calore, D. Zucchetto, M. Polese
and A. Zanella, "IoT: Internet of threats? A survey
of practical security vulnerabilities in real IoT
devices", IEEE Internet Things J., vol. 6, no. 5, pp.
8182-8201, Aug. 2019.
[15]. V. Hassija, V. Chamola, V. Saxena, D. Jain, P.
Goyal and B. Sikdar, "A survey on IoT security:
Application areas security threats and solution
architectures", IEEE Access, vol. 7, pp. 82721-
82743, 2019.
[16]. A. Humayed, J. Lin, F. Li and B. Luo, "Cyber-
physical systems security—A survey", IEEE
Internet Things J., vol. 4, no. 6, pp. 1802-1831, May
2017.
[17]. A. Suragala, P. Venkateswarlu, and M. China Raju,
“A comparative study of performance metrics of
data mining algorithms on medical data,” ICCCE
2020, Springer, Singapore, pp. 1549–1556, 2021.
[18]. M. Steurer, J. Hill, and P. Robert, “Norbert. Metrics
for evaluating the performance of machine learning
based automated valuation moders,” Journal of
Property Research, vol. 38, pp. 1–31, 2021.
[19]. C. Miller, Andrew, A. Gatys, Leon, J. Futoma, and
B. Fox, “Emily. Model-Based metrics: sample-
Efficient estimates of predictive model
subpopulation performance,” 2021,
https://arxiv.org/abs/2104.12231.
[20]. H. Liu and B. Lang, "Machine learning and deep
learning methods for intrusion detection systems: A
survey", Appl. Sci., vol. 9, no. 20, pp. 4396, Oct.
2019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 573


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Brief Review on Melanoma Diagnosis Models


using Machine Learning Techniques
Deepthi Rapeti1 Dr D Vivekananda Reddy2
Research scholar Assistant Professor
Department of Computer Science and Engineering, Dept of Computer Science and Engineering, SVUCE,
SVUCE, Sri Venkateswara University,
Sri Venkateswara University, Andhra Pradesh, Tirupati,
India Andhra Pradesh,
deepthirapeti1@gmail.com India.
svuvivek@gmail.com

Abstract incidence rate is increased by 140% for both the 2000-2015


and 2016-2022 time periods for nonmelanoma skin cancer
Melanoma is the most prevalent kind of cancer of the skin. (NMSC). Furthermore, NMSC affects more than 1.5 million
Abnormal cell growth of the skin is to blame, and this indians each year [2]. The only way a doctor can be
condition is more common in sunny locations. Common absolutely sure that a suspicious patch of skin (called a
forms of skin cancer include basal cell carcinoma, squamous lesion) is not cancer is to take a biopsy of the lesion. For
cell carcinoma, and melanoma. Although melanoma is the diagnostic purposes, a doctor may perform a procedure
least common form of skin cancer, it is responsible for the called a biopsy, in which he or she removes a small piece of
majority of cases of this malignancy's fatal outcomes (73%). tissue.
However, if detected early enough, this tumour can be
treated with a relatively straightforward operation. The most common cause of skin cancer, including all types
Dermoscopy images of skin malignancies were analyzed of melanoma, is exposure to natural or artificial ultraviolet
using a Machine Learning (ML) system for around 3000 light [3]. Dermatologists can detect skin cancer by looking
consecutive high-quality photos from 2018 to 2022. The for changes in the size, shape, or colour of moles or other
most lethal sort skin cancer is malignant melanoma. Many skin lesions, as well as any new growths or sores on the
studies have looked at various methods of detecting and skin. According to the morphological symptoms listed
diagnosing spontaneous melanoma, and those who are above, a long-term period of training is required for
detected early are more likely to survive. A lack of data has professional skin cancer recognition [4]. Because
made it difficult to create models based on available data. dermatologists have varying levels of training, some of the
This paper presents a brief survey on numerous machine first signs may be overlooked by the clinical examiner. A
learning algorithms and training methods with unbalanced large asymmetrical melanoma is shown in Figure 1.
basis weights to investigate a melanoma detection problem.
This research helps to provide sufficient information and
limitations of numerous machine learning models to new
researchers to design effective melanoma detection models
for accurate detection rate.
Keywords: Melanoma Detection, Skin Cancer, Machine
Learning Models, Dermoscopy Images, Cell Carcinoma.
1. INTRODUCTION
Skin cancer has a high mortality rate and is regularly
identified around the world because of the serious harm it Fig 1: Asymmetrical Melanoma
does to human health. Malignant melanoma, with its high
rate of recurrence and spread, is one of the most difficult Skin cancer is often detected with the dermatoscope, an
forms to treat. One in ten may get skin cancer at some point advanced microscope that can change the image capture
in their lives, and it is believed that 1,260 people in india are process' light, distance, resolution, angle and other
found in patients with melanomas every day, according to parameters. Detailed microscopic views of the epidermis
World Health Organization [1]. Over the past two decades, and outer dermis are provided by dermoscopic imaging [5].
the overall incidence of Melanoma climbed by 80% and the Skin lesions can be more readily and accurately analysed by

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 574


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

dermoscopy, which provides high resolution, uniformity, found in an already existing mole, the mole's texture may
and consistency. Since dermoscopic images contain so many change as well. It's possible that different skin lesions will
datasets, investigation on skin lesion evaluation has focused have a different sensation [11]. Although the lesions on the
mostly on dermoscopic images in the past. Skin-imaging skin of people with melanoma are typically painless,
devices such as dermoscopes, on the other side, are detecting them will help to avoid for future problems. The
prohibitively complex and expensive extensive training and ABCDE melanoma is shown in Figure 2.
expertise in order to be properly utilize [6].
On the other hand, non-dermoscopic photos can be acquired
with low-cost mobile phones that are commonly accessible
in both developed and developing countries. Non-
dermoscopic image processing CAD systems are more
widely applicable and available, these systems must be able
to withstand considerable picture fluctuations that occur
without dermoscopy [7]. The system's ability to recognise
lesion boundaries despite noise, hair, and other poor contrast
or non-existent impediments is based on new segmentation
algorithms. Skin lesions are identified using these
techniques when the lesion is segmented from the rest of the
skin. In addition to its asymmetrical growth pattern,
irregular border patterns, and a wide range of pigmentation, Fig 2: A is for Asymmetry
melanoma tumours show evidence of evolution in the form
of the ABCDE symbol. Photos taken from unknown ranges
and angles create asymmetrical images, wavy borders, and
color irregularities [8].
Melanoma is a type of cancer that develops when pigment-
producing cells in the skin become malignant. If it starts in
the body's pigmented tissues, melanoma can travel to other
parts like the eye or gut as well as to the skin [9]. Melanoma,
which accounts for less than one percent of all skin
malignancies, is responsible for the majority of skin cancer
mortality. Females under the age of 30 account for the bulk
of those diagnosed with this cancer, which has a very high
incidence. Melanoma's incidence has risen significantly
during the past 30 years. Melanoma cases have increased
Fig 3: B is for Border
significantly over the past few decades, and this is mainly
ascribed to an increase in UV exposure [10].
The ABCDE rule
Unbalance: On one part of the mole, the shape is off. There
are noticeable imperfections in the image edges.
Color. All shades of black, brown, and tan are available.
Several colors may be seen in the image: white, grey, red,
and blue.
The diameter: On the whole, it has a diameter of at least 6
millimetres (mm). An inch and a quarter is the approximate
diameter of this object. Smaller tumours are more common
in the early stages of the disease.
Fig 4: C is for Color
Adapting to the changing world around us.
Previously unaffected by mole growth, previously normal
skin is now sprouting new moles, or existing moles are
spreading to previously unaffected skin. When melanoma is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 575


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

be useful in primary care, how far they had progressed in


terms of development is analyzed, what evidence there was,
and whether or not there were any evidence gaps [16].
Classification problems can be studied using this method
because of its versatility and the metric that assigns each
item a specific group based on its similarity to other data
points. Classification and regression trees is a classifier that
is increasingly being employed in biomedical applications.
This research presents a brief review on numerous ML
models for melanoma detection for providing better
diagnosis.
2. LITERATURE REVIEW

Fig 5: D is for Diameter or Dark Skin cancer is one of the most common forms of cancer, and
it is one of the most deadly disease. Automated diagnosis of
metastatic melanoma and other pigmented skin conditions
has been much improved using image analysis, compared to
unaided eye assessment. The pathologist receives
information about the patient's age, gender, tumour location,
and size from the clinical module. The ResNet-50 network,
repurposed for predicting the likelihood of melanoma
categorization, is used in the deep learning arm to transfer
knowledge. To estimate the overall likelihood of developing
melanoma, the categorization scores from both processing
arms are combined using logistic regression. The analyzed
models and limitations are shown in Table 1.
Table 1: Considered Models and Limitations
Fig 6: E is for Evolving
Name of
ABCD rule uses a total dermoscopic score, where A
the year Methodology Limitations
represents asymmetry, B represents border abnormalities, C
author
represents colour variations, and D represents diameter.
For the classification
Individual weight is allocated for every particular feature The filtering
of Melanoma and
based on their importance. In general, researchers focus on model applied
Seborrheic
computer-aided diagnostic systems for automatically performance is
Keratosis, the author
classifying and identifying cancer. Graphics in the form of better.
proposed a multi-
geometric, colour and combination aspects have been used However, the
view filtering
for this purpose. complexity of
transfer learning
the model
Although it is still difficult to diagnose the early stages of strategy, as proved
causes
melanoma using distinguishing signs, it is possible [12]. J. Bian by comprehensive
2021 overload that
Using handmade characteristics for melanoma identification et al. [1] skin lesion
degrades the
requires an expert's knowledge of skin cancer type, colour, classification trials,
performance.
shape, and texture. Skin cancer CAD solutions with deep is superior to other
The complexity
learning-based automation are becoming increasingly approaches, and the
levels can be
popular as a means of resolving this problem [13]. These analysis of the
reduced to
deep learning-based solutions, however, still have a primary elements
improve the
requirement because of the limited labelled data available. confirms this
performance
finding.
ML technologies that potentially aid in early diagnosis of levels.
skin cancer were analyzed in this Systematic Review. The author proposed The
Primary and community care [14], where skin cancer a new technique segmentation
incidence is lower than in specialty clinics, is the subject of B. A.
called Predict- model does not
this review. Because most worrisome skin lesions are first Albert et 2020
Evaluate-Correct K- considers the
assessed in this scenario, ML may be most useful in this al. [2]
fold (PECK) that edge regions of
context [15]. To determine whether ML technologies could teaches ensembles the object. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 576


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the ability to learn features Traditional image


successfully even detection processing and deep
with sparse data. model learning are
The PECK method considered combined in this
The
was unable to more number research through the
dermoscopy
produce a deep of features that integration of
images
ensemble from 153 increases the characteristics from
considered
non-dermoscopic time each method. The
need to
lesion images, complexity author believed that
undergo image
despite previous levels that can J. R. the two methods,
denoising so
attempts and current be reduced. Hagerty 2019 each with its own
that the
state-of-the-art et al. [5] unique set of flaws,
accuracy will
approaches being work better together.
be enhanced.
tested and trained on One clinical
The model
them. information module
should predict
The author and three
even with low
developed a transfer biologically inspired
quality images.
learning-based The proposed image processing
system that uses an model RoI modules are used in
intelligent Region of based learning traditional image
Interest (ROI) to feature set does processing arms.
distinguish between not correlate at
melanoma and a strong level.
nevus malignancy. The k-mean The texture heterogeneity of the samples is determined via
To get the ROIs out approach takes asymmetric analysis. An EM-trained fusion-based HMM
R. classifier is presented in this research. A new texture feature
of the pictures, the less value that
Ashraf et 2020 has been created using local difference patterns (LDPs) and
author used an impacts the
al. [3] statistical histogram elements of the microscopic picture.
improved k-mean accuracy
approach. Since only levels. The Improved networks with skip pathways between encoder
photos containing training and decoder sub-networks bring the semantic level of
melanoma cells are samples can be encoder feature maps closer to that of decoder feature maps,
utilised to train the increased to which is the goal of this research. This method uses a multi-
algorithm, this ROI- increase the stage, multi-scale approach to pixel-by-pixel classification
based technique accuracy of melanoma lesions using a Softmax classifier. An
helps identify levels. innovative method, named Lesion-classifier, has been
distinguishing traits. created to categorise skin lesions into the two categories of
malignant and nonmalignant. Two public standard skin
The author provides lesion datasets, the International Symposium on Biomedical
a comprehensive Imaging (ISBI)2017 and Hospital Pedro Hispano, show that
The the solution surpasses current state-of-the-art methodologies.
evaluation of the
classification The analyzed models and limitations are shown in Table 2.
most recent research
model does not
on the use of CNN Table 2: Considered Models and Limitations
consider low
to classify
correlated
melanoma. The Name of
values that year Methodology Limitations
author only looked the author
A. impact the
at melanoma based The author proposed The
Naeem 2020 accuracy
on its binary an automated method dermoscopic
et al. [4] levels. The
classification. It for detecting early image based
features
focuses on CNN melanoma based on detection is
extracted will
classifiers and the repeated efficient.
be inaccurate Z. Yu et al.
accuracy of these 2022 dermoscopic images. However, the
that reduces the [6]
classifiers when The author designed edge based
system
tested using a three-step process segmentation
performance.
unpublished to accomplish this. and
datasets. As a first step, the morphological
author aligned operations helps

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 577


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

multiple in image The expectation


dermoscopic pictures enhancement maximization
of skin lesions using for accurate model applied
Using a combination
approximated detection of the for pre
of decision-level
Euclidean disease. processing is
fusion and a Hidden
transformations, and better; however,
Markov Model
then apply image multiple pre
(HMM) with
difference processing
parameters optimized
computations to techniques can
using Expectation
determine the lesion be applied for
R. Maximization (EM)
growth region. better
Rastghalam 2021 and asymmetric
The author described The performance to
et al. [9] analysis, the author
a melanoma segmentation remove
developed a
segmentation and model unwanted
melanoma detection
identification considered can values, null
system. The texture
strategy to solve be integrated values. The
heterogeneity of the
these issues and with edge HMM model
samples is
provide significant detection model can be
determined via
S. Albahli accuracy gains over for accurate enhanced to
2020 asymmetric analysis.
et al. [7] current approaches. feature reduce the time
A morphological extraction that complexity
procedure is used to considers best levels.
remove artefacts correlated For the detection and
such as hairs, gel features for localization of The encoder
bubbles, and clinical effective melanoma lesions and decoder
marks from the performance autonomously, the models can be
dermoscopic images. levels. author suggested a integrated with
In dermatology, deep deep learning-based the LSTM
neural networks are method. Improved model for better
used to distinguish A. A. networks with skip accuracy levels
between images of Adegun et 2020 pathways between for location
melanoma and those al. [10] encoder and decoder detection. The
that are clear of the sub-networks bring weights can be
disease. Melanoma the semantic level of allocated to the
detection technology The deep encoder feature maps features for
has been emphasized learning model closer to that of better
in two crucial ways applied decoder feature considering the
in this research. considers maps, which is the feature set.
Classifier accuracy complex goal of this research.
can be impacted by operations for
simply a few changes melanoma
L. D. Biasi The tendency of melanoma to metastasize has made it a
2022 to the dataset's detection that
et al. [8] particularly dangerous cancer. According to statistics, the
attributes, therefore increases the
the author began by computational most common and deadly form of skin cancer is melanoma.
looking at that. The complexity People recognised and treated early in the course of the
focus here was on the levels that need disease tend to be more successful, according to a new study
issue of transfer to be reduced published in the Journal of Clinical Pathology. In situations
learning. Following for better of melanoma, a precise clinical diagnosis and prognosis may
the results of this performance. be difficult to achieve due to clinicians' subjectivity.
early research, the Examining the form, colour, and texture of any skin lesions
author concluded that is crucial for early detection and prevention of malignant
continuous training- melanomas. These traits include uneven borders, notched
test iterations are edges, and colour variation. Deep learning has previously
important to been shown to outperform human specialists in a variety of
construct robust computer vision tests.
prediction models.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 578


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Advantages in Traditional Model 3.2 Naive Bayes Classifier


1. The traditional models can predict the tumor in less In order to determine whether or not an input belongs to a
time if small datasets are considered. certain category, Naive Bayes classifiers rely on probability.
2. The traditional models data loss rate is in Some classifiers use the Naive Bayes algorithm, which is
satisfactory level. based on a probability theorem. Using this type of classifier,
3. The computational complexity levels of existing users may find out how likely it is that a given input belongs
models is low. to one of several predefined classes.
4. The true positive rate of the traditional models in
skin cancer detection is high. For cases with more than one possible categorization, the
algorithm considers the likelihood that a given data point
Disadvantages of Traditional Models belongs to each category. The most likely classification to
contain the input text is then output after the probabilities of
1. The traditional models are slow in processing large each classification have been compared. Typically, this type
datasets that increases the delay in the system of algorithm is used by businesses to categorize textual
performance. components like email subject lines, client feedback, and
2. The traditional models can consider high quality article abstracts.
images. Noisy image inputs results in less accuracy
rate. 3.3 K-Nearest Neighbors
3. The training samples considered are less that prone
to false positive rates. K-nearest-neighbors is an easy technique that keeps all
4. The grade detection of skin cancer using traditional previous samples and sorts new ones by some similarity
models is a complex task. measure. From its inception in the early 1970s, KNN has
5. The features considered in traditional models to been used as a non-parametric method for estimating data
perform training is high that can be reduced further and recognising patterns. Because it does not attempt to
for better optimization. construct a generic internal model but instead stores only
instances of the training data, it can be considered a sort of
lazy learning. Each point's k-nearest neighbours cast a vote
to decide its classification.
3. MACHINE LEARING CLASSIFIERS
Using a distance measure to find the K nearest neighbours,
Classifiers are algorithms used in machine learning to each example is assigned to the category with the most
automatically classify or categorise data into one or more members. If K is equal to 1, the case is simply placed in the
classes. Classes can be described in a number of ways, category that contains its nearest neighbour.
including by using the targets, labels, and categories.
Algorithms based on machine learning can help automate 3.4 Support Vector Machines
processes that were formerly performed by hand. They have
the potential to significantly improve the productivity of For straightforward classification and regression tasks,
enterprises while saving significant amounts of time and experts often turn to support vector machines (SVMs). To
money. Five distinct classification strategies in machine do this, they look for lines, called hyperplanes, within a data
learning are discussed. distribution that serve to divide it into two distinct groups. In
cases when multiple hyperplanes may effectively partition
3.1 Decision Tree the data, the algorithm would choose the best one. When
using a SVM to classify data, the optimal hyperplane is the
To create models with a tree-like structure, supervised optimal dividing line across classes.
machine learning practitioners can employ a classification
technique called a decision tree. From the tree trunk to the If an SVM cannot locate a good hyperplane to divide the
branches and finally to the leaves, data is classified into data into two dimensions, it can nevertheless function in
increasingly granular categories. It permits precise, organic higher dimensions. Because of this, they are excellent tools
classification by employing the if-then rule of mathematics for extracting classes from heterogeneous data sets. SVMs
to generate sub-categories that fit into larger categories. are great machine learning tools because their accuracy
Since a decision tree's main function is to draw ever-finer improves as more complicated data is used as input.
differences, it must constantly learn new classification rules.
These rules are learned by the system by applying if-then 3.5 Artificial Neural Networks
reasoning to the data used for training. The programme The term artificial neural network (ANN) refers to a
keeps classifying until it hits a predetermined threshold. computational framework comprised of several separate
algorithms. The way they function is similar to that of
human brains, and it involves a network of artificial neurons

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 579


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

that can send and receive electrical impulses. Thus, artificial characteristics. The numerous machine learning algorithms
neural networks are now equipped to tackle multi-layered for skin cancer detection and classification have been
issues of unprecedented complexity. It can be difficult to analyzed in this systematic review research. There are no
train and fine-tune ANNs due to their complexity, and risks involved with any of these methods but there are
enormous volumes of training data are generally required. various limitations that need to be overcome. Preprocessing
However, a well-trained ANN can accomplish what would and picture segmentation, followed by feature extraction and
be impossible for a set of algorithms to do alone. classification, are necessary steps in skin cancer detection.
There are pros and downsides to each algorithm. There is
Artificial neural networks come in a wide variety, some of currently no way to answer a patient's question about
which are: whether or not a certain skin cancer symptom is present on
1. Feedforward neural network any portion of their body. The concept of self-organization
2. Feedback neural network in machine learning has just arisen. This research presents a
3. Recurrent neural network brief survey on numerous machine learning models for
4. Classification-prediction network detection of melanoma. The suggestions to overcome the
5. Radial basis function network limitations are also provided to design an effective model for
6. Dynamic neural network melanoma classification and detection In the future, its study
7. Modular neural network could improves the precision of image processing systems,
notably for medical imaging, nevertheless, In order to
4. PROPOSED METHODOLOGIES control these variables, dermatoscopes can be used, although
they are more complex and need more expertise than other
Malignant melanomas most commonly grow in the lower methods. The suggested approaches used images of the
limbs, face, neck, and trunk, but many of these tumours region of interest, which helped to focus on the most
begin as preexisting moles. The colour and texture of the important aspects of the data for better accuracy rates.
lesion's border and surface are important in defining the
clinical diagnosis of the lesion. As a result, the first step in Future Scope of Research
identifying whether or not the suspicious growth is In healthcare, AI can be used for a variety of tasks, including
cancerous is to have it thoroughly checked in brilliant light diagnosis and treatment. In order to train the machine
by a specialist. It is critical for the doctor to know when the learning approach, AI systems need constant input of new
patient first noticed the development or realised it had grown data that is clean. Better results from AI applications will be
larger. The emergence of the dermatoscope, a new achieved if clinicians and patients can work together to give
magnification device used by some clinicians, has made it images on an ongoing basis. The data fed into AI systems
easier to examine bothersome moles. This research presents should be handled with care to protect individuals'
a brief survey on existing models and their limitations and to anonymity and privacy. More information on
overcome those limitations, developing a new model is dermatologists' attitudes about and comfort with using ML
strongly required. The following objectives are suggested to to diagnose skin malignancies is needed, and this can only
overcome the limitations of the existing models that includes be gained from larger-scale studies. The noise removal
creating an Enhanced Morphological Operative Model techniques can be further enhanced to get a denoised image
employing dermoscopy pictures for edge identification and for accurate prediction levels. The features considered in
image quality improvement. To create a Multi Level Feature existing models can be reduced further to reduce the time
Extraction and Selection model that takes into account complexity levels.
valuable features with high correlation for accurate model
training and then implement an efficient clustering model REFERENCES
for grouping similar types of values into a single group for
each feature set and then to create a constructive classifier [1]. J. Bian, S. Zhang, S. Wang, J. Zhang and J. Guo,
for training the model with the feature vector set and then "Skin Lesion Classification by Multi-View Filtered
predicting the type of skin cancer using a test image and Transfer Learning," in IEEE Access, vol. 9, pp.
finally to compare the suggested model's performance to that 66052-66061, 2021, doi:
of traditional models, and to demonstrate that the proposed 10.1109/ACCESS.2021.3076533.
model's performance is superior. [2]. B. A. Albert, "Deep Learning From Limited Training
Data: Novel Segmentation and Ensemble Algorithms
5. CONCLUSION Applied to Automatic Melanoma Diagnosis,"
in IEEE Access, vol. 8, pp. 31254-31269, 2020, doi:
Existing skin lesion diagnostic tools lack scalability, and 10.1109/ACCESS.2020.2973188.
many supervised learning experiments overlook the negative [3]. R. Ashraf et al., "Region-of-Interest Based Transfer
impact of source samples on their findings. Melanomas and Learning Assisted Framework for Skin Cancer
nevi are difficult to categorize because of their various

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 580


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Detection," in IEEE Access, vol. 8, pp. 147858- [14]. W. Zhou, Z. Chen, Q. Zhou and D. Xing, "Optical
147871, 2020, doi: 10.1109/ACCESS.2020.3014701. Biopsy of Melanoma and Basal Cell Carcinoma
[4]. A. Naeem, M. S. Farooq, A. Khelifi and A. Abid, Progression by Noncontact Photoacoustic and Optical
"Malignant Melanoma Classification Using Deep Coherence Tomography: In Vivo Multi-Parametric
Learning: Datasets, Performance Measurements, Characterizing Tumor Microenvironment," in IEEE
Challenges and Opportunities," in IEEE Access, vol. Transactions on Medical Imaging, vol. 39, no. 6, pp.
8, pp. 110575-110597, 2020, doi: 1967-1974, June 2020, doi:
10.1109/ACCESS.2020.3001507. 10.1109/TMI.2019.2962614.
[5]. J. R. Hagerty et al., "Deep Learning and Handcrafted [15]. Agrahari, P., Agrawal, A., Subhashini, N. (2022).
Method Fusion: Higher Diagnostic Accuracy for Skin Cancer Detection Using Deep Learning. In:
Melanoma Dermoscopy Images," in IEEE Journal of Sivasubramanian, A., Shastry, P.N., Hong, P.C. (eds)
Biomedical and Health Informatics, vol. 23, no. 4, Futuristic Communication and Network
pp. 1385-1391, July 2019, doi: Technologies. Lecture Notes in Electrical
10.1109/JBHI.2019.2891049. Engineering, vol 792. Springer, Singapore.
[6]. Z. Yu et al., "Early Melanoma Diagnosis With https://doi.org/10.1007/978-981-16-4625-6_18.
Sequential Dermoscopic Images," in IEEE [16]. W. Wu et al., "Scale-Aware Transformers for
Transactions on Medical Imaging, vol. 41, no. 3, pp. Diagnosing Melanocytic Lesions," in IEEE Access,
633-646, March 2022, doi: vol. 9, pp. 163526-163541, 2021, doi:
10.1109/TMI.2021.3120091. 10.1109/ACCESS.2021.3132958.
[7]. S. Albahli, N. Nida, A. Irtaza, M. H. Yousaf and M. [17]. L. Song, J. Lin, Z. J. Wang and H. Wang, "An End-
T. Mahmood, "Melanoma Lesion Detection and to-End Multi-Task Deep Learning Framework for
Segmentation Using YOLOv4-DarkNet and Active Skin Lesion Analysis," in IEEE Journal of
Contour," in IEEE Access, vol. 8, pp. 198403- Biomedical and Health Informatics, vol. 24, no. 10,
198414, 2020, doi: 10.1109/ACCESS.2020.3035345. pp. 2912-2921, Oct. 2020, doi:
[8]. L. D. Biasi, A. A. Citarella, M. Risi and G. Tortora, 10.1109/JBHI.2020.2973614.
"A Cloud Approach for Melanoma Detection Based [18]. S. Sabbaghi Mahmouei, M. Aldeen, W. V. Stoecker
on Deep Learning Networks," in IEEE Journal of and R. Garnavi, "Biologically Inspired QuadTree
Biomedical and Health Informatics, vol. 26, no. 3, Color Detection in Dermoscopy Images of
pp. 962-972, March 2022, doi: Melanoma," in IEEE Journal of Biomedical and
10.1109/JBHI.2021.3113609. Health Informatics, vol. 23, no. 2, pp. 570-577,
[9]. R. Rastghalam, H. Danyali, M. S. Helfroush, M. E. March 2019, doi: 10.1109/JBHI.2018.2841428.
Celebi and M. Mokhtari, "Skin Melanoma Detection [19]. Vijayakumar, Dr T. "SELECTIVE IMAGE
in Microscopic Images Using HMM-Based ENHANCEMENT AND RESTORATION FOR
Asymmetric Analysis and Expectation SKIN CANCER IDENTIFICATION." Journal of
Maximization," in IEEE Journal of Biomedical and Innovative Image Processing 1, no. 1 (2019): 1-10.
Health Informatics, vol. 25, no. 9, pp. 3486-3497, [20]. Pandian, A. Pasumpon. "Identification and
Sept. 2021, doi: 10.1109/JBHI.2021.3081185. classification of cancer cells using capsule network
[10]. A. A. Adegun and S. Viriri, "Deep Learning-Based with pathological images." Journal of Artificial
System for Automatic Melanoma Detection," in Intelligence 1, no. 01 (2019): 37-44.
IEEE Access, vol. 8, pp. 7160-7172, 2020, doi:
10.1109/ACCESS.2019.2962812.
[11]. M. Q. Khan et al., "Classification of Melanoma and
Nevus in Digital Images for Diagnosis of Skin
Cancer," in IEEE Access, vol. 7, pp. 90132-90144,
2019, doi: 10.1109/ACCESS.2019.2926837.
[12]. Q. Wang et al., "Identification of Melanoma From
Hyperspectral Pathology Image Using 3D
Convolutional Networks," in IEEE Transactions on
Medical Imaging, vol. 40, no. 1, pp. 218-227, Jan.
2021, doi: 10.1109/TMI.2020.3024923.
[13]. H. Arab, L. Chioukh, M. Dashti Ardakani, S. Dufour
and S. O. Tatu, "Early-Stage Detection of Melanoma
Skin Cancer Using Contactless Millimeter-Wave
Sensors," in IEEE Sensors Journal, vol. 20, no. 13,
pp. 7310-7317, 1 July1, 2020, doi:
10.1109/JSEN.2020.2969414.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 581


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Equilibrium Optimizer with Deep Learning Model for


Autism Spectral Disorder Classification
A.Praveena N.Senthamilarasi
Assistant Professor, Assistant Professor,
Department of Computer Science and Department of Information Technology,
Engineering, Panimalar Engineering College, Chennai,
Jansons Institute of Technology, Tamilnadu, India,
Karumathampatti, Coimbatore, Tamilnadu, India, senthamil.cse2009@gmail.com
drpraveenacse@gmail.com Abirami.S.K,
Dr.T.S. Karthik Assistant Professor,
Professor, Department of Electronics and Department of Computer Science and Business
Communication Engineering, Systems, Sri Eshwar College of Engineering,
Aditya College of Engineering and Coimbatore, Tamilnadu, India,
Technology, Surampalem, Andhrapradesh, India, abiramiskthevan@gmail.com
writetotsk@gmail.com Mrs Shyamali Das
Vijayakrishna Rapaka E Assistant professor, Department of Computer
Student, Data Science, Science,
Indian Institute of Technology Madras, CMR group of institutions (SOSS), Bangalore,
Chennai, Tamilnadu, India, Karnataka, India,
vijayakrishnarapaka@gmail.com mail.shyamali@gmail.com
Abstract—Autism Spectrum Disorder (ASD) is a developing from the autism spectrum disorder is usually not able to do social
disorder if the symptoms develop obvious in the initial years of age communication with other persons [1, 2]. In this, an individual's
but it could be present in some age groups. ASD is mental health life was generally pretentious for his or her whole lifetime. It is
problem that affects communicational, social, and non-verbal stimulating to know that both ecological and hereditary factors
performances. It could not be cured entirely but is decreased when may turn out to be the causing factors for this disease [3]. The
identified initially. The primary analysis was hampered by the indications of this problem may be ongoing at the age of 3 years
difference and severity of ASD symptoms and containing and may last for a lifetime. It is impossible to whole treat the
symptoms usually realized in other mental health problems as
patient's sorrow from this disease; though, its belongings are
well. With the application of machine learning (ML) for the
abridged for approximately time if the indications are initially
predictive and recognition of several diseases with optimum
accuracy, a ray of hope to initial recognition of ASD dependent
noticed. By presumptuous that humanoid genes are accountable
upon many physiological and physical parameters is projected. for it, the careful causes of ASD have not been documented by
This article designs an Equilibrium Optimizer with Deep Learning the expert yet [4].
Model for Autism Spectral Disorder Classification (EODL-ASDC)
technique. The presented EODL-ASDC technique mainly focuses
on the identification and classification of ASD. To attain this, the
presented EODL-ASDC technique exploits the deep belief
network (DBN) system to perform the classification procedure. In
addition, the EO algorithm is employed for the optimal
hyperparameter tuning of the DBN approach. To demonstrate the
enhanced ASD classification result of the EODL-ASDC approach,
an extensive range of experimental evaluates was executed. The
experimental results demonstrate the improvements of the EODL-
ASDC technique over other approaches.

Keywords— Autism spectral disorder; Healthcare; Machine


learning; Metaheuristics; Disease diagnosis

I. INTRODUCTION
Fig. 1. Overview of smart healthcare diagnosis
Autism Spectrum disorder is a condition that is relevant to
human brain development. An individual who has agonized

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 582


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The human genes touch the expansion by swaying the execute, thus supporting the rehabilitations achieved by health
atmosphere. There is approximately risk factor which effects specialists in progenies with ASD.
ASD like as low birth weight, a sibling with ASD and Mekbib et al. [15] offer a VR gaming scheme that uses
consuming old parents, etc. Early discovery and treatment are stressor games to notice diverse emotional reactivity patterns,
greatest significant stages that should be taken to diminish the psychological sensor signals, in-game presentation and answers,
signs of autism spectrum disorder issues and to recover the and energetically changes the game scene rendering to the
excellence of life of ASD suffering people [5]. Though, there is present expressive state. This is an outline of a lasting training,
no process of medical test for discovery of autism. Fig. 1 anywhere the eventual box was to progress a VR scheme by
represents the overview of smart healthcare analysis. actual response for assisting early diagnosis and screening of
A noteworthy share of paediatric people suffers from ASD ASD. Chen et al. [16] study use VR technology, joint by
[6]. In many cases, it can generally be recognized in its opening wearable multi-model detection technology, with EEG, eye
stages, however, the main blockage lies in the personal and dull tracking, and heart rate variability (HRV). Physical signs and
nature of prevailing judgement measures [7, 8]. Consequently, game presentation data have been composed while operators
there will be a waiting period of at least 13 months in the exercising, and participating in many appraisal scales such as
preliminary doubt to the real analysis. The analysis takings ADOS, SRS, and CBCL. Arithmetical analysis of such data is
several hours, and the unceasingly rising request for action is made to categorize those finished ML techniques for
more than the top volume of the nation’s paediatric clinics [9]. formulating a VR assistance mechanism that is employed for
Though, due to the gaps among preliminary concerns and evaluating the social behavior, analysis, harshness, and
analysis, a lot of valuable time was lost as this illness leftovers treatment of ASD.
unnoticed. Machine Learning (ML) approaches not only aid to
measure the danger for ASD accurately, nonetheless were even III. THE PROPOSED MODEL
indispensable to rationalizing the whole analysis procedure and In this article, a new EODL-SDC system was developed
aid people access the demanded treatments faster [10]. ASD classification process. The presented EODL-SDC
This article designs an Equilibrium Optimizer with Deep technique operates in two major phases. In the initial phase, the
Learning Model for Autism Spectral Disorder Classification presented EODL-SDC technique applied the DBN model for
(EODL-ASDC) technique. The presented EODL-ASDC ASD classification process. Next, in the second phase, the
technique mainly focuses on the identification and classification EODL-SDC technique utilized the EO algorithm as a
of ASD. To attain this, the presented EODL-ASDC technique hyperparameter optimizer.
exploits the deep belief network (DBN) approach to act the
classification procedure. In addition, the EO algorithm is A. ASD Classification using DBN
employed for the optimal hyperparameter tuning of the DBN Primarily, the presented EODL-SDC technique applied the
system. For demonstrating the improved ASD classification DBN model for ASD classification process. A DBN is a variant
outcomes of the EODL-ASDC system, an extensive range of of DNN that encompasses stacked RBM and 𝑠 BPNN which
experimental analyses is performed. applies a supervised learning methodology for enhancing the
network variable and an unsupervised greedy learning
II. LITERATURE REVIEW mechanism to adjust the weight connected RBM [17]. The RBM
Tawhid et al. [11] formulates an effectual autism diagnostic encompasses 𝐻𝑘 = (ℎ1 , ℎ2 , ⋯ , ℎ𝑚 ) hidden layer and 𝑉𝑘 =
structure that could automatically find autism related to time– (𝑣1 , 𝑣2 , ⋯ , 𝑣𝑛 )visible layer. The hidden layer 𝐻1 and the visible
frequency spectrogram image in EEG signals. Initially, the raw layer 𝑉1 forms 𝑅𝐵𝑀1 , the hidden layer 𝐻2 form 𝑅𝐵𝑀2 , and the
EEG data was pre-processed through numerous methods like hidden layer 𝐻1 as the visible layer of 𝑅𝐵𝑀2 and so on. The
normalization, re-referencing, and filtering. Then, the pre- weight among the interconnected neuron, 𝐴𝑘 = {𝑎𝑖 } = 𝑅𝑛 and
processed EEG signals can be transformed into 2D images 𝐵𝑘 = {𝑏𝑗 } = 𝑅𝑚 indicates the visible and hidden biases of 𝑘-𝑡ℎ
through a short-time FT. After that, textural features were RBM and, 𝑊𝑘 = {𝑤𝑖,𝑗 } ∈ 𝑅𝑛×𝑚 denotes the connection weight
derived, and significant features were chosen through PCA, and amongst the visible and hidden layers of 𝑘-𝑡ℎ RBM. Thus, three
fed to SVM technique for classification. Negin et al. [12] devise parameters are required to determine the RBM. For DBN with
a non-intrusive vision-based technique related to human action voltage charging, the energy function of interior RBM is defined
detection for facilitating the diagnosis of autism spectrum as follows:
disorder (ASD). Several local descriptors, which will be 𝐸(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ) = −𝐴𝑇𝑘 𝑉𝑘 − 𝐵𝑘𝑇 𝐻𝑘 − 𝑉𝑘𝑇 𝑊𝑘 𝐻𝑘 (1)
generally utilized in the BoVW technique, have been tested with Now, 𝑉𝑘 and 𝐻𝑘 denotes the binary state of all the units in 𝑘-
SVM, MLP, and Gaussian Naive Bayes (GNB) techniques to 𝑡ℎ visible and hidden units. The lowest energy function
recognize ASD associated behaviors. demonstrates the ideal state of the networks, i.e., the lowest
In [13], a new multimodal picture book recommendation prediction error for EV charging voltage. The joint likelihood
structure that integrates textual data and image data for distribution of the RBM is attained by regularizing and
computing the similarity among the picture records and the exponentializing the energy function as follows:
discussion topics was modelled and assessed through a testing exp(−𝐸(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ))
database. In [14], the authors offer the structure of an intellectual 𝑃(𝑉𝑘 , 𝐻𝑘 |𝜃𝑘 ) = (2)
mirror for recognizing 5 fundamental emotions they are angry, 𝑍(𝜃𝑘 )
sad, neutral, happy, and scared. This mirror will use CNNs for 𝑍(𝜃𝑘 ) = ∑ exp (−𝐸(𝑉𝑘 ′ 𝐻𝑘 |𝜃𝑘 )) (3)
analysing the images that can be seized by a photographic 𝑣𝑘 ,𝐻𝑘
camera and compare them with ones that the patient must

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 583


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Now, 𝑍(𝜃𝑘 ) denotes the partition function which describes chased the equilibrium state. During exploitation and
the sum of every probable state energy function of the set of 𝑉𝑘 exploration stages, the 5 equilibrium candidate supports 𝐸𝑂. The
and 𝐻𝑘 node in the charging voltage DBN, as it is employed as first four candidates seeks particle exploration, while 5th
the objective function of optimization technique. According to candidate with average values seeks change in exploitation and
the structure feature of RBM, the probability that 𝑗-𝑡ℎ unit ℎ𝑗 of that candidate poses a vector termed the equilibrium pool.
hidden layer 𝐻𝑘 and the 𝑖-𝑡ℎ unit 𝑣𝑖 of visible layer 𝑉𝑘 are 𝐶⃗eq,pool = {𝐶⃗𝑒𝑞(1) , 𝐶⃗𝑒𝑞(2) , 𝐶⃗𝑒𝑞(3) , 𝐶⃗𝑒𝑞(4) , 𝐶⃗𝑒𝑞(𝑎𝑣𝑒) } (7)
activated in the following: The updating of concentration allows EO to balance
𝑚
exploration and exploitation equally
𝑃(𝑣𝑖 = 1|𝐻𝑘 ) = 𝜎 (𝑎𝑖 + ∑ ℎ𝑗 𝑤𝑖𝑗 ) (4) ⃗⃗
𝐹⃗ = 𝑒 −𝜆(𝑡−𝑡0) (8)
𝑖=1
𝑛 Now, 𝜆⃗ shows a random number supposed to differ amongst
𝑃(ℎ𝑗 = 1|𝑉𝑘 ) = 𝜎 (𝑏𝑗 + ∑ 𝑣𝑗 𝑤𝑖𝑗 ) (5) [0, 1], allowing turnover rate fluctuation for the specific time,
and 𝑡 is reduced as the iteration count rises based on the
𝑖=1
−𝑥
Whereas 𝜎(𝑥) = 1/(1 + 𝑒 ) denotes the sigmoid following expression.
𝐼𝑡 𝐼𝑡
activation function. (𝑎 )
𝑡 = (1 − ) 2 Max− 𝑖𝑡 (9)
The DBN training technique to charge voltage encompasses Max− 𝑖𝑡
two stages of pretraining and finetuning. In the finetuning, 𝐼𝑡 and Max− 𝑖𝑡 represents the current and maximal iteration
BPNN takes the estimated charging voltage as the output and the count, and 𝑎2 signifies a constant to control the ability for
predicted charging voltage as an input as well as adjusts and exploitation. Additional parameter 𝑎1 , is exploited to improve
optimizes the network variable from top to bottom in supervised exploitation and exploration [19].
learning. In the pre-training process, 𝑅𝐵𝑀1 receive dataset on 1 ⃗⃗⃗⃗⃗⃗⃗⃗⃗
the EV voltage, mandatory current, current, and charging 𝑡⃗ = 𝑙𝑛 (‐ 𝑎1 𝑠𝑖𝑔𝑛 (𝑟⃗ − 𝑂. 5) [1 − 𝑒 −𝜆⃗⃗𝑡 ]) + 𝑡 (10)

𝜆
temperature, and train RBM in the bottom‐up series with layer- The generation rate can be represented as 𝐺 that improves
wise greedy learning approach for accomplishing the extraction exploitation.
of highest‐level feature of the input dataset and the upgrade of ⃗
𝐺⃗ = 𝐺⃗0 𝑒 −𝑙(𝑡−𝑡0) (11)
the weight connected training network. Fig. 2 demonstrates the ⃗
framework of DBN technique. From the expression, 𝑙 represents an arbitrary number within
[0, 1] is shown below.
𝐺⃗0 = 𝐺𝐶⃗𝑃(𝐶⃗eq − 𝜆⃗𝐶⃗) (12)
0.5𝑟 1 , 𝑟2 ≥ 𝐺𝑃
𝐺𝐶⃗𝑃 = { (13)
0, 𝑟2 < 𝐺𝑃
Now, the arbitrary value can be denoted by 𝑟1 and 𝑟2 and
differs between zero and one. The vector ⃗⃗⃗⃗⃗⃗ 𝐺𝐶 𝑃 denoted the
parameter which controls the generation rate is employed to the
update time.
𝐺⃗
𝐶⃗ = 𝐶⃗ + (𝐶⃗ − 𝐶⃗𝑒𝑞 ). 𝐹⃗ + (1 − 𝐹⃗ ) (14)
𝜆⃗𝑉
The value of 𝑉 is corresponding to one.
IV. EXPERIMENTAL VALIDATION
The proposed model is simulated using Python tool. The
experimental validation of the EODL-ASDC model is tested
under 70% of TR data and 30% of TS data. The confusion matrix
Fig. 2. Architecture of DBN produced by the EODL-ASDC model on 70% of TR database is
given in Fig. 3. The figure reported that the EODL-ASDC model
B. Parameter Tuning using EO Algorithm has recognized 46.43% of samples into Yes class and 48.57% of
Next, the EODL-SDC technique utilized the EO algorithm samples into No class.
as a hyperparameter optimizer. The conception of single‐
objective EO was developed in 2020 [18]. Generally, it applies
a mass balance equation, the EO was based on dynamic mass
balance. The equation of mass balance search for the system
equilibrium state. Initially, EO applies a particle group, whereby
each particle describes the concentration vector which includes
the problem solution and it is given below:
𝑌𝑗𝑖𝑛𝑖𝑡𝑖𝑎𝑙 = 𝑙𝑏 + 𝑟𝑎𝑛𝑑𝑗 (𝑢𝑏 − 𝑙𝑏) , 𝑗 = 0,1,2,3, … , 𝑛 (6)
Here, 𝑌𝑗𝑖𝑛𝑖𝑡𝑖𝑎𝑙 indicates the concentration vector of 𝑗𝑡ℎ
particles, 𝑢𝑏, and 𝑙𝑏 show upper and lower limits of each
parameter, 𝑛 denotes the particle count, 𝑟𝑎𝑛𝑑𝑗 indicates an
arbitrary number lies in zero and one. The EO methodology

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 584


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3. Confusion matrix of EODL-ASDC system under 70% Fig. 4. Confusion matrix of EODL-ASDC system under 70%
of TR database of TR database
TABLE I The confusion matrix produced by the EODL-ASDC
RESULT ANALYSIS OF EODL-ASDC SYSTEM UNDER 70% OF TR approach on 30% of TS database is provided in Fig. 3. The figure
DATABASE stated that the EODL-ASDC technique has recognized 453% of
Training Phase (70%) samples into Yes class and 53.33% of samples into No class.
Table 2 provides a brief classification outcome of the EODL-
F-
Class Accuracy Precision Recall MCC ASDC system on 30% of TS database. The presented EODL-
Score
ASDC approach has identified samples into ‘Yes’ class with
Yes 95.00 100.00 90.28 94.89 90.47 𝑎𝑐𝑐𝑢𝑦 of 98.33%, 𝑝𝑟𝑒𝑐𝑛 of 100%, 𝑟𝑒𝑐𝑎𝑙 of 96.43%, 𝐹𝑠𝑐𝑜𝑟𝑒 of
No 95.00 90.67 100.00 95.10 90.47 98.18%, and MCC of 96.70%. Followed by, the presented
Average 95.00 95.33 95.14 95.00 90.47 EODL-ASDC method has identified samples into ‘No’ class
with 𝑎𝑐𝑐𝑢𝑦 of 98.33%, 𝑝𝑟𝑒𝑐𝑛 of 96.97%, 𝑟𝑒𝑐𝑎𝑙 of 100%, 𝐹𝑠𝑐𝑜𝑟𝑒
of 98.46%, and MCC of 96.70%.
Table 1 offers a brief classification outcome of the EODL-
ASDC model on 70% of TR database. The presented EODL- TABLE II
ASDC model has identified samples into ‘Yes’ class with 𝑎𝑐𝑐𝑢𝑦 RESULT ANALYSIS OF EODL-ASDC SYSTEM UNDER 70% OF TR
of 95%, 𝑝𝑟𝑒𝑐𝑛 of 100%, 𝑟𝑒𝑐𝑎𝑙 of 90.28%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 94.89%, and DATABASE
MCC of 90.47%. On the other hand, the projected EODL-ASDC
Testing Phase (30%)
approach has identified samples into ‘No’ class with 𝑎𝑐𝑐𝑢𝑦 of
F-
95%, 𝑝𝑟𝑒𝑐𝑛 of 90.67%, 𝑟𝑒𝑐𝑎𝑙 of 100%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.10%, and Class Accuracy Precision Recall
Score
MCC
MCC of 90.47%.
Yes 98.33 100.00 96.43 98.18 96.70
No 98.33 96.97 100.00 98.46 96.70
Average 98.33 98.48 98.21 98.32 96.70

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 585


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

An obvious precision-recall investigation of the EODL-


ASDC algorithm under test database is represented in Fig. 7. The
figure outperformed that the EODL-ASDC system has resulted
to improved values of precision-recall values in every class.
A detailed ROC analysis of the EODL-ASDC system under
test database is defined in Fig. 8. The outcomes referred that the
EODL-ASDC algorithm has exhibited its capability in
classifying several classes.

Fig. 5. 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 analysis of EODL-ASDC system

The training accuracy (𝑇𝑅𝑎𝑐𝑐 ) and validation accuracy


(𝑉𝐿𝑎𝑐𝑐 ) achieved by the EODL-ASDC system under test
database is shown in Fig. 5. The simulation result pointed out
the EODL-ASDC approach has accomplished higher values of
𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 . In certain, the 𝑉𝐿𝑎𝑐𝑐 appeared that better than
𝑇𝑅𝑎𝑐𝑐 .
The training loss (𝑇𝑅𝑙𝑜𝑠𝑠 ) and validation loss (𝑉𝐿𝑙𝑜𝑠𝑠 )
realized by the EODL-ASDC method under test database are Fig. 8. ROC curve analysis of EODL-ASDC system
revealed in Fig. 6. The simulation result stated that the EODL-
ASDC system has attained lesser values of 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 . The comparison results of the EODL-ASDC model with
Specifically, the 𝑉𝐿𝑙𝑜𝑠𝑠 is lesser than 𝑇𝑅𝑙𝑜𝑠𝑠 . recent models are given in Table 3 and Fig. 9. The results
implied the enhanced outcomes of the EODL-ASDC model. For
instance, based on 𝑎𝑐𝑐𝑢𝑦 , the EODL-ASDC model has shown
higher 𝑎𝑐𝑐𝑢𝑦 of 98.33% whereas the KNN, DT, LDA, NB, and
SVM models have reported lower 𝑎𝑐𝑐𝑢𝑦 of 94.52%, 96.55%,
96.72%, 95.05%, and 94.35% respectively.
TABLE III
COMPARATIVE ANALYSIS OF EODL-ASDC SYSTEM WITH
EXISTING APPROACHES

Methods Accuracy Precision Recall F-Score


EODL-ASDC 98.33 98.48 98.21 98.32
KNN Model 94.52 95.87 96.24 95.21
Fig. 6. 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 analysis of EODL-ASDC system DT Model 96.55 95.95 95.89 96.83
LDA Model 96.72 95.21 96.51 96.86
NB Model 95.05 95.57 94.53 96.31
SVM Model 94.35 95.22 96.81 95.99

Moreover, according to 𝑝𝑟𝑒𝑐𝑛 , the EODL-ASDC approach


has shown superior 𝑝𝑟𝑒𝑐𝑛 of 98.48% whereas the KNN, DT,
LDA, NB, and SVM techniques have reported lower 𝑝𝑟𝑒𝑐𝑛 of
95.87%, 95.95%, 95.21%, 95.57%, and 95.22%
correspondingly. Finally, based on 𝑟𝑒𝑐𝑎𝑙 , the EODL-ASDC
approach has revealed greater 𝑟𝑒𝑐𝑎𝑙 of 98.21% whereas the
KNN, DT, LDA, NB, and SVM models have reported lesser
𝑟𝑒𝑐𝑎𝑙 of 96.24%, 95.89%, 96.51%, 94.53%, and 96.81%
Fig. 7. Precision recall analysis of EODL-ASDC system correspondingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 586


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[9] Thabtah, F., 2019. Machine learning in autistic spectrum disorder


behavioral research: A review and ways forward. Informatics for Health
and Social Care, 44(3), pp.278-297.
[10] Ghosh, T., Al Banna, M.H., Rahman, M.S., Kaiser, M.S., Mahmud, M.,
Hosen, A.S. and Cho, G.H., 2021. Artificial intelligence and internet of
things in screening and management of autism spectrum
disorder. Sustainable Cities and Society, 74, p.103189.
[11] Tawhid, M.N.A., Siuly, S. and Wang, H., 2020. Diagnosis of autism
spectrum disorder from EEG using a time–frequency spectrogram image‐
based approach. Electronics Letters, 56(25), pp.1372-1375.
[12] Negin, F., Ozyer, B., Agahian, S., Kacdioglu, S. and Ozyer, G.T., 2021.
Vision-assisted recognition of stereotype behaviors for early diagnosis of
Autism Spectrum Disorders. Neurocomputing, 446, pp.145-155.
[13] Yang, X., Shyu, M.L., Yu, H.Q., Sun, S.M., Yin, N.S. and Chen, W.,
2018. Integrating image and textual information in human–robot
interactions for children with autism spectrum disorder. IEEE
transactions on multimedia, 21(3), pp.746-759.
[14] Pavez, R., Diaz, J., Arango-Lopez, J., Ahumada, D., Mendez-Sandoval,
C. and Moreira, F., 2021. Emo-mirror: a proposal to support emotion
Fig. 9. Comparative analysis of EODL-ASDC system with recognition in children with autism spectrum disorders. Neural
existing approaches Computing and Applications, pp.1-12.
[15] Mekbib, E., Huang, Y., Mei, C. and Li, Y.J., 2021, October. Designing a
V. CONCLUSION Smart Virtual Environment for Autism Spectrum Disorder Detection.
In this article, a new EODL-SDC system was introduced In 2021 IEEE SmartWorld, Ubiquitous Intelligence & Computing,
Advanced & Trusted Computing, Scalable Computing &
ASD classification process. The presented EODL-SDC Communications, Internet of People and Smart City Innovation
technique operates in two major phases. In the initial phase, the (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI) (pp. 288-294). IEEE.
presented EODL-SDC technique applied the DBN model for [16] Chen, Y.Q., Lin, F.A., Yang, T.Y., Yeh, S.C., Wu, E.H.K., Poole, J.M.
ASD classification process. Next, in the second phase, the and Shao, C., 2021, October. A VR-based Training and Intelligent
EODL-SDC technique utilized the EO algorithm as a Assessment System Integrated with Multi-modal Sensing for Children
hyperparameter optimizer. To demonstrate the enhanced ASD with Autism Spectrum Disorder. In 2021 IEEE 3rd Eurasia Conference
on IOT, Communication and Engineering (ECICE) (pp. 191-195). IEEE.
classification outcome of the EODL-ASDC method, an
extensive range of experimental investigates was executed. The [17] Wang, Y., Pan, Z., Yuan, X., Yang, C. and Gui, W., 2020. A novel deep
learning based fault diagnosis approach for chemical process with
experimental results demonstrate the improvements of the extended deep belief network. ISA transactions, 96, pp.457-467.
EODL-ASDC technique over other approaches. Thus, the [18] Faramarzi, A., Heidarinejad, M., Stephens, B. and Mirjalili, S., 2020.
presented EODL-ASDC technique can be employed for accurate Equilibrium optimizer: A novel optimization algorithm. Knowledge-
and timely ASD classification process. Based Systems, 191, p.105190.
[19] Houssein, E.H., Dirar, M., Abualigah, L. and Mohamed, W.M., 2022. An
REFERENCES efficient equilibrium optimizer with support vector regression for stock
[1] Wadhera, T. and Kakkar, D., 2020. Big data-based system: A supportive market prediction. Neural Computing and Applications, 34(4), pp.3165-
tool in autism spectrum disorder analysis. In Interdisciplinary approaches 3200.
to altering neurodevelopmental disorders (pp. 303-319). IGI Global.
[2] Ferrari, E., 2022. Artificial Intelligence for Autism Spectrum Disorders.
In Artificial Intelligence in Medicine (pp. 1579-1593). Cham: Springer
International Publishing.
[3] El Arbaoui, F.E.Z., El Hari, K. and Saidi, R., 2021, November. A Survey
on the Application of the Internet of Things in the Diagnosis of Autism
Spectrum Disorder. In International Conference on Advanced
Technologies for Humanity (pp. 29-41). Springer, Cham.
[4] Karunakaran, P., and Yasir Babiker Hamdan. "Early Prediction of Autism
Spectrum Disorder by Computational Approaches to fMRI Analysis with
Early Learning Technique." Journal of Artificial Intelligence 2, no. 04
(2020): 207-216.
[5] Vivekanandam, B. "Automated Multimodal Fusion Technique for the
Classification of Human Brain on Alzheimer’s Disorder." Journal of
Electrical Engineering and Automation 3, no. 3 (2021): 214-229.
[6] Song, D.Y., Kim, S.Y., Bong, G., Kim, J.M. and Yoo, H.J., 2019. The use
of artificial intelligence in screening and diagnosis of autism spectrum
disorder: a literature review. Journal of the Korean Academy of Child and
Adolescent Psychiatry, 30(4), p.145.
[7] Colizzi, M., Sironi, E., Antonini, F., Ciceri, M.L., Bovo, C. and Zoccante,
L., 2020. Psychosocial and behavioral impact of COVID-19 in autism
spectrum disorder: an online parent survey. Brain sciences, 10(6), p.341.
[8] Sharma, A. and Tanwar, P., 2022, May. Identification of Autism
Spectrum Disorder (ASD) from Facial Expressions using Deep Learning.
In 2022 International Conference on Machine Learning, Big Data, Cloud
and Parallel Computing (COM-IT-CON) (Vol. 1, pp. 478-484). IEEE.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 587


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Automated Intracranial Haemorrhage Detection and


Classification using Rider Optimization with Deep
Learning Model
Dr.T.S. Karthik Dr. Naziya Hussain
Professor, Associate Professor,
Department of Electronics and Communication School of Computers, IPS Academy, Indore,
Engineering, Madhya Pradesh, India,
Aditya College of Engineering and naziyahussain@gmail.com
Technology, Surampalem, Andhrapradesh, India, Rajasekhar Pinnamaneni
writetotsk@gmail.com Department of Biotechnology,
N K Anushkannan Koneru Lakshmaiah Education Foundation,
Associate Professor & Head, Vaddeswaram, Guntur, Andhra Pradesh, India,
Department of ECE, Kathir College of pinnamaneniraj@yahoo.com
Engineering, Coimbatore, Tamilnadu, India, Shyamali das
anushkannan@kathir.ac.in Assistant professor,
Vijayakrishna Rapaka E Department of CSE, CMR group of institutions
Student, Data Science, Indian Institute of (SOSS), Bangalore, Karnataka, India,
Technology Madras, Chennai, Tamilnadu, India, mail.shyamali@gmail.com
vijayakrishnarapaka@gmail.com
Abstract—Intracranial haemorrhage (ICH) refers to a
pathological disorder that requires quick decision-making and I. INTRODUCTION
diagnosis. Computed tomography (CT) can be accurate and Intracranial hemorrhage (ICH) is a significant and serious
dependable diagnosis method for identifying haemorrhages. disease that has provided the basis for heart stroke and disease
Automated recognition of ICH through CT scans with a computer- [1]. Mostly, ICH severely affects overweight people, and rate of
aided diagnosis (CAD) method will be useful to classify and detect death progressively improved within a short amount of time.
the distinct grades of ICH. Due to the latest development of deep
Furthermore, it takes place in different intracranial blocks that
learning (DL) techniques in image processing applications,
numerous medical imaging methods use it. Thus, this article
are caused by various outside influences [2, 3]. For the treatment
develops an automated ICH detection and classification using of ICH, a neuro-imaging model is accessible to examine the
Rider Optimization with Deep Learning (ICHDC-RODL) model. amount of hemorrhage and position and its imminent cerebral
The presented ICHDC-RODL technique mainly determines the damages that assist inpatient treatments. But it is affected the
presence of ICH using DL concepts. In the presented ICHDC- exterior in the brain parenchyma (extra-axial) [4]. Medical
RODL technique, the features are generated by the use of Xtended admittance of ICH was drastically boosted due to abnormal
Central Symmetric Local Binary Pattern (XCS-LBP) model. blood pressure management, growing population, and expensive
Moreover, the bidirectional long short-term memory (BiLSTM) lifestyle [5]. Moreover, later diagnoses of ICH cause severe
method is employed for ICH diagnosis. At last, the rider health impacts which lead to mass mortality within a minimum
optimization algorithm (ROA) is exploited for the hyperparameter duration, Computed tomography (CT) is the common
tuning procedure of the BiLSTM method. To demonstrate the methodology used for the diagnosis of ICH [6]. Thus, an
enhanced outcomes of the ICHDC-RODL technique, a series of automated notification method using the DL-AI methodology
simulations were performed and the results are examined under was developed for the diagnosis of ICH.
various aspects. The simulation outcomes indicate the In recent times, different DL based AI techniques were
enhancements of the ICHDC-RODL technique over recent effectively introduced for medical imaging interpretation tasks
approaches. with accurateness corresponding to medical specialists namely
grading of diabetic retinopathy, diagnoses of skin tumor, and
Keywords— Intracranial haemorrhage diagnosis; Deep
breast tumor recognition [7, 8]. This AI technique could possibly
learning; Artificial intelligence; Machine learning; Healthcare
sector function as a second reader to guarantee appropriate diagnosis
of higher impact subtle results, and also could be performed as
a triage tool for facilitating appropriate diagnoses of acute
events. [9] There exist previously some studies on the expansion

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 588


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of DCNN model for the automated classification or detection of related to the TL method. Alfaer et al. [14] modelled an
ICH [10]. automated ICH analysis through fuse -related DL with SI
This article develops an automated ICH detection and (AICH-FDLSI) technique. The AICH-FDLSI technique
classification using Rider Optimization with Deep Learning functions in 4 major stages like classification, preprocessing,
(ICHDC-RODL) method. The presented ICHDC-RODL feature extraction, and image segmentation. Moreover, the
technique mainly determines the presence of ICH using DL fusion-related feature extracting technique utilizing the
concepts. In the presented ICHDC-RODL technique, the EfficientNet and CapsNet has been enforced for deriving a
features are generated by the use of Xtended Central Symmetric valuable attribute set. Furthermore, DHO technique was
Local Binary Pattern (XCS-LBP) model. Moreover, the employed for the parameter optimized of the DenseNet and
bidirectional long short term memory (BiLSTM) method is CapsNet methods. Lastly, an FSVM was enforced as a classifier
employed for ICH diagnosis. At last, the rider optimization approach for recognizing the diverse classes of ICH.
algorithm (ROA) is exploited for the hyperparameter tuning In [15], the DL techniques, hybrid methods CNN with
procedure of the BiLSTM method. To demonstrate the enhanced LSTM and CNN with GRU were modelled for Brain
outcomes of the ICHDC-RODL method, a series of simulations Hemorrhage categorization. The main aim of this work was to
will be performed and the fallouts were scrutinized in numerous employ the concept influence of DL on a set of less images since
features. in most critical cases wide datasets are non-accessible on the
spot. The image growth and unbalancing the data approaches
II. RELATED WORKS were implemented with CNN technique for designing a unique
Anupama et al. [11] advance DL–related ICH diagnosis structure called Brain Hemorrhage Classification related to NN
utilizing GrabCut-oriented segmentation including synergic (BHCNet). Hilal et al. [16] grant a brainy ICH diagnosis
deep learning (SDL), termed GC-SDL method. The modelled utilizing biosignals (IICHD-BS) in IoT setting. Besides, IICHD-
technique uses Gabor filter for noise removal so that the BS method pays optimal area growing based division method
duplicate excellence is elevated. Moreover, GrabCut-related for detection the diseased intelligence areas in the CT images.
segmentation method was enforced to recognize the Also, EfficientNet related feature removal and functional link
contaminated portions efficiently in the image. For performing NN (FLNN) related arrangement method are castoff for noticing
the feature extracting procedure, SDL technique was used and to and categorizing the presence of ICH.
end, softmax layer was utilized as a technique. Rahman et al.
[12] offer a DL technique named CNN on neuroimaging with III. THE PROPOSED MODEL
TL methods for supporting the analysis of intra hemorrhage on In this article, a new ICHDC-RODL method was devised for
CT scans. The author employed six pre-trained CNN techniques the ICH detection and classification process. The presented
(VGG16, EfficientNet_B6, ResNet50, DenseNet_121, ICHDC-RODL technique mainly determines the presence of
InceptionResNet_V2, InceptionV3,) and even provide a ICH using DL concepts. In the presented ICHDC-RODL
conventional CNN method of 11-layer structure for detecting technique, the features are generated by the use of the XCS-LBP
binary organization of intracranial brain loss on CT scans. model. Moreover, the ROA with BiLSTM model is employed
Kumar [13] scrutinizes the intracranial hemorrhage for ICH diagnosis. Fig. 1 represents the block diagram of
detection issue and advances a DL technique and TL approaches ICHDC-RODL system.
for diminishing the time mandated for recognizing hemorrhages.
For classifying ICH sub types, the author formulated a CNN

Fig. 1. Block diagram of ICHDC-RODL system

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 589


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ℎ𝑡 = o𝑡 ⊙ tanh (𝑐𝑡 ), (6)


A. Feature Extraction Model
Now, ⊙ shows the Hadamard product. A BiLSTM
In the presented ICHDC-RODL technique, the features are encompasses two corresponding LSTM layers: backward and
generated by the use of the XCS-LBP model. The idea over CS‐ forward directions. Meanwhile, the input was treated 2 times,
LBP was comparable to the gray pairs of picture elements in Bi-LSTM extracts data quantity from input. Fig. 2 defines the
centred symmetric directions as an substitute of associating the framework of BiLSTM system. Thus, enhance context dataset
main pixels to its neighbours [17]. An XCS‐LBP is parallel to to make best prediction than LSTM. Therefore, BiLSTM
CS‐LBP however it deliberates the main pixels. This will presented faster convergence and accuracy than LSTM. The Bi-
overwhelm the subtle sound in an image. The XCS‐LBP is LSTM encompasses past and forthcoming contexts. The LSTM
described below: output can be incorporated by the following expression:
𝑃
( )−1
𝑦𝑡 = 𝑊ℎ⃗𝑦 ℎ⃗ 𝑡 + 𝑊 ⃖⃗ ℎ
⃖⃗
2 ℎ 𝑦 𝑡 + 𝑏𝑦′ (7)
𝑋𝐶𝑆 − 𝐿𝐵𝑃𝑃,𝑅 (𝑐) = ∑ 𝑠 (g1 (𝑖𝑡 𝑐) + 𝑔2 (i, 𝑐)). 2𝑖 (1) ⃗ ⃖⃗
From the expression, ℎ𝑡 𝑎𝑛𝑑 ℎ𝑡 denotes the output of the
𝑖=0 forward and backward LSTMs.
where,
𝑔1 (𝑖𝑡 𝑐) = (𝑔𝑖 − 𝑔𝑖+(𝑃) ) + g 𝑐 C. ROA based Hyperparameter Tuning
2 Finally, the ROA is exploited for the hyperparameter tuning
𝑔2 (𝑖𝑡 𝑐) = (𝑔𝑖 − 𝑔𝑐 )(𝑔𝑖+(𝑃) − 𝑔𝑐 ) procedure of the BiLSTM model. D Binu [19] established the
2
XCS‐LBP citations whole image data and is healthier to ROA algorithm is a portion of the optimization technique class
noise than LBP and CS‐ LBP. It can measure contiguity of the that received motivation from the rider riding the race. Now, the
sprinkling pixels in the medium GLCM to its oblique. It's series major types of riders include Or (Over‐taker), Fr (Follower), Br
deceits amongst 0 to 1. (Bypass), and Ar (Attacker). The concept utilized in POA has
been demonstrated below:
B. ICH Classification Model Initialization: ROA occurs for every four groups 𝐹𝑟, 𝐵𝑟, 𝐴𝑟,
To classify the ICH accurately, the BiLSTM model is and 𝑂𝑟 is demonstrated by 𝐺𝑖 and the scientific methodology
employed for ICH diagnosis. The LSTM is a class of RNN utilized in group initialization is demonstrated below, whereby
established initially to overcome the deficiency of gradient the rider count 𝑅𝑖 is same as 𝐺𝑖, the dimension count of 𝑢-𝑡ℎ
vanishing problem of RNN when managing long term sequence riders and the location or coordinate at a certain example of time
[18]. The LSTM model includes typical LSTM and FFNN units. are demonstrated with the help of symbols 𝐸 𝑡 and 𝑄𝑖 (u,v)
In general, LSTM unit functions: assume 𝑥𝑡 characterize the correspondingly. The overall amount of riders is evaluated by
prevailing input at time 𝑡, output of input gates was shown the sum of riders. Furthermore, together with the initial group,
below, variables namely accelerator, brake, and steering are also
𝑖𝑡 = 𝜎(𝑊𝑖𝑥 𝑥𝑡 + 𝑊𝑖ℎ ℎ𝑡−1 + 𝑏𝑖 ), (2) initialized. The equation utilized for Sa (Steering‐Angle) in the
Now, 𝑊𝑖𝑥 and 𝑊𝑖ℎ denotes the weight matrix, ℎ𝑡−1 rider vehicles is denoted as follows.
represents the preceding hidden unit, and 𝑏𝑖 characterize the bias 𝐸 𝜏 = {𝐸 𝜏 (𝑢, 𝜈); 1 ≤ 𝑢 ≤ 𝑅𝑖; 1 ≤ 𝜈 ≤ 𝑄𝑖 (8)
vectors. The function 𝜎(𝑥) ∈ (0,1) represents a sigmoid 𝑅𝑖 = 𝐵𝑦𝑝𝑎𝑠𝑠 + 𝑓𝑜𝑙𝑙𝑜𝑤𝑒𝑟 + 𝑜𝑣𝑒𝑟𝑇𝑎𝑘𝑒𝑟
functions employed for gating. + 𝑎𝑡𝑡𝑎𝑐𝑘𝑒𝑟 (9)
𝜏
𝑆𝑎 = {𝑆𝑎𝑢,𝑣 }; 1 ≤ 𝑢 ≤ 𝑅𝑖; 1 ≤ 𝑣
≤ 𝑄𝑖 (10)
Success rate evaluation: The 𝑆𝑟 based on the distance within
the target and the rider locations are evaluated. The target and
rider locations are correspondingly represented as 𝑇𝑜 𝑆𝑎 and 𝐸 𝑢 .
According to the 𝑆𝑟, the leading rider can be chosen. The
maximum accuracy rate can be accomplished using the rider
whereby the distance amid the location is lower.
1
𝑆𝑟 = 𝑢 (11)
‖𝐸 − 𝑇𝑜 𝑆𝑎 ‖
Upgrading the Rider location: The leading rider can be
evaluated with the help of the location updating procedure is
reliant on the rider's location in all the sets [20].
𝑖. Bypass‐upgrading the Rider location:
The Bypass‐Rider is the first class set of riders that have
Fig. 2. Architecture of BiLSTM accomplished the objective location without following other
riders. The formulation exploited for the computation for the
Similarly, the output of forget gate 𝑓𝑡 is estimated as follows: location of the bypass of the riders, whereas 𝛿 and 𝛽 denote
𝑓𝑡 = 𝜎(𝑊𝑓𝑥 𝑥𝑡 + 𝑊𝑓ℎ ℎ𝑡−1 + 𝑏𝑓 ). (3) random value that ranges within [0, 1]. Besides, 𝜆 and 𝜒 indicate
To end with, the output of output gate 0𝑡 and cell states 𝑐𝑡 are arbitrary value that ranges within 𝑅𝑖 to 1.
𝑡+1 (𝑢,
𝐸𝐵𝑟 𝜈) = 𝛽[𝐸 𝜏 (𝑥, 𝜈) × 𝛿(𝜈) + 𝐸 𝑡 (𝜆, 𝜈) × [1 − 𝛿(𝑣)]] (12)
shown below:
𝑐𝑡 = 𝑖𝑡 ⊙ tanh (𝑊𝑐𝑥 𝑥𝑡 + 𝑊𝑐ℎ ℎ𝑡−1 + 𝑏𝑐 ) + 𝑐𝑡−1 , (4) ii. Updating procedure for Follower‐Rider:
o𝑡 = 𝜎(𝑊0𝑥 𝑥𝑡 + 𝑊0ℎ ℎ𝑡−1 + 𝑏0 ), (5)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 590


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The Follower‐Rider trail tracks followed by 𝐵𝑟 for arriving


at the objective faster and it is evaluated as following. The Index‐
leading of Rider, Selector‐Coordinate, and the position of
Leading‐Rider are given by 𝑏 and E. The other terms such as
𝜏
𝑆𝑎𝑢,𝑏 , manifesting the steering angle during hand‐off.
𝑡+1 (𝑢, 𝑡
𝐸𝐹𝑟 𝑏) = 𝐸 𝑇𝑜 (𝑇𝑜, 𝑏) + [cos(𝑆𝑎𝑢,𝑏 ) × 𝐸 𝑇𝑜 (𝑇𝑜, 𝑏) × 𝑑𝑖𝑢𝑡 ] (13)
iii. Update process for the Attacker‐Riders:
The Attacker‐Rider attempt to control the location of the
Leading‐Rider by covering the parallel path as leading‐rider.
The position can be upgraded, wherein the position of the
distance should be covered with 𝑢-𝑡ℎ with respect to 𝑏
coordinates, and leading‐rider places are denoted by 𝐸 𝑇𝑜 (, 𝑣)
and 𝑑𝑖𝑢𝑡 . The success rate for all the riders was estimated when
the position is upgraded, however, to evaluate the effective
optimal solution, it is essential to upgraded the rider argument.
𝜏+1 (𝑢,
𝐸𝐴𝑟 𝑣) = 𝐸 𝑇𝑜 (𝑇𝑜, 𝑣) + [ cos (𝑆𝑎𝑢,𝑣
𝑡+1 ) × 𝐸 𝑇𝑜 (𝑇𝑜, 𝜈)] + 𝑑𝑖 𝑡 (14)
𝑢
Fig. 3. 𝑆𝑒𝑛𝑠𝑦 and 𝑆𝑝𝑒𝑐𝑦 analysis of ICHDC-RODL system
IV. RESULTS AND DISCUSSION with distinct epochs
This section investigates the performance of the ICHDC-
RODL method under varying epochs. Table 1 reports a brief Fig. 4 offers a 𝑎𝑐𝑐𝑢𝑦 and 𝐹𝑠𝑐𝑜𝑟𝑒 assessment of the ICHDC-
result analysis of the ICHDC-RODL method under distinct RODL model. On 100 epochs, the ICHDC-RODL model has
epoch counts. grasped 𝑎𝑐𝑐𝑢𝑦 and 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.14% and 97.95% respectively.
Likewise, on 300 epochs, the ICHDC-RODL model has reached
TABLE I
𝑎𝑐𝑐𝑢𝑦 and 𝐹𝑠𝑐𝑜𝑟𝑒 of 97.21% and 98.29% correspondingly. Also,
RESULT ANALYSIS OF ICHDC-RODL SYSTEM WITH DISTINCT on 500 epochs, the ICHDC-RODL model has grasped 𝑎𝑐𝑐𝑢𝑦
EPOCHS AND MEASURES
and 𝐹𝑠𝑐𝑜𝑟𝑒 of 98.34% and 98.56% correspondingly.
No. of F-
Sensitivity Specificity Accuracy
Epochs Score
Epoch-100 97.12 97.78 95.14 97.95
Epoch-200 95.77 96.79 98.10 95.14
Epoch-300 97.90 98.25 97.21 98.29
Epoch-400 95.65 97.33 96.78 96.00
Epoch-500 98.51 98.56 98.34 98.56

Fig. 3 offers a 𝑠𝑒𝑛𝑠𝑦 and 𝑠𝑝𝑒𝑐𝑦 assessment of the ICHDC-


RODL model. On 100 epochs, the ICHDC-RODL model has
reached 𝑠𝑒𝑛𝑠𝑦 and 𝑠𝑝𝑒𝑐𝑦 of 97.12% and 97.78% respectively.
Also, on 300 epochs, the ICHDC-RODL system has got 𝑠𝑒𝑛𝑠𝑦
and 𝑠𝑝𝑒𝑐𝑦 of 97.90% and 98.25% correspondingly. Also, on 500
epochs, the ICHDC-RODL model has gotten 𝑠𝑒𝑛𝑠𝑦 and 𝑠𝑝𝑒𝑐𝑦
of 98.51% and 98.56% correspondingly.
Fig. 4. 𝐴𝑐𝑐𝑢𝑦 and 𝐹𝑠𝑐𝑜𝑟𝑒 analysis of ICHDC-RODL system
with distinct epochs

The 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 gained by the ICHDC-RODL method


under test database is exemplified in Fig. 5. The simulation
conclusion exhibited the ICHDC-RODL system has attained
maximal values of 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 . Specifically, the 𝑉𝐿𝑎𝑐𝑐 is
greater than 𝑇𝑅𝑎𝑐𝑐 .
The 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 attained by the ICHDC-RODL
approach under test database are recognized in Fig. 6. The
simulation fallouts implied the ICHDC-RODL method has
exemplified least values of 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 . Seemingly, the
𝑉𝐿𝑙𝑜𝑠𝑠 is lesser than 𝑇𝑅𝑙𝑜𝑠𝑠 .

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 591


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 5. Analysis of ICHDC-RODL system

Fig. 7. 𝑆𝑒𝑛𝑠𝑦 analysis of ICHDC-RODL system with other


existing approaches

Fig. 8 displays a comparative 𝑠𝑝𝑒𝑐𝑦 review of the ICHDC-


RODL system with existing methodologies. The fallouts
signified the U-Net method has grasped least 𝑠𝑝𝑒𝑐𝑦 of 89.32%.
After, the WED-DCNN and CNN approaches have reported
slightly enhanced 𝑠𝑝𝑒𝑐𝑦 of 91.82% and 94.06%
correspondingly. Although the SVM and ResNexT techniques
have revealed reasonable 𝑠𝑝𝑒𝑐𝑦 of 94.50% and 94.86%, the
ICHDC-RODL model has achieved maximum 𝑠𝑝𝑒𝑐𝑦 of
98.56%.
Fig. 6. 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 analysis of ICHDC-RODL system

To depict the betterment of the ICHDC-RODL model, a


comparative review is made in Table 2.
TABLE II
COMPARATIVE ANALYSIS OF ICHDC-RODL SYSTEM WITH
OTHER EXISTING TECHNIQUES

Methods Sensitivity Specificity Accuracy F-Score


ICHDC-
98.51 98.56 98.34 98.56
RODL
SVM 89.57 94.50 90.46 95.78
CNN 90.47 94.06 93.91 95.23
WED-DCNN 95.79 91.82 94.11 95.92
ResNexT 90.31 94.86 92.53 92.81
U-Net 94.76 89.32 91.65 90.61 Fig. 8. 𝑆𝑝𝑒𝑐𝑦 analysis of ICHDC-RODL system with other
existing approaches
Fig. 7 exhibits a comparative 𝑠𝑒𝑛𝑠𝑦 review of the ICHDC-
RODL method with existing techniques. The outcomes signified Fig. 9 displays the detailed 𝑎𝑐𝑐𝑢𝑦 examination of the
the SVM method has reached least 𝑠𝑒𝑛𝑠𝑦 of 89.57%. Then, the ICHDC-RODL technique with existing techniques. The fallouts
CNN and ResNexT models have reported slightly enhanced indicated the U-Net method has achieved least 𝑎𝑐𝑐𝑢𝑦 of
𝑠𝑒𝑛𝑠𝑦 of 90.47% and 90.31% respectively. Although the U-Net 91.65%. Then, the CNN and ResNexT models have reported
and WED-DCNN models have shown reasonable 𝑠𝑒𝑛𝑠𝑦 of slightly enhanced 𝑎𝑐𝑐𝑢𝑦 of 93.91% and 92.53% respectively.
94.76% and 95.79%, the ICHDC-RODL model has attained Although the SVM and WED-DCNN models have shown
maximum 𝑠𝑒𝑛𝑠𝑦 of 98.51%. reasonable 𝑎𝑐𝑐𝑢𝑦 of 90.46% and 94.11%, the ICHDC-RODL
model has reached maximum 𝑎𝑐𝑐𝑢𝑦 of 98.34%.
Fig. 10 displays a comparative 𝐹𝑠𝑐𝑜𝑟𝑒 review of the ICHDC-
RODL technique with existing approaches. The fallouts
signified that the U-Net method has reached least 𝐹𝑠𝑐𝑜𝑟𝑒 of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 592


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

90.61%. Then, the CNN and ResNexT approaches have reported REFERENCES
slightly enhanced 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.23% and 92.81% [1] Mansour, R.F., Escorcia-Gutierrez, J., Gamarra, M., Díaz, V.G., Gupta,
correspondingly. Although the SVM and WED-DCNN D. and Kumar, S., 2021. Artificial intelligence with big data analytics-
techniques have shown reasonable 𝐹𝑠𝑐𝑜𝑟𝑒 of 95.78% and based brain intracranial hemorrhage e-diagnosis using CT images. Neural
Computing and Applications, pp.1-13.
95.92%, the ICHDC-RODL model has reached maximum 𝐹𝑠𝑐𝑜𝑟𝑒
of 98.56%. Thus, the presented ICHDC-RODL model can be [2] Altuve, M. and Pérez, A., 2022. Intracerebral hemorrhage detection on
computed tomography images using a residual neural network. Physica
employed for effectual classification process. Medica, 99, pp.113-119.
[3] Chen, H., Khan, S., Kou, B., Nazir, S., Liu, W. and Hussain, A., 2020. A
smart machine learning model for the detection of brain hemorrhage
diagnosis based internet of things in smart cities. Complexity, 2020.
[4] Woźniak, M., Siłka, J. and Wieczorek, M., 2021. Deep neural network
correlation learning mechanism for CT brain tumor detection. Neural
Computing and Applications, pp.1-16.
[5] Phan, A.C., Cao, H.P., Trieu, T.N. and Phan, T.C., 2020, November.
Detection and classification of brain hemorrhage using Hounsfield unit
and deep learning techniques. In International Conference on Future
Data and Security Engineering (pp. 281-293). Springer, Singapore.
[6] Muthumanjula, M., and Ramasubramanian Bhoopalan. "Detection of
White Blood Cell Cancer using Deep Learning using Cmyk-Moment
Localisation for Information Retrieval." Journal of IoT in Social, Mobile,
Analytics, and Cloud 4, no. 1 (2022): 54-72.
[7] Bindhu, V., and Villankurichi Saravanampatti PO. "Semi-Automated
Segmentation Scheme for Computerized Axial Tomography Images of
Esophageal Tumors." Journal of Innovative Image Processing (JIIP) 2,
no. 02 (2020): 110-120.
Fig. 9. 𝐴𝑐𝑐𝑢𝑦 analysis of ICHDC-RODL system with other [8] Malik, P. and Vidyarthi, A., 2022. A deep learning assisted image-guided
existing approaches framework for differentiation among tumors and hemorrhages in head
imaging. Computers and Electrical Engineering, 103, p.108330.
[9] Rane, H. and Warhade, K., 2021, March. A Survey on Deep Learning for
Intracranial Hemorrhage Detection. In 2021 International Conference on
Emerging Smart Computing and Informatics (ESCI) (pp. 38-42). IEEE.
[10] Sharrock, M.F., Mould, W.A., Ali, H., Hildreth, M., Awad, I.A., Hanley,
D.F. and Muschelli, J., 2021. 3D deep neural network segmentation of
intracerebral hemorrhage: development and validation for clinical
trials. Neuroinformatics, 19(3), pp.403-415.
[11] Anupama, C.S.S., Sivaram, M., Lydia, E.L., Gupta, D. and Shankar, K.,
2020. Synergic deep learning model–based automated detection and
classification of brain intracranial hemorrhage images in wearable
networks. Personal and Ubiquitous Computing, pp.1-10.
[12] Rahman, A.I., Bhuiyan, S., Reza, Z.H., Zaheen, J., Khan, T.A.N. and
Karim, D.Z., 2022, March. Intracranial Hemorrhage Detection on CT
Scan Images using Transfer Learning Approach of Convolutional Neural
Network. In Proceedings of the 2nd International Conference on
Computing Advancements (pp. 171-177).
[13] Kumar, R., 2021. Intracranial Hemorrhage Detection Using Deep
Learning and Transfer Learning (Doctoral dissertation, Dublin, National
College of Ireland).
Fig. 10. 𝐹𝑠𝑐𝑜𝑟𝑒 analysis of ICHDC-RODL system with other [14] Alfaer, N.M., Aljohani, H.M., Abdel-Khalek, S., Alghamdi, A.S. and
existing approaches Mansour, R.F., 2022. Fusion-based deep learning with nature-inspired
algorithm for intracerebral haemorrhage diagnosis. Journal of Healthcare
V. CONCLUSION Engineering, 2022.
[15] Mushtaq, M.F., Shahroz, M., Aseere, A.M., Shah, H., Majeed, R.,
In this article, a new ICHDC-RODL system was projected Shehzad, D. and Samad, A., 2021. BHCNet: neural network-based brain
for the ICH detection and classification process. The presented hemorrhage classification using head CT Scan. IEEE Access, 9,
ICHDC-RODL technique mainly determines the presence of pp.113901-113916.
ICH using DL concepts. In the presented ICHDC-RODL [16] Hilal, A.M., Alabdan, R., Othman, M.T.B., Hassine, S.B.H., Al‐Wesabi,
technique, the features are generated by the use of the XCS-LBP F.N., Rizwanullah, M., Yaseen, I. and Motwakel, A., 2022. Modelling of
model. Moreover, the BiLSTM model is employed for ICH biosignal based decision making model for intracranial haemorrhage
diagnosis in IoT environment. Expert Systems, p.e12964.
diagnosis. At last, the ROA is exploited for the hyperparameter
[17] Lakshmi, M.D., Murugan, S.S., Padmapriya, N. and Somasekar, M.,
tuning procedure of the BiLSTM method. To establish the 2019, December. Texture analysis on side scan sonar images using EMD,
boosted outcomes of the ICHDC-RODL system, a series of XCS-LBP and statistical co-occurrence. In 2019 International
simulations were performed and the outcomes are studied in Symposium on Ocean Technology (SYMPOL) (pp. 91-97). IEEE.
several aspects. The simulation results indicate the [18] Hanson, J., Paliwal, K., Litfin, T., Yang, Y. and Zhou, Y., 2018. Accurate
enhancements of the ICHDC-RODL method over recent prediction of protein contact maps by coupling residual two-dimensional
techniques. bidirectional long short-term memory with convolutional neural
networks. Bioinformatics, 34(23), pp.4039-4045.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 593


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[19] Binu, D. and Kariyappa, B.S., 2018. RideNN: A new rider optimization
algorithm-based neural network for fault diagnosis in analog
circuits. IEEE Transactions on Instrumentation and Measurement, 68(1),
pp.2-26.
[20] Rahul, K., 2021. Rider Optimization Algorithm (ROA): An optimization
solution for engineering problem. Turkish Journal of Computer and
Mathematics Education (TURCOMAT), 12(12), pp.3197-3201.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 594


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Heart Disease Prediction and Classification using


Machine Learning and Transfer Learning Model

R Sivaprasad Dr. M.Hema Dr Bharati N Sunil D M Dr. Vaishali Mochammad


Department of Assistant Professor Ganar Department of ECE Mehta Fahlevi
Electrical and Department of ECE Department of Assistant Professor Professor Department of
Electronics JNTU-GV College Anesthesia. REVA university Department of Management,
Engineering of Engineering, Associate India Computer Science BINUS Online
Associate Professor India professor. sunil.dm@reva.edu and Engineering Learning,
Sri Sairam hema.asrith@gmail ESIC medical .in Panipat Institute of Bina Nusantara
Engineering .com College Engineering and University,
College India Technology, Indonesia
India drbharativm74@g India mochammad.fahlev
sivaprasad.eee@sai mail.com wadhwavaishali@g i@binus.ac.id
ram.edu.in mail.com

Abstract— Heart disease is a dangerous condition that can the IT solutions makes it possible to access the data from
lead to a fatal condition due to cardiac arrest. Recent studies different locations to produce the intelligence [2]. The
have revealed various facts for analyzing cardiac data by sensing, dimension of data also gets changed to another form named big
monitoring, and learning data in IoT to predict early diagnosis data, which represent the huge in size but also in schema [3].
and treatment. Through machine learning based feature analysis, The organizations maintain big data in various network
accurate disease detection has been implemented. However, the locations, which can be accessed to produce intelligence
dominant methods do not accurately predict the result since the towards decision making or anything. To provide access to the
incorrect features contain non-related support values to select the big data there are number of protocols has been discussed
features to perform training validation and produce prediction
inaccuracy. To overcome this limitation, a Machine Learning and earlier by various researchers
Transfer Learning Model (TLM) is proposed to perform heart The heart plays an important role in life. Diagnosis and
disease prediction. Initially, pre-processing has been carried prediction of heart related diseases should be very accurate [4],
out to reduce dimension, and the scaling factor was also used to complete and accurate because even the slightest mistake can
calculate the margin rate. To increasing the prediction accuracy lead to fatigue and human death. There are many deaths related
Disease Prone Impact Rate (DPIR) intends to find the support to heart and the number is increasing day by day. To solve this
values. To select the labeled features, Relative Feature Margin problem, a prognosis system for disease awareness is needed.
S election (RFMS ) is used to select and train the model by
Multilayer perception neural network (MLPNN). This classifier Machine learning is a field of artificial intelligence (AI) that
selects the margin weights to predict the heart disease risk level provides first-class support in predicting all types of events
based on the class. This predicts higher impact of cardiac trained from natural phenomena [5]. In this paper, we calculate
deficiency rate by attaining the relevant features based deep the accuracy of machine learning methods for predicting heart
feature data learning model, which produce higher precision rate disease. This algorithm uses the UCI repository database for
to increase the prediction accuracy than other methods. training and testing k-near neighbors, end tree, linear
regression, support vector machine (SVM) [6]. Anaconda
Keywords— heart disease prediction, feature selection and
(jupytor) notebook is the perfect tool for executing Python
classification, machine learning and transfer learning, neural
programming. This tool has a variety of libraries and title files
network.
that make your work more accurate and precise.

I. INT RODUCT ION Hygiene is an integral part of human life. Because of the
large amount of mental health data available in the healthcare
The growth of information technology has been adapted for industry, machine learning models are used to make effective
several problems. The medical industries use the growth of IT decisions in predicting heart disease [7]. By us ing machine
in several ways. The health care data has been maintained in learning techniques, you can reliably classify healthy and
different locations of any organizational units and it has been unhealthy individuals. In this study, a framework is developed
accessed through modern Internet. Through the Heart data for understanding the principles of predicting a patient's risk
collected information [1], data analysis is the important part in profile using clinical data parameters [8].
the disease prediction and recommendation has been performed
by several units which use the data present in different data The proposed model was developed using the machine
servers located geographically in different locations. However, learning and transfer learning statistic model. Excess fit and fit

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 595


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

related issues are resolved. This model shows excellent results systems to predict the cardiac disease for early diagnose
in both experimental and training data [9]. ANN were used to treatment. There exists several techniques in supporting such
analyze the performance of models that accurately predict the analytics and decisive support systems; still they suffer to
presence or absence of heart disease. achieve higher performance in disease prediction and
generating the analysis. Towards supporting the health care
II. RELAT ED WORK solutions various decision models are presented earlier but to
produce higher support to the decision-making process, it is
The heart disease prediction using Sequential Backward necessary to utilize huge amount of data in terms of big data.
Selection Detection of Heart Disease (HD) models using For a hospital unit, maintaining such huge data becomes a
Machine Learning (ML) will be very useful in the early stages tedious but still the big data can be accessed towards analyzing
[10]. If it is detected at an early stage of the disease [11], HD the bio signals obtained from human body towards detection
models will be useful for treatment and recovery. HD symbolic and prediction of various diseas es.
machine learning technique has been developed to help
doctors.
RF Conjugant feature Multil
In [12] presented a reinforcement learning technique Inpu MS
towards routing in WSN which finds the path to the destination scale factor (CFSF) ayer
t - percep
and selects a route according to hop count, energy and distance. logs ML
[13] Presented a CHD detection approach over machine tion
PN neural
learning which uses ensembles towards disease prediction [14].
Similarly, a hybrid approach is presented to predict cardiac N Disease prone netwo
diseases with machine learning. The method combines several rk
impact rate (DPIR)
techniques towards disease prediction [15]. \
The effective heart disease prediction using hybrid model \
Heart disease is one of the most important causes of death in
the world today. Cardiovascular disease is a major challenge in Relative feature
the field of prediction and analysis of clinical data [16]. The Data
Novel Feature Reduction using machine learning and data logs margin selection
mining algorithms help in risk prediction. Error rate (RFMS)
mechanism of feature selection algorithm and analysis methods
for recommending new feature will reduce the rating process
which combines subgroups [17]. A metric profound influence Optimized prediction
on the choice of different feature selection algorithm that Patient
Monitoring class
evaluates algorithms vary in the middle.
The Monitoring and Heart Disease Prediction System
Using Deep Learning Modified Neural Network (DL-MNN) Figure 1 Proposed architecture diagram RFMS- MLPNN
[16] with the increasing popularity of smart wearable gadgets
offers internet (population) has been shown to present a The heart disease factors are labeled as features in dataset
number of solutions Internet of Things. Unfortunately, the to process the data. The transfer leaning base on artificial
chance of survival is lower for people suffering from sudd en neural network is optimized with multilayer perception be used
cardiac attacks. to analyze the data. When they collect data from medical
dataset which contains heart disease features of the patients’
The use of intelligent Machine learning system based tested values which is directly observed. The preprocessing
random forest algorithm helps in improving heart disease was carried to verify the presence of all the features, filling,
diagnosis. The main cause of Heart Failure (HF) is due to removing, indexing was carried out. This research is about the
narrowing or narrowing of the coronary arteries [17]. The development of heart disease prediction towards accessing big
coronary artery distributes blood to the heat. The stacking and data and how they can be analyzed towards health care.
Non-invasive detection of coronary artery disease, Coronary
Heart Disease (CHD), layering model and invasive technique
3.1 Conjugant feature scale factor (CFSF)
for diagnosis are accurate [18]. However, the invasive
procedure is not suitable for detecting coronary artery disease This stage choose the feature limits from the preprocessed
during an annual physical investigation [19]. Predict dataset. These creates marginal scaling values between higher
cardiovascular events in hypertensive patients to explain the and lower class based on defect ranges from medical domain.
prognosis of patients with hypertension, and is considered to be Based on the margins the features get demilitarized to group
critical to the development of cardiovascular disease the importance of feature labels. This selects the relatively high
prevention. margins based on average mean rate estimation to attain the
clusters as upper and lower boundary values. This reduces
feature dimension to conjugate the disease weightage values to
III. 3. PROPOSED SYST EM
predict.
This research importance is to heart disease prediction
based on machine and transfer learning and health care support

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 596


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Algorithm steps
Begin For this type of support value consensus values is ,

Step 1: Import the weightage features


Step 2: For each instance
If i==1 then The selective prone subjectival;y attin
To calculate average mean rate target position Dpf

and

Feature selection and extraction usually select arbitrarily


Compute the ‘s’ points feature scaling margins is rate belongs to the dependencies of disease factor. Knowledge
referred to a margins high and low values. Denotes the of the search algorithm uses the learning process to guarantee
upper bounds, denotes lower bound. the extraction of features that reduce the dimensions of the data
and improve the classification results.
End if
3.3 Relative feature margin selection (RFMS)
To calculate the average confidence values from
target position medical margins This feature is selected based on the relevant subset
feature by measuring the critical seasonal dimension according
to relative Subset radial function (RSRF) without significantly
= ), n=1,2…,
reducing the accuracy of successful predictions using intensive
agro successive margins (IASM). This ability to capture
End for metabolic forecast data from the seasonal repository of cold
chain products for crops with the collection database
Step 3: For each i of l choose the recognizes that it is suitable for crop cultivation in a particular
Update the defect margins to indexing area.
Algorithm:

End for Step1: Initialize the process Mx-f successive feature impact
rate.
Step 4: Return risk margins of the heart disease scaling
factor. Step 2: Computing all margins from Mx-f;

Stop Step 3 For All Mx-fclass margins Mc; i=0, i++

The above algorithm selects the conjugant scaling factors, Step 4 Select the consecutive class Labels from
to reduce dimension of non-related feature margins, this Mx-f;
support for choosing relational features actively for disease Set max support Lm {s,p, d, ltr, humidity,
affection state. This much support for importance disease rainfall, temperature }
defect level.
End For
3.2 Disease prone impact rate (DPIR) If Lm  Mx-f (class)
This stage the features get decisional into disease affection
Select feature to relative margin (Rm)
rate. The prone to find the risk level relatively taken from
cardiac principle. This selects the prone attain levels cardiac End If
deficiency rate weight is centralized to make comparison and
decision to attain the weight, such as finding the exact Step 5 Construct relative Subset radial function (Srf Mx-
f (RM))
characteristics of a particular transformation ( ) or
developing an evaluative observing importance dense level For each Process the Low margin Successive mean rate
from ‘N’ levels. (Lms)
Create subset for each class Lms<= Mx-f (Rm)
Attain Lmin class (Lmin-c) and (Lmax-c)
Create the subset class L(Max-Min)
Subject prone factors, they a, b are relative margins with ‘y’
variants at constant levels. Split the partition Pi(L) cluster centroid (C)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 597


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

End loop of (j). End


Step 6: Construct intensive agro successive margins (Pi(L)) The aspect values of the data sets are continuous and
the reciprocal information requires additional calculation for
Select the MX feature support weight W-max(s)
the reciprocal data, so instead of reciprocal information we use
Return W-max(s) two similarities for the similarity measure and two weight
margin for comparing the feature. Not all layers are linear.
The above algorithm selects the importance of the Activation function figures the internal result of th e input
feature to reduce the dimens ion by hybridizing the optimization vector and the heaviness of that unit constructs subset cluster
techniques. The selected features be further trained into neural based on pattern mapping. Only the synaptic weights must be
network. Based on the threshold margins the class get trained scholarly found to classify the result which produces high
with soft-max activation function and processed in deep performance.
learning neural network.

3.4 Multilayer perception neural network (MLPNN) IV. 4. RESULT AND DISCUSSION

This classifier identifies the risk of heart disease based on The proposed approach is implemented under python
the selected features trained into neural network. They testing framework using various parameters and performance is
construct transfer leering based neural network using multi- evaluated. This method measures efficiency in the prognosis of
kernel perceptron neural network with soft max decision a disease based on various features and their values. The testing
logical activation function. This sets the condition for each and training were carried through confusion matrix. The results
feature pattern disease influence rate depending on successive of the evaluation are analyzed in conjunction with the
patterns. performance of other approaches. The results will be displayed
in this section.
Step 1: Construct a set feature T to contain the T able 1 values and parameter processed
selected features. Initially T0 = ∅ (n features).
Parameter Value
Step 2: Initialize neural network with number of
neurons and features. Language, Tool Used Python,
Estimate feature support level
Dataset used CVD-cardiac dataset
Step 3: Analyze the disease as first selected feature
T1=max M threshold margin Number of patients 2000
Step 4: for i=2,.., m: Choose feature that maximizes
M Number of features 30/3000
/records
Add features to T then
Compute the number of feature occurrence attribute
pattern Pi. Table 1 shows the details used to evaluate the performance
generated in different ways. Accordingly, the method measures
//transfer terms, k times subset at feed forward performance by various limits. The consequences got are given
layers selection in detail in this section.
Step5: Compute combination of possible feature T able 2: Analysis on Mean precision and recall rate
patterns
Mean precision and recall rate in %
K- Specific features values.
Number of 500 1000 2000
Step6: for each pattern Pi from subset cluster nodes/Methods
factorScf
RF 65 70 77
Estimate the compound relation Crl = ø(Pi Scf))/m. SVM 70 74 83
Ø- Number of repeated pi contained in scf. HDPM 74 80 86
Train the Relation pattern (Rpn) = Crl/total count.
RFMS- 83 85 93
IfMaxTh support >Rpn then. MLPNN
Add Pi to extracted feature Crl.
SsAverage mean The performance of the routes generated by the
various methods was measured and shown in Table 2. Here, the
Return class by Patternpi(Rpn)Risk by class proposed RFMS- MLPNN algorithm produces higher routing
End if efficiency than other approaches.

End For.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 598


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Classification accuracy

RFMS- MLPNN

Methods
HDPM
200 records
SVM
100 records
RF 50 records
70 80 90 100
Accuracy

Figure 2: Mean precision and recall rate


Figure 3: Classification accuracy

Figure 3 shows the clustering performance generated


The routing performance introduced by different by different methods. The proposed RFMS- MLPNN approach
approaches at the nodes of different numbers in the network is has developed high clustering accuracy under a number of
measured and shown in Figure 2. The proposed RFMS- different diseases.
MLPNN approach has a higher routing efficiency than other T able 4: Analysis on Disease Prediction
methods at all levels.
T able 3: Classification accuracy
Disease Prediction Accuracy
Classification accuracy in %
Number of 500 1000 2000 Number of 50 100 200
Records Records
/methods /methods

RF 75 80 86 RF 64 70 76

SVM 81 85 90
HDPM 84 88 92 SVM 65 72 75

RFMS- 87 91 96
MLPNN HDPM 66 75 80

RFMS- 70 78 82
Table 3 shows the accuracy of clustering large data MLPNN
for disease prognosis. Here, the proposed RFMS- MLPNN
approach provides greater clustering accuracy than other
methods. The prognostic performance of the disease and its accuracy
are measured considering different disease classes. The results
obtained are shown in Table 4.4. The proposed RFMS-
MLPNN approach resulted in higher disease prognosis
accuracy than other methods.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 599


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

False Ratio
50 records
50 100 records
45

False Ratio %
40 200 records
35
30
25
20
15
10
5
0
50 records

Figure 4: Analysis on disease prediction accuracy

The accuracy of the prognosis generated by the Figure 5: Analysis on False Classification Ratio+
various methods was measured and is shown in Figure 4. The
proposed Hybrid approach resulted in a higher disease The accuracy of disease prognosis made by different
prognosis than other approaches in each class. methods is measured and shown in Figure 5. The proposed
RFMS- MLPNN approach resulted in a higher disease
T able 5: Analysis on False Ratio
prognosis than other approaches in each class.
False Classification Ratio
V. CONCLUSION
Number of 500 1000 2000
Records To perform heart disease diagnosis, intelligent large data
analysis models reduce the dimension of data analysis. A smart
/methods
IoT sensor for heart patient data analysis in healthcare is based
RF 30 25 20 on hyper-spectral deep neural network. Efficient heart disease
prognosis helps to improve the effectiveness of data analysis
and prediction using ambiguous rules. It provides predictive
results to users, giving them the ability to generate predictive
SVM 34 27 22
attack rates for early detection methods. Feature evaluation-
based prediction is also very sophisticated based on the
Multilayer perception neural classification in the functional
HDPM 30 23 18 achieves high classification and predication rate. The proposed
RFMS- MLPNN produce higher performance by evaluating the
RFMS- 28 20 16 cardiac features than other methods. This recommends the risk
MLPNN level based on classes by predicting the feature class and
recommend risk-based disease diagnosis.

The percentage of misclassifications introduced in different REFERENCES


ways is measured and shown in Table 5. Here, the proposed [1] Singh and R. Kumar, "Heart Disease Prediction Using Machine
RFMS- MLPNN approach has lower error rates than other Learning Algorithms," 2020 International Conference on Electrical
methods. and Electronics Engineering (ICE3), 2020, pp. 452-457, doi:
10.1109/ICE348803.2020.9122958.
[2] P. Ramprakash, R. Sarumathi, R. Mowriya and S.
Nithyavishnupriya, "Heart Disease Prediction Using Deep Neural
Network," 2020 International Conference on Inventive Computation
T echnologies (ICICT ), 2020, pp. 666-670, doi:
10.1109/ICICT 48043.2020.9112443.
[3] C. Boukhatem, H. Y. Youssef and A. B. Nassif, "Heart Disease
Prediction Using Machine Learning," 2022 Advances in Science
and Engineering Technology International Conferences (ASET ),
2022, pp. 1-6, doi: 10.1109/ASET 53988.2022.9734880.
[4] J. Yu, S. Park, S. -H. Kwon, K. -H. Cho and H. Lee, "AI-Based
Stroke Disease Prediction System Using ECG and PPG Bio -
Signals," in IEEE Access, vol. 10, pp. 43623-43638, 2022, doi:
10.1109/ACCESS.2022.3169284.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 600


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[5] S. Huang, P. Hung, C. Hong and H. Wang, "A New Image Blood Conference on Computing for Sustainable Global Development
Pressure Sensor Based on PPG, RRT , BPT T , and Harmonic (INDIACom), 2015, pp. 704-706.
Balancing," in IEEE Sensors Journal, vol. 14, no. 10, pp. 3685 -
3692, Oct. 2014, doi: 10.1109/JSEN.2014.2329676.
[6] S. S. Sarmah, "An Efficient IoT -Based Patient Monitoring and
Heart Disease Prediction System Using Deep Learning Modified
Neural Network," in IEEE Access, vol. 8, pp. 135784 -135797,
2020, doi: 10.1109/ACCESS.2020.3007561.
[7] N. T . Nguyen, N. V. Nguyen, M. H. T. Tran and B. T. Nguyen, "A
potential approach for emotion prediction using heart rate signals,"
2017 9th International Conference on Knowledge and Systems
Engineering (KSE), 2017, pp. 221-226, doi:
10.1109/KSE.2017.8119462.
[8] S. S. Sarmah, "An Efficient IoT -Based Patient Monitoring and
Heart Disease Prediction System Using Deep Learning Modified
Neural Network," in IEEE Access, vol. 8, pp. 135784-135797,
2020, doi: 10.1109/ACCESS.2020.3007561.
[9] V. Chacko and V. Bharati, "Data Validation and Sensor Life
Prediction Layer on Cloud for IoT ," 2017 IEEE International
Conference on Internet of T hings (iT hings) and IEEE Green
Computing and Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE Smart Data
(SmartData), 2017, pp. 906-909, doi: 10.1109/iThings-GreenCom-
CPSCom-SmartData.2017.139.
[10] Ed-Daoudy and K. Maalmi, "Real-time machine learning for early
detection of heart disease using big data approach," 2019
International Conference on Wireless Technologies, Embedded and
Intelligent Systems (WIT S), 2019, pp. 1-5, doi:
10.1109/WIT S.2019.8723839.
[11] Q. He, A. Maag and A. Elchouemi, "Heart disease monit oring and
predicting by using machine learning based on IoT technology,"
2020 5th International Conference on Innovative T echnologies in
Intelligent Systems and Industrial Applications (CIT ISIA), 2020,
pp. 1-10, doi: 10.1109/CIT ISIA50690.2020.9371772.
[12] M. A. Khan and F. Algarni, "A Healthcare Monitoring System for
the Diagnosis of Heart Disease in the IoMT Cloud Environment
Using MSSO-ANFIS," in IEEE Access, vol. 8, pp. 122259-122269,
2020, doi: 10.1109/ACCESS.2020.3006424.
[13] J. P. Li, A. U. Haq, S. U. Din, J. Khan, A. Khan and A. Saboor,
"Heart Disease Identification Method Using Machine Learning
Classification in E-Healthcare," in IEEE Access, vol. 8, pp. 107562-
107582, 2020, doi: 10.1109/ACCESS.2020.3001149.
[14] S. A. Ali et al., "An Optimally Configured and Imp roved Deep
Belief Network (OCI-DBN) Approach for Heart Disease Prediction
Based on Ruzzo–Tompa and Stacked Genetic Algorithm," in IEEE
Access, vol. 8, pp. 65947-65958, 2020, doi:
10.1109/ACCESS.2020.2985646.
[15] Y. Pan, M. Fu, B. Cheng, X. T ao and J. Guo, "Enh anced Deep
Learning Assisted Convolutional Neural Network for Heart Disease
Prediction on the Internet of Medical T hings Platform," in IEEE
Access, vol. 8, pp. 189503-189512, 2020, doi:
10.1109/ACCESS.2020.3026214.
[16] N. L. Fitriyani, M. Syafrudin, G. Alfian and J. Rhee, "HDPM: An
Effective Heart Disease Prediction Model for a Clinical Decision
Support System," in IEEE Access, vol. 8, pp. 133034-133050, 2020,
doi: 10.1109/ACCESS.2020.3010511.
[17] S. Mohan, C. T hirumalai and G. Srivastava, "Effective Heart
Disease Prediction Using Hybrid Machine Learning Techniques," in
IEEE Access, vol. 7, pp. 81542-81554, 2019, doi:
10.1109/ACCESS.2019.2923707.
[18] X. Yuan, J. Chen, K. Zhang, Y. Wu and T . Yang, "A Stable AI-
Based Binary and Multiple Class Heart Disease Prediction Model
for IoMT," in IEEE Transactions on Industrial Informatics, vol. 18,
no. 3, pp. 2032-2040, March 2022, doi: 10.1109/TII.2021.3098306.
[19] Dewan and M. Sharma, "Prediction of heart disease using a hybrid
technique in data mining classification," 2015 2nd International

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 601


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Convolutional Neural Networks (CNN) based


Marine Species Identification
Nanthini N Arul Siva Kumaran K Ashiq A
Assistant Professor, Electronics and Electronics and
Electronics and Communication Communication
Communication Engineering Engineering
Engineering Sri Krishna College of Engineering Sri Krishna College of
Sri Krishna College of and Technology Coimbatore, India Engineering and Technology
Engineering and Technology 20euec018@skcet.ac.in Coimbatore, India
Coimbatore, India 20euec020@skcet.ac.in
nandhini36268@yahoo.co.in

Aakash V S Bhuvaneshwaran M J
Electronics and Electronics and
Communication Communication
Engineering Engineering
Sri Krishna College of Sri Krishna College of
Engineering and Technology Engineering and Technology
Coimbatore, India Coimbatore, India
20euec001@skcet.ac.in 20euec030@skcet.ac.in

knowledge of aquaculture is very less among the people


Abstract--There are more than 5600 species of fish in the world.
and our project will help them to guide about the fish species
Studies show that crowds can be larger and many people are less
knowledgeable about the characteristics of marine life. This
and their characteristics [1]. Our project will also be able to
project is to raise public awareness and generate knowledge find the rare species which is to be prevented from the
about Aquaculture. In fisheries education, it is important to extinct. This research study has developed a mobile
minimize human error in the process of fish observation and application to assist in the process of marine species
analysis, where an automatic system recognition is required. identification [2]. This app can be used by uploading an
Image processing is also known as the process of taking image as image form the gallery or taking a picture directly from the
an input, analyzing it and generating a category or probability camera.
of a particular class of output type. Fish image recognition
research is an important area, especially in marine biology and
The App identifies the fish, displays its name along with its
aquaculture. Recently, the identification of different classes of
animals based on computer vision and deep learning has been
characteristics. Many steps have been made to recognize
widely used by analysts. There is one of the ultimate powerful visual images, but this is an unresolved issue due to
forms of deep learning architecture for conceptual classification segmentation errors, distortion and occlusion. Instead of
based on visual features. It is reported that there are many kinds working in a huge number of areas, the concept of CNN is
of clean water fish in world level. Most of the existing work has making the image into smaller pixels and then analyzing it
been developed for the identification of fewer fish species and [3]. This algorithm uses selective search to extract boxes
used for specific user groups. This detection system is used to from an image. These boxes are sometimes referred to as
identify and classify images of fish species found in clean water
regions. The main step in this algorithm is to create a fish
as well as in sea water.
identification record using selective search [4]. The next step
is to fine-tune the dataset's classification model. It searches
Keywords—Marine Species CNN, SVM, Machine Learning,
only the selected areas. The next step is to use a fine-tuned
Python, Deep Learning imaging, Image classification
model to make predictions for each proposal. The final step
is to return the final fish detection result [5].
I. INTRODUCTION
In the modern world many of the people are busy and This paper gives a detailed review about the fish
not interested to learn about the marine species, so the detection and its characteristics, the app created for this project
can be used by any people without prior knowledge since the
app is user friendly. The app is created using the Flutter the front

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 602


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

end is created using the dart programming language and the have developed an android application using flutter platform
back end is created using the Java Script [6]. The future which is small and portable ,such that the users can able to see
advancements in the project are that it can be used to find the their results.
rarity in the fish species such as Devils Hole, Pulp fish, Red IV.PROPOSED WORK
hand fish, Small tool fish, Adriatic sturgeon fish, European sea The proposed system is trained with 20,000+ images
sturgeon, Gilt darter Sakhalin Sturgeon are some of the rare fish all together using CNN. When an image is uploaded by the user,
species these fish species can be prevent from extinct by this the image data is traversed through particular sequence of
project since we can detect it and can safeguard it from trained data sets with the “divide and conquer” based algorithm
extinction [7]. [15].This machine learning based approach is useful in handling
large number of datasets with reduced time and space
The Harmful fish species can also be detected which complexity [16]. This project can be run using the app created
includes Puffers, Stone fishes, Lion Fishes, Cat fish, Shark, using the google colab, this can also be used by developing a
Piranha, Moray eel, Electric eel, Candiru Fish, Barracudas, website and this can be used to create an app. The extensions of
Great white Sharks, Alligator Gar ,Red lion fish, Scorpion fish, the project in future are this can be used to find the harmful
Common Carp, squid fish, Goliath tiger fish Muskie fish, species , this can be used to find the rare species, the medicinal
Atlantic Manta fish Blue spotted ribbon tail ray fish, Spotted benefits such as omega 3 (Nutrient which is taken from the fish),
trunk fish, Northern Snakehead fish [8].We can protect vitamin D, Vitamin B2. The developed app is flexible to use and
ourselves from those species by this project since we can detect it is available offline. So, it is not likely to get any network
those species and we can stay away from it [9]. The project is issues. New datasets can be added to the cloud using google
briefly explained by the below topics. colab and the app can be updated accordingly.
Two extensions are included in the proposed solution.
II. NEED FOR THE PROJECT One is picture recognition, while the other is a mobile
The proposed system is used to identify the fish species and application. Convolutional neural networks are used to identify
also its characteristics are identified using deep learning. the correct fish species based on their fish imagery. The CNN
Identification of fishes helps in the export of processed edible performs convolution in each layer. The fish and random photos
fishes as the buyers are very conscious about the correct fish are included in the pre-trained classification dataset. If the
identification along with their scientific and popular names species is accurately detected by comparing the given image
[10]. The designed algorithm is based on Convolution Neural with our trained model, the output is true, indicating that the
Network (CNN) approach. This approach effectively classifies given species was effectively discovered [17], as well as the
the fish species and runs in less time complexity. The front end characteristics and its benefits to the users. The result is revealed
or the user interface is an app created using flutter and Dart in this second extension. It comprises the fish image, an android
programming [11]. Tensor flow is the tool used for mobile application created with the flutter framework and code
implementing the CNN and to input large number of datasets written in the dart programming language. On that app, a trained
and n-dimensional data. CNN classification model was installed, which was made up of
photos of different fish species. The user can give an image in
III. RELATED WORK both capture and upload format by installing our application on
Many researchers presented different methodologies their mobile phones. The CNN [18] will classify the image as a
to identify fish species using images captured by classifying tested image and compare it to our trained image based on the
them using their shape, venation, colour and texture qualities image uploaded. The results will be displayed with
based on the research paper's analysis [12]. The amount of characteristics, benefits, and more links for the specified
precision varies depending on the procedure. Despite the fact elucidation based on the comparative result.
that the reference papers provided several classification
methods with a less amount of accuracy and no proposal for V. SOFTWARE DESCRIPTION
real-time detection. In our suggested innovation, we solve the
accuracy and real-time detection problems while also providing 1.1. ALGORITHM
an application [13][14]. 1.1.1. CONVOLUATIONAL NEURAL NETWORK
[CNN]
IV.LIMITATIONS OF EXISTING WORK Convolution Neural Network is a type of Artificial
Neural Network and it is used for image processing and Data
In the previous development of the project there is no analyzing applications. It is mainly used for pattern detection. It
platform, like a website or an mobile phone application, we gets the input by convolution and it forms many layers which is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 603


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

called as convolutional layer or Hidden layers it also transforms


the input from one layer to another layer [27]. It can detect
pattern with more precise manner. Each layer has its own
specifications for example, the edge filter can detect the edges.
The filter works efficiently in the deeper layers it can even
detect the sophisticated objects in the deeper layer.
The filter is also called as kernel and it also called as
Feature detector. The diagram shown below is the overall
diagram of the working of CNN.

1.2 SELECTION OF THE ALGORITHM Fig :2 Working of convolution Neural Network


We use Convolutional Neural Network because
it has dimensionality reduction and feature parameter In Convolutional Neural Network Pooling layers
sharing which makes that system independent of human are used to reduce the dimensions of the feature maps.
supervision. Thus, it reduces the number of parameters to learn
and the amount of computation performed in the
network. The pooling layer summarizes the features
present in a region of the feature map generated by a
convolution layer
1.4. STEPS INVOLVED
⮚ Collect data (in this case image is data).
⮚ Choose an Algorithm.
⮚ Execute the model
Fig 1: Image training of CNN network ⮚ Choose a Validation Method.
⮚ Examine the model until better results achieved
It can be clearly seen that the dimensions of each layer ⮚ Develop an application to showcase the result
is decrease when proceeding it divides the part in the each layer
and analyses the data then it performs convolution and produces
Table 1: Classification of Dataset
the output, where the filters can also be used to give the correct
results.
S.N No. of Images
Species Name
o Trained
1.3 WORKING OF CNN
1 Black Sea Sprat 2000
The working of CNN is due to the convolution in each
2 Gilt Head Bream 2000
layer which is then transformed to another layer and each layer 3 Hourse Mackerel 2000
has Feature detector. Figure 2 gives Different layers of CNN. 4 Red Mullet 2000
Each Kernel performs its own function. 5 Red Sea Bream 2000
6 Sea Bass 2000
1. Input Level: This is the first layer of the CNN the input is 7 Shrimp 2000
provided in this layer and the input image is divided into pixels 8 Striped Red Mullet 2000
and the each pixel is analyzed. 9 Trout 2000
TOTAL 18000
2. Hidden layers: The hidden layers work mainly of the
principle of the convolution and matrix multiplication. Here the
image is mainly analyzed and it is transferred to another layer,
Table 1 Classification of data
also it has the filter to find or analyze the image.
Here, we have collection of 9 species which is
commonly used by the peoples and the species are the edible
3. Output layer: The output of the hidden layer is sent to
for cooking ,and we have collected about 2000 images of each
logistic and some mathematical functions and the output of each species, so the users can able to easily identify the result.
class is converted as Probability value for each class.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 604


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

such as C++, python, java and as well as JavaScript. This kind


of flexibility makes the TensorFlow can be used in wide range
1.5 SAMPLE IMAGE : of applications.

1.8.3 NUMPY
In Python programming, NumPy is a library that has a
large collection of mathematical modules that can process the
functions of linear algebra, Fourier transform, arithmetic,
matrices etc. Using this library we can deal with multi
Figure :3 Image data sample dimensional arrays and analyze statistical data. NumPy library
Here we have a sample dataset of the species Red was first released in 2006 by developing its predecessor
Mullet, and the trained dataset images are about the size of Numeric. The modules in the library is written using Python and
200KB-400KB, by keeping less size image we can train the C. Furthermore, NumPy library is the foundation of the
large amount the samples, and the training speed will also be Artificial Intelligence and Machine learning applications where
reduced.
more and more Matrix mathematical operations are required.
1.6. PROGRAMMING LANGUAGE
The programming language used in our project is 1.8.4 KERAS
Python, an object-oriented programming language. Python is Keras plays a major-level role in machine learning and
a high-end general-purpose programming language most Application Programming Interface (API) and it was developed
commonly used to build deep learning algorithms and data by google. It was written in python and it also handles multiple
science. Python is a programming language that helps to create backend neural network calculations.
a variety of applications. Developers believe it is suitable for 1.8.5 PANDAS
building models using Python and libraries such as NumPy, Pandas is an open-source package, mainly used for
Pandas and Matplotlib. It is possible to use frameworks such data analysis and machine learning functions. It is a two-
as Tensor Flow and Keras for this App Development. dimensional data structure with rows and columns, it provides
a flexible way to merge and reshape data. It builds on top of
1.7 CLASSIFICATION OF DATASET another package called NumPy, which provides help for
multidimensional arrays and easily handles missing data.
The dataset used for the fish image classification
Pandas has series and data frames, where series is for shallow
consists of fish images of ten different marine species and it’s
data structures and data frames are for complex data structures.
listed in
Pandas can be implemented in three ways which include the
Table 1.
Series, Data Frame and Panel.
1.8 LIBRARIES USED
The Python library can be found in the site- packages
1.8.6 GRADIO
folder within the Python.
Gradio is an open-source python library that permits
you to rapidly make simple to utilize, adjustable UI parts for
1.8.1 PYTHON
Python is a programming language created by Guido your ML model, any API, or any subjective capacity in only a
Van Rossum from CWI which stands for Centrum Wiskunde & couple of lines of code.
Informatica which is a National Research Institute for
Mathematics and Computer Science in Netherlands. It is an 1.9 Methods to Create a GRADIO GUI for your Model
object-oriented programming language. It is a general-purpose
programming language which can be used for both scientific ⮚ Create a GRADIO application file for your model upload the
and non-scientific programming. It is a platform independent model.
programming language. The programs written in Python can be ⮚ Define the predictive functionality using the model.
easily readable and understandable. ⮚ Launch the GRADIO interface with predictive functionality
and appropriate UI elements.
1.8.2 TENSOR FLOW
TensorFlow is an important library used in machine
1.10 DART PROGRAMMING LANGUAGE
learning. TensorFlow was declared as open source in 2015.
DART is an object-oriented programming language
Tensor is a variable that can handle n-dimensional data.
which has a syntax similar to structural C language. It was first
TensorFlow can be used in all of the programming languages
developed and launched by Google Inc. in 2011. It is a general-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 605


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

purpose, high-level language used to develop flexible client


specific applications. It is mainly used to develop android or 2.2 APP INTERFACE
IOS applications and web development. DART language has an
extensive built-in tools like DART virtual machine and just in
time compiler. DART language is fast and comfortable with the
Flutter framework to build mobile applications. In this project,
DART programming language is used to develop the front end
of the app.

1.11 FLUTTER
Flutter is a Google-developed framework for
generating attractive, natively built, multi-platform applications
from a single codebase. It's a toolset that's both free and
portable. It may be used to create apps for IOS, macOS,
Windows, Android, and the web. To construct our medicinal
plant recognition application utilizing Deep learning, we used
the Android cross platform of Flutter and the code was
developed in DART.

2.1 FLOW DIAGRAM AND WORKING: Figure 5. App Overview

In Deep learning, Convolutional Neural Network is a


type of artificial neural network which processes an input pixel
by pixel and changes the back-end memory accordingly. After
training, the input image can be uploaded which then gets
matched with the information in memory. Once after the
algorithm is trained, it can take input as an image and looks for
similarities with the sample images. To input an image, we have
developed an application in Flutter using Dart programming
language. This is a reliable and flexible method to create an app.
This app serves a user interface and is used to communicate with
the algorithm. With the help of this app as mentioned in Figure
4, we can upload images that we have. Once the image is
uploaded, the app feeds this image as an input to the algorithm
Figure :4 Flow Diagram
that works in back end. This algorithm looks for matches in the
memory and returns the matched information of the fish and
The main technology used to implement this project is deep match percentage. This data is then used to classify the fish
learning. Deep learning is process of training and developing a species and determine the probability of match to that species.
machine learning algorithm that organizes information By the help of extra piece of code, the characteristics of the
automatically based on the given samples [images] provided determined fish species is displayed and further referenced to
and the flow of the process is given in Figure 3. The provided some important links.
image in sense is a large dataset of images. The dataset which
is used to train our deep learning algorithm is driven from the VI RESULT AND DISCUSSION
website known as Kaggle. Kaggle is a website which is used to The graph for the Project includes the accuracy and the
store large number of useful datasets that can be referenced loss of the executed project. The graph for the project is
later. With this website and with the help of some subsidiaries explained below. The result of the project is that the project is
we have collected about 18000+ samples to train our algorithm. more accurate and highly precise this can be proved by the
These images are first stored in google colab in its cloud drive following graphs.
and deep learning is implemented using Convolutional Neural
Network (CNN). 3.1. OVERALL ACCURACY
Our trained data provides the accuracy of 93-95%. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 606


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

graph (Figure 5) for the accuracy increases exponentially with making it easier for users to identify the species and its
increase in epochs so it is a growing exponential graph here characteristics. The software is straightforward, easy to use,
which means that itis the project’s result is very accurate. and takes minimal time. The app does not require access to
the internet to function. As a result, the user can use this
software when offline.
The app could be improved in the future by providing a greater
number of images as input. The software will provide more
information about the species than is currently available. Any
other developer or researcher can develop this app by
changing the front end of the app and by providing better
information regarding the species. By providing a greater
number of images as a data set and it is possible to examine,
whether the fish is edible or a poisonous one.
Figure 6. Overall Accuracy
We have achieved about 93 % of accuracy and the REFERENCES
losses are very minimal, comparing to other algorithms the [1] Y. Yong, L. Quek, E. Lim, and A. Ngo, "A case report of puffer fish
convolutional neural network shows good accuracy. poisoning in Singapore," Case reports in medicine, vol. 2013, 2013.
[2] J. K. Sims and D. C. Ostman, "Puffer fish poisoning: emergency diagnosis
and management of mild human tetrodotoxication," Annals of emergency
3.2 LOSS OF THE DATASET medicine, vol. 15, pp. 1094-1098, 1986.
[3] L. Chen, Z. Li, and Z. Zhao, "Forensic medical identification of death due
The loss of the project is very minimal in level, and the to poisoning of tetrodotoxin in puffer fish," Fa yixue za zhi, vol. 15, pp. 131-
loss is about 5-6 %. even this loss can also be decreased by 2, 189, 1999.
[4] W. J. Matthews, Patterns in freshwater fish ecology: Springer Science
increasing the epochs if the number of the epochs increases the &Business Media, 2012.
accuracy of the result will also be increased (Figure 6). [5] W. A. Wurts, "Why can some fish live in freshwater, some in salt water,
and some in both," World Aquaculture, vol. 29, p. 65, 1998.
[6] D. A. Konovalov, A. Saleh, M. Bradley, M. Sankupellay, S. Marini, and
M. Sheaves, "Underwater fish detection with weak multi-domain
supervision," 2019 International Joint Conference on Neural Networks
(IJCNN), 2019, pp. 1-8.
[7] K. M. Knausgård, A. Wiklund, T. K. Sørdalen, K. Halvorsen, A. R.
Kleiven, L. Jiao, et al., "Temperate Fish Detection and Classification: a Deep
Learning based Approach," arXiv preprint arXiv:2005.07518, 2020.
[8] N. E. M. Khalifa, M. H. N. Taha, and A. E. Hassanien, "Aquarium family
fish species identification system using deep neural networks," International
Conference on Advanced Intelligent Systems and Informatics, 2018, pp. 347-
356.
[9] X. Bai, X. Yang, and L. J. Latecki, "Detection and recognition of contour
parts based on shape similarity," Pattern Recognition, vol. 41, pp. 2189-2199,
2008. 28
Figure 7. Loss of Dataset [10] J.-S. Kim and K.-S. Hong, "Color–texture segmentation using
unsupervised graph cuts," Pattern Recognition, vol. 42, pp. 735-750, 2009.
[11] A. Joly, H. Goeau, H. Glotin, C. Spampinato, P. Bonnet, W.-P. Vel- ¨
linga, R. Planque, A. Rauber, R. Fisher, and H. Muller, “Lifeclef ¨ 2014:
Multimedia life species identification challenges,” in Information Access
Evaluation. Multilinguality, Multimodality, and Interaction, ser. Lecture
Notes in Computer Science, E. Kanoulas, M. Lupu, P. Clough, M. Sanderson,
M. Hall, A. Hanbury, and E. Toms, Eds., vol. 8685. Cham: Springer
Figure 8. Training and Validation of Data International Publishing, 2014, pp. 229–249.
[12] B. J. Boom, J. He, S. Palazzo, P. X. Huang, C. Beyan, H.-M. Chou, F.-
P. Lin, C. Spampinato, and R. B. Fisher, “A research tool for long-term and
We have trained about 15 epochs and it shows the validation continuous analysis of fish assemblage in coral-reefs using underwater
accuracy of about 93.67 %. camera footage,” Ecological Informatics, vol. 23, pp. 83 – 97, 2014, special
Issue on Multimedia in Ecology and Environment.
[15] S. Marini, E. Fanelli, V. Sbragaglia, E. Azzurro, J. Del Rio Fernandez,
VII CONCLUSION AND FUTURE SCOPE and J. Aguzzi, “Tracking fish abundance by underwater image recognition,”
Scientific Reports, vol. 8, p. 13748, 2018.
By comparing the input of Fish sample to the trained [16] L. Corgnati, S. Marini, L. Mazzei, E. Ottaviani, S. Aliani, A. Conversi,
dataset samples, the image detection was done using the ML and A. Griffa, “Looking inside the ocean: Toward an autonomous imaging
approach and it has high accuracy in detecting the species. system for monitoring gelatinous zooplankton,” Sensors, vol. 16, 2016.
[17]Kottursamy, Kottilingam. "Multi-scale CNN Approach for Accurate
This will allow users to learn more about the characteristics of Detection of Underwater Static Fish Image." Journal of Artificial Intelligence
the fish by looking at a picture of their fish. It also includes 3, no. 03 (2021): 230-242.
[18] Kumar, A. Dinesh. "Underwater Gripper using Distributed Network and
information about the species. As a part of the output, more Adaptive Control." Journal of Electrical Engineering and Automation 2, no.
reference links for the web resources are also provided, 1 (2020): 43-49.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 607


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Review of Machine Learning Algorithms for


Autism Spectrum Disorder Prediction
V. Kavitha* Dr. R. Siva*
Research Scholar, Department of Computational Intelligence, Assistant Professor, Department of Computational Intelligence,
School of computing School of computing
SRM Institute of Science and Technology SRM Institute of Science and Technology
Kattankulathur, Chennai, Tamil Nadu, India. Kattankulathur, Chennai, Tamil Nadu, India.
kavija2010@gmail.com, kv9866@srmist.edu.in sivar@srmist.edu.in
0000-0003-0131-0759 0000-0002-2006-8753
*Corresponding Author

Abstract - Autism is a disorder of the brain caused by language by the new CDC (Centers for Disease Control and
and severe social difficulties in people. It is the most common of Prevention). In 1993, six cases of ASD were diagnosed in
the many pervasive developmental disorders (PDD), which begin 160 patients (3.8 percent). In 1997, six cases of ASD were
in childhood and continue throughout life, affecting almost all diagnosed in 143 patients (4.2 percent). ASD was
aspects of life. Autistic people (cognitive and linguistic) and diagnosed in 2002 in 94 of 309 patients (30.4 percent).
social skills are delayed compared to their classmates, but their Since 2015, the number of people with autism in India has
motor skills are higher than usual. The nature of ASD varies from increased by 10-17 % per year. Autism rates are based on
person to person and is a condition for the development of the research from the National Institute of Mental Health and
brain or nervous system. In the first 12 months, most children with Neuro Sciences (NIMHANS) reported by the new CDC
autism seem to develop normally. Symptoms of autism appear (Centers for Disease Control and Prevention). The occurrence
between eighteen and thirty-six months. Up to 3 years, 40% of of an autism spectrum disorder (ASD) has been identified, as
cases were detected. The aim of the study was to detect ASD at shown in Figure 1.
an early stage to improve brain development and increase the
awareness of parents and caregivers about ASD. Machine
learning methods are now used to predict the spectrum of autism.
This study provides a comprehensive assessment of documents
that use machine learning to predict ASD, as well as data analysis
and classification algorithms. This work aims to classify and
study the different methods of Machine Learning, as well as to
explain the nature of ASD and to evaluate performance and
demonstrate research potential using different criteria. This Figure 1. Identified Occurrence of Autism Spectrum Disorder
publication serves as a roadmap for imminent researchers who
want to work on the topic of ASD prediction using machine The Autism Spectrum Disorder (ASD) is a neurological
learning. disorder that is accompanied by a variety of symptoms.
Keywords: Autism Spectrum Disorder, Machine Learning, There are some issues with social media and
Support Vector Machine, Random Forest, Artificial Neural communication such as
Network • Improper play with toys
• Unable to connect with others
1. INTRODUCTION • Inactive or inactive
Early diagnosis of autism spectrum disorder is • Wrong laughing and crying
challenging because people without ASD exhibit • Sensitive to sound or poor
comparable behaviors to those with ASD, which is why • Changes in habits are difficult to deal with
cognitive tests are appropriate for diagnosing ASD. • Cannot express their emotions through gestures.
According to the World Health Organization, autism can • Strange attachments to objects
cause social, communication, and behavioral difficulties. • Poor speech or lack of speech
The AIIMS in New Delhi reports that, in India one in 100
• Want to live alone
children under the age of 10 has autism, and about one in
• Do not feel dangerous
eight has at least one neurological disorder.
There are many ways in which autism affects people. Limited interests and repetitive activities are often a
There are some people with autism who can live problem for people with ASD. The following list includes
independently, others face significant challenges that specific cases of different types of behavior [12].
require lifelong support and care. People with autism face • Repeat specific actions, such as repeating the
stigma, discrimination and human rights abuses. same words or phrases over and over again
Based on research from the National Institute of Mental • The person gets upset when a habits change
and Mental Health (NIMHANS), Autism rates are reported

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 608


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
• Interested in specific aspects of the topic, such of language, mobility, or subsequent social function. The
as numbers and facts development of children in these areas is normal until they
• In some cases, such as light and sound, you may are 3 years old when they collide. For ignorant parents,
feel less sensitive than the other person their children have autism, and cognitive loss can be
Children 12 to 36 months of age are screened for devastating. The origin of CDD is unknown, as it is
associated with neurodegenerative studies. Boys are more
autism spectrum disorders. There are a variety of tools
prone to rashes in childhood. Nine out of ten cases of the
commonly used for autism screening, including:
disease are boys, only one girl. By the time the situation
• Modified Checklist for Autism in Toddlers begins, the baby will grow normally, regressing, taking into
• Ages and Stages Questionnaire account more than two assessments of life. Children may
• Screening Tool for Autism in Toddlers and lose the following abilities and skills: [2]
Young Children • Hygienic skills, if they have been performed
• The Childhood Autism Rating Scale before.
It affects the way people interact with each other, as • Derived dictionary or language
well as their behavior and learning. When the child is very • Flexible attitude and social skills
young, clinical signs appear. It is a chronic, incurable • Some engine capacity
disease [1]. There have been different types of autism 1.4. Kanner’s Syndrome
discussed until recently by scientists. Canner was first identified in 1943 by Leo Canner, a
1. Asperger's syndrome psychiatrist at Johns Hopkins University, who classified
2. Symptoms of Rett him as autistic. According to doctors, this condition is also
3. Childhood Disintegrative Depression (CHD) called classic autism. Canner syndrome, regardless of the
4. Kanner’s Syndrome nature of the disease, makes children beautiful, alert and
5. Pervasive Developmental Disorders - Not intelligent, which includes: [2]
otherwise Specified (PDD-NOS) • An inability to form emotional connections
1.1. Asperger's syndrome with people
Technically, Asperger's syndrome is no longer a stand-
• Issues related to communication and interaction
alone diagnosis. The DSM-5 investigative manual
classified it as level one autism. However, Asperger's • The uncontrolled use of language.
syndrome is more common in societies with autism and is • Training issues
more common than level one spectrum disorders. 1.5. Pervasive Developmental Disorders -Not Otherwise
Children with Level one spectrum have special Specified (PDD-NOS)
intelligence and excellent speaking skills, but having PDD-NOS, or metastatic disease, is an intermediate
trouble communicating in society. A child with moderate form of autism that is not otherwise expressed and reveals
autism has the following symptoms [2]. itself in a variety of ways. Social and language difficulties
• Lack of mental and behavioral flexibility are the most common symptoms. The language
• Difficulty switching between activities(Often development of your child, as well as the development of
focus on one subject or passion or only want to movements and other body functions, may be delayed. An
pursue a limited range of activities) observation of the child and identification of the child's
suffering, such as interacting with other children, can
• Problems related to the function to be reveal this type of autism. PDD-NOS, also known as
performed "subthreshold autism", is a term used to describe someone
• It is not possible to change the volume to who exhibits some, but not all, autism symptoms [2].
respond to normal voices, speech difficulties, 2. LITERATURE REVIEW
or others. Clay et al. [3] to classify newborns NT and ASD, the
• Difficulties in communicating with classmates researchers used cross-border machine-controlled learning
or family members at school or at home. systems and performed a series of statistical tests. False-
1.2. Symptoms of Rett positive ASD was detected with 96 % NT and reduced to
Rett is a neurological developmental disorder seen in 41% of newborns with a good accuracy of 77%. During the
childhood. Although it is more common in girls, it can also third trimester, the legs are measured, the white blood cells
be found in boys. Rett syndrome affects almost all aspects are counted, and the fetal heart rate is monitored at birth.
of a child's development. The good news is that with proper As well, 38 percent of children at risk of ASD have a larger
care, your baby can still live a happy and successful life. fetal circumference than infants of normal development,
You can spend quality time with your family and help your which indicates that the brain is larger in infants. There is
children do what they love [2]. uterine ASD.
Ming Zhao et al. [4] suggested a work of HC - SZ
General symptoms of Rett syndrome:
discrimination, the integration of multiple sites achieved a
• Loss of coordination and normal movement classification accuracy of 85.1 and 81.0 percent,
• Difficulty communicating and speaking respectively. In addition, 72.4% of the multi-site
• In some cases, breathing problems classifications between HC and ASD ACC were achieved
1.3. Childhood Disintegrative Depression (CHD) using the publicly available ABIDE data set.
Childhood schizophrenia (CDD), also known as Karunakaran, P et al. [5] demonstrated early prediction
Heller's syndrome or schizophrenia, is a developmental using Mullen is added, and it is analyzed by utilizing a
problem characterized by the onset of a partial impairment machine learning method with an adaptive functional
classifier and a computational approach to fMRI analysis.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 609


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
It is a superior strategy for dealing with the circumstance images. The Mild Cognitive Impairments (MCI) region of
when the quantity of training data samples out numbers the the sagittal, coronal, and axial brain segments can be
quantity of characteristics for each data point. classified with high accuracy using the CNN algorithm.
Vivekanandam, B, et al. [6] the classification of
Alzheimer's disease using a hybrid technique is more Table 1 show summary of the advantages and
accurate than using other conventional methods. disadvantages of data collection modules and algorithms
Furthermore, compared to other algorithms, CNN offers used in the diagnosis of ASD.
more minute details of subtle alterations in MRI scan
Table 1: Methods for diagnosing autism spectrum disorder (ASD)

Ref. Author/Year Advantages Disadvantages Applicable tools / Data Collection /


No. applications / Accuracy
algorithms
[7] Zhong Zhao ASD and Typical Development The number of functions obtained is SVM, LDA, DT, RF Accuracy - 92.11%
et al (2021) (TD) in children with normal limited.
development. No integrated function found.

[8] Victoria It tested a hypothesis that changes This is not acceptable for very young VIPS i) Accuracy -74%
Yaneva et al in visual function in adults with children and the number of
(2020) and without high function, such as participants is small.
eye observation measurements,
could be used to automatically
detect autism.
[9] Abdul The classification process using • Classification accuracy 72.96% - EEG, LSVM DEAP-72.96%
Rahman the emotions used was 72.96 % of DEAP data set SEED -70.71%
Aslam et al the time and 73.14 % of the time.• 70.71% Classification accuracy -
SEED data set
(2020)

[10] Tania Akter , For the toddler dataset, SVM These issues cannot be addressed FDA, LDA, MDA Accuracy - 97.10%
Md et al showed the best performance, fully due to the lack of ASD data
(2019) while Adaboost showed the best available.
results for the children dataset,
Glmboost for the adolescent • Increase the amount of data to be
dataset, and Adaboost for the adult analyzed to improve the detection of
dataset. A feature transformation ASD.
method that includes sine functions
will produce the best classification
for toddlers using SVM.

[11] Fadi Tabtah •


It not only improves the sensitivity, Except in the case of young children RML, Bagging, Use of the Kaggle
et al accuracy and predictability of ASD• Using RML makes it difficult to Boosting and DT ASD database was
(2020) testing processes, but also offers a improve predictive performance estimated in 92.26% of
new method called RML that children, 93.78% of
improves sensitivity, accuracy and adolescents and 93.78
precision to predict the ASD % of adults.
screening process.

[12] Zeinab et al Using the ABIDE I and CC400 • Use only a few pictures in each SVM, KNN and ABIDEI-70.22%
(2020) data sets, the proposed atlas class. RF classifiers

parcellation function of the future Additional data is needed to create a
model brain was able to accurately robust model
predict ASD with 70.22 •% Gender and average age are not
taken into account.
accuracy.
• Difficulties in improving
performance with unbalanced data
[13] Chalin A special method of analyzing the It is difficult to describe FE RF classifier -
Grossard et al dynamics of facial expressions production disorders in children
(2020) (FD) in children with autism can be with autism spectrum disorders.
developed using computerized
visual acuity and human narration
(ASD).
[14] Maria Laya et •
In order to develop a classification The sample size is small ARIA method Accuracy - 95.7%
al(2020) model for ASD, a machine- • No other clinical information
learning methodology was used •to Family history and information are
difficult to access
analyze retinal images using
ARIA.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 610


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Ref. Author/Year Advantages Disadvantages Applicable tools / Data Collection /
No applications / Accuracy
algorithms
[15] Rim Haweel This paper proposes an approach •to More experiments and different RF, SVM, MLP NDAR
et al(2019) assessing the severity of autism brain methods are needed
spectrum disorder using machine Do not offer an individual diagnosis Accuracy -78%
learning. and timely treatment plan

[16] Kaushik We developed automated ASD • Identify open source and large ASD SVM, RFC, NB, Kaggle
Vakadkar et prediction models using a minimal data sets. LR, KNN
al(2021) set of behaviors in each diagnostic• Accurate modeling based on large Accuracy -92.15%
data sets.
data set. Of the five models we
• There are not enough cases in the
used for the data set, maximum data set.
accuracy was observed using
logistic regression.
[18] Zhong Zhao By combining visual information • Used only small sample SVM, LDA, DT, Figshare
et al(2021) and session duration, the SVM RF
classifier achieves a maximum Accuracy - 90%
estimate accuracy of 92.31 %. The
accuracy of the classification of the
combined marks is higher only
than the visual capabilities
(maximum rating accuracy 84.62
percent) or the time of the study
(maximum rating accuracy 84.62
percent).

[17] Ping-I Lin et Classification accuracy can be• Due to the lack of other individual RF, SVM Figshare
al(2021) improved up to 90% by using RF templates to test, it may be difficult Accuracy - 90%
algorithm and SVM algorithms. to find additional features from the
limited templates within the SVM.

[19] Munirul et al Assuring that parents and Three controllable machine research DT, LR, KNN, UCI storage
(2021) guardians provide their children models with KNN and ANN logistic ANN
with a comprehensive method of regression reach only 85% accuracy. -95% accuracy
informing them about important
events.
[20] Chaitra et al With a combined feature set of Larger datasets were not used. Recursive- ABIDE
(2020) 70.1 percent accuracy, a diagnosis Psychiatric and neurologic disorders Cluster-
may be made. features were not examined Elimination SVM. Accuracy - 67.3%

3. METHODS
This literature review was done to examine how machine
learning methods are used in autism spectrum disorder
prediction. Some of the most commonly used algorithms
were DT, NB, LR, SVM, RF, K-NN, RFC. Among this by
combining features, the SVM classifier was capable of
achieving an accuracy of 92.31% [18].
Figure 2 shows the basic block diagram of ASD Prediction.
The workflow for Autism Spectrum Disorder (ASD)
consists of 2 basic steps which involves Data
Preprocessing, ASD classification. Preprocessing is the
process of preparing raw data for further processing by
performing any type of processing on it. The data includes
both individuals with and without ASD. Features are
typically collected from an ASD and TD person. After
selecting the features, the resulting features are sent to the
classification section. The

Classification section classifies ASD using various


techniques. Machine learning has more predictive models,
the proposed method will use the best predictive model.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 611


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 2. Basic block diagram of Autism Spectrum Disorder Prediction


ABBREVIATIONS
3.1 DATASET SVM-Support Vector Machine
To Diagnose ASD, several datasets are available. LDA-Linear Discriminant Analysis
Generally, Autism dataset is collected from ABIDE-I, DT-Decision Tree
ABIDE-II, UCI Machine Learning Repository, NDAR, RF-Random Forest
Kaggle, Deep, Seed, figshare data repository. VIPS-Vision Based Page Segmentation
EEG-Electroencephalogram
In UCI Repository, there are three types of datasets: Autism LSVM-Lagrangian Support Vector Machine
Screening Adult, Autistic Spectrum Disorder Screening FDA- Flexible Discriminant Analysis
Data for Children, and Autistic Spectrum Disorder MDA- Multiple Discriminant Analysis
Screening Data for Adolescent. RML-Rules-based Machine Learning
KNN-K-nearest neighbour
4. DISCUSSION ARIA-Automatic Retinal Image Analysis
The goal of this review paper is to combine works that NB-Naïve Bayes
have examined ASD utilising machine learning concepts. ANN-Artificial Neural Network
According to the study, some ML and DL algorithms used RFC- Random Forest Classifier
for autism include ANN, SVM, and deep neural network, LR-Linear Regression
Decision tree, linear regression, random forest, Naïve CNN-Convolutional Neural Network
Bayes and more included. Some algorithms are combined TP-True Positive
with feature extraction or feature selection methods to TN-True Negative
improve results. The next phase is in implementing FP-False Positive
machine learning for the diagnosis of ASD is to reduce FN-False Negative
processing time and increase diagnostic accuracy while AUC-Area under Curve
increasing complexity. UCI-University of California Irvine Machine Learning
The performance of the sample was calculated using Repository
evaluation values. Table 2 shows the image classification ABIDE I and II-Autism Brain Imaging Data Exchange I
evaluation metrics. and II
Table 2 Evaluation criteria for classification NDAR-National Database for Autism Research
Accuracy(ACC) 𝑇𝑃 + 𝑇𝑁
𝐴𝐶𝐶 = REFERENCES
𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁
[1] Hossain MD, Kabir MA, Anwar A, Islam MZ. Detecting autism
Precision(PRC) 𝑇𝑃 spectrum disorder using machine learning techniques: An
𝑃𝑅𝐶 =
𝑇𝑃 + 𝐹𝑃 experimental analysis on toddler, child, adolescent and adult
datasets. Health Inf Sci Syst. 2021 Apr 6;9(1):17. doi:
Sensitivity(SNS) 𝑇𝑃 10.1007/s13755-021-00145-9. PMID: 33898020; PMCID:
𝑆𝑁𝑆 =
𝑇𝑃 + 𝐹𝑁 PMC8024224.
[2] https://www.integrityinc.org/what-are-the-5-types-of-autism/
Specificity(SPC) 𝑇𝑁 [3] Caly, H., Rabiei, H., Coste-Mazeau, P. et al. Machine learning
𝑆𝑃𝐶 = analysis of pregnancy data enables early identification of a
𝑇𝑁 + 𝐹𝑃
subpopulation of newborns with ASD. Sci Rep 11, 6877 (2021).
https://doi.org/10.1038/s41598-021-86320-0
Geometric 𝐺𝑀 = √𝑆𝑁𝑆 ∗ 𝑆𝑃𝐶 [4] Min Zhao, Weizheng Yan, Na Luo, Dongmei Zhi, Zening Fu,
mean(GM) Yuhui Du, Shan Yu, Tianzi Jiang, Vince D. Calhoun, Jing Sui,An
𝑡 attention-based hybrid deep learning framework integrating brain
Bottom zone (ROC) connectivity and activity of resting-state functional MRI
𝐴𝑈𝐶 = ∫ 𝑆𝑁𝑆 ∗ 𝑑𝑆𝑃𝐶
curve 0 data,Medical Image Analysis,Volume 78,2022,102413, ISSN
1361-8415. https://doi.org/10.1016/j.media.2022.102413.
[5] Karunakaran, P., and Yasir Babiker Hamdan. "Early Prediction of
Autism Spectrum Disorder by Computational Approaches to fMRI
5. CONCLUSION Analysis with Early Learning Technique." Journal of Artificial
Intelligence 2, no. 04 (2020): 207-216.
Autism can be detected at an initial stage, which [6] Vivekanandam, B. "Automated Multimodal Fusion Technique for
increases the chances of recovery and lifelong care and the Classification of Human Brain on Alzheimer’s Disorder."
support. In this study, we considered several machine Journal of Electrical Engineering and Automation 3, no. 3 (2021):
learning methods for the autism. As a result, model 214-229
[7] Zhao Z, Zhu Z, Zhang X, Tang H, Xing J, Hu X, Lu J, Qu X.
machine learning and in-depth training methods, as well as Identifying Autism with Head Movement Features by Implementing
fMRI and EEG signals for the detection of ASD can be Machine Learning Algorithms. J Autism Dev Disord. 2021 Jul 11.
provided. The in-depth study model includes several types doi: 10.1007/s10803-021-05179-2. Epub ahead of print. PMID:
of neural networks that simultaneously improve 34250557.
[8] V. Yaneva, L. A. Ha, S. Eraslan, Y. Yesilada and R. Mitkov,
classification accuracy. However, the Deep Learning "Detecting High-Functioning Autism in Adults Using Eye
approach has the disadvantage that it requires a larger set Tracking and Machine Learning," in IEEE Transactions on Neural
of data for training to produce successful models. In Systems and Rehabilitation Engineering, vol. 28, no. 6, pp. 1254-
conclusion, this document discusses several methods for 1261, June 2020, doi: 10.1109/TNSRE.2020.2991675.
[9] A. R. Aslam and M. A. B. Altaf, "An On-Chip Processor for
diagnosing ASD, as well as practical measures for each Chronic Neurological Disorders Assistance Using Negative
model / algorithm. Affectivity Classification," in IEEE Transactions on Biomedical

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 612


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Circuits and Systems, vol. 14, no. 4, pp. 838-851, Aug. 2020, doi:
10.1109/TBCAS.2020.3008766..
[10] T. Akter et al., "Machine Learning-Based Models for Early-Stage
Detection of Autism Spectrum Disorders," in IEEE Access, vol. 7,
pp. 166509-166527, 2019, doi: 10.1109/ACCESS.2019.2952609.
[11] Thabtah F, Peebles D. A new machine learning model based on
induction of rules for autism detection. Health Informatics Journal.
March 2020:264-286. doi:10.1177/1460458218824711
[12] Zeinab Sherkatghanad, Mohammadsadegh Akhondzadeh, Soorena
Salari , Mariam Zomorodi-Moghadam, Moloud Abdar , U.
Rajendra Acharya , Reza Khosrowabadi and Vahid Salari ,
“Automated Detection of Autism Spectrum Disorder Using a
Convolutional Neural Network” , Frontiers in
Neuroscience,January 2020.
[13] Grossard C, Dapogny A, Cohen D, Bernheim S, Juillet E, Hamel F,
Hun S, Bourgeois J, Pellerin H, Serret S, Bailly K, Chaby L.
Children with autism spectrum disorder produce more ambiguous
and less socially meaningful facial expressions: an experimental
study using random forest classifiers. Mol Autism. 2020 Jan
13;11(1):5. doi: 10.1186/s13229-020-0312-2. PMID: 31956394;
PMCID: PMC6958757.
[14] Maria Laia, Jack Leea , Sally Chiuc , Jessie Charmd , Wing Yee
Soe , Fung Ping Yuenf , Chloe Kwoka , Jasmine Tsoia , Yuqi Lina
, Benny Zeea,b, “A machine learning approach for retinal images
analysis as an objective screening method for children with autism
spectrum disorder”, EClinicalMedicine,2020
[15] R. Haweel et al., "A Machine Learning Approach for Grading
Autism Severity Levels Using Task-based Functional MRI," 2019
IEEE International Conference on Imaging Systems and
Techniques (IST), 2019, pp. 1-5, doi:
10.1109/IST48021.2019.9010335.
[16] Kaushik Vakadkar,Diya Purkayastha, Deepa Krishnan, ”
Detection of Autism Spectrum Disorder in Children Using
Machine Learning Techniques” , SN Computer Science ,July 2021.
https://doi.org/10.1007/s42979-021-00776-5
[17] Ping-I Lin, Mohammad Ali Moni , Susan Shur-Fen Gau and
Valsamma Eapen, ” Identifying Subgroups of Patients With Autism
by Gene Expression Profiles Using Machine Learning
Algorithms”, Frontiers in Psychiatry,May 2021.
[18] Zhao Z, Tang H, Zhang X, Qu X, Hu X, Lu J. Classification of
Children with Autism and Typical Development Using Eye-
Tracking Data From Face-to-Face Conversations: Machine
Learning Model Development and Performance Evaluation. J Med
Internet Res. 2021 Aug 26;23(8):e29328. doi: 10.2196/29328.
PMID: 34435957; PMCID: PMC8440949.
[19] Munirul M Haque,Masud Rabbani,Dipranjan Das Dipal,Md Ishrak
Islam Zarif , Anik Iqbal,Amy Schwichtenberg,Naveen
Bansal,Tanjir Rashid Soron, Syed Ishtiaque Ahmed, Sheikh Iqbal
Ahamed, “Informing Developmental Milestone Achievement for
Children With Autism: Machine Learning Approach “, Jmir
Medical Informatics,2021.
[20] N. Chaitra P.A. Vijaya, Gopikrishna Deshpande, “Diagnostic
prediction of autism spectrum disorder using complex network
measures in a machine learning framework”, Biomedical Signal
Processing and Control ,2020.
https://doi.org/10.1016/j.bspc.2020.102099.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 613


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Detection of Traffic on the Network based on a Real


Dataset for the IIM method and ML-TSDS Algorithm
1 2
Mr. Sugin S.V *, Dr. M. Kanchana *,
Research Scholar, Associate Professor,
SRM Institute of Science and Technology Kattankulathur, SRM Institute of Science and Technology Kattankulathur,
Chennai. Chennai.
sugin.sv@gmail.com kanchanm@srmist.edu.in
0000-0002-4166-0422 0000-0002-6961-4735

ABS TRACT: Anomaly identification is a technique commonly and other tasks using ML. The aspects of the observed issue
used for monitoring the network traffic with the main goal to that may be measured or quantified are referred to as the input
distinguish the normal and anomalous network activity using parameters and are known as features [9] [10]. The reasons for
Intrusion Identification Methods (IIM) on an actual network the outcome characteristics are given a class assigned using
dataset. This study has used the TS DS (Technique for S ampling
Difficult S ets) method, which yield good results. ML techniques the technique, which is an observation about the outcome rate.
that can accurately recognize abnormalities based on known data The classification challenge, which tries to predict, accurately
flows can benefit from the input data packets acquired from label, and tell the difference between normal traffic and
network devices. The nine different forms of network attacks unusual traffic, includes how hard it is to find mistakes in
(traffic issues) defined in the UNS W-NB15 dataset were network data.
identified using different ML methods in this article, including
KNN, NB, RF, and S VC. The effectiveness of identifying security 2. RELATED WORKS:
issues was tested using simulated network attacks and acquired
the packet information on actual connected devices. As UNS W- A review of the research makes reference to many
NB15 is a strongly uneven training set of data, Area under the
ROC curve (AUC) values were employed to evaluate the flaws in the study, including algorithm optimization with
effective-ness of segmentation systems. The technique for limited samples because more collected data can lead to
sampling difficult sets produced the best results in the detection increased efficiency, making use of algorithms without
of the sample dataset and the dataset of actual congestion with processing or only encoding one technique to identify
AUC scores of 91% and 96%, respectively. features, an unbalanced dataset and insufficient (basic)
algorithm performance monitoring and classification of
Keywords: Intrusion Identification Methods, Machine Learning, algorithm efficiency using created data without comparing to
Packet Transmission, Technique for S ampling Difficult S ets. performance utilizing huge datasets [12].
The KNN, NB, RF and SVC algorithms are some of
1. INTRODUCTION: the machine learning categories that the authors analyze for
anomaly identification. The UNSW-NB15 dataset's speed and
Attacks on cyber security have become more
accuracy, recall, Mean Squared Error(MSE),TPR and FPR of
frequent and sophisticated throughout time, involving more
sophisticated and ongoing defensive strategy innovation various classifiers are evaluated. The results of the
experiments show that the TSDS classifier is a good
today. Machine learning is being explored as a different
representation of some other classifiers with a 96.29%
approach or extra protection against cyber security assaults as
computer power increases, hardware and software prices fall. accuracy rate.
The capacity to identify abnormalities in the
The capacity of Machine Learning to identify dangerous
classification of binary and multiple classes is compared by
network activity using packet data on network activity is
examined in this research as a potential security measure. the authors [15] [16] of across 12 different machine learning
techniques. The CSE-CIC-IDS2018, NSL-KDD and UNSW-
It is available to test machine learning algorithms and
NB15 datasets were utilized for the experiments, which were
improve the variables in order to more detect or classify
imbalances in the real network traffic. Either Python run on three publicly accessible datasets based on the
evaluation's findings, it can be shown TSDS algorithm is more
programming or the Scikit-Learn platform are used to analyze
effective in terms of detection, accuracy, and precision. The
normal network traffic, which solves the evaluation issue for
ML. Machine learning algorithms in Scikit learn may be literature study reveals potential ways to combine cyber
security with machine learning. The efficiency of different
quickly developed and deployed for identification, linearity,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 614


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

ML techniques may be assessed and compared using open 4.1 Evaluati on Indicators:
datasets.
Using KNN, NB, RF, and SVC, the authors of [11] In this research, we employ unusual appearance to
offer a network anomaly detection method. When making modify the large elements and do 10-fold cross validation to
comparisons, the follo- wing criteria were used: Performance get the predicted value. As evaluation indicators, we employ
metrics for binary classification include accuracy, TPR, FPR, F1 score, Time, Precision, Recall, Accuracy, and ROC curve.
recall, and precision. The above ML technique was more The following is a collection of pertinent formulas, where TP
accurate (81.69%) and worked better than all other classifiers indicates the level of optimistic packets that are correctly
on the UNSW-NB15 dataset. categ-orized. FP for the level of incorrectly classified
optimistic packets; TN for the variety of TN packets; FN for
3. ML ALGORITHMS: the variety of FN packets.

Machine learning techniques, according to may be The accuracy metric counts how many predicted
divided into the following learning methods: reinforcement, optimistic packets are really present in the samples.
supervised, unsuper- vised and semi supervised based on the
level of human responsibility and oversight of the process of Precision=TP/(TP + FP) ------------------------- (1)
training. The objective of classifier is to build a modeling
from identified documentation that can forecast potential data. Recall is the percentage of correctly detected training
Classification and regression are the two most typical examples:
supervised ML tasks. The system must forecast discrete
values for fresh examples, such as category [13], class, or Recall=TP / (TP + FN) --------------------------- (2)
label, in classification issues. The continuous response
variable's value is anticipated in regression issues. The number of samples that were correctly categorized is
The ML algorithms use a variety of methods and accuracy:
training datasets that have already been sorted to classify new
datasets. The most significant examples of supervised learning Accuracy=(TP + TN) / (TP + FP + TN + FN) -(3)
were executed in this investigative process and accor- ding to,
supervised ML algorithms fall into the following categories: The F1score denotes the periodic median of recall and
KNN, NB, RF and SVC. precision.

4. CLASSIFICATION METRICS: F1score = 2 * Precision * Recall / (Precision + Recall)


------------ (4)
Metric values are used to evaluate the machine
learning algorithm's effectiveness. A distinct classification The ROC curve shows the relationship between the
factor that evaluates the particular aspects and assessment TPR and FPR. The TPR looks at how often positive
related preferences are used to resolve categorization examples are wrongly labeled as negative; while the FPR
evaluations [7] [14]. There are several methods for rating looks at how often negative examples are wrongly labeled as
classifiers, and the classification issue most frequently positive.
employs the following categories of metrics:

characteristics of the minority class. Continuous qualities


vary, while the discrete characteristics of the minority class
4.2 TSDS Algorithm: are constant [2]. As a result, the continuous qualities of the
minority class are magnified to provide data that follows the
It is difficult for the classifier to distinguish between genuine distribution. As a result, we suggest using the TSDS
different traffic data types during training since imbalanced algorithm (Table 1) to balance the scales.
networks have equivalent structures. Minority assaults in
particular might resemble a lot of regular traffic [1]. Most of By using the Modified Nearest Neighbor (MNN)
the classes in the comparable instances from the uneven algorithm, the imbalanced training set is first divided into sets
training set are duplicated noise data. We compress the for close and far neighbors. The samples in the far-neighbor
majority class because the number is significantly the majority set are referred to as simple test results, but the values in the
class is larger and the identifier cannot learn the shortest distance set are referred to as challenging samples,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 615


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

since the samples in the nearest neighbor set are more similar simple set, the minority in the challenging set, and the
than dissimilar [3][4].The minority results are in the reinforcement samples. The MNN approach uses the K nearest
challenging set are then focused in and out. We scale the neighbors as a global measuring aspect. For larger values of
entire process using KNN, NB, RF, and SVC algorithms. The K, we see an increase in the number of challenging sets, the
issue needs to be solved of class imbalance in network traffic pace of compression for the vast most of the samples, and the
when presented with mismatched data. We provide a unique score of synthesis for the minority of classes. Notation-ally,
Technique for Sampling Difficult Sets (TSDS) [1].This the TSDS algorithm is represented as Table1.
technique successfully when balance is reduced and improves
the effectiveness of the identification model when learning 4.3 The UNSW-NB15 Network dataset:
challenging samples. On two benchmark datasets, we verified
using both conventional ML and DL algorithms [5][6]. The dataset UNSW-NB15 and machine learning are
the foundations of the identification model used to confirm
Faced with this imbalanced traffic on the internet, we real network traffic data. Figure1 shows the model
suggested the Technique for Sampling Difficult Sets (TSDS) architecture. The origin- nal traffic in the UNSW-NB15
algorithm[8][9], which compresses the majority class samples dataset was made in the Cyber Range Lab at UNSW Canberra.
while in tough situations, enhancing the quantity of minority They used the IXIA Perfect Storm tool to mix real world
samples is a must to decrease the training set's imbalance and actions with made-up attacks. [20] Four separate CSV files
allow the intrusion identification method to improve category include a total of 2540044 records. This data collection covers
performance [10]. The identification model we proposed is 9 different categories of assault including Worms, Shellcode,
represented in Figure1.[17] For classification models, as Fuzzers, Analysis, Backdoors, DoS, Generic, Exploits and
classifiers; employ RF, SVM, KNN and NB. Reconnaissance. It is required to narrow down the
characteristics compared to those that are same and choose
The imbalanced training set is initially split into two only the methods that will be used because the original
groups: neighbors and outliers, using the Modified Nearest UNSW-NB15 dataset and the dataset received from the packet
Neighbor (MNN) technique. Because it is quite difficult for a specific network method are not identical. By comparing the
the classification to comprehend the differences between the features of the packet filtering and UNSW-NB15 datasets [18]
segments from the highly compare- able examples in the near- [19], the packet dataset's format was developed in accordance
neighbor set, we refer to the extracts in the near-neighbor set with the suggestions of the producer of network equipment.
as "challenging sets" and the extracts in the far-neighbor set as
"simple sets". After that, we transfer our attention to the
underrepresented subset inside the challenging set, and we
enlarge and shrink it to investigate it in greater depth. Finally,
a new training set is built by mixing the samples from the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 616


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Table 1: TSDS Algorithm.

Algorithm: TSDS Algorithm

Source: Irregular strength and conditioning S, Measuring aspect K


Outcome: Raw training equipment SN
1: Different Simple and challenging sets
2: Get every data from S, then assign it to SE
3: for each element € SE do
4: Construct the KNN
5: Eliminate the values from SE whose KNN have the most elements of a specific class.
6: end for.
7: Simple set SE , challenging set, SD = S - SE
8: Reduce the variety of sources for the challenging segment centroids.
9: Choose the variety of the SD values and set us to SMaj
10: Utilize the K-Cluster and KMeans techniques.
11: Replace the majority with the K cluster centroids values in SMaj.
12: Reduce the most of the datasets SMaj
13: Reinforcement
14: Choose the majority of the SD values and set us to SMin
15: Consider the unique aspects from SMin and set us to XD
16: Extract the Constant characteristics from SMin and set us to XC
17: Get the Attribute features from SMin and set us to W.
18: for n € length (K, K + No/ SMin.Shapevalue[0]) do
19: XD1 = XD
20: XC1 = XC x (1-1/n)
21: XD2 = XD
22: XC2 = XC x (1+1/n)
23: SZ assign[begin ( XC1 , XD1 , W ), begin ( XC2 , XD2 , W )]
24: end for.
25: Improved train value, SN = ( SE + SMin + SMaj + SZ )

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 617


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 1: Classification model of UNSW-NB15 dataset and TSDS algorithm.

In Table 2, we calculated the classifiers for each and forecast efficiency. The average accuracy and F1-Score of
sample method. The average precision, accuracy, recall and the proposed TSDS method have increased by 90.56%,
F1score are shown in Figure 2. On the CSE-CIC-IDS2018 and 89.67%, and 89.16%, 85.17%, respectively, making it signi-
NSL-KDD data sets, the sampling methods using KNN, NB, ficantly better. After applying the KNN, NB, RF, and SVC
RF, and SVC all perform better than the original approach. In sampling algorithms to the UNSW-NB15 source data,
Table 2 it mentioned recall, F1score accuracy, and precision. improvements are negligibly increased. When the training set
The graph was made using these parameters as a source. and TSDS method sampling suggested in this study are used,
the median F1-score goes up by 91.17% and the average
The improvement is quite minor in terms of F1-Score accuracy goes up by 96.29%.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 618


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 2: Comparison of the efficiency of various sampling techniques.

Table 2: The comparison of the reference and real datasets for precision, recall, accuracy and F1-score
Sl F1-
Dataset Algorithm Attack Precision Recall Accuracy
No Score

KNN Normal 76% 56.9% 75.94% 59%

NB DoS 75.3% 80% 77.10% 67.5%

1 NSL-KDD RF DoS 65.21% 81.67% 76.94% 67.5%

SVC BOT 40% 50% 76.09% 47.46%

TSDS DDoS 85.4% 92% 90.56% 89.67%

KNN DDoS 66% 46.98% 93.75% 59.2%

NB DoS 65.67% 70% 92.19% 45.67%


CSE-CIC-
2 RF DDoS 55.2% 71.67% 93.42% 57.5%
IDS2018
SVC BOT 60% 70% 93.43% 57%

TSDS DoS 75.81% 82% 89.16% 85.17%

KNN R2L 76.45% 56.98% 77.79% 59%

NB DoS 75% 74% 80.69% 65.67%


UNSW-
3 RF BruteForce 67.08% 71.67% 79.34% 77.5%
NB15
SVC Shellcode 87.45% 74% 81.69% 67%

TSDS DoS 86.34% 90.56% 96.29% 91.17%

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 619


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

scores
According to experimental findings for the CSE-
CIC-IDS2018, NSL-KDD datasets the dissimilar ML The exact similar methods with similar parameters
algorithms to classify the accuracy level are decreasing, but if examined actual traffic performance gathered from equipment
we use the UNSW-NB15 dataset for the classifier TSDS on the network. Table 3 displays the results.
algorithm, the level of accuracy is 96.29% increasing. Real network traffic that was gathered from network
devices was classified using a proposed model that was
The best outcome was obtained by the TSDS learned from the UNSW-NB15 dataset. According to Table 4,
algorithm, which had values of 90.56% for AUC and 89.67% the TSDS algorithm produced the greatest results, which were
for F1 score. A larger score indicates a preferred but also a 96.29% AUC score and a 91.17% F1-score.
more precise identification. The graphs in Figure 3 of the Figure 4 displays the AUC score outcomes for the
ROC curve and AUC also support the purple line optimal dataset gathered from network devices after categorization
outcome of the TSDS method. A line that takes up more using machine learning methods. The purple line, which
space on the x axis indicates that the model is more successful stands for the TSDS method and takes up more space with the
at classifying the data into positive and negative categories. best classification algorithm along the x axis, is represented.
Table 4: AUC scores with UNSW-NB15 dataset
Table 3: AUC scores with NSL-KDD dataset

ML Algorithm F1 AUC
ML Algorithm F1 AUC KNN 0.5900 0.7779
KNN 0.5921 0.7594 NB 0.6567 0.8069
NB 0.6747 0.7710
RF 0.7750 0.7934
RF 0.6750 0.7694 SVC 0.6702 0.8169
SVC 0.4746 0.7609
TSDS 0.9117 0.9629
TSDS 0.8967 0.9056

Fig 4: The UNSW-NB15 network traffic dataset ROC curves


and AUC scores

Fig 3: The NSL-KDD dataset for ROC curves and AUC

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 620


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Table 5: Performance analysis of present accuracy and existing accuracy

Sl Author Attack Algorithm Dataset Accuracy


No
1
L. Liu, IEEE Access [1] DoS RF CSE-CIC-IDS2018 93.42%
2 G. De Carvalho Bertoli,
DoS KNN CSE-CIC-IDS2018 93.75%
IEEE Access [9]
77.10%
3 M. Wang, IEEE Access[5] DoS NB NSL-KDD
A. Kavousi, IEEE Havex
4 KNN NSL-KDD 75.94%
Transactions[6] Malware
M. A. Siddiqi, IEEE
5 Botnet SVM CSE-CIC-IDS2018 93.43%
Access[8]
Z. Chkirbene , IEEE NSL-KDD
6 DoS RF 76.94%
Systems [7]
NSL-KDD
7 Y. Uhm, IEEE Access [10] DoS SVM 76.09%
8
G. Kocher[18] DDoS RF UNSW-NB15 79.34%
Z. K. Maseer, IEEE Access
9 DDoS NB CSE-CIC-IDS2018 92.19%
[4]
77.79%
DoS KNN UNSW-NB15
N. Moustafa, MilCIS 2015
10
[20] 96.29%
DoS TSDS UNSW-NB15

research will exclusively utilize data from actual network


Table 5 compares the dataset accuracy for each traffic that involves instances of actual security while under
sampling technique based on the attack. In the UNSW-NB15, controlled private network setups and will employ a bigger
CSE-CIC-IDS2018, and NSL-KDD datasets, the sampling collection of actual network activity with longer traffic
methods using KNN, NB, RF, and SVC all perform lower monitoring intervals.
than the original TSDS algorithm.
REFERENCES:
5. CONCLUS ION AND FUTURE WORK:
[1] L. Liu, P. Wang, J. Lin and L. Liu, "Intrusion Detection of Imbalanced
Network T raffic Based on Machine Learning and Deep Learning," in IEEE
For the ML identification of actual net- work traffic Access, vol. 9, pp. 7550-7563, 2021, doi: 10.1109/ ACCESS. 2020. 3048198.
using packet telemetry data, the TSDS technique outperforms
all other regularly used classification algorithms (KNN, NB, [2] Suma.V,"Automatic Spotting of Sceptical Activity with Visualization
RF, and SVC). On the reference NSL-KDD dataset machine Using Elastic Cluster for Network Traffic in Educational Campus." Journal:
Journal of Ubiquitous Computing and Communication T echnologies June
learning with classification using the TSDS approach 2020, no. 2 (2020): 88-97. DOI: https://doi.org/10.36548/ ju cct.2020.2.004.
produced an AUC score of 90.56% and an F1-score of
89.67%. Actual network traffic classification yielded AUC [3] Haoxiang, Wang, and S. Smys. "Enhanced VANET Routing protocols for
96.29% and F1-score 91.17% results which significantly dynamic mapping in real time Traffic." IRO Journal on Sustainable Wireless
Systems 1, no.3 (2019): 139-147. DOI :
varied in F1-score from the UNSW-NB15 dataset has been https://doi.org/10.36548/jsws.2019.3.001.
classified. This study is unique in that it categorizes real [4] Z. K. Maseer, R. Yusof, N. Bahaman, S. A. Mostafa and C. F. M. Foozy,
service perfor- mance with additional imbalances, and its "Benchmarking of Machine Learning for Anomaly Based Intrusion Detection
success is evaluated by comparing it to the traits and Systems in the CICIDS2017 Dataset," in IEEE Access, vol. 9, pp. 22351 -
22370, 2021, doi: 10.1109/ ACCESS. 2021.3056614.
identification strategy of a collection of data that is available
to the general public. The results show that utilizing the best [5] M. Wang, K. Zheng, Y. Yang and X. Wang, "An Explainable Machine
algorithm on a publicly available collection of data may Learning Framework for Intrusion Detection Systems," in IEEEAccess, vol.
success- fully identify genuine network activity. A next 8, pp. 73127-73141, 2020, doi: 10. 1109/ ACCESS. 2020 .2988359.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 621


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[6] A. Kavousi-Fard, W. Su and T . Jin, "A Machine-Learning-Based Cyber Mil. Commun. Inf. Syst. Conf. MilCIS 2015 - Proc., 2015.
Attack Detection Model for Wireless Sensor Networks Industrial Informatics, https://doi.org/10.1109/ Mil CIS.2015.7348942.
vol. 17, no. 1, pp. 650-658, Jan. 2021,doi:10.1109/T II.2020.2964704.

[7] Z. Chkirbene et al., "A Weighted Machine Learning-Based Attacks


Classification to Allevi ating Class Imbalance," in IEEE Systems Journal
,vol. 15, no. 4, pp. 4780-4791, Dec. 2021, doi: 10.1109/ JSYS. 2020.
3033423.

[8] M. A. Siddiqi and W. Pak, "An Agile Appro ach to Identify Single and
Hybrid Normali zation for Enhancing Machine Learning-Based Network
Intrusion Detection," in IEEE Access, vol. 9, pp. 137494-137513, 2021, doi:
10. 1109/ ACCESS. 2021.3118361.

[9] G. De Carvalho Bertoli et al., "An End-to-End Framework for Machine


Learning-Based Network Intrusion Detection System," in IEEE Access, vol.
9, pp. 106790-106805, 2021, doi: 10.1109/ ACCESS . 2021.3101188.

[10] Y. Uhm and W. Pak, "Service-Aware T wo-Level Partitioning for


Machine Learning-Based Network Intrusion Detection With High
Performance and High Scalability," in IEEE Access, vol. 9, pp.6608 -
6622,2021,doi:10. 1109/ ACCESS.2020.3048900.

[11] M. Nawir, A. Amir, O. B. Lynn, N. Yaakob, and R. Badlishah Ahmad,


“ Performan ces of Machine Learning Algorithms for Binary Classification of
Network Anomaly Detection System,”J. Phys.Conf. Ser., vol.1018, no.1,
2018. https:// DOI:10.1088/1742-6596/1018/1 /012015.

[12] J.Ye,X. Cheng, J. Zhu, L. Feng, and L.Song,


“ A DDoS Attack Detection Method Based on SVM in Software Defined
Network,” Secur. Commun.Networks, vol. 2018, 2018. https:// doi.
org/10.1155/2018/9804061.

[13] F. A. Khan, A. Gumaei, A. Derhab, and A. Hussain,“T SDL: A T wo-


Stage Deep Learning Model for Efficient Network Intrusion Detection,
”IEEE Access, vol. 7, no. March 2020, pp. 30373 –30385, 2019. https:// doi:
10. 1109 /ACCESS. 2019. 2899721.

[14] M. A. Umar and C. Zhanfang, “Effects of Feature Selection and


Normalization on Network Intrusion Detection,” pp. 1 –25, 2020. https://
doi.org/10.36227/techrxiv.12480425.v2.

[15] M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad, “Support Vector


Machine and Random Forest Modeling for Intrusion Detection System
(IDS),” J. Intell. Learn. Syst. Appl., vol. 06, no. 01, pp. 45–52, 2014.
https://doi: 10.4236/ jilsa. 2014.61005.

[16] D. Li, C. Yu, Q. Zhou, and J. Yu, “Using SVM to Detect DDoS Attack
in SDN Network,” IOP Conf. Ser.Mater. Sci.Eng.,vol.466,no.1,20 18
.https://DOI:10.1088/1757-899X/466/1/ 012 003.

[17] C. Khammassi and S. Krichen, “A GA-LR wrapper approach for feature


selection in network intrusion detection,” Comput. Secur., vol. 70, no. June,
pp. 255–277, 2017.https:// doi.org/ 10. 1016/j.cose.2017.06.005.

[18] G. Kocher and G. Kumar, “Performance Analysis of Machine Learning


Classifiers for Intrusion Detection using UNSW -NB15 Dataset, ”pp.31-
40,2020.https://doi.org/10.51 21/ csit.20 20.102004.

[19] N. Elmrabit, F. Zhou, F. Li, and H. Zhou, “Evaluation of Machine


Learning Algorithms for Anomaly Detection,”Int.Conf.Cyber Secur. Prot.
Digit. Serv. Cyber Secur.2020,2020.https:// doi.
org/10.1109/CyberSecurity49315.2020.9138871.

[20] N. Moustafa and J. Slay, UNSW-NB15: A comprehensive data set for


network intrusion detection systems (UNSW-NB15 network data set), 2015

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 622


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Machine Learning based Approach for Breast


Cancer Prediction
Mayank Agrawal Vinod Jain,
Assistant Professor, Department of Computer Engineering Assistant Professor, Department of Computer Engineering
and Applications, and Applications,
GLA University, Mathura, India GLA University, Mathura, India
mayank.agrawal@gla.ac.in vinod.jain@gla.ac.in
(ORCHID-0000-0003-0260-7319)

Abstract— Breast cancer is currently a rather frequent kind of may be treated. Given its ability to spread to all other organs,
cancer. Recently, it has been observed in many women, and it has invasive carcinoma is regarded as the most serious kind of
been responsible for several fatalities. In order to prevent this breast cancer. Breast temperature monitoring, ultrasound, PET,
terrible disease, it is important to forecast the likelihood of cancer and MRI are just a few of the techniques that may be used to
in its earliest stages. Machine learning is a novel AI approach
whose potential for cancer prediction has not yet been fully
identify breast cancer, according to the authors in [7]. The
understood. In this work, the ability of machine learning classifiers staining procedure often involves the use of haematoxylin and
is employed to forecast breast cancer. Machine learning eosin (H&E). One of two methods—genomics or histological
algorithms applied in this work to predict the breast cancer are image analysis—can be used to identify breast cancer.
Support Vector Classifier, Random Forest Classifier, KNN Histopathological images, which are microscopic pictures of
Classifier, and Logistic Regression Classifier. The experiment's breast tissue, are very helpful in the early stages of cancer
findings show that Logistic Regression outperforms the other therapy.
three prediction methods. Regarding genomics, the authors of [8] noted that radio-
genomics is a developing area of study that focuses on multi-
Keywords— Artificial Intelligence, Machine Learning, Breast
Cancer Prediction
scale connections between gene expression data and medical
imaging. Both radiological and genetic characteristics are
I. INTRODUCTION provided by radio-genomics, which may improve diagnosis. It
In order to calculate a girl's chance of obtaining the illness, can perform molecular analyses on tissues to aid in cancer
breast most cancers chance is evaluated the use of prognosis and early diagnosis. Imaging may result in over- or
acknowledged chance factors [2-4]. A chance of girl is under-treatment since it is less accurate. Although
calculated with the assist of facts she gives, along with her age, histopathological imaging is significantly less effective than
reproductive records, non-public records of benign breast radio-genomics, the latter is far less often utilised since it entails
illness, and family records of breast most cancers [2]. This data costly datasets and heavy processing demands. As a
is utilised with the aid of using numerous breast most cancers consequence, only a few laboratories investigate with radio-
chance models, along with the broadly used Breast Cancer Risk genomics [8].
Assessment Tool. To calculate a girl's germline chance of II. LITERATURE SURVEY
growing breast most cancers, genetic models, or polygenic
chance scores (PRS), hire corporations of SNPs connected to Experts describe how health promotion, early disease
the illness [4]. Both questionnaire-primarily based totally and identification (screening), and improved management of
genetic breast most cancers chance assessment methodologies women at higher risk of illness may all contribute to the goal of
appear to have healing benefits, despite the fact that the addition individualised healthcare for breast cancer in this article. On the
of blood epigenome facts might also additionally offer a unique levels of communication, evidence, assessment, regulation, and
approach for enhancing breast most cancers prediction [5,6]. acceptability, authors have discussed how addressing specific
One of the leading causes of mortality for women worldwid implementation and uptake challenges may be helpful.
e is breast cancer. The American Cancer Society reports that o
ver 500 men and 41,760 women have lately passed away from Many researchers work on identification of breast cancer
breast cancer. Normal, benign, insitu carcinoma, and invasive using ML models. Some of the important contributions are
carcinoma are the four primary subtypes of breast cancer [7]. discussed here. A. Mangal et al. [1] proposed a model for
A little modification in the breast's structure characterises a prediction of breast cancer using machine learning algorithms.
benign tumour. It is not dangerous and is not a dangerous The k-NN, LR, DT, RF, and SVM with RB Function kernel are
malignancy. When in-situ carcinoma occurs, no other organs six supervised machine learning techniques presented in this
are affected and the disease solely affects the mammary duct study [10]. Adam Gradient Descent Learning, which includes
lobule system. If detected early, this variety is not harmful and the advantages of the adaptable gradient method with root mean
square propagation, was also used for deep learning.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 623


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

On the BC Wisconsin Diagnostic dataset, authors in this identify this disease. BC treatment and recovery will be more
study [11] applied 5 method of ML: SVM, RF, LR, DT, and effective if this approach is used. Future research may find it
KNN. After getting the solutions, a PE and comparison between beneficially challenging to apply this approach to larger
these various classifiers is conducted. The major goal of this datasets and, if feasible, to evaluate it on a broader scale.
study is to identify the machine-learning algorithms that are Additionally, The MHS may interact with several optimization
most efficient in terms of confusion matrices, accuracy, and methods, like PSO, ACO, and GA (Genetic Algorithm) (ACO
precision when used to predict and diagnose breast cancer. method). These methods may be used to accurately choose the
Support vector machines were shown to perform better than all optimum ensemble algorithm settings. The important
other classifiers and to have the greatest accuracy (97.2%). All contributions to predict breast cancer are as discussed here. The
activities are performed using the Scikit-learn module and authors of this research [15] suggest a fine-tuning strategy for
Python programming language-based Anaconda environment. neural networks that uses AlexNet for training of network.
This work may be expanded in the future by combining other Therefore, to identify the normal and abnormal areas of breast
DS and employing the FML approach to the data to retrieve cancer, scientists modified the first and final three layers of
more precise and encouraging findings. In this study [16], the AlexNet in the suggested model. The suggested model is more
SVM, KNN, RF, ANNs, and LR are 5 supervised ML effective and significant since it performs better during training
algorithms that the authors compare. The UCI ML data-set, a and testing, with accuracy rates of 98.44% and 98.1%,
well-known ML database, is where the WBC data-set was respectively. Therefore, this research demonstrates that fine-
found. With regard to accuracy, sensitivity, specificity, tuning in neural networks may identify breast cancer using MRI
precision, NP value, FN rate, FP rate, F1 score. Authors in this images, and that utilising the suggested approach to train a
paper [18] suggest a decision tree and adaptive boosting breast neural network classifier is quicker and more effective. This
cancer prediction model (Adaboost). The study makes use of study's [17] comparative analysis of seven Deep Learning
breast cancer data that was collected from of the Kaggle data techniques used the WBC data-set. The most effective
repository. 212 (or 37.25%) of the 569 observations in the algorithms were determined to be LSTM and GRU, both of
dataset are benign whereas 62.74% are malignant. The dataset which generated favourable results for most of the performance
is severely unbalanced, as shown by the class distribution, and metrics used in this study, including an accuracy of over 98%.
a learning method like a DT is biased toward the benign Future iterations of this research will broaden its reach to
observations, which has poor predictive accuracy for the incorporate those novel, promising algorithms.
malignant observations.
D. P. Yadav et al. [21][22] proposed machine learning
The authors of this study [19] recommend utilizing device models for bone fracture, heart disease and Leukemia. Pandian
learning (ML) to classify sufferers with triple bad and non-triple in [23] identify and classify cancer using image processing and
bad breast most cancers the usage of gene expression records. capsule network. T. Vijayakumar in [24] perform cancer
Methods: By analysing RNA-Sequence records from a hundred prediction using neural network. Lot of research has been done
and ten triple bad and 992 non-triple bad breast most cancers and many researchers [12] [20] contributed to stop breast
tumour samples and the authors decided on the traits (genes) cancer. But there is need to do more research in this area to stop
used within side the layout and validation of the class models. this disease.
The scientists looked at four distinct classification models,
including SVM, KNN, NB, and DT. On various gene III. PROPOSED WORK
expression datasets, the recommended approaches were utilised This work serves as an example of how ML models may be
to assess and verify their effectiveness. In order to validate the used to forecast the likelihood of breast cancer. Some machine
outcomes acquired using the WBCD database, it is crucial to learning models are selected for the implementation which are
think about how to apply the same algorithms and techniques to best selected methods for this problem in the literature [12] [13]
other datasets [9]. In their next research, the authors want to use [15]. Python language is selected for the experiments as it
their machine learning techniques as well as others, applying provides a rich set of libraries for this kind of work.
additional parameters to bigger data sets with more illness
types. It should be emphasised that the WBCD database is the A. Classification Task
only one for which the findings were acquired, which might be Breast cancer prediction was one of the categorization issues
seen as a restriction of their work. This study [14] suggests a that the recommended technique took into account. Depending
modern ensemble-based architecture called MHS to better on the problem, the patient will either be benign or malignant.
accurately forecast breast cancer. In this model, the Extra Trees The single attribute is thought of as output, whilst the other
classifier integrates the properties from VIF, Correlation of qualities are thought of as inputs. Figure 1 depicts the suggested
Pearson, and IG to extract the most relevant features and find approach for machine learning-based breast cancer prediction.
the tumours' hidden patterns. Based on the results, the authors
concluded that the performance of the recommended In this work, initial cleaning of the data set is done. Then the
framework is flawless because the Extra Trees method chooses instances are divided into training and testing data set according
more suitable characteristics. Furthermore, since it is to 80-20 ratio. The accuracy is measured as a comparative
successful, experts advise using this suggested framework to parameter for all the four ML models which are KNN, RF,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 624


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

SVM and LR. These models are used by many researchers to identify the dependent variable to belong with any of the two
predict diseases [12] [21] [22]. So these ML models are selected classes which are either 0 or 1. These four ML models are used
for prediction of breast cancer in this work. in this research.
In this study, machine learning methods are used to examine
B. Data Set and Attributes this data collection. The proposed ML models are first trained
The Wisconsin Hospitals dataset, which is accessible at on the selected data set. Then the prediction accuracy is
Kaggle.com, provided the data set for the study's breast cancer measured by using testing data.
prediction model [11]. 32 patient characteristics from the data
set are utilised to forecast cancer. The data collection has 569
occurrences altogether. The data set is available in csv format IV. RESULTS AND ANALYSIS
can be downloaded freely from Kaggle repository. Each
occurrence can therefore have: Benin or Malignant. In the data Machine learning approaches for classification are
set 357 are benign instances and 212 are malignant instances. employed in the prediction of cancer. We contrast four ML
methods. Table 1 displays the support vector classifier, random
Malignant or benign tumours can both occur in the body
forest classifier, k-nearest neighbours, and logistic regression
(cancerous). It is typical for benign tumours to develop slowly
prediction accuracy. The prediction accuracy is measured on
and not spread. Malignant tumours have the ability to spread the percentage of instances it predicts correctly from the testing
throughout the body, develop quickly, infiltrate neighbouring data set.
normal tissues, and do great damage. The working of the
proposed models is discussed here. Table 1 demonstrates that in terms of prediction accuracy,
the Logistic Regression Classifier performs better than the
KNN, RF and SVM classifier.
The accuracy of the Logistic Regression Classifier, which is
98.18 percent, is the greatest of the four. The accuracy of the
proposed ML models is shown in figure 2 using a bar graph.
The bar graph is generated in MS-Excel using the data of table
1. From the bar graph, it is easily concluded that the LR is the
best performer for the proposed problem.
TABLE I : Comparison of Prediction
Sr. No. Machine Learning Prediction
Model Accuracy
1 KNN Model 96.23
2 Random Forest
96.28
Model
3 SVM Model 98.11
4 Logistic
98.18
Regression Model

98.5 98.11 98.18


Accuracy in %age

98
97.5
97 96.28
96.5 96.23
96
95.5
95

Fig. 1. Proposed Model.

K-Nearest Neighbours Algorithm is a very popular ML


model mainly used for classification purpose. It works on Machine Learning Model
finding the nearest neighbor of an instance. Random Forest
Algorithm mix the outcome of many decision trees to make the Fig. 2. Bar Graph for Achieved Accuracy
final decision. SVM is also a reliable ML model mainly used
for classification. Logistic Regression is a ML model used to

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 625


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. CONCLUSION AND FUTURE SCOPE of comprehensive breast cancer risk prediction tools in health care for
personalised prevention. Preventive Medicine, 159, 107075.
In this work, four machine learning classifiers are applied to [10] Gupta, P., & Garg, S. (2020). Breast cancer prediction using varying
the well-known WBCD breast cancer database. With a score of parameters of machine learning models. Procedia Computer
98.18 percent, it has been shown that the "Logistic Regression" Science, 171, 593-601.
surpasses the other three KNN, RF and SVM classifiers. In the [11] Naji, M. A., El Filali, S., Aarika, K., Benlahmar, E. H., Abdelouhahid, R.
future, breast cancer may be predicted using different ML A., & Debauche, O. (2021). Machine learning algorithms for breast cancer
algorithms. Future study may be conducted to see whether the prediction and diagnosis. Procedia Computer Science, 191, 487-492.
LR classifier is producing the best results for cancer prediction [12] Uttam, A.K., Mangal, A., "Application of extreme gradient boosting
ensemble model for sleep quality prediction on personalized wearable
and to assess its accuracy in predicting tumours of various sorts. device data", International Journal of Advanced Science and Technology,
This work is a novel approach as it works on achieving the best 2020, 29(5), pp. 3755–3762
prediction accuracy for breast cancer prediction. Some future [13] Mangal, A., Uttam, A.K., "Sleep prediction by various supervised
directions of this work are discussed here. The other types of machine learning model", International Journal of Advanced Science and
the errors will be calculated in future. The time taken by Technology, 2020, 29(5), pp. 3786–3792
different algorithm in training and testing will also be discussed [14] Samieinasab, M., Torabzadeh, S. A., Behnam, A., Aghsami, A., & Jolai,
in future. F. (2022). Meta-health stack: a new approach for breast cancer
prediction. Healthcare Analytics, 2, 100010.
REFERENCES [15] Nasir, M. U., Ghazal, T. M., Khan, M. A., Zubair, M., Rahman, A. U.,
Ahmed, R., ... & Yeun, C. Y. (2022). Breast Cancer Prediction
[1] A. Mangal and V. Jain, "Prediction of Breast Cancer using Machine Empowered with Fine-Tuning. Computational Intelligence and
Learning Algorithms," 2021 Fifth International Conference on I-SMAC Neuroscience, 2022.
(IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India,
2021, pp. 464-466. doi: 10.1109/I-SMAC52330.2021.9640813 [16] Islam, M., Haque, M., Iqbal, H., Hasan, M., Hasan, M., & Kabir, M. N.
(2020). Breast cancer prediction: a comparative study using machine
[2] Gail, M. H., Brinton, L. A., Byar, D. P., Corle, D. K., Green, S. B., learning techniques. SN Computer Science, 1(5), 1-14.
Schairer, C., & Mulvihill, J. J. (1989). Projecting individualized
probabilities of developing breast cancer for white females who are being [17] Ghosh, P., Azam, S., Hasib, K. M., Karim, A., Jonkman, M., & Anwar,
examined annually. JNCI: Journal of the National Cancer Institute, A. (2021, July). A performance based study on deep learning algorithms
81(24), 1879-1886. in the effective prediction of breast cancer. In 2021 International Joint
Conference on Neural Networks (IJCNN) (pp. 1-8). IEEE.
[3] Louro, J., Posso, M., Hilton Boon, M., Román, M., Domingo, L., Castells,
X., & Sala, M. (2019). A systematic review and quality assessment of [18] Assegie, T. A., Tulasi, R. L., & Kumar, N. K. (2021). Breast cancer
individualised breast cancer risk prediction models. British journal of prediction model with decision tree and adaptive boosting. IAES
cancer, 121(1), 76-85. International Journal of Artificial Intelligence, 10(1), 184.
[4] Mavaddat, N., Michailidou, K., Dennis, J., Lush, M., Fachal, L., Lee, A., [19] Wu, J., & Hicks, C. (2021). Breast cancer type classification using
& MacInnis, R. J. (2019). Polygenic risk scores for prediction of breast machine learning. Journal of personalized medicine, 11(2), 61.
cancer and breast cancer subtypes. The American Journal of Human [20] Manoharan, Samuel. “Early diagnosis of Lung Cancer with Probability of
Genetics, 104(1), 21-34. Malignancy Calculation and Automatic Segmentation of Lung CT scan
[5] Terry, M. B., Liao, Y., Whittemore, A. S., Leoce, N., Buchsbaum, R., Images.” Journal of Innovative Image Processing (JIIP) 2, no. 04 (2020):
Zeinomar, N., ... & MacInnis, R. J. (2019). 10-year performance of four 175-186.
models of breast cancer risk: a validation study. The Lancet Oncology, [21] D. P. Yadav, P. Saini and P. Mittal, "Feature Optimization Based Heart
20(4), 504-517. Disease Prediction using Machine Learning," 2021 5th International
[6] Yanes T, Young MA, Meiser B & James PA (2020) Clinical applications Conference on Information Systems and Computer Networks (ISCON),
of polygenic breast cancer risk: a critical review and perspectives of an Mathura, India, 2021, pp. 1-5. doi: 10.1109/ISCON52037.2021.9702410
emerging field. Breast Cancer Res 22, 21. [22] D. P. Yadav, "Feature Fusion based Deep Learning method for Leukemia
[7] Zhou, X., Li, C., Rahaman, M. M., Yao, Y., Ai, S., Sun, C., ... & Teng, Y. cell classification," 2021 5th International Conference on Information
(2020). A comprehensive review for breast histopathology image analysis Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1-
using classical and deep neural networks. IEEE Access, 8, 90931-90956. 4. doi: 10.1109/ISCON52037.2021.9702440
[8] Sutanto, D. H., & Ghani, M. K. A. (2015). A benchmark of classification [23] Pandian, A. Pasumpon. "Identification and classification of cancer cells
framework for non-communicable disease prediction: a review. ARPN J using capsule network with pathological images." Journal of Artificial
Eng Appl Sci, 10, 9941-9955. Intelligence 1, no. 01 (2019): 37-44.
[9] Moorthie, S., de Villiers, C. B., Burton, H., Kroese, M., Antoniou, A. C., [24] Vijayakumar, T. "Neural network analysis for tumor investigation and
Bhattacharjee, P., ... & Schmidt, M. K. (2022). Towards implementation cancer prediction." Journal of Electronics 1, no. 02 (2019): 89-98

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 626


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Covid-19 Infection Segmentation Using Deep


Learning Techniques

Arya R Deepak S
Electronics and Communication Engineering Electronics and Communication Engineering
College of Engineering Trivandrum College of Engineering Trivandrum
Thiruvananthapuram, India Thiruvananthapuram, India
aryarajitha123@gmail.com deepaks@cet.ac.in

Abstract—The rapid spread of the disease after COVID-19’s the market to test individuals for COVID-19 infection[1]. RT-
emergence in 2019 has presented enormous problems to medical PCR, which is only used to determine whether the user is
institutions. The diagnosis process will go more rapidly if the infected, currently lacks sufficient precision. By using medical
infected region in the COVID-19 CT image can be automatically
segmented, which will aid clinicians in promptly identifying images it is possible find the infection region more accurate, as
the patient’s illness. Automated lung infection identification a result, in order to draw a conclusion, additional information
using computed tomography scans is a more general approach. must be considered in addition to RT-PCR. The lung’s bilateral
However, segmenting sick areas from CT slices is quite difficult. patchiness or ground-glass opacity (GGO) can be seen on a
In this work, a diagnosis system based on deep learning methods CT scan, providing more accurate pathological data. However,
is being created to identify and quantify COVID-19 infection and
screen for pneumonia using CT imaging. a diagnosis and course of therapy are decided by the expert
Here, Unet++ approaches, U-net architecture based on CNN judgement of medical personnel. Because there are few quali-
encoder and CNN decoder, and Attention Unet segmentation fied doctors in these locations and the workload in the infected
techniques are used. These methods are applied for quick and area is high when observed with the naked eye, it is possible
accurate picture segmentation to produce segmentation models for imaging diagnosis and therapy to be employed in areas
for lung and infection. Fourfold cross-validation has been used as
a re-sampling method to improve skill estimate on unseen data. with severe epidemics and a lack of medical resources. So we
To enable volume ratio calculating and determine infection rate, require a technology to swiftly and automatically segment the
the lung and infection volumes have been reconfigured. 20 CT contaminated area of the COVID-19 patients’ lungs in order
scan cases were used in this study, and the data were split into to better manage the issues brought on by the virus [1,2].
two, training dataset 70% and a validation dataset 30%. In this Convolutional neural networks (CNNs) have been exten-
study with three architectures it shows that basic Unet performs
well compared to other two architectures. sively utilised in the processing of medical images as a result
Index Terms—SARS-CoV-2, CT scans, deep learning, lung of the recent rapid growth of artificial intelligence, partic-
segmentation, infection segmentation, attention Unet, Unet++, ularly deep learning technologies, and their potent feature
Unet. representation and extraction capabilities. In order to locate
and recognise anomalous qualities and areas of interest, deep
I. I NTRODUCTION learning algorithms can be used to segment problems in
Corona virus disease 2019 is a pandemic ailment that is now biological picture analysis (ROIs). NET-based designs and
affecting the entire world (COVID-19). The Corona Virus Dis- popular deep learning architectures now on the market are
ease 2019 (COVID-19) is a pandemic epidemic that impacts the most promising ones. In this study, a deep learning-based
every country in the world, according to the World Health Or- diagnosis approach was created using clinical CT images
ganization. People who carry COVID-19 have reported a wide collected from a dataset of publically available chest CT scans
range of symptoms, from mild discomfort to serious disease. to automatically detect and assess areas thought to be infected
2 to 14 days after the virus was initially exposed, symptoms with the COVID-19 virus.
could start to show. Some possible symptoms include a fever or II. L ITERATURE R EVIEW
chills, coughing, shortness of breath or breathing difficulties,
tiredness, headache, loss of taste or smell, sore throat, stuffy A well-researched area with several ecological protection
or runny nose, nausea or vomiting, and diarrhoea. In order applications is deep learning-based COVID-19 detection. Re-
to prevent the pandemic from spreading, reverse transcription cently, methods for tracking the prevalence of illnesses have
polymerase chain reaction (RT-PCR) is commonly picked from been routinely used to analyse medical imaging. The devel-
opment of this subject has been hastened by the introduction
of artificial intelligence technologies and their extensive appli-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 627


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

cation for feature representation, the detection, and segmen- III. M ETHODOLOGY
tation of different medical conditions [3]. Ramzi Mahmoud The proposed approach in this study is composed of three
and others[4], It has been claimed to use CNN architecture architectures for training and segment the lung CT images
for image classification and the standard Unet architecture of covid-19 patients. The process of segmentation involves
for segmentation in a deep learning-based diagnosis system assigning a class to each pixel in the image. There are many
for COVID-19 detection and pneumonia screening using CT applications for image segmentation, including satellite imag-
imaging. The segmentation system of this suggested model ing, self-driving cars, and medical imaging, to name a few.
gets dice scores of 0.98 and 0.91, respectively, and an accuracy There are other image segmentation techniques accessible,
of 0.98 for the segmentation tasks involving the segmentation however in this case, we’re employing semantic segmentation
of the lung and infection. Qin Zhang [5] They suggested a to separate Covid-19 CT pictures into their component parts.
new network structure and gave it the name QC-HC U-Net in Semantic segmentation is a deep learning technique that gives
order to be able to automatically partition the contaminated each pixel in an image a label or category. Architecture used
region. First, they create a new connection method by fusing for segmentation are Unet, Unet++ and attention Unet. Be-
dense and residual connections, then they apply it to the cause U-net’s segmentation algorithms, which were developed
encoder and decoder. Second, in the decoder part, they decided especially for medical image analysis, can precisely segment
to include Hypercolumns. The enhanced network effectively images with only a little amount of training data. These
avoids vanishing gradient while extracting more information features, which offer U-net designs a very high utility within
when compared to the benchmark 3D U-Net. Deng-Ping Fan the medical imaging community, have led to its widespread
[6] The automatic identification of infected regions from chest adoption as the primary tool for segmentation tasks in medical
CT slices is proposed using a novel COVID-19 Lung Infection imaging. The widespread use of U-net algorithms in all
Segmentation Deep Network (Inf-Net). In their Inf-Net, the significant imaging modalities, including X-rays, MRI, CT
high-level characteristics are combined to create a world map scans, and microscopes, illustrates the effectiveness of the
using a parallel partial decoder. Jue Jiang [7] They created the technology. Here, the covid-19 CT images were segmented
incremental-MRRN and dense-MRRN variants of the multiple using three different designs, and the outcomes were com-
resolution residually connected network (MRRN). To detect pared.
and segment the lung tumours, their networks simultaneously
incorporate information from different image resolutions and A. Unet
feature levels using residual connections. Tongxue Zhou [8] Four encoder blocks and four decoder blocks that are joined
They suggest an attention-based segmentation network built by a bridge make up the U-shaped encoder-decoder network
on the U-Net, Its obtained Hausdorff Distance and Dice design known as UNET. At each encoder block, the filter count
Score are 18.8 and 83.1%, respectively. Jun Ma [9] In this (feature channels) is doubled and the spatial dimensions are
work, they generated three benchmarks for lung and infection cut in half by the encoder network (contracting path). The
segmentation based on 70 annotated COVID-19 instances, decoder network also reduces the number of feature channels
which contain active research areas like few-shot learning, by half and doubles the spatial dimensions. The encoder
domain generalisation, and knowledge transfer. Cheng Chen network doubles the filter count (feature channels) and reduces
[10] Automatic segmentation of lung lesions from COVID-19 the spatial dimensions for each encoder block (contracting
computed tomography (CT) scans can help build a quantitative path). Additionally, the decoder network reduces by half the
model for diagnosis and treatment. In order to meet the number of feature channels and increases by two the spatial
processing criteria for CT scans under the COVID-19 standard, dimensions. A succession of encoder blocks are used by the
this work presents a novel segmentation technique. Laith encoder network, which also functions as a feature extractor,
Abualigah [11] The Evolutionary Arithmetic Optimization Al- to develop an abstract representation of the input image. Each
gorithm is the foundation for the new multilevel thresholding encoder block is made up of two 3x3 convolutions, followed
method proposed in this paper (AOA). Guotai Wang [12] They by a ReLU (Rectified Linear Unit) activation function. The
first provide a novel COVID-19 Pneumonia Lesion segmenta- ReLU activation function increases the network’s nonlinearity,
tion network (COPLE-Net) to better handle the lesions with resulting in better generalisation of the training data. The
different scales and appearances, which is a generalisation output of the ReLU acts as a skip connection to the relevant
of the Dice loss for segmentation and Mean Absolute Error decoder block. In Fig. 1, the Unet architecture is displayed.
(MAE) loss for robustness against noise. Xiaocong Chen [13]
For the automatic segmentation of several COVID-19 infection B. Attention Unet
locations, they suggested an unique deep learning approach. Here, a novel attention gate (AG) paradigm for medical
Specifically, they employ the soft attention mechanism to en- imaging is developed, which automatically learns to concen-
hance the model’s capacity to differentiate a range of COVID- trate on targets with a range of sizes and shapes. Models
19 symptoms and the Aggregated Residual Transformations to developed using AGs automatically identify and suppress the
acquire a robust and expressive feature representation. portions of the input image that are not relevant to a specific
job. Because of this, it is unnecessary to use explicit external
tissue/organ localization modules in cascaded convolutional

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 628


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 1. Unet Architecture[4]. Fig. 3. UNet++ Architecture[14].

neural networks (CNNs). To increase model sensitivity and available to the general public. This is why our team
prediction accuracy, AGs can be readily added to popular CNN decided to use the CTS dataset from Ma Jun et al. [17].
architectures, such the U-Net model, without any additional The dataset used by Ma Jun et al. was made available by
computing work. Experimental results show that AGs consis- the Corona-cases Initiative [17] and Radiopaedia [15].
tently improve U-prediction Net performance while retaining manually marked [16]. 20 validated COVID-19 individu-
processing economy using a variety of datasets and training als’ axial volumetric CT scans, 3138 lung CT images that
sizes. The attention Unet’s architecture is shown in Figure 2. have been tagged, segmented, and verified by experienced
radiologists, as well as the associated lung CT images,
infection masks, and a superposition of the two masks,
are all included. Fig. 4 gives a summary of the database
that was used. This dataset is a publically available CT
image for Covid-19 in kaggle named as COVID-19 CT
scans. This dataset includes expertly segmented lung and
infection images along with 20 CT scans of individuals
with COVID-19 diagnoses. Here we are used this dataset
in the form of metadata. Starting with the 20 CT scan

Fig. 2. Attention Unet Architecture[14].

C. UNet++
UNet++ differs from the original U-Net in three ways:
1) Convolution layers on skip pathways are used, which
closes the semantic gap between encoder and decoder feature
mappings. 2) Multiple connections on skip pathways between
skips, which improves gradient flow. 3. Deep supervision Fig. 4. Sample images from dataset.
permits model pruning and, in the worst case, produces perfor-
mance that is superior to using only one loss layer. In UNet++, instances used in this study, we divided the data into
an initial or backbone encoder sub-network is followed by a two portions: 70% for the training dataset and 30% for
decoder sub-network. Deep supervision and freshly built skip the validation dataset. The lung segmentation step was
routes (green and blue in Fig. 3) link the two sub-networks the first procedure we carried out. The development of
(red in Fig 3). In Fig. 3, the UNet++ architecture is shown. the lung segmentation model follows the introduction of
IV. E XPERIMENT an Unet architecture based on CNN encoder and CNN
decoder techniques, attention Unet, and UNet++. The
A. Data Set infection segmentation model was created using the same
Despite the surge in patients with COVID-19 infections method in the second phase. The last step is to restore
and the volumetric CT scans they undergo, labelled CT the volume of the 20 examples. For each illustration,
scans are still only readily available in a small number of we reconstructed the infection volumes after the lungs’
settings. As a result, there are not as many CTS datasets volumes. As described in Ramzi Mahmoudi et al.[8]. Fig

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 629


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

5 shows a chest CT scan and its corresponding lung TABLE I


mask after prepossessing cropping. After prepossessing UN ET ++
cropping, Fig 4 displays a chest CT scan and its accom- Epoch Dice Coefficient loss val dice coefficient val loss
panying lung mask. The image’s size is decreased in this
1 0.1568 0.7625 0.1318 0.7625
prepossessing step from 250x250 to 180x180.
2 0.2092 0.6388 0.1301 0.7331

3 0.2406 0.5954 0.1264 0.6924

4 0.2674 0.5634 0.1250 0.6634

5 0.2896 0.5338 0.1229 0.6406

46 0.8869 0.0773 0.7608 0.1797

47 0.8340 0.1163 0.6991 0.2395

48 0.8558 0.1000 0.7496 0.1922

Fig. 5. A chest CT scan and its corresponding lung mask after prepossessing 49 0.8768 0.0851 0.7708 0.1784
cropping.
50 0.8828 0.0811 0.7787 0.1716

B. Segmentation Models
This network’s suggested segments cover the lung and As seen below, both of these evaluation metrics are
COVID-19 infection areas. The training for every model connected and both have a restricted range of [0,1] and
was done independently. The U-Net, Attention Unet, and are frequently close to the value of 1.
UNet++ architectures were implemented in Google Colab DICE
using the Adam Optimizer and the Keras library with IoU = (3)
2 − DICE
TensorFlow backend. Each design generates sigmoid acti-
vation by using a Relu operation as its activation function. V. R ESULTS
For the Unet++ and Attention Unet architectures, the After training each model ie using Unet, attention Unet
filter widths are 16, 32, 64, 128 and 256, while for the and UNet++ with the same dataset we inferred that the
Unet architecture, they are 16, 32, 64, 128, 256 and 512. loss function is less in the case of attention unet and the
50 epochs are used to train each model. All subsequent validation dice score is more in Unet when compared to
procedures are the same for each model till training. other architectures. Fig 6 shows the infection mask of the
original image after preprocessing stage. Expect training
C. Evaluation metrics models, all other steps are the same for each model. Each
Dice Score (DS) coefficient and Intersection over Union model obtained certain advantages and disadvantages in
(IoU) metric are used to assess this model. The efficiency the case of loss function, validation dice coefficient,
of automated segmentation of Covid-19 CT images was validation loss and dice coefficient. Table 1, Table 2 and
evaluated using the DS as a statistical validation measure. Table 3 shows the different values for dice coefficient,
The ratio of the total number of pixels to twice the overlap loss, validation dice coefficient and validation loss for
area of the expected output and the ground truth can be different epochs. By comparing the values in table 1, 2,
used to determine DS. The DS value ranges from 0 to 1, 3 dice coefficient is more compared to others in attention
where 0 denotes complete spatial overlap and 1 denotes Unet model, loss is also less in attention Unet model
no overlap at all [18]. This is how the DS is determined compared to other two models. In case of validation
[19]: coefficient it is more in Unet model compared to other
2T P two models, also validation loss is less in Unet rather
DS = (1) than other two. Fig 7 and Fig 8 shows the Validation and
F N + F P + 2T P
dice coefficient graph for 50 epochs, while the data is
In this context, TP stands for true positive, FP for false trained for Unet model. Fig 10 and 11 shows the plot of
positive, and FN for false negative prediction. IoU is validation, dice coefficient vs epoch and loss vs epoch
defined as the ratio of the area of union between the graph for Unet++ model. Fig 13 and 15 shows the vari-
anticipated segmentation’s overlap area and the ground ation of dice, validation loss vs epoch and loss vs epoch
truth. The Jaccard index is another name for the IoU. for attention Unet model. Fig 9 shows the predicted and
This is how the IoU is determined [18]: actual mask after training with unet architecture. Fig
TP 12 shows the actual and predicted masks after training
IoU = (2) with unet++ architecture. Fig 14 shows the predicted and
TP + FP + FN

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 630


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE II
ATTENTION U NET

Epoch Dice Coefficient loss val dice coefficient val loss

1 0.2134 0.6368 0.1280 0.6957

2 0.3080 0.5048 0.1203 0.6452

3 0.3581 0.4514 0.1252 0.6354

4 0.3981 0.4176 0.1120 0.6053

5 0.4232 0.3923 0.1001 0.5957

46 0.9109 0.0607 0.7887 0.1663

47 0.9122 0.0598 0.7991 0.1589

48 0.9162 0.0573 0.8012 0.1599

49 0.9182 0.0561 0.7896 0.1687

50 0.9183 0.0559 0.8029 0.1578

Fig. 6. Original Image and Infection mask. TABLE III


UN ET

Epoch Dice Coefficient loss loss val dice coefficient

1 0.2769 0.4807 1.0958 3.1989*e-̂04

2 0.5892 0.2910 1.3432 2.0927*e-̂04

3 0.6871 0.2233 0.9256 4.8579*e-̂04

4 0.7121 0.2034 0.8428 0.0021

5 0.7361 0.1896 0.8314 0.0454

46 0.9014 0.06898 0.1146 0.8494

47 0.9030 0.0682 0.1166 0.8453

48 0.9041 0.0676 0.1186 0.8466

49 0.9055 0.0666 0.1169 0.8477


Fig. 7. Dice coefficient vs epoch while trained with Unet.
50 0.9042 0.0676 0.1149 0.8502

Fig. 8. Dice loss vs epoch while trained with Unet.

Fig. 9. Actual image vs predicted image using Unet.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 631


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 10. Dice coefficient vs epoch while training with Unet++. Fig. 13. Dice coefficient vs epoch while training with attention Unet.

Fig. 11. Dice loss vs epoch while training with Unet++.

actual mask after training with attention unet architecture.


Fig. 14. Actual image vs predicted image using attention unet.

C ONCLUSION of Unet, Attention Unet, and U-Net++ are strong, and


There are numerous techniques for segmenting CT scan they were initially developed for the segmentation of
images for COVID-19 early detection. To tackle the issue, medical images. Because there are more parameters to
this experiment makes advantage of PyTorch segmenta- play with, this network might also conclude that it
tion models. And from the three models employed in this is more adaptable. Even though this experiment is far
experiment, it shows that Unet outperforms the others from ideal, segmentation in medical image processing, in
for validation and validation loss as well as for dice particular, should still benefit greatly. These three models
coefficient and lost attention. The network architectures (Unet, U-Net++ and attention Unet) were trained and
tested using the publically available 20 CT slices of
lung images. By training this dataset with these three
architectures for 50 epochs it obtained a validation dice

Fig. 12. Actual image vs predicted image using Unet++. Fig. 15. Dice loss vs epoch while training with attention Unet.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 632


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

coefficient as 0.77 and validation loss 0.17 for Unet++ [10] Cheng Chen et al. An Effective Deep Neural Network for Lung Lesions
architecture and for attention Unet architecture it obtained Segmentation From COVID-19 CT Images. [CrossRef] [Google Scholar]
[11] Laith Abualigah et al. A Novel Evolutionary Arithmetic Optimization
a validation dice score 0.802 and loss 0.15. For Unet Algorithm for Multilevel Thresholding Segmentation of COVID-19 CT
architecture it obtained validation dice coefficient 0.85 Images. [CrossRef] [Google Scholar]
and loss 0.11 for 50 epochs. So the results shows that [12] Guotai Wang etbal. A Noise-Robust Framework for Automatic Segmen-
tation of COVID-19 Pneumonia Lesions From CT Images. [CrossRef]
Unet architecture produces a good dice score compared [Google Scholar]
to others. And by comparing the training and validation [13] Xiaocong Chen et al. Residual Attention U-Net for Automated Multi-
dice coefficient graphs of these three architectures it Class Segmentation of COVID-19 Chest CT Images. [CrossRef] [Google
Scholar]
is also showing that unet architecture performs good [14] Vishal Rajput explanation on Attention U-Net, ResUnet, many more.
compared to others. From figures it shows the difference [15] Ma, J.; Wang, Y.; An, X.; Ge, C.; Yu, Z.; Chen, J.; Zhu, Q.; Dong, G.;
between actual mask and predicted mask, in these figures He, J.; He, Z.; et al. Towards Data-Efficient Learning: A Benchmark
for COVID-19 CT Lung and Infection Segmentation. arXiv 2020,
it is showing that expect from unet++ model other two arXiv:2004.12537.
are extracting small features. Unet produces good dice [16] Pizer, S.M.; Amburn, E.P.; Austin, J.D.; Cromartie, R.; Geselowitz,
score because of it has multi-stage cascaded convolu- A.; Greer, T.; ter Haar Romeny, B.; Zimmerman, J.B.; Zuiderveld, K.
Adaptive histogram equalization and its variations. Comput. Vis. Graph.
tional neural networks, they are necessary for U-Net Image Process. 1987, 39, 355–368.
to function despite its great representational capabilities. [17] Zimmerman, J.; Pizer, S.; Staab, E.; Perry, J.; McCartney, W.; Brenton,
These cascaded frameworks create dense predictions and B. An evaluation of the effectiveness of adaptive histogram equalization
for contrast enhancement. IEEE Trans. Med. Imaging 1988, 7, 304–312.
extract the region of interest. As it constantly extracts [18] Zou, Kelly H et al. “Statistical validation of image segmentation quality
low-level information, this method uses computational re- based on a spatial overlap index.”Academic radiology vol. 11,2 (2004):
sources excessively and redundantly. There are numerous 178-89. doi:10.1016/s1076-6332(03)00671-8.
[19] Taha, Abdel Aziz, and Allan Hanbury. “Metrics for evaluating 3D med-
techniques for segmenting CT scan images for COVID- ical image segmentation: analysis, selection, and tool.” BMC medical
19 early detection. To tackle the issue, this experiment imaging vol. 15 29. 12 Aug. 2015, doi:10.1186/s12880-015-0068-x.
makes advantage of PyTorch segmentation models. And
from the three models employed in this experiment, as
shown in tables 1, 2, and 3, Unet outperforms the others
for validation and vaqlidation loss as well as for dice
coefficient and lost attention. The network architectures
of Unet, Attention Unet, and U-Net++ are strong, and
they were initially developed for the segmentation of
medical images. Because there are more parameters to
play with, this network might also conclude that it is more
adaptable. Even though this experiment is far from ideal,
segmentation in medical image processing, in particular,
should still benefit greatly.

R EFERENCES
[1] Xie XZ, et al. Chest CT for typical coronavirus disease 2019 (COVID-
19) pneumonia: Relationship to negative RT-PCR testing. Radiology.
2021;292:41–45. [PMC free article] [PubMed] [Google Scholar]
[2] Wang D, et al. Clinical characteristics of 138 hospitalized patients with
2019 novel coronavirus-infected pneumonia in Wuhan, China. JAMA, J.
Am. Med. Assoc. 2020;323:1061–1069. doi: 10.1001/jama.2020.1585.
[PMC free article] [PubMed] [CrossRef] [Google Scholar]
[3] Huang, G. et al. Densely connected convolutional networks. In 2017
IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
2261–2269 (2017).
[4] Ramzi Mahmoudi et al. A Deep Learning-Based Diagnosis System for
COVID-19 Detection and Pneumonia Screening Using CT Imaging.
[CrossRef] [Google Scholar]
[5] Qin Zhang et al. Segmentation of infected region in CT images
of COVID-19 patients based on QC-HC U-net. [CrossRef] [Google
Scholar]
[6] Deng-Ping Fan et al. Inf-Net: Automatic COVID-19 Lung Infection
Segmentation From CT Images. [CrossRef] [Google Scholar]
[7] Jiang et al., Multiple resolution residually connected feature streams
for automatic lung tumor segmentation from CT images. [CrossRef]
[Google Scholar]
[8] Tongxue Zhou et al. Automatic COVID-19 CT segmentation using U-
Net integrated spatial and channel attention mechanism. [CrossRef]
[Google Scholar]
[9] Jun Ma et al. Toward data-efficient learning: A benchmark for COVID-
19 CT lung and infection segmentation. [CrossRef] [Google Scholar]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 633


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Machine Learning Techniques for
Detecting DDoS Attacks in SDN
M. Kavitha M.Suganthy Aniket Biswas
Department of CSE Department of ECE Department of CSE
Vel Tech Rangarajan Dr. Sagunthala Vel Tech Multi Tech Dr. Rangarajan Vel Tech Rangarajan Dr. Sagunthala
R&D Institute of Science and Dr. Sakunthala Engineering College, R&D Institute of Science and
Technology Chennai, Tamil Nadu, India Chennai, Technology
Chennai, India India Chennai, India
kavitha@veltech.edu.in suganthym46@gmail.com vtu11309@veltech.edu.in

R.Srinivsan R.Kavitha A.Rathesh


Department of CSE Department of CSE Department of CSE
Vel Tech Rangarajan Dr. Sagunthala Vel Tech Rangarajan Dr. Sagunthala Vel Tech Rangarajan Dr. Sagunthala
R&D Institute of Science and R&D Institute of Science and R&D Institute of Science and
Technology Technology Technology
Chennai, India Chennai, India Chennai, India
srinivasanrajkumar28@gmail.com rkavitha1984@gmail.com vtu12500@veltech.edu.in

Abstract— Future internet is increasingly reliant on largely decentralized and autonomous. These components
Software Defined Networking (SDN). With SDN, networks are usually developed by manufacturers for networks.
can be dynamically controlled, providing a global network. Manufacturers have to develop their own designs, firmware,
Compared to traditional networks, SDN offers the advantage and software in order to operate their own hardware. In light
of better security provisioning due to centralized of the changing nature of applications and the endlessly
management. However, SDN architecture manifests several changing demands for data, the existing Internet architecture
new network security problems that need to be handled to is unsuitable for adapting to them. SDN [1] has been
improve the security of SDN networks. Information security introduced for configuring and deploying networks that
and data analysis systems for Big Data have become more offers unparalleled flexibility. Managing traffic more
essential due to the increasing volume of data and its effectively can be improved by separating the control plane
incremental growth. Monitoring and analyzing data is and data plane. SDN architectures, however, pose a whole
needed to detect any intrusion into a system or network via host of security challenges. Recent concerns regarding SDN
an intrusion detection system (IDS). By using traditional security have gained considerable attention, as shown in [2]
methods, traditional data analysis techniques are unable to and [3]. A network intrusion detection system (IDS) is a key
detect attacks caused by high volumes, a wide variety and security tool. IDSs based on signatures identify new attacks
high speeds of network data. For an accurate and efficient using a database of signatures from previous attacks.
data analysis process, IDS employs Big Data Patterns in an anomaly database are used to identify attacks
techniques. The paper uses machine learning models to in an anomaly-based IDS. Zero-day attacks will not be
detect Distributed Denial of Service (DDoS) attacks. The detected by the system, but false alarms are rare. A
machine learning model is trained using data from KDD signature-based IDS is highly effective if it has a current
Cup 99.K Nearest Neighbor Classifier, Logistic Regression, signature database with accurate data. Maintaining
and Decision Tree have been used to train and test the databases of this type in real time is difficult and incurs high
datasets. It can be concluded that machine learning methods operational expenses. Analyzing observations that differ
can be more effective at detecting DDoS attacks than from the baseline allows one to identify anomalies using
traditional methods, that can be applied to software defined anomaly-based IDS. An IDS based on signatures is less
networks. Several experiments demonstrate the potential of likely to detect zero-day attacks. In order to find anomalies
our proposal to detect intrusion in SDN environments after on the network, the process monitors real-time traffic on the
extensive evaluation. network. Networks are growing in size, big data is reaching
an unprecedented volume, and powerful computation
facilities are making all processes more complex and real-
Keywords—Software Defined Networks, Decision Tree, time. In order to manage network-based intrusions
Machine Learning, Distributed Denial of Service, Intrusion
effectively, these systems must be analyzed carefully,
Detection System
precisely, and accurately, which has not been possible in the
I. INTRODUCTION past. On the other hand, machines have improved their
accuracy tremendously with AI algorithms. A growing need
Over the past three decades, the Internet architecture has for better performance is leading to its introduction among
evolved from a simple network to a complex system. the network types. In the modern era of modern cyber
Decentralized, autonomous, and consisting of a variety of security risks, network-based intrusion detection systems
network devices (with complex protocols, the system is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 634


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

(NIDS) have become a more realistic possibility due to their sampling and other preprocessing techniques applied to
implementation via software defined networks (SDNs). various datasets. 89.134% of UNSW-NB15 samples were
Rapid growth of network data and devices pose a high risk correctly identified. There have been several neural network
of security threats. By deploying machine learning models proposed for NIDS and various datasets were used
algorithms over SDN, the paper implements an Intrusion to implement the proposed approach to distinguish between
Detection System. KNN Classifier, Decision Tree Classifier, normal and attack packets in the network. In general, factors
and Logistic Regression algorithms are used to analyse the like those are intended to provide neural networks with the
data. capability of learning complex patterns with multiple scopes
of information within the same packet, but not always to do
that. This model is based on four hidden layers and used to
II. RELATED WORKS monitor intrusion attacks on KDD cup99[8]. Data
Algorithms for machine learning that integrate SDN have preprocessing was performed by using feature scaling and
attracted considerable interest. An experimental study was encoding. Various datasets were analyzed using more than
undertaken in [26] to find a solution that fixed problems in 50 features. Due to the large number of features, complex
KDD Cup 99 using the NSL-KDD dataset for intrusion GPUs were required to reduce training time. It was proposed
detection. The five Machine Learning algorithms were that NIDS use a supervised adversarial auto-encoder neural
studied. NSL-KDD dataset contained only 13 features due network [9][10]. The generator and discriminator in GANS
to correlation feature selection algorithm, resulting in a are different neural networks in contention with each other.
reduced complexity. The NSL-KDD dataset is used to detect With the Jensen-Shannon minimization algorithm, the
network anomalies in real-world networks. The average objective function will be minimized as much as possible.
accuracy is achieved for all 41 features using these classic By generating fake data packets, the generator attempts to
machine learning models. After reducing the number of generate an attack, but the discriminator determines whether
features to 13, the same models were trained again and these packets are valid or not; in other words, it determines
scored an average accuracy of 98%, 85%, 95%, 86%, and whether these packets are real or fake [11]. A regularization
73%. Based on deep neural networks, a system for intrusion penalty is also applied to the model structure for overfitting
detection and finding was proposed in [4]. In the proposed control behavior. U2RL and R2L detected reasonably well,
method, six basic and traffic characteristics are derived from but other tests revealed lower detection rates. The paper
the NSL-KDD dataset, which is easily derived from the [12][13] presented multichannel deep learning of features
SDN infrastructure. Accuracy, precision, and recall are for NIDS based on CNNs, two fully connected layers and a
combined to yield a F1-score of 0.75. For the second SoftMax classifier. With an average accuracy of 94%, the
evaluation, [5] implemented seven classic machine learning evaluation is conducted over different datasets. However,
models. A neural network has been applied to detect SDN the attack structure and characteristics were not clearly
anomalies with up to 89% accuracy [6]. Feature scaling is outlined in the proposed model. The attribute-based
also improved and accelerated via the Min-Max encryption is discussed in [14][15].
normalization technique. An intrusion detection application
used SVM classifiers coupled with principal component
analysis (PCA). A model for detecting abnormal patterns is III. METHODOLOGY
trained and optimized in this approach. It was proposed to To train the model, data is analyzed, best features are
use Min-Max normalization to reduce the error rates [7]. extracted, and preprocessing techniques are performed using
Radial basis function kernels were used for optimization. In only best five features, based on the best hyperparameters.
total, an average accuracy of 95% was achieved using the 31 The dataset consists of 2827876 rows and 80 columns,
features of the dataset, as well as the metrics used to which is collected from KDD Cup99 database. The
evaluate the proposed model. In [8], XGBoost was used to normalization helps to process the raw data and classifies
differentiate between DoS attacks and non-DoS attacks. A datasets which can be used in analysis using machine
prototype and development technique based on SDN using learning algorithms. It helps in identifying the attacks and
POX SDN was evaluated and analyzed using Future Internet allows to classify the raw data into different categories. To
2021, 13, 111 5 of 18. The network topology was simulated classify attacks, in which machine learning algorithms are
with Mininet to simulate cloud detection based on SDN in used. It is then analyzed to determine which type of attack is
real-time. A logarithmic-based and a Min-Max-based involved and what action is required. As a result, the
normalization was applied. In comparison to RF and SVM, processed data are placed in the algorithm and classified as
XGBoost had an overall accuracy of 98%, 96%, and 97% normal or an attack. Fig 1 illustrates the methodology used;
[9]. Based on the packet network, a six-tuple classification data is processed with KNN, Logistic Regression and
of characteristics is proposed. Speeds of flow packets Decision Tree Classifier, with Fig 3 showing that Decision
(SSIP), speeds of source ports, deviations of flows bytes Tree Classifier classifies better with a higher accuracy rate.
(SDFB), speeds of flow entries, and ratios of flow entries
and pairs should be investigated. SVM based on the six
characteristics calculates the current state of the network to
be either normal or attack. For an average accuracy of 95%,
attack flow, defense flow, and defense array were selected
[9]. In order to detect attacks in a multi-class classification,
TSDL was developed and implemented. The detection rate
and monitoring efficiency were improved using down-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 635


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. EXPERIMENTAL RESULTS


Machine Learning Algorithms
Data Analysis
KNN classifier A. Algorithm 1 - K Nearest Neighbor classifier
Dataset Data Normalization
Input : Training Data
Logistic Regression 1. There are K neighbors selected
Feature Selection 2. Computing Euclidean distance
Decision Tree
Classifier
ED=√(X2 − X1)2 + (Y2 − Y1)2
3. The Euclidean Distance is calculated using
K nearest neighbors
4. K nearest neighbors are counted within each
Model Evaluation category
5. A new point of data is added to the category
with the most neighbors.
Classification/ 6. Test and evaluate the model
Prediction of attack

• Data preprocessing process


SDN Controller • Implementing the K-NN algorithm on the
training data
• Prediction of test results
• Confusion matrix creation (test accuracy of
Fig. 1. Proposed Architecture to detect DDoS Attack
result)
There are various attacks included in Table I of the data set • Visualizing results from a test set
and it also desrcibes about the data used. In total, there are •
1113112 total cases, 46.5% of which are benign and 53.5% A training set is D, a testing set is Z, and a nearest
of which are malignant. 80% of the data come from the neighbour number is K. Samples are represented by
training set while 20% comes from the testing set. (x1, x2, x3, x4, x5, ..., xn, y), where x1-xn
correspond to n attributes and y corresponds to
TABLE I. Attacks occurs in the Network their label. There are many advantages of KNN
algorithm, including its simplicity, convenience,
and ease of use. No parameters need to be
estimated, no threshold needs to be considered, and
no training is necessary. Classifying test samples,
however, results in a large amount of computation
as well as a large amount of memory and CPU
usage. Furthermore, it is essential to select K
values that are appropriate if the samples are
unbalanced. It is also possible that too much data
will result in too much weight in the results if the
range of data is too broad. To Make normal data
collection and attack data collection timed at 1:1 in
order to overcome the problem of unbalanced
sample data. To ensure a suitable K value is used
for subsequent classifications of unknown flow
samples, the KNN algorithm model will be used
for classifying and predicting samples after
obtaining the dataset (training set). Using the same
dataset, any subsequent classifications of unknown
flow samples will be performed after the algorithm
has tested multiple K values.
Algorithm 2 - Logistic Regression
Input: Dataset(Training data)
1. For i=1 to n
2. For each instance of data ti
3. Regression targets should be set to

Zi = yi – P (1|aj) / [P (1|aj). (1-P (1|aj))]

4. Initiate the weight for instance aj to be


P(1*aj).(1-P(1*aj)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 636


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

predict class labels for test samples based on the rules


derived from the supplied features during the training stage.
5. Create a f(j) with weights (Wj) and values as DDoS attacks are differentiated from benign flows using
class these classification rules. Figure 2 shows the accuracy of the
Classification

6. Class is 1, if P (1|dj) > 0.5, else class is 2

The first step is to classify inputs as zero or one. The first


step in determining the class of a training set is to calculate
the probability (or class score) of the set being in class 1.
According to the below function, the y parameter is .

P( y=1)= 1 1+e −(β 0+ β 1 x 1+...+β n x n)

A high probability is predicted for observations belonging to


class 1 and a low probability for observations belonging to
class 0 by selecting coefficients that maximize the
Fig 2. Accuracy of Decision Tree Classifier
likelihood of predicting those observations. For Classifying
input values into classes by defining a threshold boundary,
the next step is to define a threshold boundary for the
classifier. In general, a threshold value of around 0.5 is
Accuracy of Machine Learning
chosen based on our business problem. In other words, if the
Algorithms
probability is larger than 0.5, such observations are 99.90% 99.90%
100.00% 99.70% 99.60%
classified as class 1 types, while the rest are classified as
class 0 types. 99.50%
99.00%
It depends on the type of error, which can be either false 98.50% 97.80% 97.80%
positives or false negatives, when choosing a threshold 98.00%
value. Observations that belong to class 0 are mistakenly Recall
97.50%
predicted as class 1 by the model, which results in a false Accuracy
positive error. Models predict class 0, but observations 97.00%
belong to class 1. Hence, a false negative error occurs. It 96.50%
would be perfect if all the 1s and 0s (or true and false) were K Nearest Logistic Decision
Neighbor Regression Tree
classified correctly. classifier Classifier

C. Algorithm 3 - Decision tree

Input: Training data Fig 3 : Accuracy and Recall of Algorithms Used


1. Construct node M Python is used to analysis the dataset and predict the results. The accuracy
2. In case sample S and sample N belong to the and recall is calculated using the below formulas.
same Class C, N will be returned as a leaf node Accuracy = True Negative + True Positive / True Negative + False
3. End if Positive+True Positive + False Negative.
4. Leaf node is returned, M as a class with the
higher part Recall = + True Positive / True Positive + False Negative
S if A = Ф or the attribute values are the same
5. End if
6. Calculate the Gain ratio to find the splitting V. CONCLUSION
Attribute
In the last two decades, machine learning algorithms in
SDN is paying more attention due to their ability to use data
and algorithms for better security detection and
7. Build a tree
efficiency. Training and testing were performed using KDD
Output : Decision tree
cup99, a benchmarking dataset. The algorithm's
performance is improved and optimized through feature
selection, feature normalization, and data preprocessing
techniques, allowing for an efficient and successful training
In Decision-Tree (DT) algorithms, classification rules are
process. The objective is to select the optimal algorithm by
contained in the internal nodes of the tree, whereas class
comparing the algorithms; KNN, Logistics Regression, and
labels are contained in the leaf nodes. This is an active
Decision Trees. Using a metric such as recall and accuracy,
learning algorithm based on predictive modelling. DTs

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 637


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

we analyze the advantages and disadvantages of Learning Techniques." Journal of IoT in Social, Mobile,
implementing any one or more of them. The Decision Tree Analytics, and Cloud 4, no. 1 (2022): 24-32.
model outperformed the other algorithms based on the
evaluation metrics. Using the proposed method, real-time [11] Mugunthan, S. R. "Novel Cluster Rotating and Routing
attacks can be detected and protected against on the SDN Strategy for software defined Wireless Sensor Networks."
platform. Moreover, future research will examine more Journal of ISMAC 2, no. 02 (2020): 140-146.
metrics of evaluation. The approach is expected to be
implemented using Deep Learning algorithms.
[12] Li, Y., & Lu, Y. (2019, September). LSTM-BA: DDoS
detection approach combining LSTM and Bayes. In 2019
REFERENCES Seventh International Conference on Advanced Cloud and
Big Data (CBD) (pp. 180-185). IEEE.
[1] Dey, S. K., & Rahman, M. M. (2019). Effects of
machine learning approach in flow-based anomaly detection [13] Ring, W. (2019). Hotho, 2019 Ring M., Wunderlich S.,
on software-defined networking. Symmetry, 12(1), 7. Scheuring D., Landes D., Hotho A. A survey of network-
based intrusion detection data sets, Comput. Secur, 86, 147-
[2] Gao, M., Ma, L., Liu, H., Zhang, Z., Ning, Z., & Xu, J. 167.
(2020). Malicious network traffic detection based on deep
neural networks and association analysis. Sensors, 20(5), [14] Ahmad, R., & Alsmadi, I. (2021). Machine learning
1452. approaches to IoT security: A systematic literature
review. Internet of Things, 14, 100365.
[3] Nobakht, M., Sivaraman, V., & Boreli, R. (2016). A
host-based intrusion detection and mitigation framework for [15] Aleesa, A. M., Zaidan, B. B., Zaidan, A. A., & Sahar,
smart home IoT using OpenFlow. In 2016 11th International N. M. (2020). Review of intrusion detection systems based
conference on availability, reliability and security on deep learning techniques: coherent taxonomy,
(ARES) (pp. 147-156). IEEE. challenges, motivations, recommendations, substantial
analysis and future directions. Neural Computing and
[4] Sebbar, A., Zkik, K., Baddi, Y., Boulmalf, M., & Applications, 32(14), 9827-9858.
Kettani, M. D. E. C. E. (2020). MitM detection and defense
mechanism CBNA-RF based on machine learning for large-
scale SDN context. Journal of Ambient Intelligence and
Humanized Computing, 11(12), 5875-5894.

[5] Ngo, D. M., Pham-Quoc, C., & Thinh, T. N. (2020).


Heterogeneous hardware-based network intrusion detection
system with multiple approaches for SDN. Mobile Networks
and Applications, 25(3), 1178-1192..

[6] Bag, S., Gupta, S., & Wood, L. (2020). Big data
analytics in sustainable humanitarian supply chain: Barriers
and their interactions. Annals of Operations Research, 1-40.

[7] Lazarevic, A., Kumar, V., & Srivastava, J. (2005).


Intrusion detection: A survey. In Managing cyber
threats (pp. 19-78). Springer, Boston, MA.

[8] Sultana, N.; Chilamkurti, N.; Peng, W.; Alhadad, R.


Survey on SDN based network intrusion detection system
using machine learning approaches. Peer Netw. Appl. 2019,
12, 493–501.

[9] Chen, P. J., & Chen, Y. W. (2015, September).


Implementation of SDN based network intrusion detection
and prevention system. In 2015 International Carnahan
Conference on Security Technology (ICCST) (pp. 141-146).
IEEE.

[10] Amrish, R., K. Bavapriyan, V. Gopinaath, A. Jawahar,


and C. Vinoth Kumar. "DDoS Detection using Machine

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 638


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Retinal Fundus Image Retrieval and Classification


using Optimal Deep Learning Model
S Syed Mahamood Shazuli A. Saravanan
Research Scholar. Assistant Professor / Programmer.
Department of Computer and Information Sciences. Department of Computer and Information Sciences.
Annamalai University. Annamalai University.
syedshazuli@yahoo.co.in sarancseau@gmail.com

Abstract—An increasing number of initiatives for screening measure vessels in retinal images. The structural features of
people for retinal disorders with widespread obtainability of blood vessels like branching pattern, length, tortuosity, and
digital fundus (retina) cameras results in huge collection of color width not just offer data regarding pathological changes but
fundus images. The capability to retrieve images relevant to helps in diagnosing the disease and its severity [3]. Retinal
pathological conditions was a powerful functionality that images should be precisely segregated for extracting delicate
contains extensive applications in automated computer aided substances present in the retinal image. Content Based Image
diagnosis (CAD), evidence-related medicine, and training Retrieval (CBIR) refers to a system for searching, retrieving
ophthalmologists. The automatic extraction of significant
similar images, and browsing the query image from large
attributes namely exudates will be helpful for physicians to
database [4]. CBIR enables users to query and related to the
effectively overcome several diseases affecting the patient.
Though there exist numerous techniques for extracting such image extracted features, matching can be taken place on the
features, they lack in retrieval aspect of the data or the precision basis of automatically derived primitive characteristics like
of the feature extraction. This study designs a Retinal Fundus texture, color, shapes, and spatial relation between objects [5].
Image Retrieval and Classification utilizing Optimal Deep CBIR related solutions were explored to develop diagnosis
Learning (RFIRC-ODL) model. The presented RFIRC-ODL help in medical imaging solutions. CBIR has been attempted
model encompasses two major modules namely retrieval and for diagnosing retinal diseases utilizing large database.
classification. For image retrieval process, the presented RFIRC- Retrieval related to statistical attributes of DR lesions can be
ODL model employs Residual Network (ResNet) based feature mapped on a semantic space respective to disease condition
extraction and Manhattan distance based similarity measure. utilizing Fischer discriminant analysis.
Next, in the second stage, the salp swarm optimization (S S O) Dayana and Emmanuel [6] examine an effectual,
algorithm with long short term memory (LS TM) approach can optimizing DNN with Chronological Tunicate Swarm
be exploited for fundus image classification. The use of S S O Algorithm (CTSA) to classify the DR severity. Primarily,
based hyperparameter optimization process helps in attaining retinal images acquired with low-quality fundus photography
maximum fundus image classification outcomes. For were pre-processing and next affected by the segmenting
investigating the improved efficacy of the projected RFIRC-ODL procedure. Primarily, the blood vasculatures and optic disc
model, a wide ranging experimental analysis was made on were segmentation employing a U-Net and sparse FCM related
benchmark database. The simulation outcomes demonstrate the
to hybrid entropy method. The lesion region is then detection
betterment of the RFIRC-ODL algorithm over other techniques.
employing Gabor filtering (GF) bank, and next the feature was
Keywords— Diabetic retinopathy; Retinal fundus images; extracting. The last classifier procedure occurs by utilizing a
Image retrieval; Image classification; Deep learning deep SAE together optimizing with bio-simulated TSA
dependent upon the chronological method. Ragab et al. [7]
proposal a new meta-heuristic with DL assisted CAD method
I. INT RODUCT ION for DR (MDL-CADDR) recognition and classifying. The
Diabetic Retinopathy (DR) refers to a retinal complication presented MDL-CADDR approach contains pre-processed
that occurs because of diabetes and can be a leading cause of steps for boosting the fundus image (FI) quality. In addition,
impaired vision among urban people [1]. Initial diagnosis by Chimp Optimizer Algorithm with DenseNet (COA-DN) related
regular treatment and screening will be suggested for Extraction Feature and Spiking Neural Network (SNN)
preventing blindness and visual loss. Digital color fundus dependent upon classifier methods were carried out for
photography will allow procurement of fundus (retina) images classifying various phases of DR. Also, Archimedes Optimizer
noninvasively which makes large scale screening simpler. In Algorithm (AOA) including Kapur's Entropy (AOA -KE)
recent times, there was substantial effort in constructing related to image segmentation approach was executed.
screening solutions for DR utilizing color fundus images (CFI) Qomariah et al. [8] introduce a DL technique for feature
mostly because of the value they provide like wider reach and extraction and classifier employing an SVM. The authors
less cost [2]. Rise in DR awareness followed by initiatives like utilize higher-level feature of final fully connected (FC) layer
large scale public programs results in collection of large dependent upon transfer learning (TL) in CNN as the input
number of CFI even within a day. The vessels in a retinal feature to classifier utilizing the SVM. This process decreases
image have low contrast and were complicated [3]. This the computation time needed by classifier procedure utilizing
necessitates a reliable automatic technique to extract and CNN with fine-tuned. Dayana and Emmanuel [9] examine a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 639


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

DL-allowed optimizing FS approach for classifying the step of TL technique is to train a process utilizing smaller data. There
DR severity in FIs. Primarily, a pre-processed stage removes is no require to train the objective methods in scratch from TL
noise and improves the contrast from the retinal FIs. Then, the system.
candidate lesion regions were identified utilizing an Attention -
based Fusion Network (AFU-Net). Next, texture and shape
features were removed, also an optimum subset of features are
chosen utilizing the Improved Harris Hawk Optimization
technique.
In [10], Autoregressive-Henry Gas Sailfish Optimization
(Ar-HGSO) related DL approach was presented for DR
detection and severity level classifier of Macular Edema (ME)
and DR dependent upon color FIs. The segmented procedure
was further important to suitable classification and detection
procedures that segment the image as to several subgroups. The
DL technique was employed to effectual detection of DR and
severity classifier of ME and DR. In [11], the authors enhanced
our preceding work for detecting DR utilizing Faster RCNN
and attention layer. During the recognition stage, initially, non-
utilized regions of DR images are extraction utilizing
calculated unified device structure with gradient-related edge
detection approach. Afterward, the Mask R-CNN is utilized
rather than Faster-RCNN for detecting lesion regions more
effective. With the presented technique, more effective
Fig. 1. Overall process of RFIRC-ODL approach
outcomes are achieved than our preceding work in Mo bileNet,
ResNet, and DenseNet. In recent times, DNN is develop substantial progress from
This study designs a Retinal Fundus Image Retrieval and the domains of image classifier. Usually, a deep method has
Classification using Optimal Deep Learning (RFIRC-ODL) been combination of middle, higher, and lower level features,
approach. The presented RFIRC-ODL model encompasses two
and classifier. During this case, the ResNet101 was utilized to
major modules namely retrieval and classification. For image extract deep feature. The VGG19 pre-training network which is
retrieval process, the presented RFIRC-ODL model employs
DCNN [12]. As already noted, CNN technique was collected
Residual Network (ResNet) based feature extraction and of several layers which are interrelated with each other. While
Manhattan distance based similarity measure. Next, in the the layers can be employed to various tasks such as medicinal
second stage, the salp swarm optimization (SSO) algorithm image classifier and NLP. The convolutional filter size from
with long short-term memory (LSTM) algorithm can be ResNet101 is 33, and stride value is 2. Down-sampling was
exploited for fundus image classifier. The use of SSO based
carried out in the convolutional layer based on the stride value.
hyperparameter optimization process helps in attaining These networks contains 347 layers and 379 connections. The
maximum fundus image classification outcomes. For
network input takes dimensional of 224 x 224 x 3. A primary
investigating the improved efficiency of the projected RFIRC- convolution layer, the filtering count is 64, the filtering size is
ODL algorithm, a wide ranging experimental analysis can be
[7, 7], and the count of channels is 3. The filtering size in the
made on benchmark dataset. max-pooling layers has 3 x 3, and the stride value is 2. Next
II. THE PROPOSED M ODEL convolutional layer, the count of filters and channels is 64.
Final convolution layer, the count of filters is 2048, with 512
In this article, a novel RFIRC-ODL methodology was channels. Then, gain a resultant vector of
formulated for the retrieval and classification of retinal images. dimensional N x 2048, but N signifies the count of features
The projected RFIRC-ODL model includes two major modules using feature extraction in pool5 layer.
namely retrieval and classification. Fig. 1 represents the overall
procedure of RFIRC-ODL system.
2) Similarity Measurement
A. Image Retrieval Module At this stage, Manhattan distance metric is used to
For image retrieval process, the presented RFIRC-ODL determine the relevancy of the images for image retrieval
model applied ResNet based feature extraction and Manhattan process. For every Manhattan distance and feature vector, the
distance based similarity measure. adjacent candidate image will be included in a histogram of
place [13]. Where all the query vectors are considered, the
resulting histogram has been used to extract a list of top-
1) ResNet Feature Extraction
Data reliance is an important issue from DL technique. ranked candidate images. The Manhattan distance was the
Related to ML approach, a massive data count was needed to quantity of total differences between 2 vectors. In 2-D space,
train deep approaches. The major cause for this huge count of the Manhattan distance will be expressed by Eq. (1):
trained databases is that it develops vital for learning hidden
| | | |
pattern. However, a huge data count could not frequently
neighboring for trained a DL technique in any research For n-dimensional space, the Manhattan distance for and
domains, particularly in medicinal imagery. The objective of data points are characterized by the above equation:

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 640


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

∑| |
Let, be the current iteration; ‐ predefine iteration count;
arbitrary integer lies within [ ]. The mathematical
B. Image Classification
formula is applied for followers to upgrade the position based
For image classification, the SSO algorithm with LSTM on Newton’s law of motion:
model is exploited for fundus image classification. LSTM is a
kind of RNN able to keep sequence of complete data. RNN
outperforms ANN for sequence of information and suffers If ‐ location of - salp in - variable, ‐ time,
from gradient vanishing problems [14]. This hampers the ‐ initial speed.
capability of the network to recollect data over a longer period
since any two significant events in the time sequence might
occur with larger gaps. LSTM is intended to resolve the Note that ‐ iteration in optimization problem,
problems of vanishing gradient with the relative in‐ sensitivity aforementioned equation is changed into subsequent formula:
to these gap lengths. LSTM network is better suitable for ( )
classifier problems for time sequence data because of the Now, . Illustrates that follower salp describes the
capability of the cells to remember values over arbitrary time location based on the prior salp and own location. If some salps
intervals. escape from the constrained searching space, they are carried
LSTM has a gated structure and utilizes ANN unit. They back within the constraint:
could store data across time steps without fundamental change,
thereby forming long‐ term memory. The short‐ term working
memory is frequently upgraded. LSTM unit consists of cell and
the data flow and out of cell is controlled by sigmoid activated {
neural network named gates and they are given in the follo wing The aforementioned formula is repetitively implemented till
equation: the termination condition is satisfied. Sometimes, food source
1. Save gate: It controls the data from the existing input is upgraded by exploiting and exploring search space around
viz., added to the cell state. current solution may define the optimum solution. Salp chains
[ ] during optimization can able to move towards global optimal
2. Forget gate: It regulates what data the cell forgets. solution.
( [ ] )
3. Output gate: It regulates what data is provided as output. Algorithm 1: Pseudo code of SSO
[ ]
Input: maximal iterations , population size
The memory state is upgraded by the following equation: Initialization of salp location
̃ [ ]
While (end condition is not satisfied)
Describe fitness of each salp
Arrange salp location depending on fitness value
Where, + and are component‐ wise addition and
Describe as optimum place for existing population
multiplication correspondingly, and represents the activation
function. Upgrade Cl
To adjust the hyperparameter values of the LSTM method, For all the salp location (ui)
the SSO approach was employed here. The motion behavior of If upgrades the location of leader salp
SSO is mathematically modelled to overcome the problems of else upgrade the position of follower salp
optimization [15]. Salps are marine animal that has barrel- end
shaped jelly like body and moves around by driving water via end
its bodies. They exist as colonies and travel together like Change the salp that crosses higher and lower bounds
chains. Leaders and followers are the two primary classes of end
salps. Leader leads the chain in forward direction, whereas Display optimal output
followers follow the leader synchronously and in harmony.
Like swarm intelligent technique, SSO initiates by an arbitrary The SSO model identifies a fitness function (FF) for
initialization of swarm of N salps. parameter is evaluated, x realizing maximal classification performances. Here, the
signifies the location of salp, and y will describe food source reduction of classifier error rate is mainly utilized to compute
which specifies objective of swarm in the problem, and it is the FF, as given below.
expressed in the following equation:
{
Now, in - variable, ‐ location of primary salp; ‐
location of food. and ‐ upper and lower limits, and
‐ arbitrary values.
Amongst three arbitrary values, inhabits leader location
since it balances exploitation and exploration in the problem.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 641


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. RESULT S AND DISCUSSION


The experimental validation of the RFIRC-ODL approach
was tested during DR Dataset from Kaggle repository [16]. The
database holds 35126 samples under five classes . The proposed
model is experimented on GeForce 1050Ti 4GB, PC i5-8600k,
1TB HDD, 16GB RAM, and 250GB SSD.

Fig. 2. a) Original Image b) Retrieved Images (Normal Class)


Fig. 4. Confusion matrix of RFIRC-ODL algorithm under 80%
Fig. 2 shows the sample retrieval results of the RFIRC- of TR dataset
ODL model. Fig. 2a shows the original image under normal The experimental DR classifier results of the RFIRC-ODL
class and the respective retrieved images are illustrated in Fig. model attained under 80% of TR dataset are given in Table 1
2b. and Fig. 5. On class-1, the RFIRC-ODL model has recognized
of 99.16%, of 99.89%, of 98.96%,
of 99.42%, and of 99.33%. Simultaneously, on class -
3, the RFIRC-ODL technique has recognized of
99.49%, of 97.88%, of 98.80%, of 98.34%,
and of 99.21%. Concurrently, on class -5, the RFIRC-
ODL approach has recognized of 99.61%, of
85.38%, of 97.34%, of 90.97%, and of
98.50%.

Fig. 3. a) Original Image b) Retrieved Images (Mild Class)

Fig. 3 displays the sample retrieval outcomes of the


RFIRC-ODL method. Fig. 3a demonstrates the original image
under mild class and the respective retrieved images were
shown in Fig. 3b.
Fig. 4 illustrates the DR classifier outcomes of the RFIRC-
ODL approach on 80% of TR dataset. The figure denotes the
RFIRC-ODL method has recognized 20392 instances into C-1,
1929 instances into C-2, 4210 instances into C-3, 684 instances
Fig. 5. Average outcome of RFIRC-ODL system on 80% of
into C-4, and 549 instances into C-5.
TR dataset

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 642


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

T ABLE I Table 2 and Fig. 7. On class -1, the RFIRC-ODL approach has
RESULT ANALYSIS OF RFIRC-ODL APPROACH WIT H VARIOUS recognized of 99.30%, of 99.92%, of
CLASS LABELS UNDER 80% OF T R DAT ASET 99.14%, of 99.53%, and of 99.46%.
Training Phase (80% ) Concurrently, on class -3, the RFIRC-ODL method has
Labels recognized of 99.57%, of 98.36%, of
C-1 99.16 99.89 98.96 99.42 99.33 98.74%, of 98.55%, and of 99.23%. In
C-2 99.65 96.98 98.12 97.55 98.94 Parallel, on class-5, the RFIRC-ODL approach has recognized
of 99.80%, of 92.21%, of 98.61%,
C-3 99.49 97.88 98.80 98.34 99.21
C-4 99.69 90.84 97.44 94.02 98.59 of 95.30%, and of 99.22%.
C-5 99.61 85.38 97.34 90.97 98.50
Average 99.52 94.20 98.13 96.06 98.92

Fig. 6 demonstrates the DR classifier results of the RFIRC-


ODL approach on 20% of TS dataset. The figure indicated the
RFIRC-ODL algorithm has recognized 5158 instances into C-
1, 470 instances into C-2, 1018 instances into C-3, 170
instances into C-4, and 142 instances into C-5.

Fig. 7. Average analysis of RFIRC-ODL system on 20% of TS


database

Fig. 6. Confusion matrix of RFIRC-ODL algorithm under 20%


of TS dataset

T ABLE II Fig. 8. TACC and VLA analysis of RFIRC-ODL algorithm


RESULT ANALYSIS OF RFIRC-ODL APPROACH WIT H VARIOUS The TACC and VACC achieved by the RFIRC-ODL
CLASS LABELS UNDER 20% OF T S DAT ASET
system under test database is exemplified in Fig. 8. The
Testing Phase (20% ) simulation result indicates the RFIRC-ODL method has
Labels achieved higher values of TACC and VACC. Seemingly the
C-1 99.30 99.92 99.14 99.53 99.46 VACC is higher than TACC.
C-2 99.63 96.11 98.53 97.31 99.12 The TLS and VLS obtained by the RFIRC-ODL algorithm
C-3 99.57 98.36 98.74 98.55 99.23 under test database were exhibited in Fig. 9. The simulation
C-4 99.76 91.40 99.42 95.24 99.59 outcome exemplified the RFIRC-ODL technique has
C-5 99.80 92.21 98.61 95.30 99.22 recognized minimal values of TLS and VLS. Mostly, the VLS
is lower than TLS.
Average 99.61 95.60 98.89 97.18 99.32

The experimental DR classifier outcomes of the RFIRC-


ODL method attained under 20% of TS dataset are given in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 643


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

AlexNet, MobileNet, Xception, and ResNet-50 methods have


reported least values of 94.70%, 91.60%, 93.12%,
92.93%, and 95.33% correspondingly. Moreover, with respect
to , the RFIRC-ODL approach has reached increased
of 99.61% whereas the WFDLN, AlexNet, MobileNet,
Xception, and ResNet-50 techniques have reported least
values of 98%, 89.50%, 92.90%, 92.80%, and 94.51%
correspondingly. Thus, the presented RFIRC-ODL model is
found to be superior to other DL models.

Fig. 9. TLS and VLS analysis of RFIRC-ODL algorithm

Finally, a brief comparative analysis of the RFIRC-ODL


method is made with recent approaches in Table 3 and Figs.
10-11 [17]. The experimental values portrayed the RFIRC-
ODL method have shown effectual outcomes over other
models. For example, in terms of , the RFIRC-ODL
method has reached increased of 95.60% whereas the
WFDLN, AlexNet, MobileNet, Xception, and ResNet-50
models have reported least values of 95.29%, 90.87%,
93.28%, 92.33%, and 95.13% respectively.
T ABLE III
COMPARAT IVE ANALYSIS OF RFIRC-ODL T ECHNIQUE WIT H
RECENT MET HODOLOGIES
Fig. 11. analysis of RFIRC-ODL technique with recent
Methods algorithms
RFIRC-ODL 95.60 98.89 99.61 97.18
IV. CONCLUSION
WFDLN 95.29 94.70 98.00 95.11
In this study, a novel RFIRC-ODL approach was modelled
AlexNet 90.87 91.60 89.50 91.52
for the retrieval and classification of retinal images. The
MobileNet 93.28 93.12 92.90 93.46 projected RFIRC-ODL model encompasses two major modules
Xception 92.33 92.93 92.80 92.75 namely retrieval and classification. For image retrieval process,
ResNet-50 95.13 95.33 94.51 95.14 the presented RFIRC-ODL model applied ResNet based
feature extraction and Manhattan distance bas ed similarity
measure. Next, in the second stage, the SSO algorithm with
LSTM model is exploited for fundus image classification. The
use of SSO based hyperparameter optimization process helps in
attaining maximum fundus image classification outcomes. For
investigating the higher efficiency of the projected RFIRC-
ODL model, a wide ranging experimental analysis is made on
benchmark database. The experimental results demonstrate the
betterment of the RFIRC-ODL system over other techniques.
In future, the classification results are boosted using deep
segmentation models.
REFERENCES
[1] Pragathi, P. and Rao, A.N., 2022. An effective integrated machine
learning approach for detecting diabetic retinopathy. Open Computer
Science, 12(1), pp.83-91.
[2] Khan, S.H., Abbas, Z. and Rizvi, S.D., 2019, February. Classification of
diabetic retinopathy images based on customised CNN architecture.
In 2019 Amity International conference on artificial intelligence
(AICAI) (pp. 244-248). IEEE.
Fig. 10. Comparative analysis of RFIRC-ODL technique with
[3] Reddy, G.T ., Bhattacharya, S., Ramakrishnan, S.S., Chowdhary, C.L.,
recent algorithms Hakak, S., Kaluri, R. and Reddy, M.P.K., 2020, February. An ensemble
Also, with respect to , the RFIRC-ODL method has based machine learning model for diabetic retinopathy classification.
attained increased of 98.89% whereas the WFDLN,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 644


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

In 2020 international conference on emerging trends in information


technology and engineering (ic-ETITE) (pp. 1-6). IEEE.
[4] Lavanya, S., and P. Naveen. "Detection of Retinal Neovascularization
Using Optimized Deep Convolutional Neural Networks." Journal of
T rends in Computer Science and Smart Technology 4, no. 1 (2022): 38 -
49.
[5] Parthasharathi, G. U., R. Premnivas, and K. Jasmine. "Diabetic
Retinopathy Detection Using Machine Learning." Journal of Innovative
Image Processing 4, no. 1 (2022): 26-33.
[6] Dayana, A.M. and Emmanuel, W.R., 2022. An enhanced swarm
optimization-based deep neural network for diabetic retinopathy
classification in fundus images. Multimedia Tools and Applications,
pp.1-32.
[7] Ragab, M., Aljedaibi, W.H., Nahhas, A.F. and Alzahrani, I.R., 2022.
Computer aided diagnosis of diabetic retinopathy grading using spiking
neural network. Computers and Electrical Engineering, 101, p.108014.
[8] Qomariah, D.U.N., T jandrasa, H. and Fatichah, C., 2019, July.
Classification of diabetic retinopathy and normal retinal images using
CNN and SVM. In 2019 12th International Conference on Information
& Communication Technology and System (ICTS) (pp. 152-157). IEEE.
[9] Dayana, A.M. and Emmanuel, W.R., 2022. Deep learning enabled
optimized feature selection and classification for grading diabetic
retinopathy severity in the fundus image. Neural Computing and
Applications, pp.1-21.
[10] Elwin, J.G.R., Mandala, J., Maram, B. and Kumar, R.R., 2022. Ar -
HGSO: Autoregressive-Henry Gas Sailfish Optimization enabled deep
learning model for diabetic retinopathy detection and severity level
classification. Biomedical Signal Processing and Control, 77, p.103712.
[11] Erciyas, A., Barışçı, N., Ünver, H.M. and Polat, H., 2022. Improving
detection and classification of diabetic retinopathy using CUDA and
Mask RCNN. Signal, Image and Video Processing, pp.1-9.
[12] Zahid, U., Ashraf, I., Khan, M.A., Alhaisoni, M., Yahya, K.M., Hussein,
H.S. and Alshazly, H., 2022. BrainNet: optimal deep learning feature
fusion for brain tumor classification. Computational Intelligence and
Neuroscience, 2022.
[13] Catalano, S.A., Goloboff, P.A. and Giannini, N.P., 2010. Phylogenetic
morphometrics (I): the use of landmark data in a phylogenetic
framework. Cladistics, 26(5), pp.539-549.
[14] Ghimire, S., Yaseen, Z.M., Farooque, A.A., Deo, R.C., Zhang, J. and
T ao, X., 2021. Streamflow prediction using an integrated methodology
based on convolutional neural network and long short -term memory
networks. Scientific Reports, 11(1), pp.1-26.
[15] Yıldız, A.R. and Erdaş, M.U., 2021. A new Hybrid T aguchi-salp swarm
optimization algorithm for the robust design of real-world engineering
problems. Materials Testing, 63(2), pp.157-162.
[16] https://www.kaggle.com/c/diabetic-retinopathy-detection
[17] Nneji, G.U., Cai, J., Deng, J., Monday, H.N., Hossin, M.A. and Nahar,
S., 2022. Identification of Diabetic Retinopathy Using Weighted Fusion
Deep Learning Based on Dual-Channel Fundus
Scans. Diagnostics, 12(2), p.540.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 645


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Social Distancing Monitoring and Alerting System


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

using YOLO Deep Learning Algorithm


Mrs. P. Dharani Devi Mr. M. Thirukumaran Mr. B. Balaji
Associate Professor, Department of ECE UG Scholar, Department of ECE Ph.D Scholar, Department of ECE
IFET College of Engineering IFET College of Engineering Rabindranath Tagore University
Villupuram. India Villupuram, India Madhya Pradesh. India
dharanidevi.dce@gmail.com thirukumaran0122@gmail.com mail2balaji92@gmail.com

Abstract— The Covid-19 disease is caused by the severe between them. After economic activity resumes, social
acute respiratory (SAR) syndrome coronavirus-2 and becomes distance and self-isolation will be the most effective means of
the reason for the Global Pandemic since 2019. Until July 2022, breaking the chain of infection and reducing the impacts of
the total reported cases were 572 million and reported deaths this corona-virus pandemic.
were 6.38 million around the world. In many countries the
infections caused severe damages. It not only took the precious In initial stages of the pandemic people did not took the
lives but also caused few other national damages like economic guideline of the world health organization very seriously.
crisis. The only solution to stop this pandemic is to increase the They did not maintain social distancing properly. This causes
vaccination and reducing the spreads. The covid 19 virus is an the pandemic to spread all around the globe. So, all the nations
airborne disease and spread when people breathe virus declared lockdowns to maintain the social distance between
contaminated air. The WHO and all the nations were insisting people. Citizens all across the world are substantially
to maintain social distance to control the virus spreading. But separating themselves from the Covid-19 outbreak in order to
maintaining the social distance in public places is very hard. In flatten the curve. Every public place like parks, gatherings,
this project we developed a method for detecting social distance. workshops, and prayer were all prohibited during the
The system uses Raspberry Pi processor to detect the distance quarantine period to achieve social separation. People are
between two people from the live video stream. The YOLOv3 urged to organize and conduct activities as much as possible
technique is used to detect the object from single frame of the
by phone and email, in order to reduce the amount of face-to-
video.
face interaction. Individuals are also being advised to practise
Keywords—Raspberry Pi, Deep Learning, Image Processing, good hygiene, such as washing hand frequently, wearing a
distance measurement, computer vision. mask, eating healthy food and avoiding close contact with
affected people, in order to help stop the virus from spreading
I. INTRODUCTION further.
COVID-19 is a life threating respiratory disease caused by The globe is still recovering from the pandemic, and a
a new corona virus which is first encountered at Wuhan, China medicine that adequately cure Covid-19 has yet to be
in December 2019. The major symptom of the disease developed. The lockdowns were slowly removed, and people
includes loss of taste & smell, body aches, high fever, cough, started to get back to their normal lives. Although the
and shortness of breath. For some people the infection gives lockdowns had been removed, people were still expected to
normal flu conditions, and they can recover with two to three maintain all the safety guidelines to prevent further spread.
weeks but for some people the infection can be severe and But maintaining social distancing between people in every
caused death [1]. This pandemic has spread to over 188 place is a huge problem for the government as well as the
countries around the world. World Health Organization health workers. It is not possible to put people in every corner
acknowledged that there have been 571,182,327 confirmed of the country to monitor social distancing.
COVID-19 cases and 6,386,234 deaths around the world until
22nd July, 2022 [2]. The ambiguity and complications of the Hence, we propose a method to monitor the social distance
corona virus have made it difficult to foresee the spread of between two people in public places. The proposed approach
this pandemic. Since there is no medicine has been invented, might be used as a real-time detecting tool to reduce the social
prevention is the only way to control the spread of this deadly distance violations. The CCTV camaras can be utilized for this
disease. Self-hygiene should be maintained other than wearing purpose or an exclusive camera can be fixed. The live video
masks and washing hands frequently to reduce the spread. The stream of strolling people was fed to the system and from the
infected person should be isolated from other to avoid video frame the people will be identified and highlighted by
spreading. The self-quarantine helps to stop the chain of bounding boxes. The YOLO V3 is used to detect the video
spread. To avoid spreading of this virus many nations stream and people identification can be done by the deep
restricted and even completely stopped the international travel convolutional neural network. The YOLOv3 approach divides
and business. The public places like offices, educational the input image into tiny grid cells (S*S small grid cells). Each
institutes, theaters, malls, swimming pools, parks, and even grid cell forecasts the location information of bounding boxes
religious places were closed to minimize the gathering of and calculates the object ratings for these boxes. From these
people. From the analysis it is shown that the lockdowns data the actual distance between two people can be calculated.
reduce the spread rate and number of infected cases. If the distance between two people is less than the expected
value, then the system will store the data in the database. If
From these analysis World Health Organization decided more violations occur in a specific place, the information will
that social distancing reduces the spread and insisted the be shared to the concern authority through alert message.
countries to implement the social distancing strictly. This will Firebase is used to store the information, and the database will
reduce the physical contact with possible COVID19 carriers. be available on a website built using React.JS. These
To limit the risk of infection, people should avoid physical databases can be sent to a corresponding authority to take
contact with one another and to maintain six meter distance necessary actions.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 646


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. RELATED WORKS techniques. The object identification methods and object
Professor Emre Dandil and Kerim Kürşat Cevik proposed classification techniques are used to identify pedestrians from
Computer Vision Based Distance Measurement System using the image which is explained in next section. The YOLO V3
Stereo Camera View [3] to distance between two objects will is used to detect object from every frame. To locate the item
be measured. In this system the disparity maps are extracted to assign the border-box, its identifier must be provided.
from the stereo camera images and object was detected from Then, correct the border-many box's boundaries [7][8].
the image. Distance between two objects were obtained by
calculating the shifts between the video frames. This system
measures the distance of one object in the frame. It is not
possible to measure distance between two persons by using
this system.
Professor Abdalla Gad, Gasm ElBary, Mohammad
Alkhedher and Mohammed Ghazal proposed Vision-based
Approach for Automated Social Distance Violators Detection
[4]. They used Gaussian Mixture Model to remove the
background, Kalman filter to track the object and Euclidian to
calculate the distance between objects. The proposed idea
required many computations. In the real time people will be
moving randomly. They will cross each other very fast.
Professor F.A.Ahmad Naqiyuddin, W.Mansor,
N.M.Sallehuddin, M.N.S.Mohd Johari, M.A.S.Shazlan,
A.N.Bakar proposed Wearable Social Distancing Detection
System [3]. This system could be fast and suitable for real time
applications. But it required hardware parts. It is necessary
that every individual should wear the wearable system inorder
to measure the distance. Practically it is not possible for public
places. This system can be applicable to locations such as
prison, hospital, or a conference where the entry is restricted.
Nguyen et al. presented a comprehensive analysis on recent
development and challenges of face detection [5].
The proposed method is suitable for real time applications.
It doesn’t need any wearable hardware, thus the cost if very
low. It uses simple computational and deep learning methods;
thus, the computation speed is high. Fig.1 Flow Diagram for Social Distance Detection

III. PROPOSED SYSTEM C. Object Detection


Observing the social distance detection in all the places YOLO is a real-time Object Detection Convolution
such as streets, marketplaces, and other crowed public areas Neural Network (CNN) [9]. YOLO V3, the most recent
all the time is almost impossible. People will only obey the version of the object identification algorithm, can distinguish
social distance if they are being watched by someone, such as 80 distinct things in photos and videos, and it is extremely
a police officer, which is not always practicable. Furthermore, quick and precise. A single neural network is used by the
new violations are extremely difficult to detect over time, system to process the entire image, then divides it into areas,
regardless of whether any future surveys are conducted. The calculating boundary boxes and probabilities for each. The
proposed method detects social distancing by using deep YOLO model's base model can process pictures at 45 frames
learning algorithms and Raspberry Pi processer. It calculates
per second in real time. All other detection approaches, such
the distance between individuals in public areas. The flow
diagram of the proposed work is given in figure 1. as SSD and R_CNN, are outperformed by the YOLO model.
Every frame of the captured video will be subjected to the
A. Acquisition YOLO v3 algorithm to detect the item, whether it is a human
The Raspberry Pi camera module was used to capture the or a vehicle. It also classifies the items and assigned then to a
video of the crowded place. The camera is aligned to cover particular class. YOLO version 3 calculates offset to pre-set
the maximum area of the street. The location of the camera is anchors to forecast the true width and height of the enclosing
identified based on the crowed. The camera can be fixed in a box. The YOLO classifier trained and tested by COCO
particular place or even the drone camera can be used for dataset can classify up to 80 labels including human. Only the
special occasions. The live feed was given to the Raspberry pedestrian (human) class was utilized in the proposed work
Pi processor. because of the detection, and other object types were
disregarded in this application.
B. Preprocessing
D. Bounding Box
The video feed was given to the OpenCV to break the
video into individual frame for further processing. Each YOLO version 3 runs the result via the sigma equation to
frame is considered as an individual image. These frames are anticipate the whole bounding box. The width, height, and
used to identify the pedestrians by using image processing centre bounding box coordinates of the expected bounding
box were calculated using this equation. Each frame contains

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 647


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

one ground truth bounding box and one centre cell to be every pedestrian will be viewed from top angle. This
accountable for this item if we train it. After training and a conversion helps in converting the boundary boxes into
fast forward pass, the network output coordinates tx, ty, tw points. Representing pedestrians in points makes the distance
and th. The coordinates of the cell on the grid of the suitable calculation process very easy. An object's spatial and
anchor are then cx and cy as given in figure 2 [10]. Finally, temporal changes over a video sequence will be followed by
the anchor's boxes, as well as their width and height, are object tracking methods. The size, form, position, and
denoted by pw and ph. The centre coordinates tx, ty are sent existence of the object will be tracked. This is achieved by
through the sigmoid function, which returns a value between addressing the temporal issue. The target region is matched
0 and 1. In which bounded box have more accuracy they only with sub-sequent frames from the video feed. Tracking is
consider to fixed boundary boxes. achieved by continuously enabling the object identification
The path for the YOLO weights, CLG file, and COCO and verify tracking using OpenCV.
names file is configured using the setup function. For ordinary By watching the detection person class and it will
path-name manipulation, the OS.path module is utilized. One generate a new id to each individual discovered person and
of the submodule [OS.path.join()] of os.path allows to draw a box over them, setting the centroid each person will
intelligently connect one or more path components. identify. One centroid is purple, whereas the other is yellow.
cv2.dnn.read The weights are loaded into the network using If a person is identified in all directions, we're certain that
the NetFromDarknet() function. After loading the weights, we'll apply the Euclidean distance calculation from each
utilize a net to retrieve a list of all the layers of a network. To centroid to a new centroid from the close person detector over
estimate the social distance between everyone in the crowd, here, and then ids will be allocated independently. If we
we utilize the image processing function to analyse a single cannot identify a result, the centroid will be removed from the
frame of video. The video frame's width and height. To load frame, and 50 pixels will be unregistered. The perspective
frames in bulk and deliver them over the network, the transformation in Open CV can be done by camera alignment.
cv2.dnn.blobFromImage() method was employed. On a It assigns 4 points in the frame and allocate it as the corner of
single frame, the blob function conducts mean subtraction, an image view [11]. As a result, it is assumed that everyone
scaling, and channel shifting. is standing on a flat, level surface.
From the probability of border box will be notified in
F. Distance Measurement
each frame to analyse and identified the border box having
more accuracy from the frame will be fixed in object Once the pedestrians were located and converted into a
detection in our project. If the previous tool has less accuracy point of the frame the proposed model uses the Euclidean
and processing time and in yolov3 have import different class formula in a frame to measure the distance between two
model in a tool. The width, height, and centre bounding box people [12]. If pedestrian-1 location is (x1, y1) and
coordinates of the expected bounding box were calculated pedestrian-2 location is (x2, y2) then the distance between
using this equation. Each frame contains one ground truth these two pedestrians can be calculated by the Euclidean
bounding box and one centre cell to be accountable for this formula as given below,
item if we train it. Distance = ( x2 − x1 )2 + ( y2 − y1 )2
The acceptable distance between two pedestrians is assigned
as threshold distance ‘t’. If the calculated distance between
two pedestrians were exceeding the threshold level, then the
distance vector is displayed as red and if the calculated
distance between the pedestrian is less than threshold level
the distance vector is displayed as green. We can utilize the
distance measurement formula which is shown in figure 3.
P D
F=
W
W F
D' =
P
Where, F → Focal length
W → Object wide
D → Distance

Fig. 2 YOLO Model Applied for Pedestrian Detection

E. Object Tracking
The target image, that is the pedestrians walking on the
street was first converted into the top angle view by camera
view calibration. This can be done by the OpenCV by
selecting four perspective viewpoints and marking them as
the corners of a two-dimensional image view. By this process Fig. 3 Distance Measurement

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 648


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Finally, we detect social detection in a video frame,


which is difficult to watch continuously, therefore we will use
location to setup each region to identify social distance
detection. We determined that a minimal number of
detections will be equipped with a buzzer or speaker. If a
certain place has the highest number of detections, it will be
sent to the Firebase using help of API integration. It's a little
more difficult and there's a lot less security protection if
everyone doesn't want to see the Firebase. As a result, we'll
use react to construct the admin site and display the location
status.
React.JS provides a basic and reliable feature set for
getting a web application up and running. The React
community augments the React framework by contributing a Fig. 6 Object Tracking Stage-3
huge number of ready-to-use components for rapidly
Then the distance between two points is calculated by
developing web apps. On top of the React library, the React
Euclidian distance. If the distance between two pedestrians is
community adds advanced ideas like as state management, less than threshold value, then it is represented by green and if
routing, and so on. The React.JS framework for our site will the distance between two pedestrians is greater than threshold
be split into two sections. The main admin dashboard and the value then it is represented by red.
individual area officer dashboard are the two. With the aid of
node-mailer, we'll also set up mail alerts for our project. Pedestrians represented with red points keep a safe
distance and pedestrians represented with green points do not.
IV. EXPERIMENTAL RESULT If minimum number of violations occurs, the buzzer sound
The system was tested in a street where people walk. The will alert the public to maintain social distance. If more
camera is positioned in such a way to cover the maximum area violation occurs at a particular location the buzzer sound will
of the street to capture the pedestrians. The camera feed is alert, and an emergency message will be passed to the
collected by the Raspberry Pi processor, and which was respective authority along with the location. All the
installed with Open CV and YOLO V3 deep learning information will be stored and displayed in web page. For
algorithm. object recognition deep convolutional neural network gives
superior performance on pedestrian images [13][14]. The
Calculating the distance between two identified losses per iteration of the object detection is given in figure 9
pedestrians with a bounding box is less accurate. Thus, each [15].
pedestrian is represented by a point for detecting social
distance. The OpenCV converts the bounding box into points V. CONCLUSION
by converting it into top viewed image. The object tracking The deep learning-based distance monitoring system is
stages are given in figure 5, 6 and 7. proposed. The distance between people can be estimated and
indicated by bounding boxes. The colors of the box represents
whether two people follow social distance or not. The system
was tested by installing the Raspberry Pi camera on a street
and feeding the live video to the processor. The violation
status can be available with the database, and it can also alert
the authorities in case if numerous violations occur. The
experimental results shows that the system can detect the
distance between two people in an efficient manner. This
system can be implemented in any public gathering places to
monitor the violation of social distancing. In future the
proposed system can be developed to identify face mask
detection along with temperature detection. [19],[20].
Fig. 4 Object Tracking Stage-1
REFERENCES
[1] World Health Organization official website, accessed on July 22 nd,
2022: https://www.who.int/emergencies/diseases/novel-coronavirus-
2019
[2] World Health Organization COVID-19 Dash Board, accessed on July
22nd, 2022:https://covid19.who.int/
[3] Emre DANDIL, Kerim Kürşat ÇEVİK, “Computer Vision Based
Distance Measurement System using Stereo Camera View”, 3rd
International Symposium on Multidisciplinary Studies and Innovative
Technologies (ISMSIT), 2019.
[4] Abdalla Gad, Gasm ElBary, Mohammad Alkhedher, Mohammed
Ghazal, “Vision-based Approach for Automated Social Distance
Violators Detection”, International Conference on Innovation and
Intelligence for Informatics, Computing and Technologies (3ICT),
2020.
[5] F.A Ahmad Naqiyuddin, W. Mansor, N. M. Sallehuddin, M. N. S.
Fig. 5 Object Tracking Stage-2 Mohd Johari, M. A. S. Shazlan, A. N. Bakar, “Wearable Social

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 649


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Distancing Detection System”, IEEE International RF and Microwave [13] A. Krizhevsky, I. Sutskever, G.E. Hinton, “Imagenet classification
Conference (RFM), 2020. with deep convolutional neural networks”, In Advances in neural
[6] D.T. Nguyen, W. Li, P.O. Ogunbona, “Human detection from images information processing systems.
and videos: A survey”, Pattern Recognition. [14] R. Girshick, J. Donahue, T. Darrell, J. Malik. "Rich feature hierarchies
[7] P. Dharani Devi, R. Thanuja, “Convolutional Neural Network based for accurate object detection and semantic segmentation." In Present of
Deep Feature Extraction in Remote Sensing Images”, International the IEEE conference on computer vision and pattern recognition.
Conference on Smart Electronics and Communication (ICOSEC), [15] Felix Järemo Lawin, Per-Erik Forssén, “Registration Loss Learning for
2020. Deep Probabilistic Point Set Registration”, International Conference
[8] P. Dharani Devi, V. Sathiyapriya, “Brahmi Script Recognition System on 3D Vision (3DV), 2020.
using Deep Learning Techniques”, Third International Conference on [16] Punn, N., et al.: “Monitoring COVID-19 social distancing with person
Inventive Research in Computing Applications (ICIRCA), 2021. detection and tracking via fine-tuned YOLO v3 and Deepsort
[9] Haiyan Yu, Yu Li, Dexian Zhang, “An Improved YOLO v3 Small- techniques”.
Scale Ship Target Detection Algorithm”, 6th International Conference [17] Redmon.J, “You only look once: Unifed, real-time object detection”.
on Smart Grid and Electrical Automation (ICSGEA), 2021. [18] Pouw, Schadewijk.F, Toschi, F., Corbetta, “Monitoring physical
[10] Yew Cheong Hou, Mohd Zafri Baharuddin, Salman Yussof, Sumayyah distancing for crowd management: real-time trajectory and group
Dzulkifly, “Social Distancing Detection with Deep Learning Model”, analysis”.
8th International Conference on Information Technology and [19] Rahman, Rukia. "Automatic Temperature Detection and Sanitization
Multimedia (ICIMU), 2020. with Authorized Entry using Face Mask Detection." Journal of
[11] A S Mohammed Shariff, Raghav Bhatia, Raghwendra Kuma, Sarthak Electronics 4, no. 3 (2022): 168-181.
Jha, “Vehicle Number Plate Detection Using Python and Open CV”, [20] Agnes, A., and T. Anto Theepak. "Animal Movement Detection along
International Conference on Advance Computing and Innovative with Differentiation and Alert Processing in Farm Lands." Journal of
Technologies in Engineering (ICACITE), 2021. Innovative Image Processing 4, no. 2 (2022): 79-92.
[12] Dharani Devi P., D. Iyanar, “CNN based Nutrient Extraction from
Food Images”, Fourth International Conference on I-SMAC (IoT in
Social, Mobile, Analytics and Cloud) (I-SMAC), 2020.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 650


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Breast Cancer Segmentation by K-Means and


Classification by Machine Learning
K. Priya 1 , V. Senthilkumar2 , Samson Isaac. J3 , Sreekanth Kottu4 ,
V S Ramakrishna 5 , M Jogendra Kumar6
1
Department of Computer Science, P. B Siddhartha College of Arts and Science,
Vijayawada 520010, Andhra Pradesh, India. kpriya@pbsiddhartha.ac.in
2
Department of Electronics and Communication Engineering, Er. Perumal Manimekalai College of
Engineering, koneripalli, Hosur 635117, Tamil Nadu, India.
3
Department of Biomedical Engineering, Surgical and Critical care Equipments Laboratory,
Karunya Institute of Technology and Sciences, Coimbatore 641114, Tamil Nadu, India.
4
Department of Information Technology, St Peter's Engineering College, Malkajgiri 500100,
Telangana, India.
5
Department of Computer Science Engineering, BVC Engineering College, Odalarevu 533210, Andhra
Pradesh, India.
6
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram
522302, Andhra Pradesh, India.

Abstract—Breast Cancer (BC) progression is currently a sensitivity is diminished in denser breast tissues. Nowadays,
common health problem among modern women. It is the cause having denser breasts are considered a separate risk factor
of death for a significant number of women. BC is the growth of for getting BC [3]. There was an elevated likelihood of BC in
malignant cells in the breast tissue. Adipose or connective tissue
women with extremely thick breast tissue, anything between
can also develop BC. Because of developments in medical
technology, ultrasonography is one of many procedures utilised 1.2 to 2.1 times higher [4]. There are numerous imaging
for the early identification of cancer. Ultrasound is a technique methods available now for the early identification and
that uses high-frequency sound wave technology to create handling of BC. Ultrasonography of the breast is widely used
images of inside body structures such as organs and soft tissues. in clinical practice to make a diagnosis. Because it is non-
Because of the poor quality of the information, there is a lot of invasive, generally women can be well-tolerated and do not
possibility for interpretational mistakes when diagnosing cancer expose the patient to radiation, ultrasound is commonly used
based on ultrasound images. As a result of these concerns, this in the diagnosis of BC [5]. Ultrasound is the most efficient
paper uses the idea of Machine Learning (ML) is employed for diagnostic method, particularly for discovering BC in thick
the classification and segmentation of BC. The K-means
breast tissue, which mammography frequently misses. By
clustering approach is used as part of the segmentation
procedure to detect where the cancer is present. A recent study
comparing other medical imaging techniques, ultrasound
has demonstrated that machine learning produces reliable imaging has advantages in portability and cost [6]. To aid
findings, allowing specialists to make better decisions. Using radiologists in the analysis of breast ultrasounds, CAD
standard BC datasets, the performance of three different systems have been created. Because early CAD systems
Machine Learning algorithms—Logistic Regression (LR), depended so much on human-supplied visual information, it
Random Forest (RF), and K-Nearest Neighbors (KNN)—is was challenging to share data between ultrasound images
tested in this work. In terms of accuracy, RF outperformed the acquired by multiple techniques [7]. Recent improvements in
other algorithms, according to the finding. Future BC artificial intelligence (AI) technology have proved critical in
researchers will be able to utilise the findings of this study to
automating the process of diagnosing BC using ultrasound
guide their investigations and influence their efforts to improve
the efficiency of specific algorithms. images. In a computerised procedure, pre-processing
ultrasound images, segmenting the tumour, obtaining
Keywords— Breast cancer, Data, Segmentation, properties from the segmented tumour, and finally
Classification, Machine Learning, Metrics. categorising the tumour are all critical procedures.

The researcher [8] discussed a unique 3D


I. INT RODUCT ION convolutional network for automated cancer detection from
BC constitutes the second largest reason for death the breast [8] and simultaneously reviewed high detection
among females [1]. Different clinical divisions, such as those sensitivity with minimal False Positive (FP). The author
dealing with BC diagnosis, screening, and therapy, could proposes a densely deep supervision strategy to greatly boost
benefit from more interoperability, and automated ways of detection sensitivity through the efficient utilisation of multi-
doing so have been proposed [2]. Mammography, layer features. Also suggest a threshold loss to offer an
ultrasound, and magnetic resonance imaging are employed as adaptive threshold at the voxel level for distinguishing
components of these automated systems for diagnosing BC. cancer from non-cancer, with high sensitivity and minimal
Mammography does minimize BC deaths, although its FP. Extensive experimental evidence reveals that the
proposed method gives good sensitivity with minimal FP. In

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 651


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
total, 85 patients were included in the retrospective study [9], advantages of a fully connected layer over a SoftMax layer
42 of whom had benign lesions and 43 of whom had for categorization and error prediction. In the present work,
malignant lesions, which were confirmed by biopsy. Deep the author combines these ML approaches with techniques
neural network models were trained independently on a for feature selection and extraction and then analyses their
dataset of 205 B-mode and 205 strain elastography (SE) findings with classification and segmentation tools to
ultrasound images (80% for training and 20% for validation). determine which one is best suited to the output at hand.
Following the configuration of the models to work as an Experiment results show relatively high accuracy of 97.2%
ensemble, 56 images were utilised to test the ensemble's when compared to comparable systems on the market.
performance. The ensemble model uses semantic features The research tries to solve the issues in speed
from the pre-trained models to distinguish between benign control of BLDC employed in EV with the help of the
and malignant tumours, capturing the many features found in above-mentioned journals (Part I). The mathematical model
B-mode and SE images. The experimental results reveal that, of BLDC is identified using the first principal method (Part
when compared to individual models, the proposed ensemble II), The tuning techniques and their working are studied (Part
model achieves 90% accuracy. In particular, the author III), Evaluation parameters are detailed with mathematical
created a novel integrated deep learning (DL) model, a multi- formula (Part IV), and the BLDC performance on various
view deep neural network support vector machine PID tuning is discussed (Part V) and finally conclude which
(MDNNSVM), for ultrasound BC diagnosis [10]. Ultrasound PID tuning is optimal for BLDC speed control.
characteristics, in particular, can be retrieved and combined
utilising multi-view representation learning to effectively II. RESEARCH FLOW
differentiate benign from malignant BC. In addition, to BC segmentation and classification are important
considerably improve diagnostic precision, a classifier is things to treat and cure cancer at earlier stages. The
learned using SVM as the objective function in conjunction ultrasonic BC data was collected from the Kaggle. the data is
with DNN. According to experimental findings on a real- composed of raw ultrasound breast and mask cancer images.
time dataset, the MDNNSVM has the highest classification The collected images are processed and given to the
accuracy and AUC. segmentation model. The processing stages deal with image
Transfer Learning is employed in the proposed sizing and filtering. The K-means technique is employed to
work [11] to develop a sophisticated BC Prognosis utilising segment the cancer region from the ultrasound images. To
an Ultrasound Dataset. BC diagnosis and prognosis provide qualify the segmented cancer region the collected mask
substantial challenges for researchers. When dealing with images are used to compare the results. The feature
cancer, many things influence a patient's prognosis. All of extraction is done to retrieve the important characteristics
these characteristics, as well as the patient's outward from the ultrasound images. The texture-based feature
symptoms, are tracked using scanning instruments. Since extraction particularly GLCM is chosen in this work. Next,
then, the Transfer learning technique has been used to apply the ML models are used, to classify the cancer images after
this data to cancer diagnosis. They present an approach for training. The various ML model outputs are compared to
detecting BC in ultrasound images that are based on transfer identify the best one. For comparison, the standard
learning and DL methods, and investigate and compare these classification metrics are employed. The above-mentioned
two approaches using a variety of different measures. When work process is converted into a flow chart and it is given in
compared to other machine learning and DL approaches, the figure 1.
results of employing the suggested method for BC diagnosis
in ultrasound images demonstrate the highest accuracy and
the fewest losses. Tumours were discovered and classified as
benign or malignant in the study [12] utilising DL
technology and ultrasound imaging diagnostics. A
supervised block-based region segmentation technique was
employed to extract tumour spots in breast ultrasound (BUS)
images. The segmented BUS images were then analysed
using a VGG-19 pre-trained on the ImageNet dataset to
determine whether the BC was benign or malignant. The
trials demonstrated that the proposed method can replace
manual segmentation. The depth features were used to build
a combination feature model, the diagnostic impact of which
was superior to that of either image alone. In publication
[13], the researcher provides a mathematical model for
detecting BC that uses cutting-edge computing methods
called the DL-assisted Efficient AdaBoost technique.
Researchers are actively developing transfer learning-based
algorithms for tumour classification in computer vision using
deep convolutional neural networks (CNNs). The first
section of this study investigates how breast masses can be
defined using CNN-based transfer learning for a variety of
diagnostic, predictive, prognostic, and imaging tasks. The
DL framework is made up of several LSTM and Max-
pooling layers, as well as several convolutional layers. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 652


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
data is composed of a total of 1578 images, here 891 are
benign, 421 are malignant and 266 are normal images. The
data of each type is split in the ratio of 8:2. The detailed
description of data taken for training and testing the ML
model is shown in table 1.

T ABLE I. BC DATA SP LITTING

Breast image Benign Malignant Normal


Total Data Count 891 421 266
Train Data Count 713 337 213
Test Data Count 178 84 53

IV. SEGMENT AT ION M ODEL


Clustering is used to organise data by discovering
similarities between objects in a set [15]. The clustering
procedure is built on the use of the distance function to
determine the degree of similarity between pairs of objects.
Medical image segmentation is simply one of several images
where cluster analysis has proven effective. K-means is a
clustering method that may efficiently classify huge datasets
in a short period [16]. As a result, this can be divided into
numerous clusters, with each cluster containing points that
are strikingly similar to one another. K-mean clustering is
delicate to the initial data point acquisition from the centroid
of every cluster since it is a localized optimization. In
addition, starting point determination is improved by u sing
the cluster's median, the K-mean can be confined to the best
feasible starting point. The k-mean clustering technique will
Fig. 1. Process flow of ML-based BC segmentation and classification choose a random beginning point among the clusters, where
k is the number of clusters. The starting centroid cluster is
III. BREAST CANCER DAT A chosen at random, therefore the total amount of iterations
with the centroid may differ. Finding the centre of the initial
The data is essential for automating the BC high sample points is a solution that will lead to better
segmentation and classification process. For classification , performance. Because k-mean clustering is the most
the ultrasound raw image alone is enough but for commonly used form of clustering, data points
segmentation in addition to raw images, mask images are are clustered into groups. It can process
required. Ultrasound images of the breast were included in vectors of varying sizes and also has good performance
the baseline data set, and the participants ranged in age from computational power. As a result, the cost function and, by
25 to 75 years old. The data included within was acquired in extension, the distortion measure are reduced.
2018 [14]. There are a total of 600 female patients. There are
1578 images total, including an average dimension of 500 ( )
pixels on both the width and height. PNGs are used to save
files. The distinctions between normal, benign, and
( )
cancerous images are seen in figure 2. Where is a statistic used to characterise how far a data
point is from a cluster's epicentre? The the metric
represents the distance between the data points and the
cluster centres. The procedure is as follows:
1. In the space defined by the clustered items, place
the points, the initial centroids.

2. Assign each group of objects to the class that most


accurately defines their approximate centres.
3. The -CenterPoint coordinates must be adjusted
once all objects have been allocated.
4. If the centroids continue to shift, repeat steps 2 and
Fig. 2. Sample BC images and their mask
3

This results in item clustering, from which the desired metric


All images are resized to the shape of 224*224.
could be computed. The K-means clustering technique has
Next the resizing, the filter is applied to the images to reduce
or remove the unwanted noise present in the images. The BC two well-known properties: first, it requires an initial cluster
number, or "k centroid," to function effectively; yet, without

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 653


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
additional context, determining what this optimal number identical. The difference between bootstrap sets formed from
should be is challenging. The other characteristic is a link a collection of training set examples is typically about two -
between each point and its neares t cluster. By using the K- thirds. Any remaining training set samples are removed to
means algorithm, the cancer region is segmented from the lower the size of the bootstrap set. The Out-of-bag (OOB) set
ultrasound images and the result will be given in figure 3. is made up of all of these separate cases. A tree can be
The figure consists of three images, the first image represents constructed with a bootstrap set and tested with an OOB set.
the ultrasonic image, the second one is the ground truth The error is then calculated by dividing the overall OOB set
image and the third one is the K-means segmented outcome. error, which is just the average classification error on the
OOB sets, by the total count of training samples. The upper
bound generalisation error has occurred.

( )

Where represents the average correlation and represents


the ensemble's strength. A solution with maximum power
and minimum correlation is best. The RF model is employed
to accumulate the results of numerous DTs into a single
model. Using just one of the RF model images boosted
Fig. 3. K-means segmented outcome accuracy in recognising tumour abnormalities in imaging
investigations.
V. M ACHINE LEARNING M ODEL C. K-Nearest Neighbour
This section detailed the three ML models used to When it comes to the actual application, the KNN
classify cancer images. Before giving the images to the categorization algorithm shines. The straightforward training
model, the important features from the images are extracted strategy includes a sample of class labels and a set of tuples
and used. The reason for the extraction of important associated with those labels. This strategy works properly
characteristics from the image is to reduce computational with a large enough random number of modules. KNN is a
time and memory. The GLCM is used to extract the features. classification model that associates samples with classes
The result of the GLCM algorithm is given to the ML model using a distance function [19]. The KNN Classification
for training. process is used to compute the distance between a
A. Logistic Regression hypothetical test illustration and each of the real-world
instances . The test samples receive a majority
Many machine learning algorithms use logistic
neighbourhood lecture based on the selection of neighbours,
regression, a popular categorization method. In its simplest
which is chosen by proximity to the test instance. The
form, this model employs a logistic function to characterise a
distance function between the samples is applied using the
binary dependent variable. The expected frequency with
Euclidean technique, the Manhattan method, o r the
which an observation belongs to a certain category. Using
Minkowski method. These processes are utilised when
logistic regression, linear regression is translated into a
dealing with continuous values. The extent to which
classifier and several regularisation approaches [17]. The
neighbours are assigned by sample probability is
most common regularisation methods are ridge and lasso.
determined by the number of neighbours. The number of
With these two popular ways, overfitting can be avoided.
neighbours considered is related to the likelihood of
Regularisation can be used to solve overfitting concerns by
categorising sample X as belonging to class .
penalising the cost function. In the processing step, both L1
and L2 regularisation in the Lasso and Ridge regularisation ∑ ( ( ))
approach, are used. The working hypothesis, " " must meet
the following criteria:
( ) VI. ML M ODEL EVALUAT ION
( ) ( ) A total of three ML models are used to detect BC.
where x is a data point, s1 is the sigmoid function, All three model has their advantages and drawbacks. The
t1 is the time interval, and w1 is the weights. application of the research is in the medical field, so more
Case 0: h1 (x) Attempt to acquire as close to 0 importance is given to the quality of the model. For
results as feasible. identifying the best ML model, evaluation metrics are used.
Case 1, h1(x) Attempt to acquire as close to 1 result The ML model was first trained with the data collected from
as feasible. Kaggle after processing and extracting the features. After
training, the models are tested and validated. The accuracy of
B. Random Forest all three models LR, RF and KNN is 95.87%, 97.14% and
93.33%. The accuracy will be good for RF and lower for the
RF classifier combines two random processes to KNN model. Next, the TNR and TPR values are compared,
construct a vast number of binary decision trees (DT) to for both metrics the value will be maximum in RF (97.83%
categorise data [18]. The bootstrap set is created by and 96.15%) and minimum in KNN (95.58% and 90.29%).
randomly sampling the training set. The tree-building Then, the negative metrics of FPR and FNR are validated.
process can then be made more random. A random selection The RF model gives the value of 3.84% and 2.16% FNR,
of attributes determines the optimum branch to divide the which is very less than compared with the other two
tree into. The images in the bootstrap and training images are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 654


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
techniques. Similarly, for the same metrics, the score will be 93.79% and F1-Score of the RF is 96.52%, LR is 95.01%
highest in KNN and the values are 9.7% and 4.41%. The and KNN is 92.01%. All the output results attained by three
precision of the RF is 96.89%, LR is 96.12% and KNN is ML models are tabulated below in table 2.

T ABLE II. ML MODEL COMP ARISON

MODEL ACCURACY TNR TPR FNR FPR PRECISION F1-SCORE


LR 95.873 97.2678 93.9394 6.06061 2.73224 96.124 95.0192
RF 97.1429 97.8378 96.1538 3.84615 2.16216 96.8992 96.5251
KNN 93.3333 95.5801 90.2985 9.70149 4.41989 93.7984 92.0152

The table is converted into a bar graph and it is of negative metrics will be vice versa, the values are
shown in figure 4. The comparison graph shows that the RF maximum for KNN and minimum for RF. In both metrics ,
model will provide a higher rate of positive metrics and the LR provides the score moderately. In the below figure
KNN provides a lower score of positive metrics. The score the RF, LR and KNN are differentiated using various colour
bar like blue, green and yellow. The RF model was found to
be the best one for identifying BC from ultrasonic images.

Fig. 4. ML model comparison on BC classification

VII. CONCLUSION
REFERENCES
Expert doctors may now successfully diagnose [1]. Spaeth, E.; Starlard-Davenport, A.; Allman, R, “ Bridging the Data
malignant tumours by analysing patient records and imaging. Gap in Breast Cancer Risk Assessment to Enable Widespread
However, various specialists may arrive at different Clinical Implementation across the Multiethnic Landscape of the
conclusions regarding the type of cancer. The high death rate US”, J. Cancer T reat. Diagn, vol. 2, pp. 1–6, 2018, doi:
10.29245/2578-2967/2018/4.1137
associated with BC has made it a hot topic as of late. Thanks [2]. Ganggayah, M.D., Taib, N.A., Har, Y.C. et al. “Predicting factors for
to advances in computer-assisted technologies, doctors may survival of breast cancer patients using machine learning
now detect cancer at an earlier stage and begin treatment as techniques”, BMC Med Inform Decis Mak, vol. 19, no. 48, 2019, doi:
soon as possible. Given the progress made in the ML field, 10.1186/s12911-019-0801-4
[3]. Houssami, N.; Abraham, L.A.; Kerlikowske, K.; Buist, D.S.; Irwig,
we employ the K-means method to isolate the tumorous L.; Lee, J.; Miglioretti, D.L. Risk Factors for Second ScreenDetected
areas in ultrasound imaging, and we apply LR, RF, and KNN or Interval Breast Cancers in Women with a Personal History of
to classify the ultrasound images into several cancer types. Breast Cancer Participating in Mammography Screening. Cancer
The metrics are used to assess all three models. Accuracy Epidemiol. Biomark. Prev, vol. 22, pp. 946–961, 2013, doi:
10.1158/1055-9965.EPI-12-1208-T
(97.14%), TPR (96.15%), TNR (97.83%), precision [4]. Sickles, E.A. “ T he Use of Breast Imaging to Screen Women at High
(96.89%), and F1-score (96.52%) were the metrics with the Risk for Cancer”, Radiol. Clin. N. Am., vol. 48, no. 5, pp. 859–878,
greatest scores for the RF, while FPR (2.16%) and FNR 2010, doi: 10.1016/j.rcl.2010.06.012
(3.84%) were the lowest. Findings have shown that the RF [5]. Sun, Q.; Lin, X.; Zhao, Y.; Li, L.; Yan, K.; Liang, D.; Sun, D.; Li, Z.-
C. “ Deep learning vs. radiomics for predicting axillary lymph node
model can provide accurate findings that aid experts in metastasis of breast cancer using ultrasound images: Don’t forget the
making more reliable predictions than humans can. peritumoral region”, Front. Oncol, vol. 10, pp. 53, 2020, doi:
10.3389/fonc.2020.00053

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 655


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
[6]. Byra, M. “ Breast mass classification with transfer learning based on
scaling of deep representations. Biomed. Signal Process”, Control
vol. 69, pp. 102828, 2021, doi: 10.1016/j.bspc.2021.102828
[7]. Shen, W.-C.; Chang, R.-F.; Moon, W.K.; Chou, Y.-H.; Huang, C.-S,
“ Breast ultrasound computer-aided diagnosis using BI-RADS
features”, Acad. Radiol, vol. 14, no. 8, pp. 928–939, 2007, doi:
10.1016/j.acra.2007.04.016.
[8]. Y. Wang et al., "Deeply-Supervised Networks with T hreshold Loss
for Cancer Detection in Automated Breast Ultrasound," in IEEE
T ransactions on Medical Imaging, vol. 39, no. 4, pp. 866-876, April
2020, doi: 10.1109/T MI.2019.2936500.
[9]. S. Misra et al., "Bi-Modal Transfer Learning for Classifying Breast
Cancers via Combined B-Mode and Ultrasound Strain Imaging,"
in IEEE T ransactions on Ultrasonics, Ferroelectrics, and Frequency
Control, vol. 69, no. 1, pp. 222-232, Jan. 2022, doi:
10.1109/T UFFC.2021.3119251.
[10]. B. Gong et al., "BI-Modal Ultrasound Breast Cancer Diagnosis Via
Multi-View Deep Neural Network SVM," 2020 IEEE 17th
International Symposium on Biomedical Imaging (ISBI), 2020, pp.
1106-1110, doi: 10.1109/ISBI45749.2020.9098438.
[11]. M. Kaur, V. Khullar and H. P. Singh, "Transfer Learning for Breast
Cancer Classification using Small Dataset of Ultrasound
Images," 2020 3rd International Conference on Intelligent Sustainable
Systems (ICISS), 2020, pp. 1050-1056, doi:
10.1109/ICISS49785.2020.9315894.
[12]. W. -X. Liao et al., "Automatic Identification of Breast Ultrasound
Image Based on Supervised Block-Based Region Segmentation
Algorithm and Features Combination Migration Deep Learning
Model," in IEEE Journal of Biomedical and Health Informatics, vol.
24, no. 4, pp. 984-993, April 2020, doi: 10.1109/JBHI.2019.2960821.
[13]. J. Zheng, D. Lin, Z. Gao, S. Wang, M. He and J. Fan, "Deep Learning
Assisted Efficient AdaBoost Algorithm for Breast Cancer Detection
and Early Diagnosis," in IEEE Access, vol. 8, pp. 96946-96954,
2020, doi: 10.1109/ACCESS.2020.2993536.
[14]. Al-Dhabyani W, Gomaa M, Khaled H, Fahmy A. “ Dataset of breast
ultrasound images”. Data in Brief, vol. 28, pp. 104863, 2020, doi:
10.1016/j.dib.2019.104863.
[15]. Kashyap KL, Bajpai MK, Khanna P. Breast cancer detection in
digital mammograms. IEEE International Conference on Imaging
Systems and T echniques, pp. 1-6, 2015, doi:
10.1109/IST .2015.7294523
[16]. Bataineh KM, Naji M, Saqer M. “ A comparison study between
Various Fuzzy Clustering Algorithms”, Jordan Journal of Mechanical
and Industrial Engineering (JJMIE), vol. 5, no. 4, pp. 335-343, 2011.
[17]. Komarek, P. & Moore, A.W, “ Making logistic regression a core data
mining tool with T R-IRLS”, Proceedings of the 5th IEEE
International Conference on Data Mining, vol. 4 pp, 2005, doi:
10.1109/ICDM.2005.90.
[18]. Schonlau, Matthias & Zou, Rosie, “The random forest algorithm for
statistical learning”, T he Stata Journal: Promoting communications
on statistics and Stata, vol. 20, pp. 3-29, 2020, doi:
10.1177/1536867X20909688.
[19]. Kataria, Aman & Singh, Mandeep, “A Review of Data Classification
Using K-Nearest Neighbour Algorithm”, 2013

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 656


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

An Examen of Oral Carcinoma using


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Machine Learning Approaches


Jenifer Blessy. J1 Sornam.M2*
Department of Computer Science Department of Computer Science
University of Madras University of Madras
Chennai – 600025, India Chennai – 600025, India
jeniferdavid1166@gmail.com madasamy.sornam@gmail.com

Abstract—Oral squamous cell carcinoma is the 8th most fast- TABLE I. TUMOR STAGES AND SIZES
spreading cancer, globally. Detection and treatment of Oral
cancer are the most important aspects that are needed nowadays Stages Tumor size
in this fast-moving world. Nanotechnology and machine Stage 0 Abnormal / no damage cell present
learning are two predominant and upcoming technologies for
detecting and classifying cancer. Machine learning algorithms Stage 1 Tumor size less than 2cm
are widely used in the early-stage detection and classification of Stage 2 Tumor size larger than 2cm lesser than 4cm
cancer. These detections can be even performed using smart
devices like cell phone cameras. Nanotechnology sets a new Stage 3 Tumor size larger than 4cm
trend and makes a new revolution in the world of information Stage 4a Between 3-6 cm in the lymph nodes
with the help of nanoparticles like gold nanoparticles, nano-
virus, nanohydroxyapatite, and so on. Nanoparticles are, being Stage 4b Tumor cell in the lymph node is larger than 6 cm
smaller in size, effectively used to stop the further spread of
Stage 4c The tumor is increased in different organs
cancer to other body parts. Accurate detection of Oral
squamous cell carcinoma is a very important phase of OSCC
treatment. Feature extraction of OSCC classification which is
attained using various machine learning algorithms such as II. LITERATURE SURVEY
SVM, Naïve Bayes, and CNN. Deep learning has attained Lavanya L and Chandra J [1] have performed an analysis
outstanding performance in early-stage cancer detection with a on oral cancer using machine learning techniques. Various
large dataset and the results are obtained with high accuracy in methodologies such as Decision trees, Random Forest,
OSCC early-stage detection. It seeks to diagnose oral cancer Support Vector Machines, KNN, Logistic regression, and
with more precision and in less time. Future oral cancer deaths Multi-Layer perceptron use artificial neural networks for
might be reduced by performing early detection. Of these early-stage oral cancer detection. The prediction model of oral
algorithms, CNN has been improved in every research and
cancer was performed using the dataset collected from the
attained an accuracy of ran up to 96.6%.
National Library of Medicine in the U.S.
Keywords— Oral Squamous Cell Carcinoma, Machine Sunil et al [2] described oral cancer staging as pathological
learning, Nanotechnology, Detection, Classification, Deep and clinical. Many tools have been created and used to stage
learning. Tumour-Node-Metasis (TNM). This classification is further
compared with Linear Layer Neural Networks. The accuracy
I. INTRODUCTION
for the T1 stage was 100%, T2 was 84.21%, and T3 was
Oral cancer is a multifaceted disease that may be caused 94.12%.
due to tobacco, drugs, alcohol, and some viruses. Oral cancer
may occur in the tongue, top & bottom of the mouth, buccal R. Prabhakaran et al [3] have performed the detection of
mucosa, gum, area behind the wisdom teeth, neck, and the Oral cancer using machine learning classification methods.
oesophagus. One of India’s main causes of mouth cancer is Various methodologies and algorithms were used to get good
the intake of beetle nuts. Human Papillomavirus and Herpes precision. The tumor images are segmented and features are
group viruses generally cause oral cancer, in both men and extracted to get better precision. Segmentation and
women. Amongst oral cancer, squamous cell carcinoma is classification are performed using SVM, Naïve Bayes, and
predominantly found in humans. Other less common oral CNN algorithms. A comparative study is done using these
cancer types are Verrucous carcinoma, Minor salivary gland algorithms.
carcinoma, and Lymphoma. Cancer can be found using a Marc et al [4] perform an automatic technique for an
variety of methods, including X-rays, computed tomography accurate precision OSCC diagnosis with the aid of deep
(CT), magnetic resonance imaging (MRI), and manual learning technologies. It is compared against textural feature-
diagnosis by a doctor. based machine learning techniques. Also, it performs a series
Depending on the size of the cancer, it is divided into of diagnoses using CLE image series from patients. Patch
various phases. The stages are tabulated in Table I. Along with extraction of images and data augmentation for training is
machine learning and deep learning technologies, done. Various classification methodologies were performed.
nanotechnology plays an important role in the field of Kevin et al [5] concentrated on the Convolutional Neural
dentistry. Being nanosized, the particles or the drugs are network (CNN) to automatically classify different cancer
capable to move to any part of the body, surrounding the lesions. It involves the combination approach of GAIN
tumor, and can stop the further spread of cancer to the other architecture along with CNN. The GAIN architecture has 3
body parts. streams of network for training such as classification stream,
attention mining stream, and bounding box stream. Through

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 657


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

this, the correct lesion area in the image is found using the IV. NANOTECHNOLOGY
decision-making methods. Nanotechnology includes various disciplines such as
Monika et al [6] have done a vast study on the application physics, engineering, biomedicine, chemistry, computer
of nanotechnology in the field of oral cancer. The study throws science, material science, and biology. It is one of the
an idea about how nanomaterials are used in oral cancer emerging technologies as the need for cancer diagnosis and
diagnosis. Liposomes, hydrogels, and liquid crystals are used treatment is high in demand. Many nanoparticles are
in the release of drugs in the human body to treat cancer. implemented in the diagnosis and treatment of oral cancer.
Nanoparticles are single-dimensional and less than 100nm in
Section III of this paper includes an introduction to oral range.
cancer, and Section IV provides an outline of nanotechnology.
Section V and section VI describe the methods and strategies The nanoparticles are hierarchical in structure. They are
employed thus far in the research on the early diagnosis of the same as natural biological materials. Nanoparticles are
cancer. used in the uniform radiation therapy of cancer with
radiosensitizers. Applications of nanotechnology are shown in
III. ORAL CANCER Figure 2. Nano-based cancer diagnosis and treatment have
Oral cancer is also known as mouth cancer. Oral cancer is radically changed the field of medicine and nanotechnology.
the abnormal cells or tumor that grows around the mouth, With the help of nanotechnology, scientists can detect even a
neck, and cheeks. Squamous cell carcinoma is the most minute change in molecule and surface area that occurs in the
common oral cancer which causes in 9 out of 10 people. The cells. Tumor growth is uninvolved using nanomedicine
most common type of oral cancer is listed in Table II. Mouth effectiveness.
pain, loose teeth, difficulty swallowing, and uncertain or
abnormal growth of tissues throughout the inner part of the
mouth are all markers of oral cancer. Numerous different signs
include sore lips or mouth that might not heal for a prolonged
period [7].
TABLE II. CANCER TYPES AND AREAS OF OCCURRENCE

Cancer Types Area


Adenocarcinoma Salivary gland
Sarcoma Bone, cartilage, muscle, or other tissue
Oral malignant
Skin pigment or color (melanocytes)
melanoma
Lymphoma Lymph glands

Figure 2 - Applications of Nanotechnology

The steps involved in the nanoparticles in the cancer


treatment process are explained in Figure 3.

Figure 1 - Oral Squamous Cell Carcinoma

Figure 1 shows the OSCC tumor-affected area of a patient.


OSCC mostly develops in the area of the mouth’s lips, tongue,
and floor. Tobacco and drugs are the two major cancer-
causing agents. Chewing betel for a long period tends to cause
cancer in the mouth. In the clinical system, the staging of
OSCC cancer is done by Tumor, Node, and Metastasis Figure 3 - Nanoparticles in cancer
(TNM). [1] Various biomaterials are available such as fluorescent,
There are three common ways to treat cancer: surgery, gold, virus, and hydroxyapatite are available in the diagnosis
radiotherapy, and chemotherapy. Other than these methods, and treatment of cancer. Fluorescent has been used as an
nanotechnology started to boom now. The release of drugs in alternative to traditional dyes, increasing stability. It is also
the format of nanoparticles is highly effective since they are used the decrease photobleaching.
smaller in size and highly dense. Gold nanoparticles are used in photothermal therapy and
radiofrequency therapy. Gold nanoparticles are used in
anticancer drug delivery and are highly biocompatible in
nature. Gold nanoparticles absorb light cheaply and
This research work was funded by the MHRD RUSA 2.0 Biomaterials effectively [9]. Gold nanoparticles are biosensor that is highly
–Research Innovation and Quality Improvement- Nano informatics on the sensitive, adaptable, and selective.
role of Nano-HAp in Orthodontics: Schema and System Design under
Functional Synthetic Material for Biomedical Applications Theme-2 from
the University of Madras.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 658


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Virus-based nanocarriers for drug delivery are used in area's shape and size. This feature extraction could be obtained
packing the drugs and delivering them to the target. It has through Principal Components Analysis, Independent
several properties such as being biocompatible, water-soluble, Components Analysis, and Linear Components Analysis.
and reduced toxicity. Furthermore, functionalization is Classification is done as binary classification, multiclass
simple. The tobacco mosaic virus (TMV), turnip yellow classification, and multimodal classification. Many
mosaic virus (TYMV), and Insect Noda virus flock house classification algorithms include K-Nearest Neighbor,
virus (FHV) are used effectively [10]. Figure 4 explains how Random Forest, Naïve Bayes, and Support Vector Machine.
virus-based nanocarriers are used in treating oral cancer. Finally, the image is said to whether Benign or malignant.

Figure 4 - Virus-based nanocarriers [10]

Hydroxyapatite is the main component of mineral bone. It


is the backbone of the standard treatment protocol. It is
effective in the drug delivery system. HAp is a bioactive
synthetic material that is smaller in grain size and easy to
synthesize and break down into nano-particles without losing
its physical and chemical properties. Being nano, HAp is also
used in the bone replacement process.
The chemical composition of HAp is Ca5 (OH)3 (PO4)3
which comprises Calcium, Hydroxide, and Phosphate. HAp
is most effective in the case of caries and dental fractures. The
further study happens in the field of tissue engineering.
HAp is available in different formats like toothpaste and
mouth-rinsing solutions to avoid hypersensitivity and
enhanced mineralization. The HAp is bioactive in the human
body. It has high interaction with biological components. As
a start of the research, the HAp is being tested on rats to
calculate the effectiveness of Nano-HAp at the physical level.
V. METHODOLOGY
The different methodologies used till today are discussed.
Data collection is the first and foremost step in any research.
Figure 5 - Steps in cancer identification using machine learning techniques
Data can be collected from local resources or they are readily
available online. Some of the Public domains that avail the
data to the researchers are Kaggle, UCI, BRATS 2015 dataset, The algorithms for detecting oral cancer are covered
BRATS 2016 dataset, BRATS 2018 dataset, LIDC-IDRI, below.
WBCD dataset, and FFDM dataset.
A. Support Vector Machine
The entire dataset is divided into three namely, training
data, validation data, and testing data. The training data is SVM is an inherently binary classifier in Machine
used to train the model, the validation data is used to monitor learning algorithms and is also used in the regression. It is
the model's performance, adjust the hyperparameters, and highly useful in pattern recognition for complex data. The
choose the best model. The test data displays the ultimate kernel trick is one of the methods that is used to modify the
performance of the created and trained model. The most data. Optimal boundaries are found among the possible
common method involved in diagnosing and treating cancer is outputs. SVM works with higher accuracy with less
shown in Figure 5. computation time.
Next to data collection, data has been pre-processed and
made into an understandable format. The image is then SVM is currently expanding its boundaries in the field of
subjected to an enhancement process by resizing, enhancing cancer which is extended to the discovery of new biomarkers
the contrast, and applying filters to improve the quality. and cancer-causing genes. Some of the SVM results in the
Images are segmented using various algorithms such as CNN detection of cancer are listed in Table III. SVM is chosen in
and RNN. Using segmentation, in medical imaging, the tumor order to obtain the best solution for the oral cancer
is found pixel by pixel, so the detection can be more accurate. classification as benign or malignant.
Feature extraction helps in the reduction of processing
time. Features are extracted in two types: Morphological TABLE III. SVM IN CANCER CLASSIFICATION
features and Textural features, which help to analyze the target

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 659


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Author Dataset Result


Nanditha BR et al Public domain and clinical Training accuracy VI. CONCLUSION
[12], 2022 data – 98.3 %
Testing accuracy – As an overview of this research, the CNN algorithm plays
97.15% a major role in the detection of Oral cancer at an early stage.
Deep learning and machine learning algorithms are useful to
Al-Ma’aitah M et al Clinical data 89.2 %
[11], 2018 both clinicians and physicians. Finding the early stage of oral
cancer is crucial, which may take an ample amount of time.
Rahul Kumar LIF spectra collected at 91.9 %
Singh et al [13], Manipal University Proper diagnosis and treatment are the two major factors in the
2008 medical industry. The technologies aim to join hands with the
Alhasan Alkuhlani https://tcga- 98.81 % medical field to enhance disease detection and reduce the
et al SVM-RFE data.nci.nih.gov/tcga/ mortality rate. For this, the data is the main key for further
[14], 2017 research. Image enhancement and overfitting reduction are the
two major key terms for the processed data. New and
B. Naïve Bayes improved algorithms must be developed for better cancer
Naïve Bayes forecast the probability of the various class detection and enhanced accuracy.
based on the different available features. This algorithm is
highly effective in oral cancer classification. The FUTURE WORK
performance and analysis are good in the Naïve Bayes Oral cancer detection can be done using different images
algorithm. Naive Bayes is simple to construct and quite such as CT, MRI, X-Ray, and other biomedical images.
helpful for very large datasets and so chosen. Classification and segmentation are done using traditional
methods. Improved ensemble learning of deep learning
TABLE IV. NAÏVE BAYES IN CANCER CLASSIFICATION methods can be performed to get improved accuracy.
Modified models have to be developed. While concentrating
Author Dataset Result on the dataset, more clinical and histopathological data has to
Nanditha BR et Public domain and clinical 90.01% be collected and worked with that. The main aim is to find oral
al [12], 2022 data cancer at an early stage to increase the patient survival rate and
Prabhakaran et Public domain 86.02 % provide treatment at the earliest.
al[3], 2020
Dharani et al UCI 85.71 % ACKNOWLEDGMENT
[19], 2021
This research work was funded by the MHRD RUSA 2.0
Biomaterials –Research Innovation and Quality
C. Convolutional Neural Network Improvement- Nano informatics on the role of Nano-HAp in
CNN is one of the leading algorithms that is used in the Orthodontics: Schema and System Design under Functional
early stage of oral cancer detection. The CNN first extracts Synthetic Material for Biomedical Applications Theme-2
the necessary features and classifies similar features. The data from the University of Madras.
depends on the data and its quality, features, the number of REFERENCES
layers, activation function used, the ability to classify the data
[1] B. Lavanya L, Dr. Chandra J, “Oral Cancer Analysis Using Machine
either as binary value or image, and the initialized weights. Learning Techniques,” International Journal of Engineering Research
The accuracy can be improved during every iteration through and Technology. ISSN 0974-3154, Volume 12, Number 5 (2019), pp.
weight adjustments and the selection of different activation 596-601
functions. Table V shows the performance of CNN so far. [2] S. K. Prabhakar and H. Rajaguru, "Performance analysis of linear layer
Since CNN can be backpropagated, it is much applicable to neural networks for oral cancer classification," 2017 6th ICT
International Student Project Conference (ICT-ISPC), 2017, pp. 1-4,
every problem. DOI: 10.1109/ICT-ISPC.2017.8075357.
[3] Prabhakaran, R. and Mohana, Dr. J., Detection of Oral Cancer Using
TABLE V. CNN IN CANCER CLASSIFICATION Machine Learning Classification Methods (June 30, 2020).
International Journal of Electrical Engineering and Technology, 11(3),
Author Framework Result 2020, pp. 384-393
de Souza Enhanced CNN 88% [4] Aubreville, M., Knipfer, C., Oetter, N. et al. Automatic Classification
Tolentino E et of Cancerous Tissue in Laserendomicroscopy Images of the Oral
al [15], 2011 Cavity using Deep Learning. Sci Rep 7, 11979 (2017).
https://doi.org/10.1038/s41598-017-12320-8.
Aubreville, M Patch-probability fusion 88.3 % [5] Kevin Figueroa, Bofan Song, Sumsum Sunny, Shaobai Li, Keerthi
et al[4], 2017 Gurushanth, Pramila Mendonca, Nirza Mukhia, Sanjana Patrick,
Transfer learning 87.02% Shubha Gurudath, Subhashini Raghavan, Imchen Tsusennaro, Shirley
Textural feature-based 77.9% T. Leivon, Trupti Kolur, Vivek Shetty, Vidya Bushan, Rohan M.
Classification Ramesh, Vijay Pillai, Petra Wilder-Smith, Alben Sigamani, Amritha
Suresh, Moni A. Kuriakose, Praveen Birur, Rongguang Liang,
Li, H. et al [16], R-CNN True positive – "Interpretable deep learning approach for oral cancer classification
2018 0.935% using guided attention inference network," J. Biomed. Opt. 27(1)
True positive – 015001 (12 January 2022) https://doi.org/10.1117/1.JBO.27.1.015001
0.185%
[6] Poonia M, Ramalingam K, Goyal S, Sidhu SK. Nanotechnology in oral
Poedjiastoeti W Improved CNN 83% cancer: A comprehensive review. Journal of Oral and Maxillofacial
et al [17], 2018 Pathology: JOMFP. 2017 Sep-Dec;21(3):407-414. DOI:
Bhandari, B et Sigmoid function and loss 96.6% 10.4103/jomfp.jomfp_29_17. PMID: 29391716; PMCID:
al [18], 2020 functions PMC5763864.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 660


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[7] https://www.mayoclinic.org/diseases-conditions/mouth [14] Alkuhlani, A., Nassef, M. & Farag, I. Multistage feature selection
cancer/symptoms-causes/syc-20350997 approach for high-dimensional cancer data. Soft Comput 21, 6895–
[8] Zhang M, Liang J, Yang Y, Liang H, Jia H, Li D. Current Trends of 6906 (2017). https://doi.org/10.1007/s00500-016-2439-9
Targeted Drug Delivery for Oral Cancer Therapy. Front Bioeng [15] Tolentino Ede S, Centurion BS, Ferreira LH, Souza AP, Damante JH,
Biotechnol. 2020 Dec 8;8:618931. DOI: 10.3389/fbioe.2020.618931. Rubira-Bullen IR. Oral adverse effects of head and neck radiotherapy:
PMID: 33425881; PMCID: PMC7793972. literature review and suggestion of a clinical oral care guideline for
[9] Sztandera K, Gorzkiewicz M, Klajnert-Maculewicz B. Gold irradiated patients. J Appl Oral Sci. 2011 Oct;19(5):448-54. DOI:
Nanoparticles in Cancer Treatment. Mol Pharm. 2019 Jan 7;16(1):1- 10.1590/s1678-77572011000500003. PMID: 21986648; PMCID:
23. doi: 10.1021/acs.molpharmaceut.8b00810. Epub 2018 Nov 30. PMC3984189.
PMID: 30452861. [16] Li, H., Weng, J., Shi, Y. et al. An improved deep learning approach for
[10] Ma Y, Nolte RJ, Cornelissen JJ. Virus-based nanocarriers for drug detection of thyroid papillary cancer in ultrasound images. Sci Rep 8,
delivery. Adv Drug Deliv Rev. 2012 Jun 15;64(9):811-25. DOI: 6600 (2018). https://doi.org/10.1038/s41598-018-25005-7
10.1016/j.addr.2012.01.005. Epub 2012 Jan 20. PMID: 22285585. [17] Poedjiastoeti W, Suebnukarn S (2018) Application of convolutional
[11] Al-Ma’aitah, M., AlZubi, A.A. Enhanced Computational Model for neural network in the diagnosis of jaw tumors. HealthCare Informat
Gravitational Search Optimized Echo State Neural Networks Based Res 24(3):236–241
Oral Cancer Detection. J Med Syst 42, 205 (2018). [18] Bhandari, B., Alsadoon, A., Prasad, P.W.C., et al. Deep learning neural
https://doi.org/10.1007/s10916-018-1052-0 network for texture feature extraction in oral cancer: enhanced loss
[12] B R, Nanditha & Annegowda, Geetha. (2022). Oral Cancer Detection function. Multimed Tools Appl 79, 27867–27890 (2020).
using Machine Learning and Deep Learning Techniques. International https://doi.org/10.1007/s11042-020-09384-6.
Journal of Current Research and Review. 14. 64-70. [19] Dharani, R., & Revathy, S. (2021, May). DEEPORCD: Detection of
10.31782/IJCRR.2021.14104. Oral Cancer using Deep Learning. In Journal of Physics: Conference
[13] R. K. Singh, S. K. Naik, L. Gupta, S. Balakrishnan, C. Santhosh, and Series (Vol. 1911, No. 1, p. 012006). IOP Publishing.
K. M. Pai, "Hybrid SVM - Random Forest classification system for oral
cancer screening using LIF spectra," 2008 19th International
Conference on Pattern Recognition, 2008, pp. 1-4, DOI:
10.1109/ICPR.2008.4761357.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 661


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
MiMi: Sinhala Language Speech Assistive Learning
Bot to Support Children with Stuttering
K.C.D Vithana D.N.N Weerarathne H.A.S Krishan M.R.M Wijesiri
Faculty of Computing Faculty of Computing Faculty of Computing Faculty of Computing
Sri Lanka Institute of Sri Lanka Institute of Sri Lanka Institute of Sri Lanka Institute of
Infromation Technology Information Technology Information Technology Information Technology
Malabe, Sri Lanka Malabe, Sri Lanka Malabe, Sri Lanka Malabe, Sri Lanka
diwyangivithana1@gmail.com nnimesha97@gmail.com shehankrishan6@gmail.com ravinimaneesha28@gmail.com
Samantha Thelijjagoda J.A.D.T Jayawickrama Nethmini T. Weerawarna
SLIIT Business School Ceylon Cold Stores PLC, University of Colombo,
Sri Lanka Sri Lanka Sri Lanka
samantha.t@my.sliit.lk dinuwan.adg@gmail.com nethmi@ict.cmb.ac.lk

Abstract— This research paper presents "MiMi", a Sinhala social and intellectual pursuits. Stuttering affects one in every
Language voice assistive gamified solution that is designed to hundred people, resulting in more than seventy million cases
address stuttering in children aged between three and fourteen. experiencing stuttering globally [2]. Around 2% of children
Speech disorders occur when the regular flow of communication experience speech disfluencies in Sri Lanka [3].
is disrupted. Stuttering, Lisps, Dysarthria, and Apraxia are some
variations of speech impairments. Stuttering can be caused by a
B. Causes of Stuttering
variety of factors including physical weaknesses, inherited
diseases, Autism, and accidents. The risk of continuing to stutter
into adulthood is highest in children between the ages of three to The findings of numerous research on stuttering indicate
fourteen. It is recognized that stuttering therapy activities were less that stuttering may be caused by a variety of factors,
effective in managing stuttering after this age. Stuttering including abnormalities in speech and motor control,
treatments comprise speech therapy with speech-language hereditary conditions, intellectual disabilities such as autism,
therapists, which requires in-person sessions that can be hearing loss, attention deficit hyperactivity disorder
challenging and expensive in some circumstances. A parent's (ADHD), brain injuries, mental and emotional health issues,
financial ability, their busy schedules, the state of the economy in and post-traumatic experiences such as accidents and falls
the nation, and the feasibility of physically seeing therapists and [4].
enduring treatments are all factors that might encourage or
demotivate participation in therapy sessions. The development in Stuttering may increase when a person is anxious, tired,
technology and technical approaches have revolutionized the
medical field and several studies have been conducted regarding
agitated, self-conscious, pressed for time, or under pressure.
communication disorders in recent years. The application can be Speaking in front of a crowd or talking on the phone can be
used to practice a child’s needed speech therapy virtually and can particularly difficult for people who stutter. Stuttering is more
also be used to aid speech therapy sessions done by speech prevalent in males than in women. Hence, gender might be
therapists. The main aim of the system is to provide a customized, considered one of the main predisposing factors for
engaging, and innovative therapeutic strategy for children to stuttering. Adults and children have a high male-to-female
manage stuttering. ratio of four to one or even more when it comes to
experiencing stuttering [5]. As a result, stuttering symptoms
Keywords—Gamified virtual assistance, Speech therapy,
might vary from person to person.
Childhood stuttering, Sinhala language, Voice assistive
C. Types of Stuttering
I. INTRODUCTION
The three main forms of stuttering are repetitions, blocks,
Stuttering is a developmental speech disfluency that is
and prolongations. Repeated words, sounds, or syllables and
one of the most prevalent forms of speech disfluency.
interruptions in the regular flow of speech are some
Incorporating technology to manage communication
characteristics of different forms of stuttering. A child may
impairments in individuals has transformed the approach to
experience more than one form of stuttering.
treatment delivery in the healthcare industry in recent years.
TABLE 1: TYPES OF STUTTERING
A. Overview of Stuttering

According to research, individuals who succeed in


developing their oral language early also succeed
academically as adults [1]. Stuttering occurs when an
individual finds it difficult to convey what they want to
express, but the normal flow and fluency of speech are
disrupted. Individuals who experience stuttering have stated
that stuttering is uncomfortable. Children who are still
developing their speech and language are more likely to
stutter during this phase of language development, but most
children outgrow this phase. Early intervention is necessary
for children who stutter since it can lead to bullying, low self-
esteem, nervousness while speaking, and a lack of interest in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 662


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

D. Stages of Stuttering flow of speech, and it has been shown to be more effective
than no treatment over the same 6-month period" [11].
The four major stuttering phases were characterized as
borderline stuttering, beginner stuttering, intermediate In 2001, "SpeechEasy" [12], a stuttering-reduction
stuttering, and advanced. Different approaches are used to electronic gadget that may be worn in the ear like a hearing
characterize each type's stuttering stage, but the most aid, was introduced. Joseph Kalinowski, Andrew Stuart, and
prevalent approach is by getting the frequency of the stuttered Michael Rastatter's research at the Communication Sciences
word count. Normal speech disfluency in children is and Disorders Department at East Carolina University served
characterized by a rate of stuttering that is less than 10%. as the basis for "SpeechEasy" [13]. Several users of this
Delayed Auditory Feedback (DAF) device reported
i. Borderline stuttering - Many children go through this improved speech, but it was recommended that it must be
phase which usually lasts around 6 months and used under the guidance of a licensed speech-language
gradually recedes. therapist. DAF has been proven to improve fluency in many
ii. Beginning Stuttering (2-8 years) - Frequency of stutterers, despite not benefiting all of them [14]. Later,
disfluency increases to more than 10%. Tense, abrupt similar devices to "SpeechEasy," such as "Speak for Less"
multiple part-word repetitions. [15], an in-ear fluency aid, and "VoiceAmp" [16], a device
made for stutterers and others who lack social confidence,
iii. Intermediate Stuttering (6-13 years) - Blocks, were made accessible. To minimize stuttering, devices with a
Repetitions, and prolongations continue. single component like a hearing aid, or several components
like a box worn in the pocket with headphones were both
iv. Advanced Stuttering (14+ years) - Severe condition of developed.
stuttering. Requires a general adult-oriented treatment
approach. [6] Along with the development of a technology-based
approach to treat stuttering, a variety of mobile applications
II. LITERATURE REVIEW were founded, which include "DAF Pro", "Fluency Coach",
"Speech for Good" and "Stamurai" which make use of DAF
Speech and Language Therapy is a field that focuses on
or Altered Auditory Feedback (AAF) technologies and are
the rehabilitation of people who have a variety of language
intended to be used by speech therapists or children who
and communication problems. Most countries lack the
experience stuttering. The mobile applications developed for
necessary infrastructure to offer these individuals healthcare
the treatment of stuttering have been proven to be helpful and
and rehabilitation treatments [7].
aid in speech treatment. Speech therapists observe that many
The percentage of those who stutter is observed to be children prefer using applications, which support learning
reduced with the intervention [8]. Speech therapists use a [17].
variety of techniques to help people with the condition
By recording the Electroencephalogram (EEG) feed of
manage their stutter, such as creating a relaxed environment,
the speech motor (Broca's region) using brain neuron
giving them multiple chances to speak, speaking at different
electrodes and processing it to identify speech impairments,
speeds so they do not feel rushed, and listening instead of
a study named "SpeechGen" was carried out in 2020 by
concentrating on the message they are conveying [9]. The
J.A.D.T Jayawickrama to develop a desktop application for
main treatment approaches used by speech therapists to
speech disfluencies. EEG neurofeedback was used to
manage stuttering are known as "fluency shaping therapy"
determine the impact on the left hemisphere of the brain. This
and "stuttering modification therapy". Fluency enhancement
system communicates the results to the speech therapist
strategies like deep breathing and reduced speech pace are
instantly, and they can provide self-learning therapy-based
used in fluency shaping therapy to help talk more fluently
tasks that help with fluency improvement [18].
[10].
In 2020, a study was done for stutter diagnosis and
Technological development and technical approaches
therapy recommendation based on deep learning by Gresha
have revolutionized the medical field in the recent past.
Bhatia and Binoy Saha. Some key findings of the conducted
Numerous studies have been conducted on the utilization of
study were, Mel-Frequency Cepstrum Coefficient (MFCC)
technology in treating stuttering. AI (Artificial Intelligence),
features give the best results with deep learning models, a
ML (Machine Learning), and several other approaches have
single model could not be used to identify all types of
been used in several studies to increase the speech fluency of
stuttering, MFCC coefficient from 1 to 13 clearly showed a
individuals who stutter by offering guidance and different
pattern for prolongation [19].
techniques to enhance speech fluency.
In recent years, a significant number of studies on speech A study was done on the topic of ‘Deep Learning based
therapy and stuttering have been conducted. The use of NLP Techniques in Text to Speech Synthesis for
technology, parent-child interactions, cognitive behavioural Communication Recognition’ by Dr. Edriss Eisa Babikir
therapy, and speech therapy are some of the most effective Adam to use deep learning approaches for speech synthesis,
stuttering therapies. In a study done in 1999 by Jan and performance in terms of aperiodic distortion is compared
Broomfield and Barbara Dodd, it was discovered that for to earlier models of natural language processing techniques
children with primary speech and/or language impairments, [20]. The system was implemented to convert natural
"an average of 6 hours of speech and language therapy in a 6- language text into speech to aid people with visual
month period can produce significant improvement in the impairments and reading disabilities. This model was found

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 663


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

to be more suitable as a speech recognition model due to its The USERS block depicts the users of the system, who are
low aperiodic distortion. The text-to-speech model was the child experiencing stuttering or a caretaker if needed.
implemented in a manner the words are mapped to vectors of Next, the user input is taken as voice commands and then
real numbers which are then used in the CNN model. forwarded to the block named VOICE ASSISTIVE BOT,
TABLE 2: COMPARISON OF EXISTING SIMILAR where the voice assistive bot is integrated with the models,
SOLUTIONS algorithms, scripts, and data sources for audio recognition
and bot outputs. The PATIENT IDENTIFICATION block
illustrates the patient identification and profile creation
process, the block named INTERNAL PROCESS is divided
into three sub-categories as stuttering type recognition, stage
recognition, and therapy recommendation. According to the
stuttering type and stage identified after each speech activity,
the profile is updated. The stuttering type and severity are
identified by the progress activities given to the child.

2) Data Collection
III. METHODOLOGY
Ten children who experience stuttering between the ages
This research effort is primarily aimed at a target audience
of three to fourteen are used for the data collection process.
that includes a child with stuttering disfluency, as well as
Their speech patterns are recorded by giving them a brief task
caregivers or parents of the children experiencing stuttering
according to their age category like expressing a simple
if the child is not able to handle the application on his/her
image, and their voices are captured during the conversations.
own. "MiMi" is a voice assistive bot designed and developed
The recorded voice clips are maintained as confidential, and
as a gamified mobile application for the age range of three to
no metadata is used for research purposes.
fourteen.
1) System Overview
The development of the final prototype
of "MiMi" involves various phases. Fig. 1 depicts the system
architecture of "MiMi".

Fig. 2. Initial picture description activity given for age 3 – 10 children

Fig. 3. Initial reading activity given for age 11 – 14 children

3) Input of the System

The child interacts with the voice assistive bot, which


records the child's voice as input. The input is accurately
recognized and identified using a customized approach via
the Google voice recognition Application Programming
Interface (API) and speech-to-text together with the boost
feature which is used to enhance transcribing and recognizing
the stuttered words more accurately. Boost is a feature of
Fig. 1. Overview Diagram of “MiMi” speech adaption which allows to assign numerical weights to
words depending on the frequency they occur in a sentence.
Depending on the words in the transcribed phrase, the audio

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 664


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

is then divided into several chunks based on the time offsets. Category 1: The children aged between three to ten years
The words included in the sentence are recognized using the
word corpus defined that contains fluent utterances of words Category 2: The children aged between eleven to fourteen
in text format. The recognized transcriptions are then passed years
to the script used by the bot for its functionalities.
The children are given an initial activity according to the
age category and audio clips captured during this activity are
used to decide the type and severity of the stutter. The entire
internal process may be separated into four phases, according
to the implementation structure of "MiMi".

i. Stuttering type recognition:


Stuttering type recognition is the first step. It is carried
out using seven CNN models that have been trained using
audio chunks. First, a model is used to determine if the uttered
word is fluently pronounced or stuttered. And then, the types
are determined with the aid of an algorithm to check the
probability of each input stuttering and then categorize each
input as single-syllable repetitive stuttering, multi-syllable
Fig. 4. Audio transcription with time offsets
repetitive stuttering, prolongation, or block stuttering based
on the results. A simple series of exercises are provided to the
4) Output of the System child to determine the type of stuttering such as describing an
image or providing a list of words or sentences to read.
The voice commands the child converse is then tokenized
and split to capture the required information for usage in the
discussion between the user and the voice assistive bot. Voice
clips are chosen from the word corpus to match the
commands. A single voice clip is then created by combining
these selected voice clips. The combined voice clip will be
provided by the bot as an output, enabling the child to
continue an interactive conversation with it.

Fig. 6. Type recognition process using seven 2D CNN models

Fig. 5. Word corpus comprising individual audio clips to create the output
commands of the voice bot

5) Profile Initiation

The patient profile is initiated during the registration


process. The system will initially record the patient's
ethnographic information. To get more precise information,
these details will be entered by the child or the caregiver via
both voice commands and the registration form, after which
the patient profile will be initiated in accordance with those
details. By analyzing the age given during the registration Fig. 7. Determining the type according to the values in the type-wise
count table
process the system will identify which age category the child
belongs to. ii. Stuttering stage identification:
6) Internal Process Next, the severity identification process begins. This
includes identifying the stage or severity of the stutter. This
According to the system implementation, the users of the is done by taking the stuttering frequency of the child and by
system are divided into two categories: assigning a label as beginner-level stuttering, intermediate-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 665


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

level stuttering, and advanced-level stuttering corresponding


to each type identified. The stutter severity index is calculated
using (1)

Stutter severity index = (𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑢𝑑𝑖𝑜 𝑐ℎ𝑢𝑛𝑘𝑠 𝑠𝑡𝑢𝑡𝑡𝑒𝑟𝑒𝑑


𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑢𝑑𝑖𝑜 𝑐ℎ𝑢𝑛𝑘𝑠
) × 100% (1)

The stutter severity index (x) corresponding to each stage is,

• Beginner level stuttering: 10% < x <= 40%


• Intermediate level stuttering: 40% < x <= 75%
• Advanced level stuttering: 75% < x Fig. 9. ARIMA model used to do the progress predictions

iii. Therapy recommendation: Additionally, the system has the capability of


generating reports. The reports may include patient details,
The next step is therapy recommendation, which stutter severity based on the types of stuttering, plots relevant
commences with determining the appropriate therapeutic to the fluency progress, and stuttering frequency. The
activities from a pool of activities, based on the age group, progress prediction is done month-wise, and the predicted
the type of stuttering experienced, and the stage previously progress percentage is recorded for each month for a twelve-
determined. Gradually, the therapy activities will be adjusted month period using the ARIMA model used earlier. This can
based on the child's progress. Loud reading exercises, visual be evaluated to understand the child’s fluency progress.
descriptions, syllable practicing, breathing activities, and
basic conversations are among the treatment activities that are
provided through the application. These activities are
generated in a gamified level-based manner depending on the
child's age. The therapeutic exercises are designed such that
the child converses with "MiMi", a voice-assistant bot.

7) Profile Maintenace

The patient will be monitored, and their profile will be


updated following each therapy session after the completion
of a progress activity. The patient profile will include
progress regarding the activities, and visualizations of the Fig. 10. Fluency predictions are shown in a table in the generated report
progress statistics. The progress is captured via two specific
activities given during the therapy sessions using the 8) User Interface Design
stuttering frequency. Daily progress is recorded, and a
progress plot is generated. The UI (User Interface) design of the mobile application
is done in a manner to get the attraction of the children and
keep them engaged with the therapeutic activities throughout
the session.

\\\\\\\

Fig. 8. Progress plot as shown in the patient’s profile


Fig. 11. Some user interfaces of ‘MiMi’ the mobile application

Additionally, by assessing the progress, the system will The developed avatar provides an appealing user interface
anticipate the amount of time taken to reduce stuttering to a to involve children in an interactive conversation. The user
particular level. The predictions are done using an will be rewarded based on the completion of a set of therapy
Autoregressive Integrated Moving Average (ARIMA) model sessions and more features will be added to make the avatar
which has p, d, and q values of 0,1 and 2 respectively. customizable. This makes the child become much more
engaged in their therapies and exerts more effort to complete
the speech therapy exercises.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 666


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

last from a few weeks to several years. Taking this into


consideration, "MiMi" a virtual voice assistive bot to manage
stuttering, is made for children between the ages of three and
fourteen. This research can contribute to the research
community as an efficient solution developed to fulfill the
therapy requirement of a child who is experiencing stuttering.

This system may be advanced further in a range of ways,


such as extending the age range, increasing the therapeutic
activities offered, enhancing prediction accuracy, and
Fig. 12. Interfaces that show the rewarding process when progressing streamlining user-bot interactions to provide users with a
through the application reward Process and Customized Avatars
more seamless experience. Since people are used to follow
the traditional therapeutic technique, this is a completely new
IV. RESULTS AND DISCUSSIONS
experience. By offering them a more human-like approach,
"MiMi" is a fully functional virtual speech therapy the existing solution may be enhanced so that the user does
application created in the Sinhala Language that assists in not feel as though they are dealing with a voice assistive bot.
managing stuttering by forwarding a gamified approach to People across the globe have started to realize the gradual
gain the necessary speech therapy. "MiMi" was created using technical paradigm shift initiated by voice assistive bots in a
classification models involving deep learning and automated decade and in conclusion, "MiMi" has fulfilled these
scripts to create the underlying architecture and to give circumstances providing the world with a solution to manage
children who stutter an enjoyable, interactive experience in stuttering speech disfluency.
which to perform the necessary speech treatment.
The accuracy of the integrated type of recognition model ACKNOWLEDGMENT
received a score of 73.2% as shown in Fig. 13. (2) and (3)
shows expressions used to calculate precision and recall The work described in this paper was carried out for a
respectively. Bachelor of Science degree research project and is a result of
immeasurable guidance, support, and encouragement given
𝑇𝑟𝑢𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒
Precision = (2) by all the mentors of our research team. Furthermore, our
𝑇𝑟𝑢𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒
sincere appreciation is deserved by all parties who supported
𝑇𝑟𝑢𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 us in the data collection procedures including the speech
Recall =
𝑇𝑟𝑢𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝐹𝑎𝑙𝑠𝑒 𝑁𝑒𝑔𝑎𝑡𝑖𝑣𝑒
(3) therapists, the parents of the children who participated in the
data gathering procedure, family members, friends, and
everyone else who supported us in our efforts to complete this
research successfully.

REFERENCES

[1] Reeder, F; Baxa, J;, "The Importance of Oral Language for Literacy
Fig. 13. Accuracy scores of the integrated stuttering type recognition Success," [Online]. Available: https://grapeseed.com/us/blog/the-
model importance-of-oral-language-for-literacy-success/.
[2] Büchel, C; Sommer, M;, "What causes stuttering?," [Online].
Fig. 14 depicts the results of the stuttering type and stuttering Available:
stage recognized with the aid of the initial activity. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC340949/.
[3] "DemographicAndHealthSurveyReport-2016-Chapter10," 2016.
[Online]. Available:
http://www.statistics.gov.lk/Health/StaticalInformation/Demograph
icAndHealthSurveyReport-2016-Chapter10. [Accessed 28 01
2022].
[4] Bloodstein, O;, "A handbook on stuttering.," in Singular, San Diego,
1995.
V. CONCLUSION AND FUTURE WORKS [5] The Stuttering Foundation and Frank Wolf, "Stuttering Gets
Congress' Attention.," [Online]. Available:
http://www.stutteringhelp.org/content/stuttering-gets-
congress%E2%80%99-attention. [Accessed 27 01 2022].
Fig. 14. Stuttering type, severity index, and severity results for a given
[6] "Developmental Levels of Disfluency," [Online]. Available:
audio
https://www.coloradostutteringtherapy.com/developmental-levels-
of-disfluency/.
VI.
[7] "Rehabilitation," [Online]. Available: https://www.who.int/news-
The research problem that is addressed in this context is room/fact-sheets/detail/rehabilitation.
one of the significant issues when it comes to stuttering [8] Rice, Alex, "What is Stuttering?," [Online]. Available:
speech disfluency. One of the common aspects of speech https://familydoctor.org/condition/stuttering/. [Accessed 27 01
2022].
disfluency is stuttering which is discussed in this context.
Stuttering can start between the ages of two and five and can [9] Leonard, J;, "How to stop or reduce a stutter," [Online]. Available:
https://www.medicalnewstoday.com/articles/321995.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 667


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[10] "Stamurai," 1 March 2021. [Online]. Available: [16] "Voice Amp," [Online]. Available: http://voiceamp.net/.
https://stamurai.com/blog/stuttering-fluency-shaping-techniques/. [17] "Amazing Apps for Speech therapy," [Online]. Available:
[11] J. Broomfield and B. Dodd, "Is speech and language therapy https://1specialplace.com/2018/10/01/amazing-apps-for-speech-
effective for children with primary speech and language therapy/ .
impairment? Report of a randomized control trial.," International [18] Jayawickrama, J.T; Thelijjagoda, Samantha;, "A solution to
Journal of Language & Communication Disorders, pp. 628-640, overcome speech disorder of patients using Brain Neuron EEG
2011. Signals," in International Research Conference on Smart
[12] "SpeechEasy," [Online]. Available: https://speecheasy.com/. Computing and Systems Engineering, 2020.
[13] Sidavi, A; Fabus, R;, "A Review of Stuttering Intervention [19] Bhatia, Gresha; Saha, Binoy; Khamkar, Mansi; Chandwani, Ashish;
Approaches for Preschool-Age and Elementary School-Age Khot, Reshma;, "Stutter diagnosis and therapy system based on deep
Children," 2010. [Online]. Available: learning," 2020.
https://pubs.asha.org/doi/pdf/10.1044/cicsd_37_S_14. [20] Adam, Edriss Eisa Babikir;, "Deep learning based NLP techniques
[14] Hardy, CJD; Bond, RL; Jaisin, K; Marshall, CR; Russell, LL; Dick, in text to speech synthesis for communication recognition," Journal
K; Crutch, SJ; Rohrer, JD; Warren, JD;, "Sensitivity of Speech of Soft Computing Paradigm, vol. 02, no. 04, pp. 209-215, 2020.
Output to Delayed Auditory Feedback in Primary Progressive
Aphasias," 2018.
[15] "Speak for Less," [Online]. Available:
https://www.speakforless.com/.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 668


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

An Extensive Review of Machine Learning


Techniques for EEG Signal Processing
Anita.M1, A.Meena Kowshalya2,
Department of Computer Science and Engineering, Department of Computer Science and Engineering,
S.A. Engineering College, Government College of Technology,
Chennai, India. Coimbatore, India.
anitam.engg@gmail.com meenakowsalya@gct.ac.in

B.Maheswari3, A.Muthuram4,
Department of Computer Science and Engineering, Department of Aeronautical Engineering,
Rajalakshmi Institute of Technology, Hindustan Institute of Technology and Science,
Chennai, India. Chennai, India.
maheswari.b@ritchennai.edu.in masrimuthu@gmail.com

Abstract - Electrical brain activity is detected by signals a tool can be used to detect epilepsy, seizure, and other
in an Electroencephalogram (EEG). Based on their neurological disorder. This facilitates diagnosis and lessens
frequencies, EEG signals are usually put into one of five time spent waiting for results. The signal-to-noise ratio is the
groups: delta, theta, alpha, beta, and gamma. These main obstacle when analysing EEG data (SNR). Section II
signals help find a pattern that can be used to predict examines preprocessing strategies that have been developed
when a person will have a seizure. Classifying a seizure is to address these difficulties. In Section III, discuss how to
a very important job for a doctor, as it helps them figure use algorithms and machine learning to extract features from
out what kind of seizure it is and if there will be any EEG signals for further analysis. Figure 1 provides a high-
other problems. The goal of seizure classification is to level overview of how EEG signals can be categorised.
learn as much as possible about the EEG signals.
Literature shows that there are a lot of EEG signal pre-
processing techniques, selection methods, feature
extraction from EEG signals, and classification
algorithms that can be used to find out if someone is
having a seizure. The most important thing about pre-
processing EEG signals is that it improves the quality of
raw experimental data, which leads to better datasets,
better classifications, and better accuracy. This study
gives an overview of recent EEG pre-processing
methods, datasets that can be used for experiments, and
EEG classification techniques that will help a beginner
researcher build on and use the right techniques.

Keywords - Electroencephalogram (EEG); Classification; Fig.1. A schematic outline of EEG Signal


Decomposition; Preprocessing; Seizure
Classification

II. LITERATURE SURVEY


I. INTRODUCTION
The Neuronal oscillations in the nervous system aid
The primary application of electroencephalogram
the brain in its communication with its vast network of
(EEG) analysis is in the evaluation and diagnosis of brain
neurons. Neurological disorders are caused by abnormal
and nervous system disorders. An EEG can detect any shifts
electrical discharge in the brain. Together, millions of
or irregularities in brain activity. It is more time-consuming
neurons produce signals and send them to the body's various
and challenging to make an EEG diagnosis visually.
systems. Non-linear data is abundant and adds complexity to
Furthermore, the number of neurologists is small. In order to
these signals. Emotions can be detected by monitoring the
automatically and rapidly diagnose the brain-neuro disease,
continuous brain waves that humans constantly emit.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 669


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Electrical potential fluctuations brought on by neural of time. STFT uses a 30 second window that doesn't overlap
networks in communication can be detected by means of to find small changes. By mapping the EEG signal's
EEG signals. amplitude and phase onto a two-dimensional matrix,
Mingyang Li et al. [5] made an image of the brain's
Electroencephalograms (EEGs) are often used to electrical activity using STFT. The most common brain state
find out what's going on with the brain's electrical activity. frequencies are Delta (0-4Hz), Theta (4-8Hz), Alpha (8-
Electrodes are put on the head of the patient to record the 15Hz), Beta (15-30Hz), and Gamma (30-60Hz).
electrical activity of the brain [15]. This is what scalp
signals from an electroencephalogram (EEG) look like. One STFT was used by S. Raghu et al. [6] to turn a
way to describe neurological disorders is to look at the EEG time series of EEG signals into an image. They did this by
signals that have been recorded [2]. Visually analysing the using a band pass filter with an intensity range of 0.1 to 44
EEG data takes a lot of time and can take a few hours. Hz. The final single image features of a spectrogram are the
spectra of all the individual channels stacked on top of each
The preprocessing technique [3] transforms the raw other.
signals into time frequency pictures. Smaller and medium-
sized hospitals often lack the trained and experienced B. DISCRETE WAVELET TRANSFORM:
neurologists necessary for EEG analysis [4]. Multiple
spectral thresholds are used to create permutations of Using the DWT method, Hafeez Ullah Amin et al.
frequency sub-bands. From the EEG signal's characteristics, [2] were able to separate the signal into its component
we can determine the synchronisation pattern that correlates wavelet coefficient rhythms. This paper approximates the
with seizure activity. The signals in the time domain are original signal using 4 level wavelet decomposition
used to create the 2-dimensional images. The techniques. The final result is a reorganised signal free of
electroencephalogram (EEG) is the best way to diagnose quality loss and with the insignificant coefficients removed.
epileptic syndromes and a cheap way to keep track of people
For their time-frequency series, Mahendra Yadava
over time.
et al. [7] employed discrete wavelet transform. In doing so,
Seizure classification is accomplished using the it separated the original signals into narrower bands whose
extracted ranges as inputs to various ML algorithms like coefficients varied. In this case, high & low filters were
SVM, CNN, and other data mining techniques. While each used. The signal was cleaned high and low frequency noise
technique has its place, hybrid methods have been shown to by two separate filters. By iteratively applying the process
improve accuracy . This proposed review and analysis lays across four distinct levels, the signal was decomposed into
the groundwork for furthering the study of EEG signal approximation and wavelet coefficients. Alpha (8–13 Hz),
classification. Theta (4–8 Hz), Delta (1–4 Hz),and Gamma (13–30 Hz)
represent the subsets of frequency spectrum at each of the
II. APPROACHES OF EEG SIGNAL PREPROCESSING four echelons (8-100 Hz).
METHODOLOGIES
C. EMPIRICAL MODE DECOMPOSITION (EMD):
This section goes into detail about the different
ways to analyse EEG data before they are processed. Wonsik The EMD procedure was used by Wonsik
Yang et al. [4] to generate the IMFs. Raw EEG signals are
A. SHORT TIME FOURIER TRANSFORM: dynamic and non-linear. For starters, we identified the
signal's local maximum and minimum at each time
To transform original signal into time-frequency segment. The second step was to find the midpoint. This
images, Gaowei Xu et al. [3] proposed an STFT method. model met the following two requirements for determining
Time-frequency signal analysis employing the Fourier
the IMF: I one maxima between two zero crossings; and
transform. Here, we figure out the amplitude of a signal that (ii) mean value become 0. Following this procedure, the
doesn't stay the same over time and frequency. By range of audible frequencies was narrowed down to the
processing the raw EEG data, we were able to get features in following five categories: Beta, alpha, delta, theta and
both the time domain and the frequency domain. The mu gamma.
band consists of frequencies from about 4 to 14 hertz, while
the beta band features those from about 16 to 32 hertz. An ensemble EMD decomposition strategy was
proposed by Ahnaf Rashik Hassan et al. [8]. It generated a
STFT gives better results because it can find signal in the form of time frequencies. To do this, it used a
transient changes in EEG signals, which have a short length technique called intrinsic mode functions (IMF) to split the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 670


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

input signal up into discrete frequency bands. As an from the TD, the FD, and the TFD. Overfitting is a problem
extension of Hilbert transform, Hesam Shokouh Alaei et al. with the highly unbalanced data, but this is mitigated by the
[9] proposed the Hilbert Huamg Transform (HHT), an removal of non-seizure data that was previously used.
approach that combines the two methods. Beta, alpha,
delta, theta and gamma were the designated frequency The CNN model was proposed by Hengjin Ke et al.
bands after EMD decomposition of the IMF [12] due to its ability to automatically extract features and
share their weights, allowing for the capture of correlated
III. APPROACHES OF MACHINE LEARNING EEG signals within an image. The feature patterns were
METHODOLOGIES USED IN EEG SIGNAL DATASET processed using this technique after each iteration. However,
a 10-fold CV approach was applied during training to
This section describes machine learning methods such eliminate the overfitting issue.
as CNN, SVM, and the K-NN Algorithms, as well as an in-
depth assessment of the EEG data. In classification of seizure analysis, Wonsik Yang et al.
[4] used an SVM model for the feature selection process.
Using an image-based classification, S. Raghu et al. [6] The pattern recognition problem was solved effectively by
proposed using CNN for seizure prediction. An initial step SVM, which located the boundary that correctly categorised
involved transforming the EEG signal over time into a the most closely related training samples. SVM's recursive
spectrogram image stack. The SVM classifier was feature elimination (RFE) process mitigated the overfitting
determined with the aid of an image feature extractor. issue.
However, the overlap method was able to solve the issue of
uneven datasets. To better predict seizures, Wenbin Hu et al. SVM and k-NN algorithms were used by
[10] implemented a CNN-based method. Downsampling MarziehSavadkoohi et al. [13] to categorise the
was used to eliminate extraneous data and background preprocessed signal. In this case, the SVM algorithms used
noise. The classifier for epilepsy is constructed by SVM the resulting features. The programme used the Euclidean
based on the extracted features of CNN. Dropout was used distance to determine how far apart each sample was. Using
to discard some of the randomly chosen feature to stop the a nearest-to-greatest distance measure between each data
overfitting issue. point, an SVM classifier determined the optimal hyper plane
line. Cross validation helped get rid of the issue of
Automatically identifying useful features of an EEG overfitting. For the purpose of seizure classification,
signal was achieved by Zuyi Yu et al., [11] using the CNN Mingyang Li et al. [5] proposed a SVM with a RBF
method. Extracted features provided crucial data for seizure algorithm. SVM classification was used to determine to
event prediction. However, (BLDA) Bayesian linear which state the EEG Signal belonged by incorporating the
discriminant analysis by regularisation fixed the overfitting features in a sequential order. When it comes to EEG
issue. Successful feature extraction from invariant video recognition, the SVM algorithm excels.
patterns in VGGNet was achieved by Hengjin Ke et al. [12]
using CNN (Visual Geometry Group). Images with IV. COMPARISON OF EEG SIGNAL
dissimilar features were chosen in an adaptive fashion. Early CLASSIIFICATION METHODOLOGIES
stopping, in which units are dropped from training at
random, however, eliminates the overfitting issue. In this section, the examined methods are
summarised, and their advantages and disadvantages are
The CNN algorithm with optimization technique was contrasted. Table 1 shows that various preprocessing
proposed by Mohammad-Parsa Hossein et al. [14] and used techniques for EEG signals, including the Fourier Transform
for the extraction of unsupervised feature patterns. (which is further subdivided into the FFT, STFT, DWT, and
Overfitting, which causes deep learning methods to stall out Empirical Mode Decomposition, etc., offer improved
at unhelpful "local maxima," was eliminated via accuracy, sensitivity, and specificity while requiring less
optimization using PCA, ICA, and a DSA to locate optimal computational effort. In Table 2 we see a comparison of
solutions. To extract and classify features from EEG signal EEG-based machine learning techniques. The reader can use
time series data and images. this table to better comprehend the various machine learning
methods and the purpose of the study.
A CNN model for seizure prediction was proposed by
Xiaobin Tian et al. [1], which leveraged multi-view TABLE 1
characteristics to extract deep view features. The COMPARISON OF PREPROCESSING METHOD AND
dimensionality of this feature is reduced, making it more THE FREQUENCY RANGES
discriminatory. The different perspectives combine elements

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 671


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Authors Preprocessing Dataset Frequenc gamma (8-


Methodology y bands University 100 Hz)
of Bonn alpha (8-
Mahendra
and 13 Hz)
Yadava et DWT
delta(0.5− University theta
al. 2018 (4-8 Hz)
3.5Hz) Hospital of
Severance Freiburg delta
theta (1-4 Hz)
Children’s (3.5−8 Hz)
Hospital alpha
Wonsik
(Yonsei
Yang et EMD (8−13 Hz)
University, Table 2
al. 2020 beta
Seoul,
(13−30 COMPARISON OF MACHINE LEARNING METHODS
South Hz) USING EEG
Korea) gamma
(>30 Hz) Authors Approach Dataset

Ahnaf -- S. Raghu et al. Publicly available


University CNN, SVM
Rashik EMD 2020 epilepsy data-set
of Bonn’s
Hassan et
Wenbin Hu et al. CHB-MIT
al. 2019 CNN , SVM
gamma(30 2019 database
-70Hz)
HHT Center for
beta (13–
combination of Center of Epilepsy -
Hesam Sh 30Hz)
Empirical Mode University Zuyi Yu et al. Freiburg
okouh Al alpha (8– CNN
Decomposition Hospital of 2018 University
aei et al. 13Hz)
(EMD) and Freiburg, Hospital,
2019 theta (4–
Hilbert Germany Germany
8 Hz)
transform delta (0.5–
Severance
4 Hz)
Children’s
Wonsik Yang et
SVM Hospital (Yonsei
University Mu (4- al. 2020
University, Seoul,
Gaowei of Bonn & 14Hz) South Korea,
Xu, et al. STFT University
2019 Hospital of beta (16-
Hengjin Ke et al. The CHB-MIT
Freiburg 32 Hz) CNN
2017 scalp EEG dataset

gamma(30 Marzieh
-60Hz) University of
Savadkoohi et al. SVM, k-NN
beta(15- Bonn,
2020
Departmen 30Hz)
Mingyang t of alpha(8- Department of
Li et al. STFT Epileptolog Mingyang Li et Epileptology,
15Hz)
2019 y, Bonn SVM
theta(4- al. 2019 Bonn University 5
University Dataset
8Hz)
delta(0-
4Hz) Mayo clinic,
University of
Mohammad-Parsa
Hafeez --- Pennsylvania and
Hossein et al. CNN
Ullah Bonn sponsored by the
DWT 2017
Amin et University American
al. 2020 Epilepsy Society

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 672


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The CHB_MITs BECTS and TLE patients using EEG brain signals,” IEEE Access,
Vol.8, pp. 218924218325,2020.DOI:10.1109/ACCESS.2020.3038948
Xiaobin Tian et dataset Boston [5] Mingyang Li, Xiaoying Sun, Wanzhong Chen, Yun Jiang and Tao
CNN
al. 2019 Children's Zhang, “Classification epileptic seizures in EEG using time-frequency
Hospital image and block texture features,” IEEE Access, Vol. 8, pp. 9770-
9781, 2019.DOI:10.1109/ACCESS.2019.2960848
[6] S. Raghu, Natarajan Sriraam, YasinTemel, ShyamVasudeva Rao and
Pieter L. Kubben, “EEG based multi-class seizure type classification
using convolutional neural network and transfer learning,” Neural
V. CONCLUSION Networks, Elsevier, Vol. 124, pp.202-
212,2020.https://doi.org/10.1016/j.neunet.2020.01.017
[7] Mahendra Yadava, Pradeep Kumar, Rajkumar Saini, Partha Pratim
The objective of this survey is to point out the Roy and Debi Prosad Dogra, “Analysis of EEG signals and its
difficulty of pre-processing EEG signals and the advantages application to neuromarketing,” Multimed Tools Applications,
Springer, Vol. 76, pp. 19087–19111, 2018. DOI 10.1007/s11042-017-
of extracting frequency bands for identifying and classifying 4580-6
neural abnormalities like epilepsy and seizures. The [8] Ahnaf Rashik Hassan and Abdulhamit Subasi, Yanchun Zhang,
information from the dataset was used to analyse and “Epilepsy seizure detection using complete ensemble empirical mode
decomposition with adaptive noise,” Knowledge-Based Systems,
summarise a number of the best existing approaches to Springer, Vol. 191, pp. 1-12, 2019.
classification. The analysis stands out from the literature in https://doi.org/10.1016/j.knosys.2019.105333
several key respects. First, we give special attention to the [9] Hesam Shokouh Alaei, Mohammad Ali Khalilzadeh and Ali Gorji,
“Optimal selection of SOP and SPH using fuzzy inference system
pre-processing techniques and the rationale behind the for on-line epileptic seizure prediction based on EEG phase
transformation of the frequency bands into ranges. Some of synchronization,” Australasian Physical & Engineering Sciences in
Medicine, Springer, Vol.42, no. 4, pp. 1049-1068, 2019.
these approaches directly apply the EEG signals to machine https://doi.org/10.1007/s13246-019-00806-w
learning algorithms, while others pre-process the EEG [10] Wenbin Hu,Jiuwen Cao, ·Xiaoping Lai and Junbiao Liu, “Mean
amplitude spectrum based epileptic state classification for seizure
signals before feeding them into the machine learning prediction using convolutional neural networks,” Journal of Ambient
algorithms for feature selection methods, all of which are Intelligence and Humanized Computing, Springer, 2019.
summarised here. From these results, the proposed study can https://doi.org/10.1007/s12652-019-01220-6
[11] Zuyi Yu, Weiwei Nie, · Weidong Zhou, Fangzhou Xu, Shasha
infer that the most precise prediction can be achieved by Yuan,Yan Leng and· Qi Yuan, “Epileptic seizure prediction based on
employing pre-processed methods rather than raw signals. local mean decomposition and deep convolutional neural network,”
The Journal of Supercomputing, Springer, Vol. 76, no. 5, pp. 3462-
Multiple pre-processing techniques for EEG signals (like 3476,2018.https://doi.org/10.1007/s11227-018-2600-6
STFT, FFT, and WT) can be used to create frequency bands. [12] Hengjin Ke, Dan Chen, Xiaoli Li, Yunbo Tang, Tejal Shah and Rajiv
From the granular bands, the bare minimum of features is Ranjan, “Towards brain big data classification: Epileptic EEG
identification with a lightweight VGGNet on global MIC,” IEEE
chosen to produce meaningful outcomes. The key is to avoid ACCESS, Special section on cyber-physical-social computing and
choosing superfluous details that will increase processing networking, Vol. 6, pp. 14723-
14733,2017.DOI:10.1109/ACCESS.2018.2810882
time and produce meaningless patterns. If fewer features are
[13] Marzieh Savadkoohi, Timothy Oladunni and LaraThompson, “A
used than necessary, a low-dimensional dataset is produced, machine learning approach to epileptic seizure prediction using
which hinders effective process discovery. The need to Electroencephalogram (EEG) signal,” Biocybernetics and Biomedical
Engineering, Elsevier, Vol. 40, no. 3, pp. 1328-1341, 2020.
develop one's own hybrid model of epilepsy prediction https://doi.org/10.1016/j.bbe.2020.07.004
grows as more is discovered about how to categorise and [14] Mohammad-Parsa Hosseini, Dario Pompili, Kost Elisevich, and
forecast seizures. Hamid Soltanian-Zadeh, “Optimized deep learning for EEG big data
and seizure prediction BCI via internet of things,” IEEE Transactions
on Big Data, Vol. 3, no. 4, pp. 392-404, 2017. DOI:
REFERENCES 10.1109/TBDATA.2017.2769670
[15] Simon, Judy, and A. Naveen Kumar. "A Novel Signal Processing
[1] XiaobinTian, Zhaohong Deng, Wenhao Ying, Kup-Sze Choi, Dongrui Based Driver Drowsiness Detection System." Journal of IoT in Social,
Wu, Bin Qin, Jun Wan, Hongbin Shen and Shitong Wang, “Deep Mobile, Analytics, and Cloud 3, no. 3 (2021): 176-190. DOI:
multi-view feature learning for EEG-based epileptic seizure 10.1109/TBDATA.2017.2769670
detection,” IEEE Transactions on Neural Systems and Rehabilitation
Engineering, pp. 1-11, 2019. DOI: 10.1109/TNSRE.2019.2940485
[2] Hafeez Ullah Amin, Mohd Zuki Yusoff and Rana Fayyaz Ahmad, “A
novel approach based on wavelet analysis and arithmetic coding for
automated detection and diagnosis of epileptic seizure in EEG signals
using machine learning techniques,” Biomedical signal processing
and control, Elsevier, Vol. 56, pp. 1-10, 2020.
https://doi.org/10.1016/j.bspc.2019.101707
[3] Gaowei Xu, Xiaoang Shen, Sirui Chen, Yongshuo Zong, Canyang
Zhang, Hongyang Yue, Min Liu, Fei Chen and Wenliang Che, “A
deep transfer convolutional neural network framework for EEG signal
classification,” Special Section on Data-Enabled Intelligence for
Digital Health, IEEE Access, Vol. 4, pp. 1-
10,2016.DOI:10.1109/ACCESS.2019.2930958
[4] Wonsik Yang, Minsoo Joo, Yujaung Kim, Se Hee Kim and Jong-
Moon Chung, “Hybrid machine learning scheme for classification of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 673


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Hybrid Machine Learning based False Data


Injection Attack Detection and Mitigation
Model for Waste Water Treatment Plant
A.Parvathy, G.Leela Kasyap, D.Venkata Abhinav, A.N.V. Surya Sai, R.Sriranjani and N.Hemavathi*
School of EEE, SASTRA Deemed to be University, Thanjavur, TamilNadu, India
nuhemasen@gmail.com

Abstract: The industries are deploying Internet of Things Things, many research works employed Intelligent
(IoT) for complex applications in their respective Control strategies through machine learning [5].
domains which employ different sensors to collect data Accurate water management in water pump and pump
from different plants and pass it over signal conditioning station is achieved with the help of more flexible and
units to obtain desired results. Now-a-days, these plants
are vulnerable to cyber-attacks and one of prominent
robust multi intelligent control system by the Internet
attacks is False Data Injection Attack (FDIA) which of Things technology [6], and it is widely employed in
means injecting false data into the sensor readings, which agricultural and industrial sectors such that it saves
has considerable losses that may include loss of human cost and water. Intelligent system such as multilayer
lives, equipment, etc. Hence, the proposal aims to develop perceptron (MLP) neural network is also used in the
a Machine Learning Algorithm which can protect the predictive analysis of chemical oxygen demand in
clean data from corrupted data and are useful for bioreactor for the optimal water treatment system [7-9].
Anomaly Detection and Data Cleaning. False data A detailed survey on the recent trends in security
injection is detected through three machine learning issues in the cyber physical systems are discussed [10]
algorithms namely, Linear Regression with Least
squares method (OLS) and Gradient descent and
for cyber threats such as Denial of service and
K-Means clustering and the suitable detection model is deception attack. The literature deals with false data
obtained through comparison of performance indices. injection attack for different industry applications are
Further, Auto Encoder neural network is applied to elaborated below:
reconstruct the true data from the false data. False data injection is an important type of
cyber-attacks growing on the industrial control system
Keywords - False Data Injection Attack, K-Means, (ICS) in recent years. A tool is developed for attack
Linear Regression, Auto Encoder, Cyber-attacks, injection for simulating the attacks on the industrial
Ordinary Least Square, Gradient Descent, Anomaly control system. A Networked control system with
Detection neural network technique is proposed to mitigate false
data injection attacks (FDIA), and to compensate for
INTRODUCTION measurement and process noise, the technique is
robust to unknown inputs also. In order to improve the
Water scarcity refers to the availability of quality FDI detection accuracy, extended Kalman filter is used
water and India ranked 13 among the world in water to update the weights of the neural network [11]. The
crisis. The solution to water management involves FDIA research is carried out in smart grids of power
optimal water usage, metering to monitor usage, water systems [10]. FDIA against the nonlinear state
conservation techniques etc. Of all these methods, one estimation analysis (uses AC), graph theory-based
of the promising techniques is waste water treatment outlier detection approach in smart grids is carried out
plant [1]. With the advent of sensors, [21]. Static security assessment of power system is an
communication and automated technologies, internet emerging area
of things based smart waste water treatment plants Many researches were carried out on the
evolved. Supervisory system is developed in Waste cyber-attacks which may hazard the power system
Water Treatment Plant (WWTP) by integrating [13]. Fake secure signal attack and fake insecure
classical automatic controller with the knowledge signal attack study were carried out for the same and
based systems especially, expert systems and case the analysis was tested with IEEE-39 benchmark
based systems for controlling dissolved oxygen in system [14]. FDIA analysis is also carried out in
aeration tank of WWTP [2-3]. Different methods such aviation CPS with the negative selection algorithm for
as centralized and decentralized for waste water detecting the malicious network packets and drop out
treatment plant is discussed with various automatic and NARX for predicting the dropout packets [15].
controllers like ON/OFF, Proportional Integral Margin Setting Algorithm (MSA), data analytical
Derivative (PID), feed forward, cascade and Model methods is proposed to mitigate false data injection
Predictive Control study were carried out in detail for cyber-physical threat in modern smart grids [16].
the same plant [4]. With the advent of Internet of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 674


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Two-stage FDIA model is to generate training instances that includes Q-E, ZN-E, PH-E , DBO-E ,
dataset and an extreme gradient boosting (XGBoost) DQO-E , SS-E t, SSV-E, SED-E, COND-E, PH-P,
classifier combined with active learning and Bayesian DBO-P,SS-P, SSV-P, SED-P, COND-P, PH-D,
optimization with improved training efficiency is DBO-D, DQO-D, SS-D, SSV-D, SED-D, COND-D,
proposed [17]. A neural network model to depict PH-S, DBO-S, DQO-S, SS-S, SSV-S, SED-S,
spatio-temporal relationship of bus measurements in COND-S, RD-DBO-P, RD-SS-P,
sub-grids is presented [18]. In addition, data-driven RD-SED-P ,RD-DBO-S, RD-DQO-S ,RD-DBO-G,
intrusion detection scheme based on both time and RD-DQO-G, RD-SS-G, RD-SED-G. After collection
frequency domain analysis is proposed [19]. A of data set, missing values or non numeric values are
robust statistical feature to detect the FDIs based cyber replaced during data pre- processing. Hence, the mean
threats at the distribution level is discussed. Artificial for every attribute is obtained and the missing value in
Neural Network (ANN) is also developed for the column is replaced with respective mean of the
analyzing the performance of the FDIA on ICS [20]. attribute. Correlation Matrix is used to compare the
Energy controller is designed that stabilizes the relation between various attributes in the dataset so as
attacked CPSs and ensures the dynamic performance to attain feature selection to reduce the computational
of the system by adjusting the amount of damping complexity. However, the data available is true data
injection. Vulnerability analysis for false data injection and hence, false data ought to be generated. To
(FDI) attacks is carried out to verify resiliency of accomplish this task, 0.25 quantile point and 0.75
proposed structure to these types of attacks. quantile point of each attribute is obtained and it is
Regression-based FDIA signal predictions, including declared that the data falls with this range is identified
sequence-to-point prediction and the long short-term as true data whereas the data out of this boundary are
memory (LSTM) network-based prediction is considered as false data. Thus, the false data which is
proposed [21-24]. False data injection (FDI) attacks not in the quintile ranges of every attribute is generated
against state estimation in power grids by proactively using random function. Thus, the new data set
perturbing branch susceptances are presented through comprise true data and false data are obtained and
Moving Target Defense (MTD) mechanism. Malicious labeled as class 1 and 2 respectively. Further, to
data injection in the state vectors can be detected implement intrusion detection, Linear regression using
through temporal and spatial data correlations and the least square, linear regression using gradient descent,
malicious data can be adjusted through singular value clustering with K-means algorithms are chosen. Using
matrices and wavelet transforms. these algorithms, binary classification is accomplished.
Though many research works deal with false data Further, the false data ought to be replaced with
injection attacks, the solutions may not be suitable as reconstructed true data to eradicate the impact of false
majority of works are simulation based. Further, many data in operation and performance of Waste Water
of the works dealt with smart grid i.e. operational Treatment Plant. Hence, Auto Encoder (AE) is used to
technology, the solution may not be suitable for Waste reconstruct the entire false data and bring the false data
Water Treatment Plant. Hence, the proposal addresses as close as possible to true data thereby making the
the detection of false data injection attack and data free from anomalies.
reconstruction of original data of the waste water
II. IMPLEMENTATION
treatment plant.

I. PROPOSED SYSTEM
The collected data is organized using pandas and
then it is cleaned or modified by replacing the missing
The following diagram Fig.1 shows us the process or non-numeric values by the mean of the respective
work flow of our system which takes the data as input attribute.
and passes through machine learning algorithms which At first, the distplot and boxplot are plotted as
detect whether the given data is True or False. shown in Fig. 2 and Fig. 3 respectively through which
The detected False data is passes through auto the quartile ranges and the mean values of a particular
encoder which reconstructs it and gives an output attributes are known.
which is the rectified True data. From these graphs, the mean value of a particular
attribute can be used to replace the non-numeric values
in the dataset and the dataset after preprocessing is
depicted in Figure 4 with 527 rows and 38 columns.
Ordinary least square approach is one among
various techniques used along with linear regression to
reduce the error or loss function.

The distplot is plotted which is a normal


distribution graph from which the mean and frequency
of certain values is known whereas boxplot is plotted
Fig.1. Flow Chart of the IDS to depict the 25th and 75th percentile of an attribute.
Similarly, graphs for all the attributes can be plotted
The dataset collected from UCI repository [21-22] is a and the mean and percentile values that act as margin
multivariate data set with 38 attributes and 527 for true and false data are obtained.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 675


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Algorithm are implemented with the above data set to


classify the normal and false data

Fig. 2 Disport of data Fig. 3. Box Plot of data Fig..7 Intermediate Data Set Fig. 8 .Final Data Set

Further, correlation matrix depicted in Figure 5 is . Linear regression, a prediction tool define a
obtained to reduce the features so as to reduce relationship between an independent and a dependent
computational complexity. This is achieved through variable and if it’s just one independent variable it’s
heat map which is presented in Figure 6. Based on the called simple linear regression and if there are more
correlation, 38 attributes are reduced to 7 which are than one independent variable then it’s called multiple
fed as input to the collection of machine learning linear regression. Ordinary least square approach is
algorithms to identify suitable model for intrusion one among various techniques used along with linear
detection. regression to reduce the error or loss function. It can
also be used to estimate coefficients of linear
regression which is used to understand relation
between one or more independent variables versus a
dependent variable. The main idea behind using
ordinary least square approach is to get a line which is
as close as possible to the data points. Hence, there
would be minimal error and predicted data can be as
close as possible to our actual data. The expression
correspond to OLS is shown using equations (1) , (2)
Fig.4. Initial Dataset Fig. 5. Correlation Matrix and (3) respectively.

𝑦 = 𝑚𝑥 + 𝑐 (1)
̅)
∑(x−x̅)(y−y
m = ∑(x−x)2 (2)
̅
𝑐 = (𝑦̅ − (𝑚 ∗ 𝑥̅ )) (3)

This fit line was calculated by using the formula


y = m*x + c and this fit line is also termed as Decision
threshold line and the values on that line are called
Decision threshold values. The boundary of +150 and
-150 of that threshold values are considered to classify
Fig. 6. Heat Map of Correlation Matrix whether the data point is True or False. This means if
the calculated y-value is in between the range given by:
Initial dataset consists of only True data and false [y_value-150, y_value+150], then it is true data, else it
data are created using the random function. The is classified as false data. From the model fit line, it
generated random values which do not fall in the is observed that slope of the model fit line (m) =
inter-quartile range of each attribute forms the false 0.015092 and Intercept of Model Fit line (c) =
data as shown in figure 7. 657.7486. The algorithm is evaluated with accuracy,
Finally, the data set consists of 1055 rows and 7 precision, recall, F1 -score and specificity and
columns as attributes which are ready to be used in presented in Figure 15 . Further, to compare the
machine learning model. Further, to label the classes, efficacy of the algorithm, it is compared with other
the threshold ought to be determined. To accomplish two algorithms namely linear regression using
this, the Y-values are calculated using the formula gradient descent and k-means clustering. Gradient
Y=mX+c. ‘X’ refers to the set of attributes with descent is an optimization algorithm used to train the
respective weights in such a way that sum of all model in such a way that the best hyper parameters are
weights is equal to ‘1’. Here, all the 7 attributes are obtained in order to reduce the cost function of the
assigned equal weights and hence w = 0.14285. model. The cost function is nothing but the measure of
Based on this relationship, ‘Y’ values correspond root of squared mean of error between the predicted
to true data as shown in Figure 8 are considered as values and real data. The primary aim of this model is
threshold and are labelled as ‘1’ or otherwise ‘2’. to reduce the cost function as much as possible.
Three machine learning algorithms with linear Gradient Descent Approach invokes the learning rate
regression using Ordinary Least Square (OLS) (which is helpful in updating the weights). This
Approach , Gradient Descent (GD) and k-Means

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 676


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

algorithm is fundamentally based on calculating ‘local


minima’ with the minimizing of Cost Function.

Fig.11. K-Means Clustering Fig.12. Elbow Graph

For k-means, number of clusters in order to


Fig. 9 Flow Chart for Gradient Descent Algorithm classify the data is to be identified. Hence, optimal
number of clusters ought to be identified and it is
From figure 9, the flow chart, represents the obtained using ‘Elbow Method’ as shown in Figure 12.
random weights i.e ‘theta’ and learning rate ‘alpha’ are It is used to find the number of centroids and is
set and pass these along with the dataset as input to the obtained by plotting the graph between the sum of
model. Then, the error between predicted and actual squared distance between each point and the centroid
Y-values is obtained. Further, the cost function is in a cluster and the number of clusters taken in that
ccomputed and theta (weights) is updated and the iteration. From Figure 12, ‘K’ value is chosen as 3 and
iteration continues until the lowest cost function is 4 and corresponding accuracies are obtained. For K=4
arrived and remains constant. Repeat the above steps clusters, a detailed study is made and is elucidated
until cost function remains constant. For the data set, below. At first, initialize the centroids (number equal
the cost function become constant at around 200 to the number of clusters).
iterations and achieved the minimum value as depicted Now, calculate the distance between each point
in Figure 10. The parameters obtained after gradient and all the four centroids and find the centroid whose
descent method is shown in Table 1. distance is the minimum from that particular data point
and assign that particular centroid’s label as either
0,1,2, or 3 to the data point and add that column to
out-data frame. So, this new column in the data frame
consists of either 0,1,2,3
based on the particular data point’s proximity to
that respective centroid. Now, keep on updating these
centroids until there is no more change in the distance
between the centroids and data points. Hence, these
would be our final centroids position as shown in
Table 2 and Table 3.. Now, the centroid closest to true
Fig. 10. Cost Function Vs Training Epoch data as the cluster or group containing the true data
and the remaining clusters as false data and then the
number of data points in those clusters are counted in
Table 1. Parameters obtained after Gradient Descent order to analyze the accuracy of the model. Similar
implementation
procedure is adopted for k=3 and the centroid update
Parameter Value is demonstrated in Figures 13 and 14 respectively.
Learning Rate (α) 0.01
value Table 2. Initialized Centroids Location (k=4)
-9.112984202-17, 4.24333640e-03,
Final weights(θ) values 3.65408748e-01, 4.92800303e-03, Centroid X Centroid Y
1.04070066e-01, 3.0182906e-01,
11.396264 1748.110701
4.93944229e-03, 2.97151677e-01
Final Cost(cost) 5.448252399630739e-05 14.593798 2278.485849
9.710591 1232.173021
With this optimized model, the performance 14.807943 790.125541
metrics are obtained and compared in Figure 15.
In k-Means (k-Means) clustering algorithm, initially Table 3. Final Centroids (k=4)
the number of centroids is found based on ‘k’ value.
Then the data around those centroids are grouped into Centroid X Centroid Y
a cluster. 8.00000 2050
Based on newly joined nodes, their centroids are 21.902682 2100
updated and the iteration continues until there is no 23.841805 2353
19.206837 2267
change in centroid. The algorithm terminates in such
a way that intra-cluster distance is minimum and
inter-cluster distance is more. Flow chart of k-means
algorithm is presented in Figure 11.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 677


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Figure 17 (a) and (b) respectively. And then, the


model has two decoder levels where each level has the
same layers as one encoder layer but here the input
size to the layers increases by layer. The batch
normalization layer is to normalize the input batch
data to that particular layer using the mean and
standard deviation in order to avoid complex
calculations and to train deep neural networks easily.
Fig. 13. Initial Centroids Fig. 14. Final Centroids Math behind LeakyReLU function is that it returns the
value (alpha * x) if x < 0 else return x if x >= 0, where
From the accuracies correspond to k=3 and k=4, alpha is defaulted to 0.3 if we don’t specify any value.
it is observed that 83% for k=4 whereas it is 90% for The purpose of LeakyReLU is one, to fasten the
k=3. Further the performance metrics namely training and two, it has small slope for negative output
precision, recall, F1 score and specificity of all the values instead of getting zero in case of normal Relu
algorithms are compared and portrayed in Figure 15. function, and the dying ReLU problem is avoided.
From the results, it is inferred that linear regression DyingReLU refers to the problem when ReLU
with gradient descent algorithm outperforms and neurons become inactive and only output 0 for any
hence, false data injection attack can be detected using input. So, once a neuron gets negative input, it will
this algorithm. always output zero and is unlikely for it to recover. It
will become inactive forever. Now, data is divided into
training and test data sets and we need certain
functions to build the AE model such as Dense,
LeakyReLU, Batch Normalization and after that we
build the model layers wise and train the model by
epochs. During compilation of the mode, Adam
optimizer is used which is the widely used
optimization algorithm. It is basically the combination
of gradient descent with momentum and RMS prop
(Root Mean Square Propagation) algorithm. By using
momentum, the gradient descent algorithm can be
accelerated by taking into consideration the
Fig. 15. Performance Metrics ‘exponentially weighted average’ of the gradients.
Using averages makes the algorithm converge towards
Thus, machine learning based false data injection the minima in a faster pace. It is observed that as it
attack detection algorithm is developed. Further, the passes down each layer the loss decreases thereby the
false data ought to be reconstructed using auto encoder test and train data sets can be predicted and the
algorithm to obtain equivalent true data. respective accuracy for the model is obtained and
shown in Figure 18.
Auto Encoder is an algorithm which can be used
to reconstruct the True data from False data. It
comprises of two parts, one Encoder and a Decoder as
shown in Figure 16. An Encoder is a module that
compresses the input data that is meant for training
into an encoded form so dimensionally or magnitude
wise it would be a lot smaller than the original input
data. Whereas the decoder tries to reproduce this input
data from its compressed form to its original size and (a) (b)
Fig. 17 (a) and (b) Auto Encoder Model
also as close as possible to the input data or data used
for training.
Code

Input Encoder Decoder Output

Fig. 16.General Auto Encoder Model Fig. 18 .Accuracy of Auto Encoder model

In this model, two encoder levels in which each From Figure 18, it is inferred that the auto
level contains a dense layer, a batch normalization encoder model has an accuracy of around 95% in
layer and a LeakyReLU layer having the input size to reconstruction the True data and it even reconstructs
each layer in decreasing order and is portrayed in the false data with an accuracy of around 77%.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 678


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. CONCLUSION predictive analysis of an industrial wastewater treatment process.


Sustainability, 12(16), 6348.
Industrial control systems are prone to cyber threats.
[11]. Zhang, D., Wang, Q. G., Feng, G., Shi, Y., &Vasilakos, A. V.
Waste water treatment plant, a promising alternate to (2021). A survey on attack detection, estimation and control of
meet water demand comprises integrated cyber industrial cyber–physical systems. ISA transactions, 116, 1-16.
physical systems which is prone to variety of cyber [12]. Sargolzaei, A., Yazdani, K., Abbaspour, A., Crane III, C. D.,
threats. False data injection, a prominent cyber threat & Dixon, W. E. (2019). Detection and mitigation of false data
results in data manipulation which has an adverse injection attacks in networked control systems. IEEE Transactions
on Industrial Informatics, 16(6), 4281-4292.
effect on control systems of these plants. Hence, the [13]. Qu, Z., Dong, Y., Qu, N., Li, H., Cui, M., Bo, X.,
proposal aims to detect such threat and reconstruction ...&Mugemanyi, S. (2021). False data injection attack detection in
of true data from false data. The proposal is power systems based on cyber-physicales. Frontiers in Energy
implemented with three machine learning models Research, 9, 644489.
namely Linear Regression with Ordinary Least Square [14]. 19. Reda, H. T., Anwar, A., &Mahmood, A. (2021).
Comprehensive Survey and Taxonomies of False Injection Attacks
Approach , Gradient Descent and k-Means Algorithm. in Smart Grid: Attack Models, Targets, and Impacts. arXivpreprint
Further, the optimal model for the attack detection is arXiv:2103.10594.
identified and auto encoder is used to reconstruct the [15]. Rahman, M. A., &Mohsenian-Rad, H. (2013, July). False
true data from false data. The results exhibit that data injection attacks against nonlinear state estimation in smart
linear regression with Gradient descent performs well power grids. In 2013 IEEE Power & Energy Society General
Meeting (pp. 1-5). IEEE.
for attack detection and auto encoder exhibits high [16]. Chen, J., Liang, G., Cai, Z., Hu, C., Xu, Y., Luo, F., & Zhao,
accuracy in predicting true values from false data. J. (2016). Impact analysis of false data injection attacks on power
system static security assessment. Journal of Modern Power
REFERENCES Systems and Clean Energy, 4(3), 496-505.
[1]. Jorjani, M., Seifi, H., &Varjani, A. Y. (2020). A graph [17]. Yin, X., Zhu, Y., & Hu, J. (2021). A Subgrid-Oriented
theory-based approach to detect false data injection attacks in power Privacy-Preserving Microservice Framework Based on Deep Neural
system AC state estimation. IEEE Transactions on Industrial Network for False Data Injection Attack Detection in Smart Grids.
Informatics, 17(4), 2465-2475. IEEE Transactions on Industrial Informatics, 18(3), 1957-1967.
[2]. Yang, J. (2021). A Controllable False Data Injection Attack for [18]. W. Xue and T. Wu, "Active Learning-Based XGBoost for
a Cyber Physical System. IEEE Access, 9, 6721-6728. Cyber Physical System Against Generic AC False Data Injection
[3]. Alsulami, A. A., &Zein-Sabatto, S. (2020, December). Attacks," in IEEE Access, vol. 8, pp. 144575-144584, 2020, doi:
Detection and Defense from False Data Injection Attacks In 10.1109/ACCESS.2020.3014644.
Aviation Cyber-Physical Systems Using Artificial Immune Systems. [19]. Potluri, S., Diedrich, C., &Sangala, G. K. R. (2017,
In 2020 International Conference on Computational Science and September). Identifying false data injection attacks in industrial
Computational Intelligence (CSCI) (pp. 69-75). IEEE. control systems using artificial neural networks. In 2017 22nd IEEE
[4]. R. K. Kodali, S. C. Rajanarayanan and S. Yadavilli, "IoT International Conference on Emerging Technologies and Factory
Monitoring Setup for Waste Water Treatment," 2019 IEEE R10 Automation (ETFA) (pp. 1-8). IEEE.
Humanitarian Technology Conference (R10-HTC)(47129), 2019, [20]. Wang, Y., Amin, M. M., Fu, J., &Moussa, H. B. (2017). A
pp. 169-174, doi: 10.1109/R10-HTC47129.2019.9042472. novel data analytical approach for false data injection cyber-physical
attack mitigation in smart grids. IEEE Access, 5, 26022-26033.
[5]. N. Hemavathi, M. Meenalochani and S. Sudha, "Influence of
Received Signal Strength on Prediction of Cluster Head and [21]. James, J. Q., Hou, Y., & Li, V. O. (2018). Online false data
Number of Rounds," in IEEE Transactions on Instrumentation and injection attack detection with wavelet transform and deep neural
Measurement, vol. 69, no. 6, pp. 3739-3749, June 2020 networks. IEEE Transactions on Industrial Informatics, 14(7),
3271-3280.
[6]. Zhao, Y., Chen, Z., Zhou, C., Tian, Y. C., & Qin, Y. (2021).
Passivity-based robust control against quantified false data injection [22]. Dehghani, M., Ghiasi, M., Niknam, T., Kavousi-Fard, A.,
attacks in cyber-physical systems. IEEE/CAA Journal of Tajik, E., Padmanaban, S., &Aliev, H. (2021). Cyber attack
AutomaticaSinica, 8(8), 1440-1450. detection based on wavelet singular entropy in AC smart islands:
False data injection attack. IEEE Access, 9, 16488-16507.
[7]. Hadipour, M., Derakhshandeh, J. F., &Shiran, M. A. (2020). An
experimental setup of multi-intelligent control system (MICS) of [23]. https://archive.ics.uci.edu/ml/datasets/water+treatment+plant
water management using the Internet of Things (IoT). ISA
transactions, 96, 309-326. [24]. Ll. Belanche, U. Cortes and M. S\`anchez. "A
knowledge-based system for the diagnosis of waste-water treatment
[8]. Vijayakumar, T., Mr R. Vinothkanna, and M. Duraipandian.
plant''. Proceedings of the 5th international conference of industrial
"Fuzzy Logic Based Aeration Control System for Contaminated
and engineering applications of AI and Expert Systems IEA/AIE-92.
Water." Journal of Electronics 2, no. 01 (2020): 10-17.
Ed Springer-Verlag. Paderborn, Germany, June 92.
[9]. Koresh, H. James Deva. "An Efficient Control Strategy for an
Optimal Operation on Clear Water Process Station." Journal of Soft
[10]. Arismendy, L., Cárdenas, C., Gómez, D., Maturana, A.,
Mejía, R., & Quintero M, C. G. (2020). Intelligent system for the
.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 679


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Appendix
Data Set Description
1. SSV-D Input volatile suspended solids to secondary settler Attribute Attribute Description
2. SED-D Input sediments to secondary settler No.
3. COND-D Input conductivity to secondary settler 18. Q-E Input flow to plant
4. PH-S Output pH 19. ZN-E Input Zinc to plant
20. PH-E Input pH to plant
5. DBO-S Output Biological demand of oxygen
21. DBO-E Input Biological demand of oxygen to plant
6. DQO-S Output chemical demand of oxygen
22. DQO-E Input chemical demand of oxygen to plant
7. SS-S Output suspended solids
23. SS-E t Input suspended solids to plan
8. SSV-S Output volatile suspended solids
24. SSV-E Input volatile suspended solids to plant
9. SED-S Output sediments
25. SED-E Input sediments to plant
10. COND-S Output conductivity
26. COND-E Input conductivity to plant
11. RD-DBO- Performance input Biological demand of oxygen in
27. PH-P Input pH to primary settler
P primary settler
28. DBO-P Input Biological demand of oxygen to primary settler
12. RD-SS-P Performance input suspended solids to primary settler
29. SS-P Input suspended solids to primary settler
13. RD-SED- Performance input sediments to primary settler
P 30. SSV-P Input volatile suspended solids to primary settler
14. RD-DBO- Performance input Biological demand of oxygen to 31. SED-P
S secondary settler Input sediments to primary settler
15. RD-DQO Performance input chemical demand of oxygen to 32. COND-P Input conductivity to primary settler
-S secondary settler
16. RD-SS-G Global performance input suspended solids 33. PH-D Input pH to secondary settler
34. DBO-D Input Biological demand of oxygen to secondary
17. RD-SED- Global performance input sediments settler
G 35. DQO-D Input chemical demand of oxygen to secondary
settler

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 680


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Twitter Sentiment Analysis with Machine


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Learning
Dr.M.Jagadeesan1 Dr.T.M.Saravanan2, Dr.P.A.Selvaraj3 U.Asif Ali4, J.Arunsivaraj5,
Associate Professor Associate Professor(s) S.Balasubramanian6
Department of Computer Applications Department of Computer Applications PG Scholar
Kongu Engineering College Kongu Engineering College Department of Computer Applications
Perundurai-638060, Erode, Tamil Perundurai-638060, Erode, Tamil Kongu Engineering
Nadu, India Nadu, India saravanan@kongu.ac.in, College,Perundurai-638060, Erode,
jagadeesan3176@gmail.com kps.raj2001@gmail.com Tamil Nadu, India

Abstract— Sentiment analysis plays an important role in interpreted in simple words, charts, tables, and so on. The
assessing the human emotions and feelings by using Natural next phase is data visualisation, which involves visualising
Language Processing (NLP) technique. Researchers have the results in the form of charts, graphs and other graphics.
recently developed different models to accurately detect and
analyze the human emotions. Sentiment analysis overcomes The two most common method used to perform Twitter
the Natural Language Processing (NLP) challenge by using sentiment analysis are machine learning and lexicon-based
Machine Learning (ML) models to perform classification, text approaches. The machine learning methods are applied here
mining, text analysis, data analysis, and data visualization to to perform Twitter sentiment analysis.
identify positive and negative tweets. Initially, the plain text
present in the tweets will be cleaned and pre-processed. The Machine learning has been used to categorize and
tweets are then analyzed from the pre-processed identify racial, sexist, misogynistic, religious, refugee, and
text. Followed by this, the proposed model extracts the immigrant objectionable and hate speech on Twitter.
numerical features from the data and combine them with tweet According to certain studies, machine learning
sentiments to train and detect different human sentiments. The approaches can be used to address regression challenges and
main purpose of the proposed model is to find the offensive
enhance the sentiment analysis performance by using Twitter
content in tweets. For the sake of simplicity, the proposed
data and anticipate new outcomes. As a result, the proposed
model considers a tweet to be vulgar content if it incorporates
offensive or hateful sentiments.
research work contributes to gaining a better understanding
on machine learning algorithms in order to perform well in
Keywords— Twitter data, Sentiment Analysis, Machine terms of tweet classification. However, previous research
Learning. works are only focused on the sentiment analysis.
Data requirements is data collecting, data collection, data
I. INTRODUCTION cleaning, data analysis, data manipulation, and data
visualization are all steps in the process. The requirement for
The method of determining the sentiment behind a tweet data analysis should be discovered first.
is known as sentiment analysis. A written piece of text
(tweet) can either be good, impartial or hateful. It is also This research study attempts to classify a tweet's polarity
considered as the task of determining user sentiment or and offer a novel framework by including preprocessing
thoughts about a particular entity. Twitter is a well-known tweets, feature extraction, and the establishment of a scored
popular and social media platform that creates a lot of and well-balanced system, followed by the use of several
information. machine learning algorithms to categorize tweets into distinct
categories.
Twitter sentiment analysis is a state-of-the-art research
domain in both academia and industries. This type of study is
highly beneficial as it gathers and categorizes the public
opinion by evaluating huge amounts of data. However, there II. RELATED WORK
are some aspects of Twitter data that make sentiment
analysis more challenging than it is with other types of data. A large number of efforts are taken in the past few
Tweets have a character restriction of 140 characters, which years to improve the opinion mining method, and a lot more
are written in colloquial English and contain a range of is being done currently. Deep Learning (DL) and Machine
acronyms, slang phrases, and irregular idioms. To overcome Learning (ML) algorithms are being increasingly used to
these challenges, researchers have investigated different perform prediction, modelling, training, and emulate
experiments concentrating on sentiment analysis of tweets. human-like behavior.
The internal information can be extracted from a text and it
can be categorized in terms of polarity, as useful, impartial, Various methodologies, such as Naive Bayes method,
or negative by using ML algorithms and NLP. It is a really linear regression, and other deep learning algorithms are
important analysis to figure out how people feel about a being used to study and analyze human sentiments.
product or predict stock market movements of a specific Moreover, the human reactions can be further classified to
firm. the particular incident by using the results of this analysis,
Data cleansing is considered as the next critical step. All which can be categorized as useful, impartial, offensive or
undesired elements such as replication records, unwanted bad.
spaces, and typos will be deleted based on the collected data
to ensure that it is error-free. The cleaned and processed data
will be subjected to critical analysis in the analysis step.
After the data or results have been analyzed, they will be

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 681


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A. Twitter
We use NLP in our daily lives in the following ways:
Twitter is a data center, where users contribute huge
amounts of information. Twitter users are said to create 12 • check your spelling
GB data per day. It is broadly used by the public, who use it • Autocomplete
to show their thoughts on a wide range of public issues as
• Spam filter
well as to lodge grievances with corporations and
government authorities. Twitter, as a social networking site, • Voice texting on the phone
creates data that can be used for a variety of purposes, • Siri
including subject and person analysis. Maintaining the
Integrity of the Specifications.
Twitter is a most popular and social media website that
was founded in 2006 that allows users to post and
communicate via tweets. With almost 500 million users and
millions of messages sent every day, Twitter has quickly
become a crucial resource for businesses to monitor their
reputation and brands by eliminating and analysing public
perception of their items, services, and even competitors.
B. Opinion Mining
Opinion mining is a vast topic of natural language
processing (NLP), content analysis, and computational
reasoning about emotions represented in text. It's used in
online debates and criticism to identify customer
perceptions of products, businesses, and services.

C. Sentiment Analysis
Sentiment analysis is a Natural Language Processing (NLP)
method that assists in determining a tweet's sentiment.
Sentiment analysis is a generic technique for determining
polarity and subjectivity from the influence of words and
phrases as well as the polarity of text. It is possible to
automatically extract sentiments using the following Figure 1: Steps involved in Sentiment Analysis Process
techniques.
• Lexicon based Approach
• Machine learning based Approach III. METHODOLOGY

We analyse distinct tweets and label them as good, negative, A. Data Collections
or impartial in sentiment analysis using Twitter. This research work uses a kaggle data collection, which
was crawled and categorized as good and bad. The data
includes emoticons, usernames, and hashtags, all of which
D. Natural Language Processing must be analysed and transformed into standard formats. We
NLP is a branch of software engineering that entails must also extract relevant properties from the text, such as
teaching computers to understand human speech and using it unigrams and bigrams, which are two types of tweet
as a means of interacting with the real world. Sentiment representation.
analysis, text categorization, machine translation, and
B. Data Pre-Processing
speech recognition are all examples of NLP.
Data pre-processing is the next step following data
These are the steps in Machine Learning that are used to collection. It's a significant step forward in machine
analyse sentiment. learning. It is the process through which data is transformed
or encoded into a machine-understandable state. In simple
• Stemming terms, the algorithms can easily interpret the dataset's
features.
• Tokenization
• Part of speech tagging A twitter stream extracts all linked tweets from Twitter
• Parsing in an unstructured format. Before applying any classifier to
these unstructured tweets, they must be pre-handled. The
tweets will be tokenized and cleaned ahead of time. Initially,
all HTML content in the tweets is removed by creating a
URL structure.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 682


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The following are the phases in our preprocessing method: 1.5 Emoticons

• All special characters have been Emoticons, often known as Emojis, were invented to
eliminated from the equation. depict emotions symbolically. Users utilise a variety of
• The URL links have been deleted. various emoticons in their tweets to show their feelings. All
• Stopping words, unnecessary punctuation emoticons are divided into three types: negative, useful, and
marks, and digits, among other things, are impartial. As a result, all emoticons are replaced with words
eliminated. that are related.
• All capital characters have been converted Example: used to express happy mood – replaced by
to lowercase letters. specific word.

1. Tokenization 2 Lemmatization

Tokenization is the procedure for dividing vast Lemmatization is a natural language processing
volumes of text into mini chunks tokens. approach that identifies the basic words from a vocabulary
Tokenization is a crucial step in text data in order to categorize all alternative forms of a term into a
modelling. By evaluating the word sequence, It assists in single category. The basic word "End," for example, has
deciphering the text's meaning. To lessen the inflection various forms, including "Ended," "Ending," and "Ends."
towards their root forms, we used the porter stemmer. The "End" base class is shared by all of these variants. We
This was accomplished by removing the suffixes create used lemmatization to improve the ML's efficiency.
stems. Finally, the final initialized tweets were put in a
new pandas file called "Cleaned Tweets" in our present 3 Stemming
data frame of tweets collections.
It is a technique for condensing a word to its word stem,
1.1 Uniform Resource Locator which joins with suffixes, affixes, or the lemma, the base of
all words. Natural Language Processing (NLP) and Natural
URLs and hyperlinks do not add to the analysis of the Language Understanding (NLU) both gain from it (NLP).
tweet, they are eliminated. All of the URLs mentioned in the More results are returned as more forms of words are
messages or tweets are blanked out. We utilise regular recognised, searched for, and retrieved. When a word's form
expressions to match the URLs. Because we wish to is identified, it may be it's possible to get search results that
compare the tweet to the English word list, we eliminated aren't would otherwise be missing. Stemming is essential to
the punctuation marks and numbers / numerals as well. identify queries and data retrieval because of the additional
information retrieved.
Example: ['https', ':', '/', 'dataset', 'sentiment’] - [' ', ' ', ' ',
'dataset', 'sentiment']. Figure : Data Pre-Processing Pipeline

1.2 User Mentions


Raw Tweet
A handle is issued to every Twitter user. The @handle
tag is used to refer to other individuals in tweets.
As a result, all mentions from users have been erased as
Noise Removal
well. When we talk about regular expressions (regex), we're (URLs, User
talking about how they're utilised to match a user's name. Mentions, Hashtags,
Example: '@name' - 'name' Lowercase)

1.3 Hashtags

On Twitter, hashtags, which are single-spaced phrases that Text Normalization


start with the hash sign (#), are frequently used to describe a (Tokenization,
trend. lemmatization,
All hash tags are changed to words that contain the hash Stemming)
sign, for instance, #correct becomes correct.
Example: '#TamilNadu' - 'TamilNadu'

1,4 Lowercase Word


Stantardization
All data are converted to lowercase in order to maintain
consistency and uniformity. As a result, comparing it to the
English dictionary is simpler.
Example: HBD is converted into hbd Cleaned Tweet

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 683


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

C. Feature Extraction
Feature extraction lowers raw data to processing groups. 4. Support Vector Machine
Feature extraction is a technique for choosing and
integrating data into features, as a result, the amount of data The Support Vector Machine (SVM) is a binary
that has to be processed accurately is reduced, and the real non-probabilistic classifier for classification, regression,
and other applications. It creates a hyperplane or
data set is properly represented.
collection of hyperplanes in a high or infinite dimensions
space. SVM for sentiment classify is based on the
The procedure of extracting features from the study's data is principle of generating a hyper plane that divides papers
crucial because features support the investigation, into groups with the least practical distance between
evaluation, and processing of people's attitudes from the them.
data. Sentiment analysis may be considered of as a pre-
programmed technique that uses Natural Language 5. XGB Classifier
Processing to extract assumptions, perspectives, mentalities, The eXtreme Gradient Boosting (XGBoost)
and sentiments from text, dialogue, and tweets (NLP) approach is a gradient-enhanced decision tree-based
D. Sentiment Classification boosting algorithm. One way that XGBoost differs from
gradient boosting is by using a more aggressive
The goal of this study was to explore if using sentiment regularization technique to reduce overfitting. Gradient
classification as a subset of topic-based categorization (with boosting-based machine learning methods are offered via
useful and negative sentiment as the two "themes") would the open-source package "xgboost." Scikit-learn API is
sufficient, or if more advanced sentiment-categorization compatible with XGBoost Classifier.
methods would be required.
We experimented with five standard algorithms: V. EXPERIMENTAL RESULTS
Random Forest Classifier, Logistic Regression, Decision
Tree Classifier, Support Vector Machine, XGBoost Confusion Matrix
Classifier. A table that displays how well a model performs on
a set of test data is called a confusion matrix. It is also known
as an error matrix. The examples in a predicted class were
IV. PROPOSED MODELS represented in the matrix's row, whereas the instances in an
We must compare the performance of above classifiers with actual class were represented in the matrix column.
Twitter data in this comparison study. The classifiers that • True Positive (TP): The model predicts that the value
have been selected are the most widely used machine will also be positive and the actual value is positive.
learning classifiers.
• False Negative (FN): The model predicts a negative
1. Random Forest Classifier result even if the actual value is positive.
Random Forest (RF) is a categorization and • True Negative (TN): The actual value and the
regression method that uses the ensemble technique with predicted result of the model are both negative.
bootstrap bagging. The Random Forest is a collection of
trees that are utilized forecast a data point's related to the False Positive (FP): The model predicts a positive result even
type dependent variable, assigns class label. A variety of when the actual value is negative.
voice and language processing programmers use this
approach.
TABLE 1: Confusion Matrix and Accuracy Results
2. Logistic Regression RF LR DT SVM XGB
The cost function should be restricted to a value
between 0 and 1 according to the logistic regression TP 7317 7185 7130 7419 7414
hypothesis. It also demonstrates the model's precision and FN 255 219 244 369 435
recall. Precision is the model's useful predictive value,
whereas recall is its sensitivity. TN 304 340 315 190 124
FP 115 247 302 13 18
3. Decision Tree Classifier Accuracy 95% 94% 93% 95% 94%
For task categorization and regression, decision
trees (DTs), a non-parametric supervised learning
technique, are often used. It supports the usage of typical
and continuous variables. The objective is to create a
model that uses decision orders from data to forecast the
outcome of a target variable. A hierarchically represented
attribute value condition in the training data space divides
the outcome into its component parts.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 684


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

REFERENCES

[1] Ismail, Heba, Saad Harous, and Boumediene Belkhouche. "A


Comparative Analysis of Machine Learning Classifiers for
Twitter Sentiment Analysis." Res. Comput. Sci. 110 (2016):
71-83.
[2] Ruz, Gonzalo A., Pablo A. Henríquez, and Aldo Mascareño.
"Sentiment analysis of Twitter data during critical events
through Bayesian networks classifiers." Future Generation
Computer Systems 106 (2020): 92-104.
[3] Yousefinaghani, Samira, et al. "An analysis of COVID-19
vaccine sentiments and opinions on Twitter." International
Journal of Infectious Diseases 108 (2021): 256-262.
[4] Vyas, Piyush, et al. "Automated Classification of Societal
Sentiments on Twitter with Machine Learning." IEEE
Transactions on Technology and Society (2021).
[5] Gupta, Itisha, and Nisheeth Joshi. "Feature-Based Twitter
Sentiment Analysis With Improved Negation
Handling." IEEE Transactions on Computational Social
Systems 8.4 (2021): 917-927.
[6] Kamal, Rashid, et al. "Emotion classification and crowd
source sensing; a lexicon based approach." IEEE Access 7
(2019): 27124-27134.
Figure 3: Word Cloud [7] Oriola, Oluwafemi, and Eduan Kotzé. "Evaluating machine
learning techniques for detecting offensive and hate speech in
South African tweets." IEEE Access 8 (2020): 21496-21509.
[8] Lee, Vivian Lay Shan, et al. "Semi-supervised learning for
sentiment classification using small number of labeled
data." Procedia Computer Science 161 (2019): 577-584.
[9] Ali, Research Assistant Raza, et al. "Hate Speech Detection
on Twitter using Transfer Learning." Computer Speech &
Language (2022): 101365.
[10] Neogi, Ashwin Sanjay, et al. "Sentiment analysis and
classification of Indian farmers’ protest using twitter
data." International Journal of Information Management Data
Insights 1.2 (2021): 100019.
[11] Aloufi, Samah, and Abdulmotaleb El Saddik. "Sentiment
identification in football-specific tweets." IEEE Access 6
(2018): 78609-78621.
[12] Babu, Nirmal Varghese, and E. Kanaga. "Sentiment Analysis
Figure 4 : Impartial words
in Social Media Data for Depression Detection Using
Artificial Intelligence: A Review." SN Computer Science 3.1
(2022): 1-20.
[13] Saad, Shihab Elbagir, and Jing Yang. "Twitter sentiment
analysis based on ordinal regression." IEEE Access 7 (2019):
163677-163685.
[14] Yadav, Nikhil, et al. "Twitter sentiment analysis using
supervised machine learning." Intelligent Data
Communication Technologies and Internet of Things.
Springer, Singapore, 2021. 631-642.
[15] Khurana, Medha, Anurag Gulati, and Saurabh Singh.
"Sentiment Analysis Framework of Twitter Data using
Classification." 2018 Fifth International Conference on
Parallel, Distributed and Grid Computing (PDGC). IEEE,
2018.
[16] Alhashmi, Saadat M., et al. "Using a Hybrid-Classification
Method to Analyze Twitter Data During Critical
Figure 5 : Negative Words Events." IEEE Access 9 (2021): 141023-141035.
[17] Gupta, Prasoon, et al. "Sentiment analysis of lockdown in
VI. CONCLUSION india during covid-19: A case study on twitter." IEEE
Transactions on Computational Social Systems 8.4 (2020):
992-1002.
This research study has obtained results from several [18] Jagadeesan, M., Chandrasekar, C., Jayasudha, K.” A new approach on
step clustering based greedy routing in vehicular ad hoc networks”,
techniques such as data pre-processing, tokenization, etc. Journal of Theoretical and Applied Information Technologythis link
The performance of various machine learning based is disabled, 2017, 95(2), pp. 310–318
classifiers are compared with Twitter data in this study. [19] Khan, Rijwan, et al. "Social media analysis with AI:
Additionally, various methods of machine learning sentiment analysis techniques for the analysis of twitter covid-
19 data." Critical Rev 7.9 (2020): 2761-2774.
algorithms are used to predict results with different levels of
[20] Machuca, Cristian R., Cristian Gallardo, and Renato M.
accuracy. Toasa. "Twitter sentiment analysis on coronavirus: Machine
learning approach." Journal of Physics: Conference Series.
Vol. 1828. No. 1. IOP Publishing, 2021.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 685


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[21] Haoxiang, Wang. "Emotional Analysis of Bogus Statistics in Proceedings, Volume 58, Part 1, 2022, Pages 150-156, ISSN 2214-
Social Media." Journal of Ubiquitous Computing and 7853, https://doi.org/10.1016/j.matpr.2022.01.165.
Communication Technologies (UCCT) 2, no. 03 (2020): 178- [25] P. A. Selvaraj, M. Jagadeesan, J. B, K. M and A. K, "Critical Factors
186. Influencing the Adoption of Cloud Computing in Indian Private
[22] Valanarasu, Mr R. "Comparative Analysis for Personality Sector Organizations," 2021 6th International Conference on
Prediction by Digital Footprints in Social Media." Journal of Inventive Computation Technologies (ICICT), 2021, pp. 884-891,
Information Technology 3, no. 02 (2021): 77-91. doi: 10.1109/ICICT50816.2021.9358558.
[23] T.M. Saravanan, M. Mohammed Ajmal, M. Manoranjith, B.G. [26] Selvaraj, P.A., Jagadeesan, M.” A survey paper on different software
Sanjaay, Jay Prakash Mishra,”Rumour influence minimization and testing automated methods with its techniques”, International Journal
topic modelling for twitter dataset using machine learning schemes”, of Scientific and Technology Research, 2019, 8(12), pp. 2159–2160
Materials Today: Proceedings, Volume 58, Part 1, 2022, Pages 535-
539, ISSN 2214-7853, https://doi.org/10.1016/j.matpr.2022.03.059.
[24] T.M. Saravanan, K. Karthiha, R. Kavinkumar, S. Gokul, Jay Prakash
Mishra, “A novel machine learning scheme for face mask detection
using pretrained convolutional neural network”, Materials Today:

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 686


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Hybrid Particle Swarm Optimization with Deep


Learning Driven Sarcasm Detection on Social Media
Dr.J.Anitha Josephine Santosh Kumar Maharana
Associate Professor, Department of CSE, Narasimha Assistant Professor, Department of CSE, OUTR,
Reddy Engineering College, Maisamaguda, Hyderabad, Bhubaneswar
Telangana skm.gec@gmail.com
anitha.josephine88@gmail.com Thulasimani T,
Md. Abul Ala Walid Assistant Professor, Department of Mathematics, Bannari
Lecturer, Department of Computer Science and Amman Institute of Technology, Sathyamangalam, Erode
Engineering, Northern University of Business and District, Tamil Nadu, India
Technology, Khulna thulasimanithangamani@gmail.com
abulalawalid@gmail.com Mohit Tiwari
Mohammad Shabbir Alam Assistant professor, Department of Computer Science
Lecturer, Department of Computer Science, College of and engineering, Bharati Vidyapeeth’s College of
Computer Science and Information Technology, Jazan Engineering, Delhi
University,Jizan, Kingdom of Saudi Arabia mohit.t.bvcoe@gmail.com
amushabbir@gmail.com

Abstract—Sarcasm is a language phrase that transports the castoff knowledge to routinely spot the valuable features.
polar opposite of what is being said, usually something extremely Sarcasm is labelled as a cutting, ironic remark envisioned to
disagreeable to mock or offend someone. Sarcasm was commonly take ridicule or disdain [3]. SA otherwise called opinion
employed on social networking sites daily. Since sarcasm might mining will be the main task in NLP where judgments or
alter the significance of statement, the opinion analysis process is opinions, feelings, perceptions, observations were extracted a
error-prone. Concerns regarding the integrity of analytics have definite topic [4]. For separate decision makers, governments,
developed as the utilization of automatic social media analytics and business organizations, sentiment appreciation was
apparatuses has extended. Based on the earlier study, sarcastic indispensable. It is very beneficial to management, decisive
statements alone have considerably decreased the performance of
support mechnaisms, and persons to identify public opinions
automated sentiment analysis. This article develops a Hybrid
Particle Swarm Optimization with Deep Learning Driven
on organizations, strategies, and products [5].
Sarcasm Detection (HPSO-DLSD) technique. The presented Sarcastic expressions may change the orientation of textual
HPSO-DLSD technique mainly concentrates on the recognition files [6]. For textual files with sarcasm, text words carried and
of sarcasm on social media. In the presented HPSO-DLSD the harshness of the discrete by means of sarcasm is undeniably
technique, the initial stage of data preprocessing is carried out. the opposite. Thus, the prognostic efficacy of sentiment
To detect and classify sarcasm, sparse stacked autoencoder classification structures is reduced if cynicism cannot be
(SAE) model is exploited and the detection performance can be appropriately managed [7]. Sarcasm detection on text files is a
boosted via the HPSO algorithm. The experimental result challenging task in NLP, is becoming a significant research
analysis of the HPSO-DLSD technique can be tested on direction because of its occurrence on social media and
benchmark dataset and the outcomes emphasized the microblogging sites. A huge capacity of data has substantial
enhancements of the HPSO-DLSD method over other current latent for corporations for study more around sentiments,
approaches. individual opinions, and other aspects. But there was a slew of
problems [8]. For sample, irony has optimistic words, however,
Keywords— Sarcasm detection; Natural language processing; the background is dissimilar, creating negative sentiments.
Social media; Deep learning; Metaheuristics Such subtle problems have resulted in wrong valuation of the
evaluations of products or services in the assessment study or
I. INTRODUCTION incorrect sorting in false news recognition [9]. These problems
The vast amount of data generated on social networking have irritated many governments and academics absorbed in
sites today was good for data analysis as they are very private. dragging precise data from the text with irony. Numerous
Administrations were utilizing such data to aid them methods in NLP were projected, as the background part while
comprehend their viewers better. This arena can be known as drilling the sarcasm detection [10].
sentiment analysis (SA). Instead, sarcasm was well-defined as This article develops a Hybrid Particle Swarm Optimization
a positive sentence with negative meaning [1]. It was with Deep Learning Driven Sarcasm Detection (HPSO-DLSD)
considered to be a challenging problem in the Natural technique. The presented HPSO-DLSD technique mainly
Language Processing (NLP) domain. Managing sarcasm concentrates on the recognition of sarcasm on social media. In
properly was decisive as it could alter the divergence of a the presented HPSO-DLSD technique, the initial stage of data
sentence and risk a SA [2]. Conventional lessons cast-off rule- preprocessing is carried out. To detect and classify sarcasm,
based methods for solving this and additional new education sparse stacked autoencoder (SSAE) model is exploited and the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 687


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

detection performance can be boosted via the HPSO algorithm.


The experimental result analysis of the HPSO-DLSD technique
can be tested on benchmark dataset and the results highlighted
the enhancements of the HPSO-DLSD performance over other
current approaches.
II. RELATED WORKS
The authors in [11] assessed several vectorization and ML
models to spot sarcastic captions. This tests display that pre-
trained transformer-related embeddings compiled with LSTM
networks offer improved recall. Goel et al. [12] purposes to
link the gap among machine and artificial intelligence to
understand and recognize sarcastic patterns and behavior. The
research depends on consuming numerous neuronal methods
like GRU, Baseline CNN, and LSTM in an ensemble method
for distinguishing sarcasm on the internet. To expand the
accuracy of the projected method, the essential data was also
organized on dissimilar formerly skilled word-embedding
methods namely GloVe, fastText, and Word2Vec, and their
precisions were associated. The purpose was to measure the
complete gush of the writer as negative or positive or non-
sarcastic or sarcastic to assure that the right communication
was gained to the envisioned viewers.
The authors in [13] offer an innovative Convolution and
Attention with Bi-directional GRU (CAT-BiGRU) technique,
which has a convolutional, input, embedding, BiGRU, and 2 Fig. 1. Overall process of HPSO-DLSD system
attention layers. The convolutional layer will extract SDS- B. Sarcasm Detection using SAE
enabled semantic and syntactical structures from entrenched
To detect and classify sarcasm, the SSAE method is
layer, BiGRU layer recovers related data after the mined
exploited. Autoencoder (AE) is an unsupervised NN
structures in subsequent and previous instructions, and
mechanism including input, hidden, and output (also called
consideration layers were employed to recover SDS-related
reconstruction layer) layers. Particularly, the encoder
comprehensive context picture after the input texts. Jain et al.
accomplishes the input and transforms to the abstraction that
[14] offer sarcasm detection by means of DL in code-switch
generally called code, the input is redeveloped from the code
tweets, explicitly mash-up of English language with Indian
layers via decoder. It employs nonlinear hidden layers for
language, Hindi. The projected technique was a fusion of
implementing reduction dimension. The processing model
bidirectional LSTM including a CNN and softmax attention
encompasses two fundamental segmentations placed
layer and for realtime sarcasm recognition. Kumar et al. [15]
successively which have the equivalent quantity of layers.
offer a DL technique termed sAtt-BLSTM convNet that
• The encoder considers data of the input and map
depends on the hybrid of soft attention-related bidirectional
towards the hidden description after the hidden unit has
LSTM (sAtt-BLSTM) and convNet smearing international
a lower dimension than that of input data, the encoder
courses for word depiction (GLoVe) to form semantic word
reduces or compressed the initial dataset.
embedding’s.
• The decoder makes use of the concealed description
III. THE PROPOSED MODEL (code) for recreating input.
These models are compared below which correspondingly
In this article, we have developed a new HPSO-DLSD
illustrate the encoder and decoder:
method for the detection of sarcasm in social media context.
𝑍 = 𝑓(𝑊1 𝑋 + 𝑏1 ) (1)
The presented HPSO-DLSD technique mainly concentrates on
𝑋 ′ = 𝑓(𝑊2 𝑍 + 𝑏2 ) (2)
the recognition of sarcasm on social media. Fig. 1 represents
Consider 𝑋 = (𝑥1 , 𝑥2 , … , 𝑥𝑛 ) as the input unit, and 𝑍 =
the overall process of HPSO-DLSD system.
(𝑧1 , 𝑧2 , … , 𝑧𝑚 ) signifies the vector extracted from the input 𝑋
A. Preprocessing Stage called as code, 𝑋 ′ = (𝑥1′ , 𝑥2′ , … , 𝑥𝑛′ ) shows the output
In the presented HPSO-DLSD technique, the initial stage of restoration of input 𝑋, wherein 𝑛 refers to the input data
data pre-processing is carried out. Firstly, each text in the data dimension and 𝑚 indicates the number of code units. 𝑊1 and
in transformed to lowercase. Next, each stopword was 𝑏1 characterize the weighted matrices and bias amongst the
detached. Later, existence of ‘‘#sarcasm’’ in the document is succeeding and the input layers. 𝑊2 and 𝑏2 represents the
eliminated. Then, the elimination of punctuation signs. Lastly, weighted matrices and bias amongst the succeeding and the
each word is transformed to the root form. The ‘lemma’ style output layers; 𝑓 refers to the activation function.
was selected for these works since it is very common in
contradiction of the ‘stem’ style.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 688


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

alteration was projected for monitoring the velocity of all the


particles with the integration of fractional order derivative
concept. The Grunwald-Letnikov description was exploited for
describing the fractional derivative as follows:
𝑟
𝛼 [𝑋(𝑡)]
1 (−1)𝑘 𝛤(𝛼 + 1)𝑥(𝑡 − 𝑘ℎ)
𝐷 = 𝛼∑ (8)
𝑇 𝛤(𝛼 + 1)𝛤(𝛼 − 𝑘 + 1)
𝑘=0
Whereas 𝛼 indicates the derivative order, 𝑇 denotes the
sampling period, and 𝑟 represents the truncation order. Another
component of Eq. (8) was described. The new velocity to
execute fractional‐order calculus on PSO:
𝑉𝑡+1 + 𝑉𝑡 = 𝐶1 × 𝑟𝑎𝑛𝑑(𝑃 − 𝑋𝑇 ) + 𝐶2 × 𝑟𝑎𝑛𝑑(𝐺 − 𝑋𝑇 ) (9)
The L.H.S of the abovementioned formula characterizes the
discrete formulation of the derivative of order number 𝛼 = 1 as
Fig. 2. Architecture of SSAE follows
𝐷𝛼 [𝑉𝑡+1 ] = 𝐶1 × 𝑟𝑎𝑛𝑑(𝑃 − 𝑋𝑇 ) + 𝐶2 × 𝑟𝑎𝑛𝑑(𝐺 − 𝑋𝑇 ) (10)
The dissimilarity amongst 𝑋 and 𝑋 ′ are widely called Eq. (11) signifies the claim of portion order number on the
reconstructed error (RE), viz., indicated by the cost function particle speed with the range from 𝛼 = 0 to 𝛼 = 1(𝛥𝛼 = 0.1)
that module attempt to minimize the training procedure. The and 𝑟 = 4:
cost function of AE is evaluated using, wherein the subset of 1 1
variables are characterized by 𝜃 = {𝑊1 , 𝑏1 , 𝑊2 , 𝑏2 }. 𝑉𝑖+1 = 𝛼𝑉𝑡 + 𝛼(1 − 𝛼)𝑉𝑡−1 + 𝛼(1 − 𝛼)(2 − 𝛼)𝑉𝑡−2 +
𝑛
2 6
1
𝐽(𝜃) = ∑ 𝑅𝐸(𝑥𝑖 , 𝑥𝑖′ ) (3) 𝛼(1 − 𝛼)(2 − 𝛼)(3 − 𝛼)𝑉𝑡−3 𝐶1 × 𝑟𝑎𝑛𝑑(𝑃 − 𝑋𝑇 )
24
𝑖=1 + 𝐶2 × 𝑟𝑎𝑛𝑑(𝐺
Then the AE concept has been used, unlike supervised − 𝑋𝑇 ) (11)
DNN mechanism, it can be unsupervised feature learning NN The major advantage of the slight calculus derivative is the
that might repeatedly abstract structures from unlabelled data. other levels of grade of freedom. Eq. (11) demonstrates the
Meanwhile, the quantity of units in hidden layer was probability governing the rapidity of elements regarding the
greater in the SAE, we forced sparse restraints on hidden layers copied order (𝛼). This was the major advantage of the
to capture highest level demonstration of the data. Then, add fundamental PSO method. Another levels of probability of
sparsity penalty term in the loss function to avert individuality fractional calculus derivative considered the precise description
charting by preserving a preferred set of layers ”active” at of the conduct of several cycles via the particular improvement
every instance. Especially, once the output layers are close to of architecture control, display, and planning.
one, the layers considered “active”, then it is “inactive”, and
consequently the SAE was rehabilitated into SSAE. Fig. 2 IV. RESULTS AND DISCUSSION
portrays the substructure of SSAE. For these purpose, add The proposed model is simulated using Python 3.6.5 tool
sparse term to the objective function which penalize 𝜌̂𝑗 on PC i5-8600k, GeForce 1050Ti 4GB, 16GB RAM, 250GB
(average activation of 𝑗 hidden states) once they significantly SSD, and 1TB HDD. The parameter settings are given as
vary from 𝜌 (the sparsity parameter) in the following: follows: learning rate: 0.01, dropout: 0.5, batch size: 5, epoch
𝑛
1 count: 50, and activation: ReLU.The sarcasm detection
𝜌̂𝑗 = ∑[ 𝑓𝑗 (𝑥(𝑖)] (4) performance of the HPSO-DLSD model is investigated on two
𝑛
𝑖=1 datasets namely Twitter and headline datasets as represented in
𝑆
Table 1.
𝜌𝑝𝑒𝑛𝑎𝑙𝑡𝑦 = ∑ 𝐾𝐿(𝜌||𝜌̂𝑗 ) (5)
𝑗=1 TABLE I
Consider 𝑆 as the neuron amount in the hidden layer. 𝐾𝐿 DATASET DETAILS
represents the KL divergence in the following:
𝜌 1−𝜌 Headline
𝐾𝐿(𝜌||𝜌̂𝑗 ) = 𝜌 log + (1 − 𝜌)log (6) Class Twitter Dataset
Dataset
𝜌̂𝑗 1 − 𝜌̂𝑗
Sarcastic 895 11725
Then, the objective is 𝜌̂𝑗 technique a continuous 𝜌 that was
nearer to zero. The sparsity penalty term is additional to the Non-Sarcastic 1061 14984
cost function in the following: Total No. of
1956 26709
𝐽𝑠𝑝𝑎𝑟𝑠𝑒 (𝜃) Tweets
𝑆

= 𝐽(𝜃) + 𝛽 ∑ 𝐾 𝐿(𝜌||𝜌̂𝑗 ) (7)


𝑗=1

C. Parameter Tuning using HPSO Algorithm


The detection performance can be boosted via the HPSO
algorithm for hyperparameter tuning. In HPSO approach, an

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 689


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Sarcastic
Average 98.10 98.06 98.12 98.09 96.19
Testing Phase (30%)
Sarcastic 98.98 98.48 99.23 98.85 97.93
Non-
98.98 99.38 98.77 99.08 97.93
Sarcastic
Average 98.98 98.93 99.00 98.97 97.93

Fig. 4. 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 analysis of HPSO-DLSD system


under Twitter database

The 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 obtained by the HPSO-DLSD


Fig. 3. Confusion matrices of HPSO-DLSD system under method under Twitter database is exemplified in Fig. 4. The
Twitter dataset (a) Entire database, (b) 70% of TR database, ssimulation result inferred that the HPSO-DLSD technique has
and (c) 30% of TS database achieved maximal values of 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 . Mostly the
𝑉𝐿𝑎𝑐𝑐 is greater than 𝑇𝑅𝑎𝑐𝑐 .
Fig. 3 represents the confusion matrices of the HPSO- The 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 attained by the HPSO-DLSD
DLSD model on Twitter dataset. The HPSO-DLSD model has approach under Twitter database were exhibited in Fig. 5. The
properly discriminating the sarcastic and non-sarcastic samples. experimental outcome implied that the HPSO-DLSD algorithm
Table 2 reports an overall sarcasm detection outcomes of has accomplished least values of 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 .
the HPSO-DLSD method on Twitter dataset. On entire dataset, Particularly, the 𝑉𝐿𝑙𝑜𝑠𝑠 is lesser than 𝑇𝑅𝑙𝑜𝑠𝑠 .
the HPSO-DLSD model has offered average 𝑎𝑐𝑐𝑢𝑦 of 98.36%,
𝑝𝑟𝑒𝑐𝑛 of 98.32%, 𝑟𝑒𝑐𝑎𝑙 of 98.39%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 98.35%, and
MCC of 96.71%. In line with, on 70% of TR databases, the
HPSO-DLSD technique has offered average 𝑎𝑐𝑐𝑢𝑦 of 98.10%,
𝑝𝑟𝑒𝑐𝑛 of 98.06%, 𝑟𝑒𝑐𝑎𝑙 of 98.12%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 98.09%, and
MCC of 96.19%. Along with that, on 30% of TS databases, the
HPSO-DLSD method has presented average 𝑎𝑐𝑐𝑢𝑦 of 98.98%,
𝑝𝑟𝑒𝑐𝑛 of 98.93%, 𝑟𝑒𝑐𝑎𝑙 of 99%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 98.97%, and MCC
of 97.93%.
TABLE II
RESULT ANALYSIS OF HPSO-DLSD SYSTEM WITH DIFFERENT
CLASSES UNDER TWITTER DATABASE

Twitter Dataset
Class F- Fig. 5. 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 analysis of HPSO-DLSD system
Accuracy Precision Recall MCC
Labels Score under Twitter database
Entire Dataset
Sarcastic 98.36 97.79 98.66 98.22 96.71
Non-
98.36 98.86 98.11 98.49 96.71
Sarcastic
Average 98.36 98.32 98.39 98.35 96.71
Training Phase (70%)
Sarcastic 98.10 97.50 98.42 97.96 96.19
Non- 98.10 98.63 97.82 98.22 96.19

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 690


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Sarcastic
Average 93.92 93.69 94.40 93.87 88.08

Fig. 7. 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 analysis of HPSO-DLSD system


under Headline database

Fig. 6. Confusion matrices of HPSO-DLSD system under


Headline dataset (a) Entire database, (b) 70% of TR database,
and (c) 30% of TS database

Fig. 6 signifies the confusion matrices of the HPSO-DLSD


model on Headline dataset. The HPSO-DLSD technique has
properly discriminating the sarcastic and non-sarcastic samples.
Table 3 reports the complete sarcasm detection results of
the HPSO-DLSD model on Headline dataset. On entire dataset,
the HPSO-DLSD model has offered average 𝑎𝑐𝑐𝑢𝑦 of 93.82%,
𝑝𝑟𝑒𝑐𝑛 of 93.65%, 𝑟𝑒𝑐𝑎𝑙 of 94.25%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 93.78%, and
MCC of 87.90%. In line with, 70% of TR database, the HPSO-
DLSD model has presented average 𝑎𝑐𝑐𝑢𝑦 of 93.78%, 𝑝𝑟𝑒𝑐𝑛
of 93.64%, 𝑟𝑒𝑐𝑎𝑙 of 94.18%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 93.74%, and MCC of Fig. 8. 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 analysis of HPSO-DLSD system
87.82%. Also, on 30% of TS databases, the HPSO-DLSD under Headline database
approach has offered average 𝑎𝑐𝑐𝑢𝑦 of 93.92%, 𝑝𝑟𝑒𝑐𝑛 of
93.69%, 𝑟𝑒𝑐𝑎𝑙 of 94.40%, 𝐹𝑠𝑐𝑜𝑟𝑒 of 93.87%, and MCC of
88.08%. The 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 obtained by the HPSO-DLSD
technique under Headline database is shown in Fig. 7. The
TABLE III silmualtion values inferred that the HPSO-DLSD method has
achieved higher values of 𝑇𝑅𝑎𝑐𝑐 and 𝑉𝐿𝑎𝑐𝑐 . Chiefly the 𝑉𝐿𝑎𝑐𝑐
RESULT ANALYSIS OF HPSO-DLSD SYSTEM WITH DISTINCT
CLASSES UNDER HEADLINE DATABASE is greater than 𝑇𝑅𝑎𝑐𝑐 .
The 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 achieved by the HPSO-DLSD
Headline Dataset approach under Headline database are established in Fig. 8.
Class F- The simulation values exhibited the HPSO-DLSD method has
Accuracy Precision Recall MCC
Labels Score exhibited least values of 𝑇𝑅𝑙𝑜𝑠𝑠 and 𝑉𝐿𝑙𝑜𝑠𝑠 . Particularly, the
Entire Dataset 𝑉𝐿𝑙𝑜𝑠𝑠 is lesser than 𝑇𝑅𝑙𝑜𝑠𝑠 .
Sarcastic 93.82 89.23 97.72 93.28 87.90 To exhibit the improvised performance of the HPSO-DLSD
Non- method, a comparison study is made in Table 4.
93.82 98.07 90.77 94.28 87.90
Sarcastic
Average 93.82 93.65 94.25 93.78 87.90 TABLE IV
Training Phase (70%) COMPARATIVE ANALYSIS HPSO-DLSD SYSTEM WITH OTHER
Sarcastic 93.78 89.28 97.65 93.28 87.82 APPROACHES UNDER TWO DATASETS
Non-
93.78 97.99 90.71 94.21 87.82 Accuracy (%)
Sarcastic
Average 93.78 93.64 94.18 93.74 87.82 Twitter Headline
Methods
Testing Phase (30%) Dataset Dataset
Sarcastic 93.92 89.11 97.89 93.29 88.08 HPSO-DLSD 98.98 93.92
Non- 93.92 98.27 90.91 94.44 88.08 Hybrid Auto- 93.66 89.38

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 691


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Encoder
AlexNet 91.43 90.04
KNN Algorithm 90.12 88.74
LOR Algorithm 90.60 89.15
SVC Algorithm 89.95 87.58

Fig. 9 presents a comparative 𝑎𝑐𝑐𝑢𝑦 assessment of the


HPSO-DLSD method on Twitter dataset. The outcomes
specified sthe SVC method has reached least 𝑎𝑐𝑐𝑢𝑦 of 89.95%.
On the contrary, the AlexNet, KNN, and LOR models have
represented slightly improved 𝑎𝑐𝑐𝑢𝑦 of 91.43%, 90.12%, and
90.60% respectively. Although the HAE model has obtained
reasonable 𝑎𝑐𝑐𝑦 of 93.66%, the HPSO-DLSD model has
shown superior 𝑎𝑐𝑐𝑢𝑦 of 98.98%.

Fig. 10. 𝐴𝑐𝑐𝑢𝑦 analysis HPSO-DLSD system with other


approaches under Headline database
V. CONCLUSION
In this article, we have developed a new HPSO-DLSD
technique for the detection of sarcasm in social media context.
The presented HPSO-DLSD technique mainly concentrates on
the recognition of sarcasm on mass media. In the presented
HPSO-DLSD technique, the initial stage of data pre-processing
is carried out. To spot and classify sarcasm, the SSAE method
was exploited and the detection performance can be boosted
via the HPSO algorithm. The experimental result analysis of
the HPSO-DLSD technique can be tested on benchmark
dataset and the outcomes exhibited the enhancements of the
HPSO-DLSD approach over other current approaches. In
future, the HPSO-DLSD technique can be extended to the
Fig. 9. 𝐴𝑐𝑐𝑢𝑦 analysis HPSO-DLSD system with other detection of emotions in tweets.
approaches under Twitter database
REFERENCES
Fig. 10 presents a comparative 𝑎𝑐𝑐𝑢𝑦 assessment of the [1] M. S. Razali, A. A. Halin, L. Ye, S. Doraisamy, and N. M. Norowi,
‘‘Sarcasm detection using deep learning with contextual features,’’ IEEE
HPSO-DLSD technique on headline dataset. The outcomes Access, vol. 9, pp. 68609–68618, 2021.
exhibited the SVC method has reached least 𝑎𝑐𝑐𝑢𝑦 of 87.58%. [2] M. Abulaish, A. Kamal, and M. J. Zaki, ‘‘A survey of figurative
On the contrary, the HAE, KNN, and LOR approaches have language and its computational detection in online social networks,’’
represented slightly improved 𝑎𝑐𝑐𝑢𝑦 of 89.38%, 88.74%, and ACM Trans. Web, vol. 14, no. 1, pp. 1–52, Feb. 2020.
89.15% correspondingly. Although the AlexNet technique has [3] F. Barbieri, H. Saggion, and F. Ronzano, ‘‘Modelling sarcasm in
Twitter, a novel approach,’’ in Proc. 5th Workshop Comput. Approaches
gained reasonable 𝑎𝑐𝑐𝑦 of 90.04%, the HPSO-DLSD method to Subjectivity, Sentiment Social Media Anal., 2014, pp. 50–58.
has exhibited superior 𝑎𝑐𝑐𝑢𝑦 of 93.92%. Thus, the presented [4] Rodriguez, Y.-L. Chen, and C. Argueta, ‘‘FADOHS: Framework for
HPSO-DLSD model has shown better results. detection and integration of unstructured data of hate speech on
Facebook using sentiment and emotion analysis,’’ IEEE Access, vol. 10,
pp. 22400–22419, 2022.
[5] Rodriguez, C. Argueta, and Y.-L. Chen, ‘‘Automatic detection of hate
speech on Facebook using sentiment and emotion analysis,’’ in Proc. Int.
Conf. Artif. Intell. Inf. Commun. (ICAIIC), Feb. 2019, pp. 169–174.
[6] P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, ‘‘Enriching word
vectors with subword information,’’ Trans. Assoc. Comput. Linguistics,
vol. 5, pp. 135–146, Dec. 2017.
[7] Jacob, I. Jeena. "Performance evaluation of caps-net based multitask
learning architecture for text classification." Journal of Artificial
Intelligence 2, no. 01 (2020): 1-10
[8] Abulaish, M., Kamal, A., Zaki, M.J.: A survey of figurative language
and its computational detection in online social networks. ACM
Transactions on the Web (TWEB) 14(1), 1–52 (2020)
[9] Peters, M.E., Neumann, M., Iyyer, M., Gardner, M., Clark, C., Lee, K.,
Zettlemoyer, L.: Deep contextualized word representations. arXiv
preprint arXiv:1802.05365 (2018)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 692


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[10] Joshi, A., Bhattacharyya, P., Carman, M.J.: Automatic sarcasm


detection: A survey. ACM Computing Surveys (CSUR) 50(5), 1–22
(2017)
[11] Nayak, D.K. and Bolla, B.K., 2022. Efficient Deep Learning Methods
for Sarcasm Detection of News Headlines. In Machine Learning and
Autonomous Systems (pp. 371-382). Springer, Singapore.
[12] Goel, P., Jain, R., Nayyar, A., Singhal, S. and Srivastava, M., 2022.
Sarcasm detection using deep learning and ensemble
learning. Multimedia Tools and Applications, pp.1-24.
[13] Kamal, A. and Abulaish, M., 2022. Cat-bigru: Convolution and attention
with bi-directional gated recurrent unit for self-deprecating sarcasm
detection. Cognitive Computation, 14(1), pp.91-109.
[14] Jain, D., Kumar, A. and Garg, G., 2020. Sarcasm detection in mash-up
language using soft-attention based bi-directional LSTM and feature-
rich CNN. Applied Soft Computing, 91, p.106198.
[15] Kumar, A., Sangwan, S.R., Arora, A., Nayyar, A. and Abdel-Basset, M.,
2019. Sarcasm detection using soft attention-based bidirectional long
short-term memory model with convolution network. IEEE access, 7,
pp.23319-23328.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 693


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Design of Kernel Extreme Learning Machine based


Intelligent Crop Yield Prediction Model
Srilatha Toomula Sudha Pelluri
Research Scholar Professor
Dept. of Computer Science & Engineering Dept. of Computer Science & Engineering
Osmania University Osmania University
Hyderbad, India Hyderabad, India
toomula.srilatha@gmail.com sudha.p@uceou.edu

Abstract— Agriculture is the major occupation in India and Because of the labor required to handle vast amounts of plots,
around half of the population depends on agriculture for their permanent and management environment impacts have
survival. Crop yield prediction (CYP) is a hot research topic primarily been explored at smaller scales [2]. Furthermore, for
since it depends upon several parameters such as environment, each new layer of environment characterization, less
rainfall, soil, water, seasonal crop, etc. Machine learning (ML) difference must be attributed to generic "environmental"
models are commonly employed for the extraction of important
crop features to predict yield. The ML models act as a decision
components and may be explored independently alongside
support tool for CYP, which enables to decide on what type of plant genetics. Regardless of crop type, the connection of non-
crops can grow and at what season. With this motivation, this genetic and genetic variables is the cornerstone of plant
paper focuses on the design of kernel extreme learning machine- breeding techniques to eventually address agricultural
based crop yield prediction (KELM-CYP) model. The goal of the production problems [3]. Climatic robustness in cultivars is a
KELM-CYP technique is to predict the crop yield based on significant challenge for farmers and plant breeders seeking to
different parameters such as state name, season crop, area, and increase seed production in a variety of conditions. Climate
rainfall. The proposed KELM-CYP model initially performs changeability may be linked to differences in rainfall events
data preprocessing in two levels namely data merging and data (both magnitude and pattern), temperature, and other climate
normalization. Besides, KELM is a kind of machine learning
(ML) based model commonly used for regression and
factors. Aside from temporal variability, geographical
classification processes. KELM is an extended version of extreme variability of climate factors is significant but often
learning machine (ELM) by the use of kernel transformation overlooked in crop forecast studies. It is vital to understand
process that allows having improved generalization performance how the changeability of weather parameters influences
owing to the kernel conversion from the input to kernel space. In agricultural productivity in the presence of global climate
order to showcase the enhanced predictive outcome of the change, particularly in the presence of extreme climatic
KELM-CYP model, a wide range of simulations takes place on conditions [4]. Forecasting the consequences of environmental
benchmark datasets from Kaggle repository. The experimental changes, for example, could help with marketing decisions,
results pointed out the better performance of the KELM-CYP optimising production informed plant breeding decisions, and
model in terms of different measures.
comparing results over time.
Keywords- Machine learning, Agriculture, Crop yield, Prediction
model, Regression process, Rainfall, Kernel extreme learning Crop growth methods have traditionally been developed to
machine estimate and simulate crop yields in a variety of conditions
involving genotype, environment, management factors, and
I. INTRODUCTION soil parameters [5]. This provides a clear description of
Crop yield prediction is crucial for global food production. To biophysical reactions and mechanisms, but it has limitations in
increase national food security, policymakers rely on precise terms of predicting and estimating input parameters in
forecasting to make appropriate import and export decisions. unexpected and complex circumstances [6]. Earlier crop
To produce higher crop yields, seed companies must measure prediction research across environments focused on crop
the effectiveness of original hybrids in varied conditions [1]. approaches created by quantifying responses in a small
Growers and farmers utilise yield prediction to make more number of lines while limiting the scope of inference by
informed financial decisions and operate their businesses more changing a single environmental variable. To address the
efficiently. Crop production forecasting, on the other hand, is limits of crop growth methodologies, a linear model has been
a tough task due to a number of complex components. Higher- employed to predict crops with a specific degree of progress
dimension marker data, for example, is widely used to [7]. Because it is focused on smaller groups of constituents,
describe genotype data, with hundreds to millions of this model fails to address the challenges of site-specific
producers for each individual plant. The impact of genetic climatic conditions and biological interaction. Crop yields are
markers, which may be affected by field management currently estimated using machine learning (ML) technologies
practices and a variety of environmental variables, must be such as multivariate artificial neural networks, association rule
assessed. mining, decision trees, and regression. The ML technique is
distinguished by the fact that it treats the outcome (crop yield)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 694


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

as an implicit function of the input variable (environment technique with high performance and accuracy, the supplied
components and genes), which can be a complicated and model focuses on selecting an optimal subcategory of features
highly nonlinear relationship. KELM often offers better from a soil features, groundwater, and set of climate. The
classification results with less optimization constraints. efficiency of the ANN imperialist competitive algorithm
Because of its faster training speed and excellent (ANN-ICA) and ANN-GWO methods for crop yield
generalisation capabilities, the suggested KELM-CYP model prediction is estimated by Nosratabadi et al. [13]. The given
initially performs data preparation in two steps, namely data strategy, according to Agarwal and Tarar [14], is enhanced by
merging and data normalisation. KELM has evolved as a utilizing DL techniques and crop forecasting to generate
result of the numerous modifications that have been unambiguous data based on the amount of soil components
implemented to improve its generalizability and stability for required by their expenditures. In terms of accuracy, it
specific applications. outperforms the current method. It analyses the data supplied
and assists producers in estimating yield and reaping benefits
The KELM model is an analytically derived single-layer feed- as a result. When predicting appropriate yields, the soil and
forward neural network (SLFN) with randomly assigned input climatic factors of the land are taken into account.
weights. The KELM is computationally more efficient than
traditional neural network models since it does not require The goal of this study is to construct a kernel extreme learning
tuning factors such as learning rates, learning epochs, halting machine-based crop yield prediction (KELM-CYP) model.
criteria, or local optima. Furthermore, because to its superior The KELM-CYP technique utilizes different input parameters
generalisation skills and fast processing of massive volumes of for prediction namely state name, season crop, area, and
data, KELM is better suited to crop output projections for a rainfall. The proposed KELM-CYP model involves two
diverse range of crops. The kernel transformation was used to major processes namely data preprocessing and KELM based
display ELM's KELM model. It achieves better generality prediction. Primarily, data preprocessing take place in two
than ELM due to input-to-kernel translation. ELM evolved levels namely data merging and data normalization. Besides,
into KELM. Minimizing output weights and errors at the same KELM is a kind of machine learning (ML) based model
time. commonly used for regression and classification processes.
For examining the supremacy of the KELM-CYP model, a
series of experiments are carried out on benchmark datasets
II. LITERATURE REVIEW from Kaggle repository.
Abbas et al. [8] use four ML algorithms to forecast potato
(Solanum tuberosum) tuber yields based on crop and soil H. James Deva Koresh [15] proposed an innovative approach
parameters acquired from proximate sensing. Suresh et al. [9] for increasing soil productivity while also recognising the
use data mining to assist farmers in determining soil quality by environmental influence on soil functionality, productivity
inspecting its unique boundaries and recommending crops function, and resource information. The Soil classification
depending on the results. To improve the efficiency of the refers to a multiplicity of internationally approved methods for
Harvest Suggestion Framework, the framework leverages the projected soil production. The major goal is to identify
Arrangement calculation of Help Vector Machine. The methods for evaluating the benefits of a balanced nutrition
architecture maps yield and dirt data to predict the rundown of system based on maize and chickpeas. The treatment and
moderate yield for the dirt and also provides information management can be established and evaluated annually for
about supplements that are lacking in soil for the specific crop yield.
yield. S. Sairamkumar [16] proposed that it is crucial for farmers to
predict crop output. Remote sensing is used in agricultural
Shetty et al. [10] train RF, MLP, and NN regression systems as a decision-support tool to increase crop efficiency
techniques on data from four major yields grown in and save operating costs. Machine learning techniques for
Karnataka. Previous harvest and meteorological conditions estimating agricultural production have become more popular
from thirty districts in Karnataka were collected. Weather data since remote sensing-based processes demand a lot of
includes humidity readings, minimum, average, and maximum processing. However, for agricultural planning, yield
pressure, and temperature. Both data sets are pre-processed estimation accuracy is essential. The use of machine learning
before being combined to train the models. Pant et al. [11] use is a tactic for identifying workable solutions to this problem.
the ML approach to predict four widely grown crops grown Various machine learning algorithms have been used recently
primarily in India. When crop yields are projected, inputs such to anticipate yields.
as fertilisers may be used differently depending on soil
III. THE PROPOSED MODEL
conditions and predicted crops. In this work, they use ML
approaches to construct training models to recognise patterns A novel KELM-CYP technique was developed in this work to
in data, and it is used to predict agricultural productivity. accurately estimate crop productivity. The suggested KELM-
CYP method is divided into two stages: preprocessing and
Elavarasan et al. [12] present a novel hybrid feature extraction prediction. Data preparation occurs at the beginning to turn the
method that incorporates the CFS and RFRFE wrapper data into a compatible format. Second, the suggested KELM
structures. In order to develop a crop-yields prediction ML model uses input such as state name, crop season, area, and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 695


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

rainfall to prct agricultural production. Figure 1 depicts the 𝑃𝑟𝑜𝑑𝑢𝑐𝑡𝑖𝑜𝑛


overall procedure of the KELM-CYP approach. The next 𝑌𝑖𝑒𝑙𝑑 = (1)
𝐴𝑟𝑒𝑎
sections explain how these two processes function in detail.
B. KELM based Prediction Process
After the input data has been preprocessed, the crop
production is predicted using the KELM model. In ELM for
increasing network training quickness, and then
comprehensive the ELM theory in neuron hidden layer to
another hidden layer. The trained instances are represented as
{𝑥𝑖 , 𝑡𝑗 }𝑛𝑖=1 , where n is the number of trained instances, 𝑥𝑗
denotes the input of 𝑖 𝑡ℎ instance with m dimensions, and 𝑡𝑗
denotes the output of 𝑖 𝑡ℎ instance. The consequence of SLFN
with 𝐿 hidden node is then expressed as follows to supply the
input vector x:
𝐿

𝑓(𝑥) = ∑ 𝛽𝑖 ℎ𝑖 (𝑥) = ℎ𝑇 (𝑥)𝛽 (2)


𝑖=1

where ℎ(𝑥) = [ℎ1 (𝑥) ⋯ ℎ𝐿 (𝑥)]𝑇 represents the hidden outputs


and 𝛽 = [𝛽1 ⋯ 𝛽𝐿 ]𝑇 the resultant weights The compact design
is as follows if the output of these n trained instances is
approximated with 0 error.

𝐻𝛽 = 𝑡 (3)
Fig. 1. The overall procedure of the KELM-CYP model
where 𝐻 = [ℎ(𝑥1 ) ⋯ ℎ(𝑥𝑛 )]𝑇 is referred to as the hidden
A. Data Preprocessing resultant matrix The effort of resultant weights 𝛽 is merely a
simple linear formula, and the effort is equal to, say,
In this study, the preprocessing of data is carried out in two
minimising trained error. min‖𝐻𝛽 − 𝑡‖ MoorePenrose
stages namely data merging and normalization. Initially, the
merging of data takes place between two datasets comprising generalised inverse 𝐻 † is used to demonstrate a superior
various attributes. The merged dataset includes 74975 evaluation of resultant weights.
instances under different attributes such as state, season crop,
area, rainfall, and production. Data normalization is performed 𝛽̂ = 𝐻 † 𝑡 (4)
for the provided crops district wise and the crop with
Usually, the orthogonal projection was utilized for resolving
maximum yield can be recommended to the farmers to get
the generalization inverse 𝐻 † . If 𝐻𝑇 𝐻 has non-singular, 𝐻 † =
more proficient in the future.
(𝐻𝑇 𝐻)−1 𝐻𝑇 , or if 𝐻𝐻𝑇 has non-singular, 𝐻 † = 𝐻𝑇 (𝐻𝐻𝑇 )−1 .
Data preparation cleans up raw data. Analyses are impossible
KELM model was proposed from ELM with the kernel
due to the large amount of raw data from many sources. We
transformation technique that allows it to possess good
can change the data by swapping missing and null values.
generalization performances when compared to ELM because
Finally, the testing and training data are separated. Because
of the kernel conversion under the input to kernel space.
model training requires as many data points as feasible, the
Minimalizing the output weights the training and errors
data is often distributed unevenly. 80% of the dataset is used
simultaneously, KELM could be derived as follows
as training data to train machine learning algorithms to make
credible predictions. to standardise the value of the crop 𝑛
production by making use of preprocessing. 1 𝐶
min ‖𝛽‖22 + ∑ 𝜀𝑖2 (5)
𝛽 2 2
𝑖=1
The normalising process eliminates discrepancies in the data
that result from the data's inherent characteristics. It can be 𝑠. 𝑡. 𝜑 𝑇 (𝑥𝑖 )𝛽 = 𝑡𝑖 − 𝜀𝑖′ 𝑖 = 1,2, ⋯ 𝑛
reversed without affecting the result in any way. The
submitted crop data is normalised by district, and the crop whereas 𝜑(∙) symbolises the training 𝑖𝑡ℎ error under the input
with the best yield may be recommended to farmers in the of 𝜀𝑖 kernel space [17], the indicated variable 𝐶 is used to
future as a strategy to boost productivity. The data reflect the trade-offs between 𝛽 & 𝜀.
normalization is done to normalize the crop yield values using
Eq. (1): As per the Karush‐Kuhn‐Tucker (KKT) concept and afterward
presenting the Lagrange multipliers 𝛼𝑖 , the succeeding two

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 696


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

optimization problems could be employed for solving the KELM employs a straightforward risk reduction strategy that
output weight 𝛽 enables it to ensure improved generalisation results. It does
this by utilising empirical risk and confidence intervals that
𝑛 𝑛
1 𝐶 are approved by the scientific community. The inversion of
min{𝐿 = ‖𝛽‖22 + ∑ 𝜀𝑖2 − ∑ 𝛼𝑖 (𝜑 𝑇 (𝑥𝑖 )𝛽 − 𝑡𝑖 the n-by-n matrix computation is crucial to the solution of the
𝛽,𝛼,𝜀 2 2
𝑖=1 𝑖=1 weight equation. When there are plenty of training examples
+ 𝜀𝑖 )} (6) in the dataset, the network framework redundancy may
jeopardise the generalisation performance and computing
The KKT condition is expressed by taking the partial efficiency, which finally results in the inverse process failing.
derivative and converting it to zero.

𝜕𝐿 𝜕𝐿 KELM, like SVM, should be able to recognise the kernel


= 0, 𝑗 = 1, ⋯ 𝐿′ → 𝛽 = 𝛷 𝑇 𝛼 = 0, 𝑖 = 1, ⋯ 𝑛 → 𝛼 matrix without knowing the kernel space dimension or the
𝜕𝛽𝑗 𝜕𝜀𝑖 exact kernel mapping. It is demonstrated that when the SVM
= 𝐶𝜀 (7) expression does not include a bias component, the results of
KELM are more reliable than the least square SVM. Solving
𝜕𝐿 the equation AX = 0 to find the kernel of a matrix A is
= 0, 𝑖 = 1, ⋯ , 𝑛 → 𝛷𝛽 − 𝑡 + 𝜀 = 0
𝜕𝛼𝑖 identical to putting A in rref. The kernel of matrix A and its
reference B are the same. In each case, the kernel is a
whereas 𝛷 = [𝜙(𝑥1 ) ⋯ 𝜙(𝑥𝑛 )]𝑇 signifies the kernel harvest collection of solutions to the associated homogeneous linear
function. The output function could be converted as follows equations with AX = 0 or BX = 0.
using some simple derivation and substitution. 𝑓(𝑥) =
𝐼
𝜙 𝑇 (𝑥)𝛷 𝑇 𝛼 = 𝜙 𝑇 (𝑥)𝛷 𝑇 ( 𝑛 + 𝛷𝛷 𝑇 )−1 𝑡 (8) KELM employs a simple risk reduction strategy to ensure
𝐶
superior generalisation performances through the use of
If 𝐼𝑛 is an identity matrix with n dimensions and is grounded widely considered confidence intervals and empirical risk. The
on the ridge regression concept, strengthening the regulatory inverse computation of the 𝑛 × 𝑛 matrix is largely involved in
item 𝐼𝑛 /𝐶 is capable of improving conversion performances. the weight 𝛼 solution. When there are several trained
instances in the dataset, network framework redundancy may
𝐾 = 𝛷𝛷 𝑇 : 𝐾𝑖,𝑗 = 𝜙(𝑥𝑖 ) ⋅ 𝜙(𝑥𝑗 ) = 𝑘(𝑥𝑖 , 𝑥𝑗 ) (9) jeopardise generalisation performance and computation
efficiency, resulting in inverse process failure. The suggested
The network framework of novel KELM method has been KELM-CYP model was trained and tested on both longer and
demonstrated in Fig. 2, together with the output, the input shorter time series to evaluate the model's accuracy as well as
feature, and the kernel planning layer. During kernel mapping its capacity to perform generically. This is done to ensure that
layer, each trained instance is utilized as hidden node. the model may be adapted to function in various Indian
Therefore, the resultant function is denoted by locations. In addition, for each testing station, a set number of
neighbouring predictor stations, also known as characteristics,
𝑓(𝑥) = [𝑘(𝑥, 𝑥1 ) ⋯ 𝑘(𝑥, 𝑥𝑛 )]𝛼 (10) were determined.

Let 𝛼 = (𝐼𝑛 /𝐶 + 𝐾)−1 𝑡 be the output weight based on kernel


mapping. IV. PERFORMANCE VALIDATION
The proposed KELM-CYP technique is simulated using
Python 3.6.5 tool with few packages such as pandas,
matplotlib, scikit-learn, pyqt5, and numpy. The results are
examined in terms of mean square error function (MSE), root
mean square error (RMSE), and mean absolute error (MAE).

RMSE: The RMSE is the square root of average squared


difference (𝐷𝑖𝑗2 ) and it has famous statistical measures to
efficiency of numerical process from atmospheric analysis.
The Root Mean Square Error (RMSE) is a commonly
employed statistic for evaluating a model's ability to
accurately predict quantitative data. The relative standard
error, or RMSE, should be considered ideal when classifying
the accuracy of a technique, and a smaller index indicates
greater precision. In order to this approach, 𝑗, the RMSE was
Fig. 2. KELM structure determined as:

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 697


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

1
𝑛 2
The proposed prediction models are suitable to the West
1 African region and accommodate large-scale datasets. In the
𝑅𝑀𝑆𝐸𝑗 = [ ∑ 𝐷𝑖𝑗2 ] (11)
𝑛 future, we hope to incorporate additional elements such as soil
𝑖=1
data, wind data, humidity, agricultural water data, wind data,
The RMSE is an optimum condition for classifying the pollution data, climatic fluctuations data, animal species data,
accuracy of method and minimal index refers to superior and agricultural economic data from those nations, which may
accuracy. improve the model's quality. To the best of our knowledge, we
are among the first to employ machine learning to address the
MAE: The MAE is the average of magnitudes of difference African agriculture problem. It will be fascinating to consider
(𝐷𝑖𝑗 occupied as positive) and is also famous index to evaluate Big Graphs techniques with data collected by smartphone
bias from atmospheric analysis. To this technique, 𝑗, the MAE sensors. Figure 3 depicts a few data samples.
was expressed as:
Table 1 gives a thorough prediction results analysis of the
𝑛 KELM-CYP model on the applied dataset in terms of MSE,
1
𝑀𝐴𝐸𝑗 = ∑ | 𝐷𝑖𝑗 | (12) RMSE, and MAE. According to the experimental results, the
𝑛 KELM-CYP model achieved minimal values of MSE, RMSE,
𝑖=1
and MAE under various situations. For example, on the
and, similar to RMSE, minimal index refers the superior Andaman and Nicobar Islands, the KELM-CYP model
accuracy. achieved an MSE of 0.9369, an RMSE of 0.9679, and an
MAE of 0.510. At the same time, the KELM-CYP approach
has achieved MSE of 9.8828, RMSE of 3.1437, and MAE of
1.6275 in Arunachal Pradesh. Finally, in Bihar, the KELM-
CYP strategy achieved an MSE of 42.5878, an RMSE of
6.5259, and an MAE of 2.8686. Meanwhile, in Chhattisgarh,
the MSE of the KELM-CYP system is 10.6343, the RMSE is
3.261, and the MAE is 1.4924. According to Kerala, the
KELM-CYP method has an MSE of 427693.6, an RMSE of
653.9829, and an MAE of 204.045. Finally, in Tamil Nadu,
the MSE of the KELM-CYP approach was 669947.1, the
RMSE was 818.5029, and the MAE was 199.8459.
TABLE I. RESULTS ANALYSIS OF PROPOSED KELM-CYP
MODEL

Number of States MSE RMSE MAE


Andaman and
0.9369 0.9679 0.5109
Nicobar Islands
Arunachal
9.8828 3.1437 1.6275
Pradesh
Bihar 42.5878 6.5259 2.8686
Chhattisgarh 10.6343 3.261 1.4924
Himachal Pradesh 2.5973 1.6116 0.8351
Jammu and
Fig. 3. Data Samples 4.1785 2.0441 0.8406
Kashmir
Jharkhand 1.116 1.0564 0.4619
The KELM-CYP model's performance is validated using crop
production and rainfall data from the Kaggle repository [18]. Kerala 427693.6 653.9829 204.045
The first crop production in India [19] collection contains a Odisha 72.2819 8.5019 4.5854
vast amount of information on crop production ranges
Punjab 365548 604.6056 37.4224
spanning many years. It contains information such as the state
name, district name, production, season crop, area, and year. Tamil Nadu 669947.1 818.5029 199.8459
The following rainfall in India dataset contains monthly Uttarakhand 17.3495 4.1653 2.0541
rainfall details for 115 years, from 1901 to 2015. Finally, the
merged dataset contains 74975 instances with various
parameters such as state, crop season, area, rainfall, and
productivity. Furthermore, the results are examined in terms of
MSE, RMSE, and MAE.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 698


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 6. Actual and Predicted Yield Outcome of KELM-CYP model on Jammu


Fig. 4. Actual and Predicted Yield Outcome of KELM-CYP model on and Kashmir
Andaman and Nicobar Islands
Fig. 6 showcases the predictive outcomes analysis of the
The prediction results analysis of the KELM-CYP model on
KELM-CYP model on Jammu and Kashmir. The figure
the Andaman and Nicobar Islands are depicted in Fig. 4. The
displayed the actual and predicted crop production values.
graph depicts actual and forecast crop production values.
It is obvious that the KELM-CYP system has boosted
On the Andaman and Nicobar Islands, the KELM-CYP model
production outcomes with the smallest disparity between
has achieved improved production outcomes with the smallest
actual and forecasted production values in Jammu and
discrepancy between actual and forecast production values.
Kashmir.

Fig. 5. Actual and Probable Yield Outcomes of the KELM-CYP Model in Fig. 7. Actual and Probable Yield Outcomes of the KELM-CYP Model in
Himachal Pradesh Jharkhand

Fig. 5 illustrates the predictive results analysis of the KELM- The prediction results analysis of the KELM-CYP method on
CYP method on Himachal Pradesh. The figure outperformed Jharkhand are depicted in Fig. 7. The figure outperformed
the actual and predicted crop production values. both the actual and forecasted crop yield numbers.

It is observed that the KELM-CYP manner has accomplished It may be stated that the KELM-CYP technique has achieved
higher production outcomes with a lower variance between the improved production outcomes with the least amount of
actual and predicted production values on Himachal Pradesh. disparity between actual and forecasted production values in
Jharkhand.
TABLE II.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 699


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IN TERMS OF RMSE, THE KELM-CYP STRATEGY WAS COMPARED benchmark datasets from the Kaggle library to test the
TO EXISTING APPROACHES
superiority of the KELM-CYP model. A detailed comparative
.
results analysis of the KELM-CYP with contemporary
Methods RMSE
techniques revealed that the KELM-CYP model performed
Proposed KELM-CYP Model 0.968 better in terms of MSE, RMSE, and MAE. As a result, the
suggested KELM-CYP model can be used to accurately
MLR Model 9.252
predict crop yield. In the future, the KELM model's
Fuzzy Logic Model 6.425 parameters can be tuned using metaheuristic algorithms to
improve the forecast outcome.
ANFIS Model 3.328

Simple RNN 4.567 REFERENCES


[1] Shook, J., Gangopadhyay, T., Wu, L., Ganapathysubramanian, B.,
LSTM 3.213 Sarkar, S. and Singh, A.K., 2021. Crop yield prediction integrating
genotype and weather variables using deep learning. Plos one, 16(6),
Deep NN 10.55 p.e0252402.
[2] Heslot, N., Akdemir, D., Sorrells, M. E., and Jannink, J.-L. (2014).
Integrating environmental covariates and crop modeling into the
genomic selection framework to predict genotype by environment
interactions. Theor. Appl. Genet. 127, 463–480. doi:
10.1007/s00122-013-2 231-5
[3] Khaki, S. and Wang, L., 2019. Crop yield prediction using deep
neural networks. Frontiers in plant science, 10, p.621.
[4] Lenaerts B, Collard BC, Demont M. Improving global food security
through accelerated plant breeding. Plant Science. 2019; 287:110207.
[5] Jagtap SS, Jones JW. Adaptation and evaluation of the CROPGRO-
soybean model to predict regional yield and production. Agriculture,
ecosystems & environment. 2002; 93(1-3):73–85.
[6] Roberts MJ, Braun NO, Sinclair TR, Lobell DB, Schlenker W.
Comparing and combining process-based crop models and statistical
models with some implications for climate change. Environmental
Research Letters. 2017; 12(9):095010.
[7] Durrell J. Pathways to impact for building thriving and resilient
communities in dry areas. International Center for Agricultural
Research in the Dry Areas, Beirut, Lebanon; 2017.
Fig. 8. RMSE analysis of KELM-CYP technique with existing [8] Berlin, M.A., Tripathi, S. et al. IoT-based traffic prediction and
traffic signal control system for smart city. Soft Computing (2021).
approaches https://doi.org/10.1007/s00500-021-05896-x
[9] Abbas, F., Afzaal, H., Farooque, A.A. and Tang, S., 2020. Crop yield
prediction through proximal sensing and machine learning
algorithms. Agronomy, 10(7), p.1046.
Finally, Table 2 and Fig. 8 [20-22] provide a brief comparison [10] Suresh, G., Kumar, A.S., Lekashri, S. and Manikandan, R., 2021.
results analysis of the proposed KELM-CYP model with Efficient crop yield recommendation system using machine learning
for digital farming. International Journal of Modern
recent techniques in terms of RMSE [23-25]. According to the Agriculture, 10(1), pp.906-914.
graph, the Deep NN and MLR models produced the best [11] Shetty, S.A., Padmashree, T., Sagar, B.M. and Cauvery, N.K., 2021.
results, with maximum RMSEs of 10.55 and 9.25, Performance analysis on machine learning algorithms with deep
respectively. In addition, the Fuzzy logic model produced learning model for crop yield prediction. In Data Intelligence and
Cognitive Informatics (pp. 739-750). Springer, Singapore.
somewhat better results, with an RMSE of 6.42. Following [12] Pant, J., Pant, R.P., Singh, M.K., Singh, D.P. and Pant, H., 2021.
that, the ANFIS, Simple RNN, and LSTM models achieved Analysis of agricultural crop yield prediction using statistical
slightly lower RMSEs of 3.33, 4.57, and 3.21, respectively. techniques of machine learning. Materials Today: Proceedings.
The proposed KELM-CYP model, on the other hand, [13] Neelakandan, S & Paulraj, D 2020, ‘An Automated Exploring And
Learning Model For Data Prediction Using Balanced CA-SVM’,
produced the best predictive results with an RMSE of 0.968. Journal of Ambient Intelligence and Humanized Computing, Vol.12
In terms of crop production prediction, the tables and figures ,no.5, April 2020 , DOI: https://doi. org/10.1007/ s12652-020-01937-
above show that the KELM-CYP model outperforms the other 9
options. [14] Elavarasan, D., Vincent PM, D.R., Srinivasan, K. and Chang, C.Y.,
2020. A hybrid CFS filter and RF-RFE wrapper-based feature
extraction for enhanced agricultural crop yield prediction
V. CONCLUSION modeling. Agriculture, 10(9), p.400.
In this study, a unique KELM-CYP technique was created to [15] Koresh, Mr H. James Deva. "Analysis of Soil Nutrients based on
Potential Productivity Tests with Balanced Minerals for Maize-
accurately estimate crop yield. The suggested KELM-CYP Chickpea Crop." Journal of Electronics 3, no. 01 (2021): 23-35.
approach consists of two stages: preprocessing and prediction. [16] Sairamkumar, S. "Design of ANN Based Machine Learning Method
Data preparation occurs at the beginning to turn the data into a for Crop Prediction." Journal of Innovative Image Processing 3, no. 3
compatible format. Then, the proposed KELM model receives (2021): 223-239.
[17] Nosratabadi, S., Imre, F., Szell, K., Ardabili, S., Beszedes, B. and
the input as state name, season crop, area, and rainfall to Mosavi, A., 2020. Hybrid machine learning models for crop yield
predict the crop yield. A number of experiments are run on prediction. arXiv preprint arXiv:2005.04155.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 700


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[18] C Pretty Diana Cyril, J Rene Beulah, Neelakandan Subramani,


Prakash Mohan, A Harshavardhan, D Sivabalaselvamani, An
automated learning model for sentiment analysis and data
classification of Twitter data using balanced CA-SVM,
https://doi.org/10.1177/1063293X211031485
[19] Agarwal, S. and Tarar, S., 2021. A Hybrid Approach for Crop Yield
Prediction Using Machine Learning and Deep Learning Algorithms.
In Journal of Physics: Conference Series (Vol. 1714, No. 1, p.
012012). IOP Publishing.
[20] Lu, J., Huang, J. and Lu, F., 2019. Distributed kernel extreme
learning machines for aircraft engine failure diagnostics. Applied
Sciences, 9(8), p.1707.
[21] https://www.kaggle.com/rajanand/rainfall-in-india
[22] https://www.kaggle.com/abhinand05/crop-production-in-india
[23] Shastry, A., Sanjay, H.A. and Hegde, M., 2015, June. A parameter
based ANFIS model for crop yield prediction. In 2015 IEEE
International Advance Computing Conference (IACC) (pp. 253-257).
IEEE.
[24] Nigam, A., Garg, S., Agrawal, A. and Agrawal, P., 2019, November.
Crop yield prediction using machine learning algorithms. In 2019
Fifth International Conference on Image Information Processing
(ICIIP) (pp. 125-130). IEEE.
[25] Reddy, D.J. and Kumar, M.R., 2021, May. Crop Yield Prediction
using Machine Learning Algorithm. In 2021 5th International
Conference on Intelligent Computing and Control Systems
(ICICCS) (pp. 1466-1470). IEEE.

SRILATHA TOOMULA received bachelor’s degree in


Computer Applications from Osmania University, India
master’s degree in Information Systems from Osmania
University, India, master’s degree in Computer Science and
Engineering from Jawaharlal Nehru Technological
University, India. She has 2 years of industry experience and
12 years of academic experience in RBVRR Women’s
College. Currently pursuing Ph.D degree in Computer
Science and Engineering in Osmania University, India.

SUDHA PELLURI (Member, IEEE) received BTech degree


in Computer Science and Engineering from Sri
Venkateshwara University, Tirupati, India, MTech degree
from Jawaharlal Nehru Technological University, Hyderabad,
India and Ph.D. degree from Jawaharlal Nehru Technological
University, Hyderabad, India. She is currently working as a
Professor in the department of Computer Science and
Engineering. She is a good researcher with a couple of
publications, and two sponsored projects to her credit. She
has organized a few workshops, faculty development
programmes and training programmes. Her current research
interests include Cloud Computing, Artificial Intelligence,
machine learning and analytics. She has delivered a keynote
in a few conferences and delivered expert talks in various
institutes. She is a reviewer for s few reputed journals
including IEEE Access.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 701


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Reliable Densely Connected Network with Machine


Learning based Diabetic Retinopathy Grading
Approach
Srinivasulu Sirisala,1 4Associate Professor, Department of Electronics & Computer
1Associate Professor, Department of Computer Science and Engineering, Sanjivani College of Engineering, Kopargaon-423601,
Engineering, CVR College of Engineering, Hyderabad, Telangana, chaudharisachinetc@sanjivani.org.in
India-501510, vasusirisala@cvr.ac.in
Jhakeshwar Prasad,5
Nihar Ranjan Behera,2 5Assistant Professor, Department of Pharmacology, Shri
2DBA Researcher, Swiss School of Business and Management Shankaracharya College of Pharmaceutical Sciences, Junwani,
Geneva, Av. des Morgines 12, 1213 Petit-Lancy, Switzerland, Bhilai-490020, Chhattisgarh, India,
nihar1773@gmail.com jhakeshwarprasad03@gmail.com

Dr. D. Amuthaguka,3 Swetha Reddy A.6


3Associate Professor, Department of Computer Applications, 6Assistant Professor, Department of Electronics and Communication

Kalasalingam Academy of Research and Education, Krishnankoil, Engineering, R.M.K. College of Engineering and Technology,
Tamilnadu, India-626126, d.amuthaguka@klu.ac.in Puduvoyal, Thiruvallur District, Tamilnadu, India – 601206,
anthayswethareddy2398@gmail.com
Dr. Sachin Vasant Chaudhari,4

Abstract—Lately, diabetic retinopathy (DR) is deliberated to be indications of blindness, which results in the disease
the major cause of blindness in today’s world. There are various development without medication [2]. Subsequently, consistent
reasons for loss of eyesight but DR has greatly contributed to check-ups through screening programs were necessary for
blindness. The main challenge of DR is that it is incurable at an early achieving initial diagnosis of DR. Several DR patients are found
stage, therefore basic analysis is of great significance. Consequently, to be in a late-stage and will be suffering serious visual
it is mentioned as a classic difficulty in medical schemes due to impairment [3]. Therefore, initial recognition and prompt
minimum number of medicinal experts and facilities and massive medication were very significant thereby preventing vision
patients. Accordingly, it resulted in deploying automated diagnosing
impairment. Though advanced telehealth services and fundus
methodology that is very beneficial for the analysis of DR. With this
cameras are prevalent in China, the work pressure of DR
aspect, this article develops a reliable Densely Connected Network
with Machine Learning based Diabetic Retinopathy Grading
screening was very devastating, as the lacks of skilled eye
Approach, called RDCN-MLDR. The presented RDCN-MLDR specialist. In the meantime, numerous works revealed that
model follows two major stages namely feature extraction and DR certified eye specialists screening DR by indirect
classification. Initially, the DenseNet model processes the input ophthalmoscopy can just reach sensitivity of 33, 34, or 73%
fundus images. In addition, squirrel search algorithm (SSA) is approximately [4]. The main impediments to prior identification
applied for the hyperparameter tuning of the DenseNet model. As and timely interference for DR are the greater number of people
soon as the features are created, they are fed to the LR module for affected by diabetes, the imbalance of medical resources, and
proper identification of DR. The performance assessment of the lack of ophthalmologists. Thus, there comes a crucial want to
RDCN-MLDR model is tested using open access dataset from Kaggle accomplish sound monitoring and method for patients suffering
dataset and it produces the 97.8% accuracy. The attained outcomes from diabetes [5].
highlighted that the RDCN-MLDR model can accomplish enhanced
DR classification performance. II. LITERATURE SURVEY
Deep learning (DL) is a subdivision of artificial intelligence
Keywords— Deep learning; Medical images; Diabetic (AI) and has revealed a promising outcome in the DR
Retinopathy; Convolutional Neural Network (CNN); Machine
identification by peripheral neuropathy and fundus images in
learning
diabetes mellitus using corneal confocal microscopy (CCM) [6].
DL-related technologies were implemented for DR and diabetic
I. INTRODUCTION neuropathy recognition, retinal vascular segmentation,
Diabetic retinopathy (DR) is a diabetic complication and one classification, and recognition of DR lesions [7]. In recent times,
such leading factor of blindness across the globe and the count Preston et al. advanced an AI-related method for classifying
of diabetic patients is expected to grow from 346-552 million peripheral neuropathy using CCM with no image segmentation,
persons by 2030 [1]. The blindness is prevented by detecting which did not need automated or manual explanation and
them at the initial stage and by rendering accurate medication. permitted the use of big datasets [8]. Many methods employ the
But there are even patients that suffered from DR by not having convolutional neural network (CNN) structure, which has

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 702


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

superior efficacy compared to other network structures [9]. in fundus imageries. Two channels of fundus imageries are
Simultaneously, DL involves the benefits of incessant work, contrast-enhanced canny edge detection (CECED) fundus
reproducibility, and no need to rest, thus it does not devote more images and the CLAHE fundus imageries were processed by
work force for training physicians [10]. Additionally, the WFDLN. Bhardwaj et al. [16] emphases on automated DR
application of DL in DR referral has the potential to minimize disease detection and its grading with the help of TL method
workload of ophthalmologists and scale up the efficacy of DR utilizing dynamic investigation. This presented technique
screening programs. leverages DNN for feature extraction from fundus imageries and
Gayathri et al. [11] modelled an automated DR grading such features were further ensembled with supervised ML
technique where features will be derived from fundus images approach for DR grading.
and classified on the basis of severity utilizing ML and DL This article develops a reliable Densely Connected Network
techniques. A Multipath CNN (M-CNN) was employed for local with Machine Learning based Diabetic Retinopathy Grading
and global feature extraction from images. Afterward, an ML Approach, called RDCN-MLDR. The presented RDCN-MLDR
technique was employed for classifying the input as per the model follows two major stages namely DR classification and
severity. Nancy and Celine Kavida [12] modelled an AdaBoost feature extraction. At the initial stage, the DenseNet model
method-related ensemble classifier method for classifying DR processes the input fundus images. In addition, squirrel search
grades. The main goal of the modelled approach was an algorithm (SSA) is applied for the hyperparameter tuning of the
enhancement of DR classification performance by utilizing DenseNet model. As soon as the features are created, they are
ensemble ML techniques and optimized features. By utilizing fed to the LR module for proper identification of DR. The
the Meyer wavelet and retinal vessel-related features derived performance assessment of the RDCN-MLDR model is tested
from multiple RoI of the retina, the devised technique using open access dataset from Kaggle dataset. The attained
categorizes various grades of DR. The author employed a outcomes highlighted that the RDCN-MLDR model can
Bayesian technique for optimizing the hyper-parameters of the accomplish enhanced DR classification performance.
presented ensemble technique to scale up the prediction
accuracy. III. THE PROPOSED MODEL
In [13], a solution to this issue was tried for classification In this study, a new RDCN-MLDR method has been
utilizing CNN by making classification tasks and feature formulated for effectual recognition in categorization of DR on
learning separated. Feature learning was a significant part of any fundus images. The presented RDCN-MLDR model follows
classifier method. Classifier techniques rely on error gradients two major stages namely DR classification and feature
that have limits such as vanishing gradient issues. In this regard, extraction. Initially, the SSA with the DenseNet model processes
an autonomous non-hand-crafted unsupervised feature learning the input fundus images. As soon as the features are created, they
technique was selected depending on unsupervised clustering. are fed to the LR module for proper identification of DR.
Depending on this idea this study devises feature extraction
approach that upgrades its variables related to Normalized A. Feature Extraction
Mutual Information performance of k-means clustering. The CNN is the more commonly known DL architecture used
variables of feature extractors were upgraded by nature-inspired mainly for classification tasks. The mathematical operations of
GWO method. In [14], an optimized DL structure can be convolution have been employed on input dataset. The multi-
modelled in this article for grading and extracting DR severities. dimensional discrete convolution is a linear function that can be
This includes several steps such as CNN severity grade represented as follows [17]:
classification, background segmentation, feature optimization 𝑦(𝑛1 , 𝑛2 ) = (𝑛1 , 𝑛2 ) ∗ 𝑤(𝑛1 , 𝑛2 )
∞ ∞
using Cuckoo search, and feature extraction set.
Nneji et al. [15] presented a weighted fusion DL network = ∑ ∑ 𝑥 (𝑛1 , 𝑛2 )𝑤(𝑛1 − 𝑘1 , 𝑛2
(WFDLN) for automatic extraction of features and classification 𝑘1 =−∞ 𝑘2 =−∞
of DR phases from fundus scans. The devised structure intends − 𝑘2 ) (1)
to treat problems of low quality and find retinopathy indications

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 703


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 1. Layered in DenseNet

In Eq. (2), 𝑥(𝑛1 , 𝑛2 ) signifies the input image, 𝑤(𝑛1 , 𝑛2 ) the others beforehand and fed into the layer. Consequently, the 𝑙-th
impulse response of filter and 𝑦(𝑛1 , 𝑛2 ) the output image. A layer has 𝑙 input, which comprises the feature mapping of earlier
standard CNN architecture can be made of several hidden layers convolutional blocks. Next, the feature map is fed to all the 𝐿 −
that can able adaptively learn the spatial sequence of data by 𝐿(𝐿+1)
𝑙 following layers. It creates relations in an 𝐿-layer, an
deriving higher and lower level patterns. The most widely used 2
hidden layers were pooling, convolutional, dropout, and FC (or alternate of L, as in traditional structural model. Because of the
dense) BN layers. The convolution layer constitutes the building dense connection patterns, it is mentioned as DenseNet. Fig. 1
components of CNN and extracts features from input dataset. depicts the layered in DenseNet.
Also, they apply set of filters, termed kernels (impulse response It encompasses a dense block, convolution layer, classifier,
of filter), whose value was learned during training. This filter is and transition layer afterward the global average pooling.
2𝐷, meanwhile, 1𝐷 lung sound time waveform has been B. Hyperparameter Tuning
converted into 2𝐷 images with the application of STFT. The SSA is applied as a hyperparameter optimizer of the
outcome of this convolution of the input layer with the kernel DenseNet model. It was simulated in the performance of
generates activation (or feature) map of high abstraction as we southern flying squirrels if it can be observed for food, the effort
move towards deeper layers, which identify most discriminatory of such squirrels is named as gliding, this process is also
feature for the task at hand (regression or classification). recognized for small mammals particularly if the distances can
At the same time, the pooling layer is additional part of CNN be long [19]. The SSA mathematically methods this
and is commonly positioned after every convolution layer. They performance for realizing the procedure of optimization. SSA
decrease the computation difficulty of the network by begins with arbitrary primary place of 𝑁 flying squirrels. The
accompanying nonlinear downsampling on the extracted feature place of 𝑖 𝑡ℎ flying squirrel 𝐹𝑆 is stated by a vector in 𝑑
map. Furthermore, the BN layer uses batches to rescale and dimension searching space:
recenter the input dataset such that training model can be 𝐹𝑆𝑖 = [𝐹𝑆𝑖,1 𝐹𝑆𝑖,2 … 𝐹𝑆𝑖,𝑑 ]. The 𝐹𝑆 vectors can be
speeded up, whereas the dropout layer is accountable to prevent
established utilizing Eq. (2).
overfitting by disabling few neurons. Lastly, FC layer is simple
F𝑆𝑖 = F𝑆𝐿 + 𝑈(0,1) × (𝐹𝑆𝑈 − F𝑆𝐿 ) (2)
FFNN that is usually placed at the network end for mapping the
whereas 𝐹𝑆𝐿 and 𝐹𝑆𝑈 signifies the lower as well as upper
aggregated activation of each prior layer into class probability
distribution by generating weight connections amongst them. bounds correspondingly and 𝑈(0,1) refers uniformly distributed
DenseNet is a network framework from which the layer is arbitrary number from the range of zero and one.
linked straightaway toward one another in the dense block in a Next, the fitness value of all the flying squirrels can be
feedforward manner [18]. The layer is determined that the computed and one with lesser fitness value was expressed on
activation map of each previous layer is preserved as separate “hickory nut tree (ht)”. The next optimum flying squirrels can
input while the activation map is given as input to all the be assumed that the acorn nuts trees (at)” and it is supposed to
succeeding layers. In DenseNet, the feature is concatenated with move nearby hickory nut tree. The residual flying squirrels can

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 704


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

be assumed that normal trees (nt)”. During all the stages of this TABLE I
technique, the squirrels can be continued for acorn nut trees COMPARATIVE ANALYSIS OF RDCN-MLDR SYSTEM WITH
while it can be affected by the occurrence of predators. This EXISTING ALGORITHMS
performance was modelled by utilizing the place upgrading
Methods Sensitivity Specificity Accuracy
progress with predator presence probability (𝑃𝑑𝑝 ). Afterward,
RDCN-MLDR 98.58 99.16 97.97
the dynamic foraging performance was modelled as follows:
Case1: The flying squirrels that were on acorn nut trees ResNet 95.57 97.08 95.73
(𝐹𝑆𝑎𝑇 ) move nearby hickory nut tree. During this work, a novel GoogleNet 98.20 98.06 97.80
place was attained: VggNet-19 95.13 98.08 95.43
𝑡
𝑡+1 𝐹𝑆 𝜏 + 𝑑𝑔 𝐶𝑔 (F𝑆ℎ𝑡 − F𝑆𝑎𝑇𝑡
) 𝑅1 ≥ 𝑃𝑑𝑝 VggNet-16 98.43 95.69 96.17
𝑃𝑆𝑎𝑇 = { 𝑎𝑇 (3)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 VggNet-s 96.36 95.59 97.03
Case2: The flying squirrels on normal trees (FSnt) can move AlexNet 96.47 98.24 96.44
nearby acorn nut trees to fulfill their regular energy needs.
During this work, a novel place for squirrels is gained: M-AlexNet 97.96 96.96 96.50
𝐹𝑆 𝑡 + 𝑑𝑔 𝐶𝑔 (𝑃𝑆𝑎𝑡𝑡
− 𝐹𝑆𝑛𝑡𝑡
) 𝑅2 ≥ 𝑃𝑑𝑝 KFCM-CNNR 96.86 98.33 97.02
𝑡+1
F𝑆𝑛𝑡 = { 𝑛𝑡 (4)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
Case3: once the squirrels on normal trees use the whole of In Fig. 2, a detailed 𝑠𝑒𝑛𝑠𝑦 assessment of the RDCN-MLDR
acorn nuts, they can alter their place nearby hickory nuts for model with other classification models is given. The results
storing hickory nuts, the purpose is to utilize these hickory nuts indicated that the ResNet and VGGNet-19 models have
later. A novel place of squirrels is then written as: demonstrated least 𝑠𝑒𝑛𝑠𝑦 values of 95.57% and 95.13%
𝑡
𝑡+1 𝑆 𝑡 + 𝑑𝑔 𝐶𝑔 (𝐹 𝑣 𝑆ℎ𝑡 𝑡
− 𝐹 𝑣 𝑆𝑛𝑡 ) 𝑅3 ≥ 𝑃𝑑𝑝 respectively. Then, the VGGNet-s, AlexNet, and KFCM-CNNR
F𝑆𝑛𝑡 = { 𝑛𝑡 (5)
𝑅𝑎𝑛𝑑𝑜𝑚 𝑙𝑜𝑐𝑎𝑡𝑖𝑜𝑛 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 models have reported slightly enhanced 𝑠𝑒𝑛𝑠𝑦 of 96.36%,
In which 𝑑𝑔 implies the arbitrary distance, whereas 𝑅1 , 𝑅2 , 96.47%, and 96.86% respectively. Though the M-AlexNet and
and 𝑅3 denotes random numbers from the range of zero and one, GoogleNet model has gained moderately better 𝑠𝑒𝑛𝑠𝑦 of
𝐹𝑆ℎ𝑇 signifies the place of flying squirrel which obtained 97.96% and 98.20%, the vggNet-16 models have reached
hickory nut tree and 𝜏 defines the present iteration. The considerable 𝑠𝑒𝑛𝑠𝑦 of 98.43%. However, the RDCN-MLDR
balancing betwixt exploration as well as exploitation is attained model exhibits its capability on DR classification with
with use of gliding constants 𝐺𝑐 . In this case, the value of 𝐺𝑐 was maximum 𝑠𝑒𝑛𝑠𝑦 of 98.58%.
assumed as 1.9.
C. DR Classification
Here, LR method depends on the linear regression method
as follows [20]:
𝑃 = 𝛼 + 𝛽1 𝑥1 + 𝛽2 𝑥2 +. . +𝛽𝑚 𝑥𝑚 (6)
A classification problem is nearly analogous to the linear
regression problem that forecasts the constant value. It
accomplishes even sensitivity throughout the actual number.
The prediction value of classification is 0 or 1. The outcome is
1 once the value is greater when compared to the thresholding
values; otherwise, the outcome is 0. The output variable of LR
ranges from zero to one.
Pr(𝑌 = +1|𝑋) ~𝛽. 𝑋 𝑎𝑛𝑑 Pr(𝑌 = −1|𝑋)
= 1 − Pr(𝑌 = +1|𝑍) (7)
1
↓ 𝜎(𝑥) ≔ ∈ [0,1] (8)
1 + 𝑒 −𝑥
Pr(𝑌 = +1|𝑋) ~𝜎(𝛽. 𝑋)𝑎𝑛𝑑 Pr(𝑌 = −1|𝑋)
= 1 − Pr(𝑌 = +1|𝑋) (9)
Now, a classification is utilized in negative and positive Fig. 2. 𝑆𝑒𝑛𝑠𝑦 analysis of RDCN-MLDR system with existing
groups. algorithms

IV. RESULTS AND DISCUSSION In Fig. 3, a comprehensive 𝑠𝑝𝑒𝑐𝑦 assessment of the RDCN-
The result analysis of the RDCN-MLDR model is tested on MLDR method with other classification models is given. The
the benchmark Kaggle DR dataset which holds images under outcomes specified that the VggNet-s and VggNet-16 methods
five classes. A comparative study of the RDCN-MLDR method have demonstrated least 𝑠𝑝𝑒𝑐𝑦 values of 95.59% and 95.69%
with recent methods is made in Table 1. By looking at the correspondingly. Then, the M-AlexNet, ResNet, and GoogleNet
figures, it is apparent that the RDCN-MLDR model has models have stated slightly enhanced 𝑠𝑝𝑒𝑐𝑦 of 96.96%, 97.08%,
surpassed all other models. and 98.06% correspondingly. Though the VggNet-19 and
AlexNet techniques have gained moderately better 𝑠𝑝𝑒𝑐𝑦 of
98.08% and 98.24%, the KFCM-CNNR model has reached
considerable 𝑠𝑝𝑒𝑐𝑦 of 98.33%. But, the RDCN-MLDR

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 705


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

approach exhibits its capability for DR classification with


maximum 𝑠𝑝𝑒𝑐𝑦 of 99.16%.

Fig. 5. TACC and VACC analysis of RDCN-MLDR system

The TACC and VACC of the RDCN-MLDR model are


inspected on DR performance in Fig. 5. The results exhibited
that the RDCN-MLDR approach has revealed enhanced
performance with increased values of TACC and VACC. It is
Fig. 3. 𝑆𝑝𝑒𝑐𝑦 analysis of RDCN-MLDR system with existing visible that the RDCN-MLDR model has reached maximum
TACC outcomes.
algorithms
The TLS and VLS of the RDCN-MLDR method are tested
on DR performance in Fig. 6. The figure inferred that the
RDCN-MLDR technique has exposed better performance with
least values of TLS and VLS. It is seen that the RDCN-MLDR
model has reduced VLS outcomes.

Fig. 4. 𝐴𝑐𝑐𝑢𝑦 analysis of RDCN-MLDR system with existing


algorithms
Fig. 6. TLS and VLS analysis of RDCN-MLDR system
In Fig. 4, a thorough 𝑎𝑐𝑐𝑢𝑦 assessment of the RDCN-MLDR
approach with other classification models is given. The figure These results show the enhanced performance of the RDCN-
indicated that the VggNet-19 and ResNet methods have MLDR model over other existing models on DR classification.
demonstrated least 𝑎𝑐𝑐𝑢𝑦 values of 95.43% and 95.73%
V. CONCLUSION
correspondingly. Next, the VggNet-16, AlexNet, and M-
AlexNet models have reported slightly enhanced 𝑎𝑐𝑐𝑢𝑦 of In this study, a new RDCN-MLDR model has been
96.17%, 96.44%, and 96.5% correspondingly. Though the developed for effectual recognition and categorization of DR on
KFCM-CNNR and VggNet-s methods have gained moderately fundus images. The presented RDCN-MLDR model follows
better 𝑎𝑐𝑐𝑢𝑦 of 97.02% and 97.03%, the GoogleNet model has two major stages namely DR classification and feature
reached considerable 𝑎𝑐𝑐𝑢𝑦 of 97.8%. Though, the RDCN- extraction. Initially, the SSA with DenseNet model processes the
input fundus images. As soon as the features are created, they
MLDR model exhibits its capability on DR classification with
are fed to the LR module for proper identification of DR. The
maximum 𝑎𝑐𝑐𝑢𝑦 of 99.97%. performance assessment of the RDCN-MLDR model is tested
using open access dataset from Kaggle dataset. The attained
outcomes highlighted that the RDCN-MLDR model can
accomplish enhanced DR classification performance.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 706


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

CONTRIBUTION STATEMENT [17] Petmezas, G., Cheimariotis, G.A., Stefanopoulos, L., Rocha, B., Paiva,
R.P., Katsaggelos, A.K. and Maglaveras, N., 2022. Automated Lung
Srinivasulu Sirisala; data Curation, Nihar Ranjan Behera; Sound Classification Using a Hybrid CNN-LSTM Network and Focal
formal analysis, Dr. D. Amuthaguka; Methodology, Loss Function. Sensors, 22(3), p.1232.
Investigation, Dr. Sachin Vasant Chaudhari; project [18] Tan, Y.S., Lim, K.M. and Lee, C.P., 2021. Hand gesture recognition via
enhanced densely connected convolutional neural network. Expert
administration, Jhakeshwar Prasad; software data analysis, Systems with Applications, 175, p.114797.
Swetha Reddy; Data Analysis, Original draft with Formatting,
[19] Le-Ngoc, K.K., Tho, Q.T., Bui, T.H., Rahmani, A.M. and Hosseinzadeh,
All authors have read and agreed to the published version of the M., 2022. Optimized fuzzy clustering in wireless sensor networks using
manuscript. improved squirrel search algorithm. Fuzzy Sets and Systems, 438, pp.121-
147.
REFERENCES [20] Parthasharathi, G. U., R. Premnivas, and K. Jasmine. "Diabetic
[1] Kandel, I. and Castelli, M., 2020. Transfer learning with convolutional Retinopathy Detection Using Machine Learning." Journal of Innovative
neural networks for diabetic retinopathy image classification. A Image Processing 4, no. 1 (2022): 26-33.
review. Applied Sciences, 10(6), p.2021.
[2] Zhang, C., Lei, T. and Chen, P., 2022. Diabetic retinopathy grading by a
source-free transfer learning approach. Biomedical Signal Processing and
Control, 73, p.103423.
[3] Gangwar, A.K. and Ravi, V., 2021. Diabetic retinopathy detection using
transfer learning and deep learning. In Evolution in Computational
Intelligence (pp. 679-689). Springer, Singapore.
[4] Le, D., Alam, M., Yao, C.K., Lim, J.I., Hsieh, Y.T., Chan, R.V., Toslak,
D. and Yao, X., 2020. Transfer learning for automated OCTA detection
of diabetic retinopathy. Translational Vision Science & Technology, 9(2),
pp.35-35.
[5] Jabbar, M.K., Yan, J., Xu, H., Ur Rehman, Z. and Jabbar, A., 2022.
Transfer Learning-Based Model for Diabetic Retinopathy Diagnosis
Using Retinal Images. Brain Sciences, 12(5), p.535.
[6] Khalifa, N.E.M., Loey, M., Taha, M.H.N. and Mohamed, H.N.E.T., 2019.
Deep transfer learning models for medical diabetic retinopathy
detection. Acta Informatica Medica, 27(5), p.327.
[7] Thota, N.B. and Reddy, D.U., 2020, August. Improving the accuracy of
diabetic retinopathy severity classification with transfer learning. In 2020
IEEE 63rd International Midwest Symposium on Circuits and Systems
(MWSCAS) (pp. 1003-1006). IEEE.
[8] Hagos, M.T. and Kant, S., 2019. Transfer learning based detection of
diabetic retinopathy from small dataset. arXiv preprint
arXiv:1905.07203.
[9] Al-Smadi, M., Hammad, M., Baker, Q.B. and Sa’ad, A., 2021. A transfer
learning with deep neural network approach for diabetic retinopathy
classification. International Journal of Electrical and Computer
Engineering, 11(4), p.3492.
[10] Panwar, A., Semwal, G., Goel, S. and Gupta, S., 2022. Stratification of
the lesions in color fundus images of diabetic retinopathy patients using
deep learning models and machine learning classifiers. In Edge
Analytics (pp. 653-666). Springer, Singapore.
[11] Gayathri, S., Gopi, V.P. and Palanisamy, P., 2021. Diabetic retinopathy
classification based on multipath CNN and machine learning
classifiers. Physical and engineering sciences in medicine, 44(3), pp.639-
653.
[12] Nancy, W. and Celine Kavida, A., 2022. Optimized Ensemble Machine
Learning-Based Diabetic Retinopathy Grading Using Multiple Region of
Interest Analysis and Bayesian Approach. Journal of Medical Imaging
and Health Informatics, 12(1), pp.35-44.
[13] Jena, M., Mishra, D., Mishra, S.P. and Mallick, P.K., 2022. A Tailored
Complex Medical Decision Analysis Model for Diabetic Retinopathy
Classification Based on Optimized Un-Supervised Feature Learning
Approach. Arabian Journal for Science and Engineering, pp.1-13.
[14] Zhang, Q.M., Luo, J. and Cengiz, K., 2021. An Optimized Deep Learning
based Technique for Grading and Extraction of Diabetic Retinopathy
Severities. Informatica, 45(5).
[15] Nneji, G.U., Cai, J., Deng, J., Monday, H.N., Hossin, M.A. and Nahar, S.,
2022. Identification of Diabetic Retinopathy Using Weighted Fusion
Deep Learning Based on Dual-Channel Fundus
Scans. Diagnostics, 12(2), p.540.
[16] Bhardwaj, C., Jain, S. and Sood, M., 2021. Transfer learning based robust
automatic detection system for diabetic retinopathy grading. Neural
Computing and Applications, 33(20), pp.13999-14019.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 707


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Land Use Land Cover Classification using Machine


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Learning
Harsh Waghela Saurin Patel Pooja Sudesan
Information Technology Information Technology Information Technology
Mumbai University Mumbai University Mumbai University
Shah & Anchor Kutchhi Engineering Shah & Anchor Kutchhi Engineering Shah & Anchor Kutchhi Engineering
College College College
Mumbai, India. Mumbai, India. Mumbai, India
harsh.waghela_19@sakec.ac.in saurin.patel_19@sakec.ac.in pooja15996@sakec.ac.in

Soham Raorane Mr. Rohan Borgalli


Information Technology Asst. Prof.
Mumbai University EXTC Department
Shah & Anchor Kutchhi Engineering Mumbai University
College Shah & Anchor Kutchhi Engineering
Mumbai, India College
soham.raorane15548@sakec.ac.in Mumbai, India
rohan.borgalli@sakec.ac.in

Abstract—Due to rapid urbanization processes and population classification, different types of land cover can be
exploitation, urban sprawl becomes a challenging task for urban distinguished with ease to take appropriate action. Most
planners. For planning authorities and their decision-making importantly, it is wanted for LULC type future projection for
process, particularly in developing nations throughout the late sustainable habitation and development.
20th and early 21st centuries, Land Cover Land Use (LULC) is
one of the most crucial pieces of information. Instead of doing it The Google Earth Engine (GEE), with its huge reusable
manually, the paper's goal is to estimate the LULC Classification library, abundance of geo spatial datasets, and user-friendly
using artificial intelligence approaches. The Google Earth Engine interface, is the ideal cloud-based platform for in-depth
(GEE) cloud computing is utilized to easily retrieve satellite photos monitoring and modelling of the features of the earth [5].
for this purpose [1]. The suggested approach will make the process GEE has evolved into a strong and efficient platform for
of image classification easier so that different land use types may
picture categorization utilizing satellite photos that can be
be identified and watched for urbanization. Classification and
Regression Trees (CART), a supervised machine learning (ML) used for a number of purposes thanks to the availability of
technique, is used to perform the classification [2]. Additionally, free images, tools, and methods for spatial data analysis. One
metrics like classification accuracy, precision and Kappa of the various language programming libraries that GEE
coefficient are assessed to support the conclusions. The results of offers is the JavaScript/Python client library. These libraries
the classification revealed a high accuracy of 92.9%. The LULC can be used to create GEE applications and tool-kits, which
classification results can be used as a starting point for additional can make using GEE easier. GEE also support the use of
research on a variety of topics, such as river morphology change different machine learning methods.
analysis, ecosystem services analysis, land use policy formulation,
management of water resources, management of other natural II. RELATED STUDY
resources, urbanization, etc. [3].
Keywords—Land use land cover (LULC); Classification;
Machine Learning; Artificial Intelligence; Regression; Urban It is easy to combine machine learning algorithms with
Development; Remote Sensing; Classification and Regression other open-source network apps and they are a powerful
Tree (CART); GEE; collection of data-driven techniques that employ an
automated way for pattern detection in large-scale data [6]. A
I. INTRODUCTION few of the effective machine learning techniques that have
The amount of woods, wetlands, farmland, other land and been developed for the detection and modelling of many
water types that cover an area is referred to as its land cover. characteristics are the support vector machine (SVM),
Land use refers to the way people use the land shows, whether random forest (RF), artificial neural network, classification
it is for development, conservation, or a combination of the and regression tree (CART), and decision tree [7]. Important
two. When the terms "Land Use" and "Land Cover" are algorithms like bagged decision trees, random forests, and
combined, they often refer to the grouping or classification of boosted decision trees all have their roots in the CART
human activities and natural elements on the landscape algorithm. A randomly chosen remote sensing sample is used
throughout a certain time period based on accepted scientific by the CART algorithm to build a binary tree, and the tested
and statistical methods of analysis of relevant source sample is then used to prune the tree. The classification
materials [4]. For the study and prediction of many accuracy and fast performance of CART make it one of the
applications, such as weather forecast, agricultural yield, widely used LULC classifiers. In the research paper released
disaster prediction, climate change, urbanization, and so on, in 2016, A. Sungheetha et al. [8], to maximize efficiency and
the satellite geographical data are of great value. LULC classification accuracy, the fewer data required the better.
Classification is one such essential use. One of the key tasks Their proposed CNN model is a more filter contained model
in this area is automatically classifying the land based on its is that it outperformed the deep model in terms of fine-tuning.
physical characteristics and relevant uses. Through LULC

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 708


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. OBJECTIVES according to the same logic. This continues until the tree has
its final pure sub-set or has all of its potential leaves.
The main objective of this study is to create highly accurate
LULC categorization maps of Mumbai City [3].
• To look at the extension and layout of the urban area
in the research area [9].
• To assess how land use and cover have changed over
time in the study area.
• For LULC classification, cloud computing
platforms like GEE can work quickly and
effectively.
IV. METHODOLOGY
In this study, the LULC classification is implemented by
employing GEE in conjunction with the machine learning
algorithm CART, and the sample points of the study region Fig. 2. Binary Decision Tree with CART Algorithm
are divided into two parts: the training samples (Fig. 4) and
the validation/testing samples (Fig. 5) [6]. The predictive V. EXPERIMENTAL RESULT
model was created using training data, and the testing In this section, the Classification And Regression Tree
samples were used to assess the model's effectiveness [6]. Fig. (CART) technique is used to conduct experiments for the
1 represents the full methodology [10]. classification of LULC on the GEE cloud computing platform
[6]. The CART machine learning algorithm was used to
process these training and test datasets in Fig. 6, and the
results showed a maximum accuracy of 92.9% and precision
of 0.92999. The produced LULC map Fig. 3., shows
classification of water body, built-up areas, non-built areas,
trees, bare land, mangroves using LULC mapping for satellite
observations of Mumbai.

Fig. 1. Detailed Flow of Methodology

A. Study Area
The study area focuses on Mumbai city of India with a total
area of about 603.4 sq. Km. Firstly, Mumbai is the financial
capital of India and an urban landscape of the western part of
the country on coordinate of latitude and longitude between
19.0760° N, 72.8777° E [9]. Its central location in terms of
connection by land, sea, and air making it a significant
industrial and commercial hub. It is the hub of manufacturing, Fig. 3. LULC Classification
financial services, and capital markets, and it is essential to
the expansion and advancement of the Indian economy.
Secondly, Mumbai is both one of the world's most populous
urban areas and the fourth-most populous city in the world.
B. Machine learning algorithm
One of the supervised machine learning techniques used for
classification and regression predictive modelling issues is
the classification and regression tree (CART) algorithm [11].
A foundation for crucial algorithms like bagged decision trees,
random forests, and boosted decision trees is provided by
CART, which runs on the binary decision tree as its basis as
shown in Fig. 2. The training set for the decision tree is split
in half using the best attribute and threshold value, using the
root node as the training set. Identification and tree
construction are carried out using training samples.
According to a threshold value for an attribute, the nodes are
divided into sub-nodes. Additionally, the subsets are divided Fig. 4. LULC map for training

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 709


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I. VALIDATION ERROR MATRIX

Water Built Tree Non- Groun Mangrove


Body -up s Built ds/Bar s
[0] Area [2] (Slum e [5]
[1] s) Lands
[3] [4]
Water
Body 34049 29 65 0 0 241
[0]
Built-up
Area 59 2158 211 513 518 67
[1]
Trees 422 45 1339 5 6 288
[2] 0
Non-Built
Area 2 7 0 1312 200 0
(Slums)
[3]
Fig. 5. Validation of LULC Grounds/
Bare 9 55 51 29 3004 3
Lands
[4]
Mangrove 1056 4 1259 1 4 13726
s
[5]

Comparing categorization levels with actual geographic data


is known as accuracy assessment. The overall accuracy (in
percentage) using Kappa coefficient (K) for classification is
shown in Table II. The overall calculated accuracy of LULC
classification using CART algorithm has been detected as
93.21% with Kappa coefficient of 0.88 and can be
recommended as the best suited classifier of LULC. In the
Table II., given below we calculated the Omission Error
(OE), Producers Accuracy (PA), Commission Error (CE) and
the Users Accuracy(UA) using the error matrix.
TABLE II. ACCURACY ASSESSMENT USING ERROR MATRIX
[0] [1] [2] [3] [4] [5] Tot CE UA
al
[0] 340 29 65 0 0 241 343 0.9 99.0
49 84 7% 3%
Fig. 6. Dataset geometry imports [1] 59 215 211 513 518 67 47.
8 407 06 52.9
6 % 4%
[2] 422 45 133 5 6 288 140 5.0 94.9
90 96 1% 9%
[3] 2 7 0 131 200 0 13.
2 152 74 86.2
1 % 6%
[4] 9 55 51 29 300 3 319 4.6 95.3
4 1 1% 9%
[5] 105 4 125 1 4 137 14.
6 9 26 160 48 85.5
50 % 2%
To 355 229 149 186 377 148 733 0.9 99.0
tal 97 8 76 0 2 15 18 7% 3%
OE 4.35 6.09 10.5 29.4 19.3 7.35 4.35 6.0 10.5
% % 9% 6% 0% % % 9% 9%
PA 93.
95.6 93.9 89.4 70.5 80.7 92.6 95.6 91 89.4
5% 1% 1% 4% 0% 5% 5% % 1%

Cohen’s kappa measures the agreement between two raters


who each classify N items into C mutually exclusive
Fig. 7. LULC classification map
categories [12]. The equation for KC is:
The validation error matrix Table I. is a matrix used to 𝑝(𝑎)−𝑝(𝑟)
determine the performance and the errors in the classification 𝐾𝐶 = (1)
1−𝑝(𝑟)
model in the form of a matrix for a given set of data. where 𝑝(𝑎) is the Overall Classification Accuracy, and 𝑝(𝑟)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 710


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

is the Random Accuracy. The correctly categorised areas are 10, no. August, pp. 1–27, 2022, doi:
represented by the diagonal elements in the error matrix 10.3389/feart.2022.959108.
Table I. The overall accuracy is determined by adding the [5] M. Amani et al., “Google Earth Engine Cloud
number of sites that were correctly categorised and dividing Computing Platform for Remote Sensing Big Data
it by the total number of reference sites. Random Accuracy is Applications: A Comprehensive Review,” IEEE J.
calculated by summation of ratio of each reference site to Sel. Top. Appl. Earth Obs. Remote Sens., vol. 13, no.
total reference cites multiplied by the total of ratio of September, pp. 5326–5350, 2020, doi:
classification sites to the total reference sites. The Kappa 10.1109/JSTARS.2020.3021052.
Coefficient may range between -1 and 1 [13]. A value closer [6] B. Feizizadeh, D. Omarzadeh, M. Kazemi Garajeh,
to 0 means that the classification is no more accurate than a T. Lakes, and T. Blaschke, “Machine learning data-
random one. A negative value means the classification is driven approaches for land use/cover mapping and
considerably less accurate than random. The categorization is trend analysis using Google Earth Engine,” J.
clearly superior to random when the value is near to 1. Environ. Plan. Manag., pp. 1–33, Nov. 2021, doi:
Overall Classification Accuracy 𝑝(𝑎) : 0.92 10.1080/09640568.2021.2001317.
Random Accuracy 𝑝(𝑟) : 0.315 [7] X. Liu et al., “Classifying urban land use by
Kappa Coefficient(KC): = 0.88 integrating remote sensing and social media data,”
Int. J. Geogr. Inf. Sci., vol. 31, Apr. 2017, doi:
VI. CONCLUSION 10.1080/13658816.2017.1324976.
It is commonly accepted that LULC maps and the changes [8] A. Sungheetha and R. Sharma R, “Classification of
they represent can be taken into account for a variety of Remote Sensing Image Scenes Using Double Feature
applications, including land use planning and allocation, Extraction Hybrid Deep Learning Approach,” J. Inf.
analyses of environmental effect, and assessments of Technol. Digit. World, vol. 3, no. 2, pp. 133–149,
sustainable development [14]. From an environmental 2021, doi: 10.36548/jitdw.2021.2.006.
perspective, the conclusions are essential for decision-makers [9] S. Mangkhaseum and A. Hanazawa, “Comparison of
and authorities to analyze LULC changes and develop the Machine Learning Classifiers for Land Cover
proper environmental protection strategies [6]. Mumbai's Changes using Google Earth Engine,” in 2021 IEEE
LULC classification findings revealed an overall accuracy of International Conference on Aerospace Electronics
92.9% (Fig. 7). Because there were many variables taken into and Remote Sensing Technology (ICARES), 2021,
account in this study we were faced with a high-dimensional pp. 1–7. doi: 10.1109/ICARES53960.2021.9665186.
feature space, and hence feature selection approaches are [10] T. K. Das, D. K. Barik, and K. V. G. R. Kumar,
advised for the future studies. Future work in LULC research “Land-Use Land-Cover Prediction from Satellite
should address how best to leverage satellite-based land cover Images using Machine Learning Techniques,” 2022
databases through LULC change modeling techniques. This Int. Conf. Mach. Learn. Big Data, Cloud Parallel
will make important contributions to the emerging fields of Comput. COM-IT-CON 2022, no. May, pp. 338–343,
research in environmental monitoring, global warming, and 2022, doi: 10.1109/COM-IT-
climate change [15]. CON54601.2022.9850602.
[11] S. Pathak, I. Mishra, and A. Swetapadma, “An
VII. REFERENCES Assessment of Decision Tree based Classification
[1] S. M. Mirmazloumi et al., “ELULC-10, a 10 m and Regression Algorithms,” Proc. 3rd Int. Conf.
European Land Use and Land Cover Map Using Inven. Comput. Technol. ICICT 2018, pp. 92–95,
Sentinel and Landsat Data in Google Earth Engine,” 2018, doi: 10.1109/ICICT43934.2018.9034296.
Remote Sensing, vol. 14, no. 13. 2022. doi: [12] S. M. Vieira, U. Kaymak, and J. M. C. Sousa,
10.3390/rs14133041. “Cohen’s kappa coefficient as a performance
[2] M. Kiadi and Q. Tan, “Machine Learning: A measure for feature selection,” 2010 IEEE World
Convergence of Emerging Technologies in Congr. Comput. Intell. WCCI 2010, 2010, doi:
Computing BT - The International Conference on 10.1109/FUZZY.2010.5584447.
Advanced Machine Learning Technologies and [13] B. S. Sasikala, V. G. Biju, and C. M. Prashanth,
Applications (AMLTA2018),” 2018, pp. 181–192. “Kappa and accuracy evaluations of machine
[3] C. S. Kang, K. Devi Kanniah, and N. E. Mohd Najib, learning classifiers,” RTEICT 2017 - 2nd IEEE Int.
“Google Earth Engine for Landsat Image Processing Conf. Recent Trends Electron. Inf. Commun.
and Monitoring Land Use/Land Cover Changes in Technol. Proc., vol. 2018-January, pp. 20–23, 2017,
the Johor River Basin, Malaysia,” in 2021 IEEE doi: 10.1109/RTEICT.2017.8256551.
International Geoscience and Remote Sensing [14] Y. Zhang, K. Qin, Q. Bi, W. Cui, and G. Li,
Symposium IGARSS, 2021, pp. 4236–4239. doi: “Landscape Patterns and Building Functions for
10.1109/IGARSS47720.2021.9554768. Urban Land-Use Classification from Remote Sensing
[4] S. K. Nath, A. Biswas, A. Srivastava, A. Sengupta, Images at the Block Level: A Case Study of Wuchang
C. Ghatak, and J. Madan, “Site-specific seismic District, Wuhan, China,” Remote Sens., vol. 12, p.
hazard and risk potential of Bengal Basin with 1831, Jun. 2020, doi: 10.3390/rs12111831.
emphasis on holistic seismic hazard microzonation [15] S. Sudhakar and K. S. Rao, “Land Use and Land
and its structural impact assessment in the cities of Cover Analysis,” Remote Sens. Appl., pp. 21–48,
Dhanbad and Mymensingh,” Front. Earth Sci., vol. 2010.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 711


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Deep Learning Aided Emotion Recognition from


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Music
R Raja Subramanian Kokkirala Aditya Ram Dola Lokesh Sai
Department of computer Science and Department of computer Science and Department of computer Science and
Engineering Engineering Engineering
Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch
and Education and Education and Education
Virudhunagar,Tamil Nadu,India . Virudhunagar,Tamil Nadu,India . Virudhnagagr,Tamil Nadu.India line 5:
rajasubramanian.r@klu.ac.in adityaramkokkirala@gmail.com lokesh091403@gmail.com

K Venkatesh Reddy Kondeti Akarsh Chowdary Kundu Dheeraj Datta Reddy


Department of computer Science and Department of computer Science and Department of computer Science and
Engineering Engineering Engineering
Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch Kalasalingam Academy of Reasearch
and Education and Education and Education
Virudhnagagr,Tamil Nadu.India Virudhnagagr,Tamil Nadu.India Virudhnagagr,Tamil Nadu.India
kvenkyreddy113@gmail.com akarshchowdary2035@gmail.com dheerajdattakundu@gmail.com

Abstract— Emotion identification by audio signal is a Emotion categorization follows genre classification. For
contemporary study area in Human Computer Interaction music recovery, they are endeavouring to involve feeling
domain. The desire for improving the communication interface notwithstanding conventional meta information like type and title.
between people and digital media has increased. The emotion of Numerous music sites have likewise settled melody idea frameworks
the song is detected through music. Music is a great medium for to fulfil comparative requirements. In light of client demands and
conveying emotion. The practice of determining emotions from tracks that clients ordinarily pay attention to and the system will
music snippets is known as music emotion recognition. Audio likewise suggest similar melodies from music library. As of late,
dataset is collected from the Kaggle. Researchers are now different listening destinations have started to give music idea
increasingly concerned towards increasing the precision of administrations with shifting states of mind to give a superior client
experience. There are only a couple of music feeling characterization
emotion recognition techniques. However, a complete system
and feeling based web indexes. [22] Therefore, feeling based music
that can discern emotions from speech is not yet developed. This recovery is a significant piece of meeting individuals' individualized
research work has suggested a novel emotion recognition music recovery requirements, as well as an essential development
technique, where the neural networks are trained to identify course for current music recovery. A few music specialists
emotions based on the retrieved information. The performance contributed manual explanation on the connection between highlight
of neural networks is then compared to the performance of amount and melody feeling. [18] Music creations should be named
baseline machine learning classification algorithms. The with feelings to accomplish feeling based music ID and recovery.
obtained results show that MFCC characteristics combined with Numerous music experts gave understanding into the connection
deep RNN perform better for instrument emotion identification. between include number and music feeling. explanation by hand
The results also reveal that MFCC features paired with a deep Close to home comment of immense music creations utilizing fake
neural network outperform other emotion recognition methods. techniques isn't just time requesting, yet in addition unsure with
It also shows that the class has a major influence on the mood regards to quality. Subsequently, investigating music feeling
evoked by music. To make human-computer interaction more programmed recognizable proof innovation and executing
natural, the computer should be able to perceive different mechanized feeling marking of music works is a fundamental need.
emotional states. The voice of a person is very essential in [20] To improve the system's reliability and resilience, A
assessing individuals. The emotion of the individual is detected classification method simulates a feature classifier and is used to
through the person's speech. These audio types are further analyse each feature, resulting in a musical sentiment. The underlying
classified as joyful, sad, neutral, or fearful. recognition model in this study is a neural network.

Keywords— Audio Emotion Recognition, Deep learning, II. DATASET


Neural Network, LSTM (Long Short-Term Memory) and MFCC In music emotion recognition, the most often used public
(Mel Frequency Cepstral Coefficient). datasets mostly consist of audio recordings conveying emotions.
Each of the two female performers and their emotions is assigned its
I. INTRODUCTION own folder in the dataset.[17] And within it are all 5600 target word
Music is a powerful tool that has many positive effects on the audio files. WAV is the audio file format. Attributes in this dataset
human body and mind. Stimulating and relaxing. The part of the include joyful, sad, neutral, wrath, disgust, pleasure, and pleasant
human mind that perceives music is close to the realm where home surprise. Several tilt models have been proposed in brain research
articulations are realized, so there is a direct relationship between and physiology. The Thayer model is probably the most relevant
music and profound articulations. A portion of the examination model to the sense of music, as it is highly related to musical angles.
bunches are taking gander at the connection[1]between music and Thayer's 2D model is based on two important and successful
feeling. Music analysts are the people who research the connection boundaries. The energy of music and the joy of music are also called
between aural signs and different communicated feelings. They for excitement and value respectively. The moment a person pays
the most part make profound models. PC researchers who make attention to an angry or joyful melody, the pulse increases and the
calculations that perceive melodic feeling naturally. Discourse circulatory load increases (energy music). These factors are related
Feeling Acknowledgment is a task that utilizes profound figuring out to the excitement aspect. Overall, higher blood cortisol levels were
how to group sounds. The project's goal is to analyse spoken sounds associated with positive valences. The model consists of a two-
and classify the accompanying emotion. This paradigm is applicable dimensional plane divided into four clusters based on excitation and
to any sound-based recognition project, including speech, music, and valence factors, each located in a quadrant of the plane.[29] As
songs.[11]

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 712


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

shown in Fig. 2, the resulting four clusters are furious, joyful,


relaxed, and sad; we applied this emotion model in our suggested
Represents the Speech recognition using the MFCC-(Mel Frequency
technique.
Cepstral Coefficient).It actually Shows Step involved in MFCC
Technique which is used to divide according to the frequencies as
shown in the Fig 2.
3.2 LSTM
Long short-term memory (LSTM)is a type of artificial neural
network used in artificial intelligence and deep learning. Unlike
traditional feedforward neural networks, LSTM has feedback
connections. To identify emotions from text, many Machine
Learning Models have been developed. However, in this essay, we
will concentrate on the Bidirectional LSTM Model. Bidirectional
LSTMs, or Bi LSTMs, are an addition to standard LSTMs that are
used to improve the model's performance on sequence classification
issues. Bi LSTMs train on sequential input using two LSTMs. The
first LSTM is applied directly to the input sequence. On a reversed
representation of the input sequence, the second LSTM is employed.
It aids in the insertion of context and speeds up our model.[2]
Fig.1 Some Audio clips in Dataset

Fig .3 Architecture of Speech Emotion [21]


Fig 1.2 Emotion Classes of the Dataset Represents the speech recognition architecture using (CNN –
LSTM). It is a deep multi tasking learning-based recognition. It is a
III. FEATURES 2D-CNN-LSTM that has two conventional layers followed by two
layers of long short-term memory as shown in the Fig 3.
In this work, the features extracted from the instrumental music
clips give an excellent computational approach for describing the IV. Data Preprocessing
audio data. [19]
3.1 MFCC Preprocessing is an important step before doing feature extraction
and classification. In this study, the second order Butterworth filter is
The electrical modification of audio signals is the focus of audio employed to remove noise from music sound sources. Furthermore,
signal processing, a subset of signal processing. Audio signals are the dataset's music recordings are converted to mp3 format with a
electronic representations of sound waves, which are longitudinal sample frequency of 41100 Hz.[8]
waves that flow through air and contain compressions and
rarefactions. The energy of audio transmissions is usually measured 4.1 Modules
in decibels. It is, however, rarely employed in instrument emotion Pandas' module is an information control and examination
recognition. These qualities enable near-human perception accuracy instrument. NumPy Is a Python library that can lead a great many
because they account for human perception sensitivity to frequencies. numerical procedure on clusters. Matplotlib is an information
[7] To compute MFCC, the music clips are divided into 20ms frames perception and graphical plotting library. os - used to control records
with a 10ms shift. Each frame contains MFCC properties such as with framework orders. Seaborn - similar usefulness carried out on
static, derivative, and acceleration coefficients. To extract the top of matplotlib librosa is a sound record investigation program
features, the Python speech features module is utilised. The MFCC me.[15] Librosa. show - used to deliver sound information as designs.
feature was created by combining four different instrument clips and Sound is utilized to show and pay attention to sound. Alerts - to
portrays the corresponding emotion.. change the subtleties of admonitions.
Up till now, brain research and physiological sciences have put
out various inclination models.The Thayer model is one of the
Speech Preprocessing Framing models of music feeling that is most often applied on account of how
intently it connects with melodic components. Two essential and
valuable boundaries — music energy and music delight, frequently
known as excitement and valence, individually — structure the
MF FFT Appling premise of Thayer's 2D model. Individuals' heartbeat rates and pulse
Wrappin Harming rise when they pay attention to irate or cheerful music (music with
g high energy). The excitement aspect is associated with these factors.
window All things considered; positive valence was connected to expanded
blood cortisol levels. The dataset's initial five-way documents and the
MFCC
MFCC initial five names of the dataset's voice records is executed. We
Cepstrum presently make an information build out of the sound documents and
labels. The provided information is a record way which is input for
Fig 2 Speech Recognition Using the MFCC

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 713


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the code. The result information for the program is name. The
informational index's groupings and the quantity of tests in each class
are listed.[16] The worth counts () strategy returns a Series that
contains counts of exceptional qualities. The resultant item will be
organized in diminishing request, with the primary component being
the most frequently happening. Presently we characterize both wave
plot and spectrogram capabilities. The highlights are separated
utilizing the Python discourse highlights module. The MFCC include
was made by joining four different instrument cuts and depicts the
comparing feeling. [4] A wave plot is a visual portrayal of a sound Fig 5.1 Audio Signals of disgust Emotion
record's waveform. A sound record's recurrence levels are displayed
on a spectrogram. The spectrogram highlights are utilized for include Returns features taken from all audio files. Visualization of the
extraction and element choice in the brain network by means of the retrieved data characteristics.[14] The greater the number of samples
convolution layer and pooling layer, though the sound elements act in the dataset, the longer the processing time. The list is converted
as the organization input for the combination characterization model into a single-dimensional array. In a single dimension array, the
in view of LSTM. [3] A progression of serialized include vectors are shape indicates the number of samples in the dataset.[9] The shape
created by the model and took care of into the LSTM network as new denotes the number of samples and output classes. Hidden units in a
highlights prior to being yield through an express meager single dimension linear layer is called Dense. Dropout is used to
consideration network. We can get the feeling of the sound apply regularization to data in order to avoid overfitting and dropping
subsequent to posting it.as shown in the Fig 4 and Fig 4.1 out a portion of the data.

Fig.4 Frequency of Fear Emotion Fig 6 Frequency of Angry Emotion

Fig 4.1 Audio Signals of the Fear Emotion Fig 6.1 Audio Signal of Angry Emotion
Each class's audio file's wave plot and spectrogram are plotted. The outcomes of each training epoch are displayed. batch
Each class has a sample audio of an emotion speech. Darker colors size=64 indicates the amount of data to be processed each step.
are associated with lower pitched voices. Colours are brighter in epochs=50 - the number of iterations used to train the model.
higher pitched voices. Audio length is limited to 3 seconds for files Validation split=0.2 - % of train and test split. Each cycle improves
of identical size. [6] The Mel-frequency cepstral coefficients the training and validation accuracy. The highest validation accuracy
(MFCC) features will be extracted with a limit of 40 and the mean is 72.32%. Save the best validation accuracy model using a
will be used as the final feature. Audio file feature values are being checkpoint. Slow convergence requires adjusting the learning
displayed in Table-1. The frequencies and audio Signals of different rate.[12]
emotions (Happy, Sad, disgust etc.) as shown in the below figures.

Fig 7 Frequency of Happy Emotion


Fig.5 Frequency of disgust Emotion

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 714


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

moods to get music. This organization uses 288 mood categories for
emotional classification provided by music professionals.
V. Result
Deep learning models outperform machine learning techniques
in terms of accuracy. The voice emotion recognition model is trained
using the retrieved audio features. Your accuracy will increase with
more training data. This model can be used in a variety of ways,
including speech recognition or other audio-related tracks, depending
on the settings and data collection. We reviewed the Speech Emotion
Recognition dataset as a deep learning classification project during
this project conference. Various voice-emotional sounds were
identified and classified using explanatory data analysis. The phase
spectrum feature combined achieves an accuracy score of 83%.
72.32% short-term energy, short-term average amplitude, short-term
Fig 7.1 Audio Signals Happy Emotion autocorrelation function, frequency, amplitude, phase and complex
characteristics of the drum face are correct. The voice emotion
Create a categorization task for the MER job. In the VA recognition model is trained using the retrieved audio features. Your
emotional space, there are four unique sorts of continuous emotions: accuracy will increase with more training data.
joyous, sad, anxious, and calm. Since the music video labels in the
dataset correspond to specified points in the VA space, the emotional This model can be used in a variety of ways, including speech
value must be separated to map to the emotional category. [5] Before recognition or other audio related tracks, depending on settings and
the sample data were processed using the classification tasks in this data collection. We reviewed the Speech Emotion Recognition
study, the VA space was separated into four parts, and the four dataset as a deep learning classification project during this project
emotions were associated with the VA space. The combination of conference. Various voice-emotional sounds were identified and
short-term energy functions, short-term mean amplitude and short- classified using explanatory data analysis. The phase spectrum
term autocorrelation function in the BP-based MER experiment had feature combined achieves an accuracy score of 83%. 72.32% short-
the best recorded effect. The outcomes of each training epoch are term energy, short-term average amplitude, short-term
displayed. The training accuracy and validation accuracy grow with autocorrelation function, frequency, amplitude, phase and complex
each iteration; the best validation accuracy is 72.32 use checkpoint to characteristics of the drum face are correct. In this study, the VA
save the best validation accuracy model Slow convergence requires space was divided into four parts, and the four emotions were linked
adjusting the learning rate.[13] to the VA space, before the sample data was processed by
classification tasks.
Table-1 Compare With the Layer and param.
Layer( type) Output Shape Param#

Lstm_3(LSTM) (None,256) 264192

Dropout_9(Dropout) (None,256) 0

Dense_9(Dense) (None,128) 32896

Dropout_10(Dropout) (None,128) 0

Dense_10(Dense) (None,64) 8256

Fig 8 Frequency of Neutral Emotion Dropout_11(Dropout) (None,64) 0

Dense_11(Dense) (None,7) 455

Total Params: 305,799


Trainable Params: 305,799
Non Trainable Params: 0
To determine which feature combination provides the best
recognition results, the BP technique was initially used to study many
different feature combinations. Short-term energy, short-term
average amplitude, short-term autocorrelation function, short-term
zero cross-sectional rate, frequency spectrum and amplitude
spectrum are the combination of features that have the strongest
identifying effect. The combination of phase spectrum functions has
an accuracy rate of 83.83%. Accuracy of 77.89% was obtained by
combining short-term energy, short-term average amplitude, short-
term autocorrelation function, frequency spectrum, amplitude
Fig 8.1 Audio Signals of Emotion spectrum, phase spectrum, and complex features of the surface.
Because there is no common standard database for musical drum. Accuracy of short-term energy, short-term average amplitude,
motion detection, many databases have been used in published short-term autocorrelation function, frequency, amplitude, phase,
studies. Because of this, the specified accuracy of each algorithm complex face and drum characteristics is 76.48%. The test results
varies. All Music Guide (AMG)a is a music company that uses show that the time factor has a significant effect. The differences are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 715


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

small because they are not materially different from the experimental
results that the recognition models produce. for graphical comparison [7] Singhal, Rahul, Shruti Srivatsan, and Priyabrata Panda. "Classification
of test results. of Music Genresusing Feature Selection and Hyperparameter Tuning."
Journal of Artificial Intelligence 4, no. 3 (2022): 167-178.
VI. Conclusion
[8] Cheng Z Y, Shen J L, Nie L Q, Chua T S, Kankanhalli M. Exploring
Music contains a plethora of human emotional information. user-specific information in music retrieval. In:Proceedings of the 40th
Research on music emotional categorization is useful for International ACM SIGIR.
incorporating vast amounts of musical data. This study enhances the
feature information gathering capabilities of the emotion [9] Kim Y E, Schmidt E M, Migneco R, Morton B G, Richardson P, Scott
identification model by including the deep network model into the J, Speck J A, Turnbull D. Music emotion recognition:a state of the art
review. In: Proceedings of the 11th International Society for Music
explicit sparse attention mechanism for optimization. It encourages Information Retrieval Conference. 2010, 255–266
the preparation of related data and enhances the input level of the
model, which increases the recognition accuracy of the model. [10] Yang Y H, Chen H H. Machine recognition of music emotion: a review.
Compared with other strategies, the proposed method includes an ACM Transactions on Intelligent Systems and Technology. 2011, 3(3):
obvious sparse attention mechanism to deliberately filter out small 1–30 Bartoszewski
amounts of information, concentrate the distribution of attention, and
enable the collection and analysis of information. information about [11] M, Kwasnicka H, Kaczmar M U, Myszkowski P B. Extraction of
geographic objects. The test results show that the proposed method emotional content from music data. In: Proceedings of the 7th
can effectively analyze and classify the data. International Conference on Computer Information Systems and
Industrial Management Applications. 2008, 293–299.
Research on audio digitization has advanced as a result of the
continual development of modern information technology. It is now [12] Hevner K. Experimental studies of the elements of expression in music.
possible to do research on using computer-related technologies to The American Journal of Psychology, 1936, 48(2): 246–268
MER. To improve musical emotion recognition, this study uses an
improved BP network to recognize music data. Before analyzing the [13] Posner J, Russell J A, Peterson B S. The circumplex model of
optimal feature data for emotion detection, this study first identifies affect:anintegrative approach to affective neuroscience, cognitive
the acoustic features of music in associative form for emotion development, and psychology. Development and Psychopathology,
classification. Second, using the ABC modified BP network, a 2005, 17(3): 715–734
musical sentiment classifier was developed and its performance [14] Thammasan N, Fukui K I, Numao M. Multimodal fusion of EEG and
evaluated compared with other classifiers. The results of the test musical features in music-emotion recognition. In: Proceedings of the
show that the network used has a greater impact on the recognition. 31st AAAI Conference on Artificial Intelligence. 2017, 4991–4992
References [15] R. R. Subramanian, M. Yaswanth, B. V. Rajkumar T S, K. Rama Sai
[1] R. R. Subramanian, Y. Sireesha, Y. S. P. K. Reddy, T. Bindamrutha, M. Vamsi, D. Mahidhar and R. R. Sudharsan, "Musical Instrument
Harika and R. R. Sudharsan, "Audio Emotion Recognition by Deep Identification using Supervised Learning," 2022 6th International
Neural Networks and Machine Learning Algorithms," 2021 Conference on Intelligent Computing and Control Systems (ICICCS),
International Conference on Advancements in Electrical, Electronics, 2022, pp. 1550-1555, doi: 10.1109/ICICCS53718.2022.9788116.
Communication, Computing and Automation (ICAECA), 2021, pp. 1-
6, doi: 10.1109/ICAECA52838.2021.9675492. [16] Turnbull D, Barrington L, Torres D, Lanckriet G. Towards musical
query-by-semantic-description using the CAL500 data set. In:
[2] J. Sönmez-Cañón et al., "Music Emotion Recognition: Toward new, Proceedings of the 30th Annual International ACM SIGIR Conference
robust standards in personalized and context-sensitive applications," in on Research and Development in Information Retrieval. 2007, 439–
IEEE Signal Processing Magazine, vol. 38, no. 6, pp. 106-114, Nov. 446
2021, doi: 10.1109/MSP.2021.3106232.
[17] Aljanaki A, Yang Y H, Soleymani M. Developing a benchmark for
[3] Serhat Hizlisoy, Serdar Yildirim, Zekeriya Türeci, Music emotion
emotional analysis of music. PLoS ONE, 2017, 12(3): e0173392
recognition using convolutional long short term memory deep neural
networks, Engineering Science and Technology, an International
[18] Chen P L, Zhao L, Xin Z Y, Qiang Y M, Zhang M, Li T M. A scheme
Journal,Volume24,Issue3,2021,ISSN22150986,https://doi.org/10.1016
of MIDI music emotion classification based on fuzzy theme extraction
/j.jestch.20210.009.
and neural network. In: Proceedings of the 12th International
[4] R. R. Subramanian, B. R. Babu, K. Mamta and K. Manogna, "Design Conference on Computational Intelligence and Security. 2016, 323–
and Evaluation of a Hybrid Feature Descriptor based Handwritten 326
Character Inference Technique,"2019IEEE International Conference
on Intelligent Techniques in Control, Optimization and Signal [19] Juslin P N, Laukka P. Expression, perception, and induction of musical
Processing (INCOS), Tamil Nādu, India, 2019, pp. 1-5. emotions: a review and a questionnaire study of everyday listening.
Journal of New Music Research, 2004, 33(3): 217–238
[5] R. Raja Subramanian, H. Mohan, A. Mounika Jenny, D. Sreshta, M. [20] R. Raja Subramanian, V. Vasudevan, “A deep genetic algorithm for
Lakshmi Prasanna and P. Mohan, "PSO Based Fuzzy-Genetic human activity recognition leveraging fog computing frameworks”,
Optimization Technique for Face Recognition," 2021 11th Journal of Visual Communication and Image Representation, Volume
International Conference on Cloud Computing, Data Science & 77, 2021,103132,ISSN1047-320
Engineering(Confluence),2021,pp.374379,doi:10.1109/Confluence51
648.2021.9377028. [21] Kim, Jaebok, Ibrahim H. Shareef, Peter Regier, Khiet P. Truong, Vicky
[6] Yang X Y, Dong Y Z, Li J. Review of data features-based music Charisi, Cristina Zaga, Maren Bennewitz, Gwenn Englebienne, and
emotion recognition methods. Multimedia System, 2018, 24(4): 365– Vanessa Evers. "Automatic ranking of engagement of a group of
389 children “in the wild” using emotional states and deep pose machines."

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 716


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Estimation of Accuracy Level for Sentiment


Analysis using Machine Learning and Deep
Learning Models

V. Vanthana K. Kartheeban
Research Scholar, Department of Computer Applications, Department of Computer Science and Engineering, Kalasalingam
Kalasalingam Academy of Research and Education, Krishnankovil, Academy of Research and Education, Krishnankovil, Tamil Nadu
Tamil Nadu k.kartheeban@klu.ac.in
vanthana.310@gmail.com

Abstract—Due to the digitization of everything, the effect of divided by total words count. If the obtained one is a positive
the growth of social media in nook and corner of the world number, then it is a positive emotion, if not, it is a negative
creates the requisite of gathering and analysing the millions of emotion.
reviews that people shared about their emotions so as to improve Count of [ (Positive Words – Negative Words) / (Total
the quality of the corresponding concern. Such thing is defined Words) ] (1)
as sentiment analysis which accommodates online product
reviews, movie reviews, personal posts in social media, etc. to The exactness of lexicon models is usually high as it
categorize them as good and bad. The proposed research uses the polarity of the text. The algorithms used are Text
contains the performance examination of machine learning and Blot, VADAR, etc.
deep learning models for the hotel reviews and IMDB Movie
Reviews. The result reveals that the deep learning has higher
accuracy. The performance of machine learning models varies B. Machine Learning Model
depending on the size of the dataset.
Here supervised learning approach is used for
Keywords—Sentiment Analysis, Opinion Mining, Support Vector sentiment analysis. In the machine learning models, the
Machine, Logistic Regression, Convolutional Neural Network, dataset with classes for positive, negative and neutral is used
Bidirectional Encoder Representations from Transformers. for training the model. Then the polarity of the text is
determined. The testing and validation can be done to
measure the efficiency of the developed model. The model
I. INTRODUCTION can be developed using several machine learning algorithms
like Naïve Bayes, Logistic Regression, SVM, etc. The
Sentiment Analysis evaluates customer’s attitudes,
accuracy is calculated using the confusion matrix measures
reviews, evaluations, thoughts opinions, judgements,
like precision, recall, F1 – score, etc.
emotions, etc. of entities like companies, products,
individuals, problems. [1]. It is more valuable as it behaves C. Deep Learning model
like feedback that assists them in making effective
advertisements, prediction of the impact of advertisement, as Generally deep learning model provides the accurate
well as finding consumer opinions about their brand, and precise result than the machine learning model. The
products, services, etc [2]. Such analysis algorithm decides working of deep learning simulates the working of human
which method can be suitable for classifying a user comment brain. Like the brain that contains neurons, there exists the
mechanically as a positive and negative one. Document level, artificial neural network with neurons and perceptron’s. It is
Sentence level and Feature level are the classification levels also a supervised one that can be trained and validated using
of Sentiment analysis respectively [3]. The algorithmic bias functions. Many applications exist based in this, mainly
models used are lexicon, machine learning, deep learning and the automation of human tasks. The familiar algorithms are
advanced Deep Learning. CNN, LSTM

A. Lexicon Based model II. LITERATURE SURVEY

In the lexicon-based models, the categorization of Categorizing the reviews as positive, negative and
the customer opinions can be made using a calculation using neutral is a significant one in the modern digital marketing.
dictionary. In the course of this, the good meaning words can These can be done using the various algorithmic models. One
be “positive” and the contradictory one is “negative”. among them is the lexicon-based approach.
Afterwards, the difference between the quantity of affirmative For the novices, Textblob is one of the finest
and negative words will be calculated and algorithm with the moderate learning process and massive
functionality. Here there exists an interface so-called NLTK
used for the natural language processing tasks. There is a new
arrival in the market with the alike options like NLTK. It is a
great boon to the field of NLP as it can be used for building
an application from the scratch or existing ones. . It was

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 717


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

developed on 76 IITM Journal of Management and IT The authors specified in [13] used the fine grained
Cython. But comparatively performance wise TextBlob BERT model for the sentiment classification of SST data.
places the prior role that Spacy. Though good working one, it They reveals that their model with the simple architecture
can support only English language. [4] provides the outstanding result. This stimulates to implement
the BERT in this paper.
In [5], lexicon based approach is applied on the
product review dataset for the sentiment analysis. The paper In [14], the author proposes an innovative method
was proposed to have a summarized view on the positive and for recognizing the emotions which can assists the police to
negative opinions of the customer reviews that assists the recognize whether the criminals are lying. The deep CNN
business individuals to make decisions. model is used for classification which is trained using the 443
YouTube thumbnail videos. This kindle ourself to apply the
The author in the journal enumerated at [6], merged current research work to the emoticons in future.
an effective deep learning architecture well-tuned using the
universal linguistic model and the SVM algorithm. The III. EVALUATION MEASURES FOR THE CLASSIFIERS
analysis is executed on three real world datasets called
Twitter US Airlines, IMDB and GOP debate. Also, it is For the classifiers, the accuracy is a highly
constrained to document level Appl. Syst. Innov. 2022, 5, 13, desirable assessment measure. Such measure depends on the
four possible results like TP, TN, FP and FN. TP and TN
pp: 1 – 16. The result reveals that the accuracy level rises due
to the introduction of novelty. The performance level the indicates how much data correctly forecasted positive /
author obtained for the above mentioned three datasets are negative, whereas FP and FN indicate how much wrongly
99.78%, 99.71% and 95.78% respectively. The combination forecasted as positive / negative. These counts are positioned
of the deep learning and machine learning approaches indeed in a matrix clarified below.
provides an incredible result. A. Confusion Matrix
In [7], the author applied the Recurrent Neural The confusion matrix is a two-dimensional structure
Network (RNN) and Support Vector Machine (SVM) to the that is used to signify the count of the total true and false
Twitter data that encompasses the hash tags like COVID-19, positives, and the total true and false negatives. The template
corona virus, demises, new case, and recovered. The objective is as follows.
of the investigation is to have a familiarity on the
psychological strength of the people during the peak period
of COVID-19. During the lock down era, the social media Predicted Vs Observed Positive Negative
plays a vital role in communicating the awareness, Positive TP FN
precautions and the spread of the disease as we all are in the
stay at home and be quarantine condition. That’s why the Negative FP TN
author preferred the dataset from social media. The sentiment
score for the analysis is measured and segregated as positive
mindset, negative mindset and neutral mindset. Here T- True, F – False, P – Positive, N – Negative.

The author in [8] proposed a work for the sentiment In the above matrix, for the positive sentiments, the counts are
analysis by means of the deep learning methods Mostly, the positioned by calculating the number of tuples that are
methods provide the acceptable result for the SA tasks. correctly identified as positive (TP) and wrongly identified as
Therefore, the author concludes that due to the rapid and negative (FP).
increasing advancement of DL techniques, the focus on the For the negative sentiments, the count of the correct
research may be encouraged on the analysis of opinions via prediction is True Negative (TN) and the contradictory as
deep learning in the future era. positive instead of negative is False Negative (FN).
In [9], the author concludes that there exists more B. Accuracy from the confusion Matrix
training accuracy and an elongated running time when the
analysis is done using the neural network based methods than Accuracy which reveals the performance level is
the machine learning methods. calculated by dividing the the number of all correct
predictions by the total number of records in the dataset. The
In [10], according to the view of author, SVM, KNN highest value of accuracy is 100%, whereas the reverse is 0%.
and NB models when used to categorize twitter data into Normally the results lies between 0 and 100.
Humorous, Joyful, Miserable, Annoyed and none using
lexicon dataset AFFIN over 8K tweets. SVM attained Accuracy = CP / N (2)
maximum accuracy followed by KNN and NB, but KNN was where CP – Number of tuples Correctly Predicted,
the most constant among the three classifiers. That’s why the
SVM is implemented in this paper. N – Total number of records in dataset
In [11], the author performed sentiment analysis
using embedding of Indonesian language as the features of IV. DATASET FOR ANALYSIS AND PREPROCESSING
CNN and LSTM. It means that the CNN is applicable for any
country languages. In this paper too CNN is implemented. The data needed for the analysis is taken from the
available online machine learning repository.kaggle.com.
Similarly, in [12], the author applied deep CNN for Two datasets of different sizes namely
the twitter data and the sigmoid function is used. tripadvisor_hotel_reviews taken from [16] containing 20K
reviews and the IMDB movie_reviews dataset taken from

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 718


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[17] with 50K reviews are used to estimate the performance The estimated accuracy of SVM when implemented
of different machine learning and deep learning models. The for hotel reviews dataset is 71.79% and for movie reviews it
data objects are available in the form of .csv file that contains is 89.22%
attributes like Review, Rating. As both of these are pre-
processed by splitting the sentences as tokens using the 2) Logistic Regression
tokenization functions of the sklearn python packages by Logistic Regression which is a supervised machine
referring the author in [15]. learning algorithm is used to predict the categorical variable
given the independent variables. The probable values for the
independent variable lies between 0 and 1. In sentiment
V. MODEL IMPLEMENTATIONS FOR ESTIMATING ACCURACY analysis, logistic regression can predict whether it is a positive
LEVELS or negative sentiment using the percentage of positive and
negative words.
A. Methodology
There are differences between logistic and linear
regression. The former is for classification tasks and the later
is for the prediction tasks.
Here the CountVectorizer is used for the creation of
feature vectors with the document frequencies minimum as
10 and the maximum as 0.95. The solver attribute of the of
the LogisticRegression is set as liblinear and the highest
number of iterations is set as 1000.
The estimated accuracy of logistic regression when
implemented for hotel reviews and the movie reviews datasets
are 75% and 78% respectively.
C. Implementation of Deep Learning Methods
Deep learning is an approach which follows the
neural networks models. The model depicts the working
Fig 1. Process Flow Diagram of the proposed model process of the human brain. Here the model can be trained
using the activation functions and the error can be propagated
The user reviews are analysed using two algorithmic back and corrected using bias functions. Though the concepts
models named machine learning and deep learning and the are tough to understand and implement, the accuracy of the
accuracy has been calculated. Both the models are applied to deep learning will be better than the machine learning. The
the Tripadvisor , the IMDB dataset reviews and the familiar deep learning algorithms for sentiment analysis are
sentiments were categorized as positive and negative CNN and BERT.
comments (class outcomes). Totally 20K and 50K reviews
respectively had been taken into consideration for producing 1) Convolutional Neural Networks
the result. The accuracy computation is done using Python Convolutional network also termed as
libraries. ConvNet/CNN is a deep learning algorithm, which contains
B. Implementation of machine learning models input layer, one or more hidden layers and an output layer.
The learnable weights and biases can be assigned to the nodes
Machine learning is an approach used to categorize in the layers.
the unknown data objects using supervised or unsupervised
methods. For the sentiment analysis, the supervised approach The architecture is similar to that of the connectivity
is used. The categorization here is done using the polarity of pattern of Neurons in the Human Brain and was inspired by
the text. Two popular methods in machine learning are SVM the organization of the Visual Cortex.
and Logistic Regression. The proposed CNN model contains embedding
1) Support Vector Machine layer, three convolutional layers, one flatten layer and two
dense layers. The size for the embedding is set as 300. For the
Support Vector Machine which in brief called as three convolutional layers, the filters are set as 128, 64 and 32
SVM is a supervised machine learning algorithm mostly used respectively with the kernel 4 and the function relu. The
for performing classifications. The algorithms works by resulting data from the convolutional layers is then converted
finding the hyperplane that best split the n-dimensional space into a single vector using flatten layer. For the first dense
into the different target classes. The plane is found by layer, the units was set as 256 and the activation function relu
choosing the optimal one out of the best boundary lines is used. Then for the second one sigmoid with unit parameter
drawn. The optimal one chosen is called as the hyperplane. 1 is used. For the compilation, Adam optimizer was used with
Here for the analysis, 60% of reviews is used for the loss as binary cross entropy. Two iterations were done for
training, 20% is used for testing and 20% is used for analysis.
validation. The feature vectors are formed using the
TfidVectorizer function with the least document frequency as
5 and the maximum as 0.8. For the classification linear kernel
is used.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 719


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VI. EXPERIMENTAL RESULTS


A. Machine Learning Based methods
Table I. ESTIMATED ACCURACY OF THE MACHINE LEARNING
METHODS

Number Accuracy Levels (in %)


Dataset of Support Vector Logistic
Reviews Machine Regression
TripAdvisor Reviews 20 K 71.79 75
IMDB Reviews 50 K 89.22 78

Fig 3. Estimated Accuracy of the Machine Learning Methods

The two machine learning models named SVM and


Logistic Regression are implemented on the two different size
datasets called hotel reviews from TripAdvisor and movie
reviews from IMDB.
Fig 2. Proposed CNN Model
The experimental results reveals that there is no
The estimated accuracy obtained in CNN for the much changes in the accuracy level for the Logistic
hotel and the movie reviews are 85% and 88.52% Regression. But in SVM, there is massive changes in the
respectively. accuracy while it is applied to the 50 K reviews dataset, which
2) BERT means that SVM works well when the number of reviews are
more.
The Bidirectional Encoder Representations from
Transformers abbreviated as BERT is an advanced deep B. Deep Learning Based Methods
learning model used for the Natural Language Processing. It Table II. ESTIMATED ACCURACY OF THE DEEP LEARNING
was developed by Jacob Delvin and his colleagues in 2018 at METHODS
Google. The model was already well trained using the English Accuracy Levels (in %)
Number of
Wikipedia containing 2,500M words and Bookcorpus wuth Dataset
Reviews
800M words. There are two variations. The basic one is 12- CNN BERT
layer, 768-hidden layer, 12 heads and 110M parameter TripAdvisor Reviews 20 K 85 89.4
networks and the large model is24-layer, 1024 – hidden, 16-
IMDB Reviews 50 K 88.52 88.4
heads and 340M parameters.
For the analysis, the model named bert base cased is
used. The dropout is considered as 0.3. The optimizer Adam
with 10 epochs are done.
The estimated accuracy of BERT for the input
datasets are 89.4% and 88.4% accordingly.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 720


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 5. Machine Learning Vs Deep Learning methods

Fig 4. Estimated Accuracy of the Deep Learning Methods


The estimated accuracy levels are concisely
Two deep learning algorithms named CNN and designated in the chart and the obtained result exposes that for
BERT was applied to the two different dataset and the result the dataset with minimum number of reviews, there is rapid
shown in the table reveals that both the algorithm works more growth among the machine learning models SVM & Logistic
or less similar for the varying size datasets. And another Regression and the deep learning models CNN & BERT. And
interpretation is that the accuracy kevel is approximately when the number of reviews increases, then the performance
equal to the accuracy level of SVM for IMDB dataset. of the models varies and the variation is much more for SVM.

VII. RESULTS AND DISCUSSION


The estimated accuracy of the four different models
while implementing on the two different size datasets are as
follows,

Table III. MACHINE LEARNING VS DEEP LEARNING METHODS


Accuracy Levels (in %)
Model Algorithm 20 K 50 K
reviews reviews
SVM 71.79 89.22
Machine Learning Based Logistic
75 78
Regression
CNN 85 88.52
Deep learning based
BERT 89.4 88.4

Fig 6. Accuracy levels of SVM with DL models

The above graph exposes that the SVM algorithm


performance is equivalent to the deep learning models for the
huge volume datasets which is symbolized by means of the
orange stroke in the above graph. It consumes less time for
execution comparing to DL models. So, SVM is more
appropriate for the sentiment analysis of large size data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 721


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VIII. CONCLUSION AND FUTURE WORK [12] A. Severyn and A. Moschitti, "UNITN: training deep
convolutional neural Network for twitter snetiment
The obtained accuracies of machine learning and classification," in Proceedings of the 9th International
deep learning models reveal that the performance of deep Workshop on Semantic Evaluation (SemEval 2015), Denver,
learning models is approximately same though the size of the 2015.
input datasets increases. In the machine learning models for
logistic regression, there remains no much difference but for
SVM, the variations were abrupt. It indicates that SVM is
suitable for the sentiment analysis of datasets having large [13] Manish Munikar; Sushil Shakya; Aakash Shrestha,
number of reviews. It provides the accuracy level equivalent “Fine-grained Sentiment Classification using BERT”,
to deep learning models. The accuracy of SVM can be further https://ieeexplore.ieee.org/xpl/conhome/8933012/proceeding
improved in future by applying ensemble techniques and it ,2019
may be possible to make it to work more efficient than the [14] Mishmala Sushith, “Semantic Feature Extraction and
deep learning models. Deep Convolutional Neural Network-based Face Sentimental
Analysis”, Journal of innovative image processing 4, no. 3
(2022) : 157-164.
REFERENCES
[15] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B.
[1] B. Pang and L. Lee, "Opinion mining and sentiment Thirion, O.Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V.
analysis", Found. Trends Inf. Retr., vol. 2, no. 1, pp. 1-135, Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M.
2008. Brucher, M. Perrot and E. Duchesnay,"Scikit-learn: Machine
Learning in Python,"Journal of Machine Learning Research,
[2] S. Pedro, T. Yeh and N. Oliver, "Leveraging user vol. 12, pp. 2825-2830, 2011.
comments for aesthetic aware image search reranking", Proc.
21st Annu. Conf. World Wide Web (WWW), pp. 439-448, [16]https://www.kaggle.com/datasets/andrewmvd/trip-
2012. advisor-hotel-reviews
[3] Vohra, S. M., and J. B. Teraiya. "A comparative study of [17]https://www.kaggle.com/datasets/lakshmi25npathi/imdb
sentiment analysis techniques." Journal JIKRCE 2, no. 2 -dataset-of-50k-movie-reviews
(2013): 313-317.
[4] Munna Pandey, Rebecca Williams, Nikita Jindal, Anurag
Batra, Sentiment Analysis using Lexicon based Approach,
IITM Journal of Management and IT pp. 68 – 76
[5] M. a. L. B. Hu, “Mining and summarizing customer
reviews,Proceedings of the tenth ACM SIGKDD
international conference on Knowledge discovery and data
mining,” ACM, pp. 168–177, 2004.
[6] Barakat AlBadani , Ronghua Shi and Jian Dong, A Novel
Machine Learning Approach for Sentiment Analysis on
Twitter Incorporating the Universal Language Model Fine-
Tuning and SVM, Applied System Innovation. 2022, 5, 13,
pp: 1 – 16
[7] Harleen Kaur, Shafqat Ul Ahsaan, Bhavya Alankar &
Victor Chang, A Proposed Sentiment Analysis Deep Learning
Algorithm for Analyzing COVID-19 Tweets, Springer Link,
20 April 2021
[8] Lei Zhang, LinkedIn, Shuai Wang, Deep Learning for
Sentiment Analysis: A Survey
[9] V. Umarania, A. Juliana, J. Deepab, Sentiment Analysis
using various Machine Learning and Deep Learning
Techniques, Journal of theNigerian Societyof
PhysicalSciences 2021
[10] Govin Gaikwad, Prof. Deepali J. Joshi, Multiclass Mood
Classification on Twitter Using Lexicon Dictionary and
Machine Learning Algorithms, International Conference on
Inventive Computation Technologies (ICICT)2016
[11] A. N. Farhan and M. L. Khodra, "Sentiment-specific
word embedding for Indonesian sentiment analysis," in
ICAICTA, 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 722


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Heart Disease Prediction Model using Machine


Learning
Binju saju V Asha Arpana Prasad
Master of Computer Applications Master of Computer Applications Master of Computer Applications
New Horizon College of Engineering New Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India Bengaluru, India
binjusaj@gmail.com asha.gurudath@gmail.com arpanaprasad2013@gmail.com

Harish Kumar P Rakesh V A.P. Nirmala


Master of Computer Applications Master of Computer Applications New Master of Computer Applications
New Horizon College of Engineering Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India Bengaluru, India
harishkumarp16032000@gmail.com v.rakesh1292@gmail.com nirmalasuresh.ap@gmail.com

Abstract— heart disease is considered as one of the common high-risk individuals and in making decisions about
health problem, and machine learning can be a powerful tool preventive measures and treatment [16]. The machine
for reducing the burden of disease. Heart Disease Prediction learning approach described in this paper can be used to
Model using Machine Learning is a process of using predict heart disease [6]. This approach can be helpful in
algorithms to learn based on the data and produce some identifying high-risk individuals and in making decisions
predictions about future events. The data used to train the
about preventive measures and treatment.
several different sources of machine learning algorithms,
including medical records, health insurance claims, and
Many machine learning algorithms are available that have
patient surveys. The predictions made by the machine
learning algorithm can be used to help prevent heart disease
applicability to heart disease prediction. A few of the more
by identifying risk factors and providing personalised prominent methods encompass logistic regression, decision
recommendations for treatment and lifestyle changes. The trees, and support vector machines [9]. Every single one of
heart disease prediction system correctly predicted heart these algorithms has its own perks and drawbacks.
disease in 96.7% of the test cases when using Random Forest
model The best algorithm for a particular application depends on
Keywords— Heart Disease, Machine Learning, the data and the specific prediction task. Logistic regression
Categorization, Regression, Random Forest is a popular method for heart disease prediction. This
method is used to build a prototype that reflects the
I. INTRODUCTION likelihood of a person developing heart ailment. The
prototype is based on a series of predictor variables.
Heart disease can be anticipated and detected early,
potentially saving lives. Models that can predict Common predictor variables used in logistic regression
cardiovascular dysfunction can be developed using models include youth, sexuality, lifestyle factors, and
machine learning techniques [4]. These models can be used cardiovascular disease in the genetic history. Decision trees
to determine who is at high risk and offer suggestions for are another well-known machine learning approach for
preventative therapy. In this study, we suggest a machine predicting coronary heart disease.
learning method for anticipating cardiac disease. Our
strategy is based on a classifier called a Support Vector Frameworks that forecast the likelihood that a person will
Machine (SVM). get heart disease are created using decision trees based on a
set of predictor variables [10]. Decision trees can be used to
We use a dataset of heart disease patients and healthy identify high-risk individuals and to provide
individuals, and we extract a number of features from each recommendations for preventative care. A potent machine
patient. We then train our SVM classifier on this dataset, learning algorithm called the support vector machines can
and evaluate its performance on a held-out test set. Our be used for heart disease prediction.
observations demonstrate that our technique may
accurately predict cardiac disease. In this study, a machine This algorithm is used to build a prototype that anticipates
learning technique for predicting coronary heart disease is the likelihood of a person developing heart ailment. The
presented. prototype is founded on several predictor variables.
Common predictor variables used in support vector
The strategy is based on a classifier called a Support Vector machine models include youth, sexuality, lifestyle factors,
Machine (SVM). A dataset of individuals having heart and cardiovascular disease in genetic history. The deep
disease and not having heart disease is used to train the learning algorithm for predicting coronary heart disease
classifier. The classifier is then tested on a held-out test set depends on the facts and the specific prediction task[11].
[5]. The results show that the approach can achieve good Different algorithms have different strengths and
accuracy in predicting heart disease. The proposed machine weaknesses. The best algorithm for a particular application
learning approach can be utilized as a tool for heart disease must be carefully selected.
prediction. This approach can be helpful in identifying

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 723


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

II. RELATED WORK measurements, and laboratory test results [1]. The study
An exponentially growing body of progress in the found that the machine learning algorithm could predict
development of machine learning for heart disease with accuracy which patients would develop heart disease
prediction. A number of Studies have demonstrated that within five years, with a specificity of 87%. Enhanced
data mining algorithms effectively predict the development examination used deep learning to anticipate cardiac
of heart disease, as well as to identify individuals at risk of disease based on a combination of demographic data,
developing the condition [7].The life - threatening disease clinical measurements, and electrocardiogram (ECG)
caused of mortality in the United States is heart disease, results [2].
and machine learning could potentially be used to predict The study found that the prediction of cardiovascular
which individuals are at risk for developing the condition. disease performance of the machine learning techniques,
There is a growing body of research that has to forecast with an accuracy of 92%. A third study used deep learning
cardiovascular problems, machine learning techniques were to anticipate cardiac disease based on demographic
used. and this literature review will summarise some of the information, clinical measurements, and ECG results [3].
key findings. The study proved that cardiovascular disease prediction
A recent comparative study [11] proposed a method capability of the machine learning algorithm has an
concerned with temporal data modelling by using accuracy of 95%.
convolutional neural network for predicting heart failures at These papers show how machine learning can be used to
an early stage and achieved 97% of accuracy. detect cardiac disease. Machine using supervised learning
A recent review by Domingos and colleagues (2015) found accurately foretells the development of heart disorder, and
that machine learning techniques can outperform traditional could indeed identify individuals at high risk of developing
statistical methods for predicting heart disease. Machine the condition [12].
learning approaches have also been found to be effective These models have the potential to improve the clinical
for identifying risk factors for heart disease [8]. management of heart disease, by identifying individuals at
For example, a study by Chen and colleagues (2016) used a risk of developing the condition and providing information
machine learning approach to identify novel risk factors for on the likely course of the disease[18]. However, more
heart disease. Overall, the literature suggests that the use of research is needed to determine how machine learning can
supervised learning as a technique for predicting heart be used to improve the accuracy of predictions and to
ailment. However, additional study is required to further identify individuals at risk for heart disease.
assess the precision of these forecasts. Some possible causes of heart disease include genetics,
One study used machine learning to generate a forecasting lifestyle choices, and certain medical conditions. For
technique for the development of cardiac diseases in a large example, someone might be more susceptible to
population-based cohort [17]. The study found that the cardiovascular disease if they have a family history of the
machine learning model was able to accurately foretell the condition. Additionally, the lifestyle chance of having
development of cardiac diseases, with integrity of over cardiovascular diseases can be increased by behaviours like
80%. The prototype was also able to identify individuals at smoking and eating poorly. Finally, certain medical
high risk of developing heart disease, with a positive conditions such as Hyperglycemia can also raise the danger
predictive value of over 90%. of heart disease [13].

Another study applied ML algorithms to build a risk model Some possible symptoms of heart related disease are pain
for cardiovascular disease prediction in a large cohort of in chest, difficulty in breathing, and an irregularity in
patients with diabetes. The study found that the machine heartbeat. Additionally, heart disease can lead to other
learning model was able to accurately foretell the conditions such as heart failure, which can cause fatigue
development of cardiac diseases, with integrity of over and swelling in the legs and feet. Some possible treatments
80%. The prototype was also able to identify individuals at for heart disease are the changes in lifestyle, taking proper
high risk of developing heart disease, with a positive medicines and surgery if needed.
predictive value of over 90%. Lifestyle changes such as eating a healthy diet and
A third study applied ML algorithms to build a risk model exercising regularly can help to improve heart health [19].
for cardiovascular disease prediction in a large cohort of Additionally, there are several medications that can be used
patients with hypertension. The study found that the to treat heart disease, such as beta blockers and ACE
machine learning model was able to accurately foretell the inhibitors. In some cases, surgery may also be necessary to
development of cardiac diseases, with integrity of over treat heart disease. Some possible complications of heart
80%. The prototype was also able to identify individuals at disease include heart failure, arrhythmias, and stroke[14].
high risk of developing heart disease, with a positive Additionally, heart disease can lead to other conditions
predictive value of over 90%. such as kidney disease. There are several things that can be
done to prevent heart disease. These include maintaining a
One of the studies used machine learning to anticipate healthy lifestyle, managing medical conditions, and taking
cardiac disease based on demographic data, clinical

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 724


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

medications as prescribed. Additionally, it is important to The dataset contains 303 occurrences with coronary artery
get regular checkups and screenings for heart disease. disease diagnoses and 14 characteristics. The data includes
information about each individual's demographics, medical
There are many different machine learning approaches that history, and heart health. The objective of this study is to
could be made use for predicting heart disease. Some evaluate whether or not an individual has heart disease.
common approaches include decision trees, support vector
machines, and artificial neural networks. All approaches
has their own merits and demerits, so it is advised to TABLE I. DATASET ATTRIBUTES [21]

choose the correct algorithm for the specific problem at


hand [20].
Decision trees are a popular choice for predicting heart
disease because they are easy to interpret and understand.
However, they can be prone to over fitting, especially if the
data is not very clean. Support vector machines are another
popular choice for predicting heart disease. They are very
effective at finding the boundaries between different
classes of data [15].
However, they can be difficult to interpret and can be
computationally intensive. Neural networks are a powerful
A technique of learning algorithms that can be applied to
the prediction of coronary heart disease. They are very
effective at finding patterns in data. However, they can be
difficult to interpret and can be computationally intensive.
It is important to experiment with different machine
learning approaches to see which one works best for the
specific data set.

III. PROPOSED WORK


The methodology for this heart disease prediction system B. Steps followed
will involve the use of a machine learning algorithm to
learn from a dataset of patient information in order to The steps followed for the study is as follows:
estimate a patient's risk of getting heart disease.

A. Data set
The data set is a real-world dataset which is taken from
Kaggle. The dataset contains details of 303 patients. This
machine learning algorithm will be trained on a dataset of
patient information that includes various demographic
features (age, gender, race, etc.), lifestyle choices
(smoking, diet, physical activity level, etc.), and medical
history (family history of heart disease, previous heart
attacks, etc.).
This model will then be used to estimate the likelihood of
cardiovascular disease in new patients. The forecasts will
be due to the new patients' demographic features, lifestyle
choices, and medical history. The predictions will be made
on a scale of 0-100, with 0 indicating no chance of
developing cardiovascular disease and 100 indicating a
very deep chance of developing cardiovascular disease. Fig. 1. Proposed Method

The problem statement is to develop a computer learning


model that can predict a patient's cardiac condition is • The first step is to collect data on heart disease.
present. The metadata utilised in this problem is the This data can be collected from medical records,
statistics on Myocardial Infarction from the UCI Machine surveys, or other sources.
Learning Versioned. The data used for this problem is the • Next, the data is pre-processed to prepare it for
from the UCI Machine Learning Repository, the Coronary use in a machine learning model. This may
Artery disease Dataset. include cleaning the data, imputing missing
values, or scaling the data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 725


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

• Then that data is spitted into 80:20 ratio for doing 4) Naive Bays: Naive Bayes is a kind of algorithm
the training of system and later for testing the for supervised learning that may be applied to both
model. regression and classification applications. Naive Bayes is a
• Then, a model for deep learning is trained on the popular choice for heart disease prognosis because it is
metrics. This model can be a linear model, a easy to interpret and explain.
decision tree, a random forest, or any other type of
P (Disease Symptoms) = P (Disease) * P (Symptoms Disease) /
model. P (Symptoms) (3)
• Finally, the model is used to predict the
likelihood; Figure 1 depicts cardiac illness in new where, P(Disease Symptoms) = the Given symptoms, the
patients. likelihood that a person has the disorder, P(Disease) is the
C. Algorithms probability that a person has the disease, P(Symptoms
Disease) is the probability that a person has the
There are many methods that can be utilized in machine
characteristics indicating the presence of the illness and
learning to anticipate cardiac problems. Some of the most
P(Symptoms) is the probability that a person has the
common methods are:
symptoms.
1) Support Vector Machines: The supervised
So, using the formula above, we can calculate the
learning approach known as supporting vector machines
probability that a person has heart disease given their
(SVMs) can be applied to both regression and classification
symptoms.
applications. SVMs are a popular choice for heart disease
prediction because they can model non-linear decision 5) Logistic Regression: Logistic regression is a kind
boundaries. of algorithm for supervised learning that may be applied to
both statistical classification applications. Logistic
The Support Vector Machine (SVM) formula for heart
regression is a popular choice for heart disease prediction
disease prediction is:
because it can model non-linear decision boundaries.
P (heart disease) = 1/ (1 + e^-(SVM (age, sex, cholesterol, systolic blood
pressure, smoking status, diabetes) +b)) (1) P (heart disease) = 1 / (1 + e^-(β0 + β1*age + β2*sex + β3*chest pain +
β4*resting blood pressure + β5*cholesterol + β6*fasting blood sugar +
where, SVM is the support vector machine model, age is β7*resting electrocardiographic results + β8*maximum heart rate
achieved + β9*exercise induced angina + β10*old peak + β11*slope +
the Patient's time of life, cohabitation is patient's sex (male β12*number of major vessels + β13*thal)) (4)
= 1, female = 0)., cholesterol is the cholesterol level of the
patient, systolic blood pressure is the systolic blood Where, β0 = the intercept β1-β13 = the coefficients for
pressure of the patient, smoking status is the smoking status each of the predictor variables e = the natural logarithm
of the patient (current smoker=1, never smoked=0, former
6) Neural Networks: Neural networks are a group of
smoker=0.5), diabetes is the diabetes status of the patient
machine learning strategies that may be applied to
(diabetic=1, not diabetic=0), and b is the bias term.
applications requiring classification and regression. Neural
2) Decision Trees: The supervised learning credible networks are a popular choice for heart disease prediction
source of information as decision trees can be applied to because they can model complex non-linear relationships.
both supervised and unsupervised situations. A decision The neural network mathematical expression for prediction
tree is a popular choice for heart disease prediction because of heart disease using ml algorithms provides an output
they are easy to interpret and explain. variable that is the risk of cardiovascular disease from a
variety of input elements. The input variables can be any of
If (age is less than 45) AND (cholesterol is less than 240) the following: Time of life, sexuality, the kind of chest
THEN predict heart disease as not present. pain, ambient hypertension, total cholesterol, fasting
If (age is superior to or equivalent to 45) AND (cholesterol glucose levels, the accelerated heart rate attained, strength
is superior to or equivalent to 240) THEN predict heart training angina, the amount of blood vessels that supply
disease as present. (0–3) colored by aerobic activity ST depression, the slope
of the peak exercise ST segment, and fluoroscopy, and
3) K-Nearest Neighbours: K-Nearest Neighbours (K- thalassemia.
NN) is a kind of algorithm for supervised learning that may
be applied to both detection and recognition problems. Due 7) Random forest: This is a method which is suitable
to its simplicity in interpretation and explanation, k-NN is a for determining health complications by creating a random
well-liked option for heart disease prediction. forest from the data. Random Forest is a good choice for
heart disease prediction as it can handle both continuous
P (Disease|x1, x2, x3) = P (Disease) * P (x1|Disease) * P (x2|Disease) * and categorical variables. It is also resistant to over-fitting
P (x3|Disease) (2)
and can model non-linear relationships.
Where, P (Disease|x1, x2, x3) is the probability of disease P (heart disease) = 1 - P (no heart disease) (5)
given the three predictors x1, x2, and x3. P (Disease) is the
prior probability of disease. P (x1|Disease), P (x2|Disease), P (no heart disease) = (1 - P (forest)) ^N (6)
and P (x3|Disease) are the conditional probabilities of the Where, N stands for the forest's total number of trees.
predictors given disease.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 726


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IV. RESULT ANALYSIS Accuracy is considered as one of the important and


The outcomes of the machine learning-based cardiovascular commonly used metric for analyzing the performance of any
disease prediction system are quite accurate. The system is classification model.
able to correctly estimate a patient's probability of
developing cardiovascular diseases or not with a reliability Accuracy = Number of correct predictions /
of up to 96%. The system is also able to provide fairly Total number of predictions
accurate predictions for the risk factors associated with heart
TABLE 2. A COMPARISON BETWEEN THE PERFORMANCE OF
disease. For example, the system is able to correctly identify
ALGORITHMS ARE SHOWN BELOW AND THEIR ACCURACY
smoking as a risk factor for heart disease with an accuracy SCORES.
of up to 85%.
Ultimately, the machine learning-based automated
diagnostic system is a very trustworthy and precise method
for determining whether an individual has cardiovascular
disease or not. There are a few potential limitations of the
system that should be noted. First, the system is only as
effective as the training collection of information. The facts
used to train an algorithm system are inaccurate; the
predictions made by the system will also be inaccurate.
Second, the system is only designed to forecast if coronary
artery disease will be prevalent or not. It is not designed to
predict the prevalence of cardiac disease or its underlying
aetiology. Third, the system is only established to anticipate
adult cardiac disease.
Heart disease detection is not its intended use. In children or
in people with other health conditions. Fourth, the only heart
disease is diagnosed by the system. In the general
population. It is not designed to prevent atherosclerosis in
specific groups of people, such as personnel with a history
of coronary artery disease in their ancestors.

The machine learning technique for predicting heart disease


approaches is a very accurate and reliable tool for predicting
the presence or absence of heart disease in a patient. Fig 3 . Illustrates the various algorithm performance with model accuracy
However, there are a few potential limitations that should be
noted. The results of the study showed that the machine learning
techniques were able to accurately foretell the presence of
cardiac artery disease in patients.
The accuracy of the predictions varied depending on the
approach used, but the overall accuracy was high. The
study found that the most accurate predictions were made
using the random forest approach, followed by the gradient
boosting approach. The least accurate predictions were
made using the k-nearest neighbours approach.
Overall, the machine learning approaches were able to
accurately predict the presence of cardiac artery in patients,
with the highest accuracy achieved using the random forest
approach.

Fig 2. Correlation Matrix of data. Cardiovascular disease can be detected using a variety of
The heart disease prediction system correctly predicted heart approaches to machine learning. Some of the more popular
disease in 96.7% of the test cases. ones encompass support vector machines (SVM), decision
trees, and logistic regression... When choosing a computer
learning algorithm for this problem, it is important to
consider the nature of the data.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 727


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

For example, if the data is very imbalanced (i.e., there are REFERENCES
much more healthy patients than patients with heart
disease), then a technique like decision trees may not be the [1] Chen, M., et al. "Prediction of future coronary heart disease using a
best choice. This is because decision trees tend to over fit risk score based on a machine learning algorithm." PLoS One 9.2
(2014): e88758.
on the minority class (in this case, the patients with heart
[2] Mani, K., et al. "Machine learning for automated detection of
disease), and they may not generalise well to unseen data. coronary artery disease." IEEE transactions on Information
Technology in Biomedicine 11.3 (2007): pp. 317-325.
The magnitude of the data set is another vital factor. If the
data set is very small, then it may be better to use a simpler [3] Ghasemi, A., et al. "Heart disease prediction using machine
algorithm like logistic regression. This is because more learning algorithms." International journal of computer science
and engineering 6.2 (2015): pp. 91-99.
complex algorithms like support vector machines can be
very sensitive to over fitting on small data sets. Once a [4] Predicting Heart Disease with Machine Learning.
machine learning algorithm has been selected, the next step
[5] Heart Disease Prediction Using Machine Learning Approaches:A
is to train it on the data. This is typically done using a Review. https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5822181/
training set, which is a subset of the data which is used for
[6] Machine learning in cardiovascular disease prediction and
training the model. The remaining data is then used to test
prognosis.
the performance of the model. There are many ways to Https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6478972/
evaluate the accuracy of a machine learning algorithm. One
popular metric is accuracy, which simply measures the [7] Sun, J., et al. (2017). Prediction of Incident Heart Disease Using
Machine Learning in a Population-Based Cohort. JAMA
percentage of correctly classified instances. Cardiology, 2(7), 775-783.

Another metric is precision, which measures the percentage [8] de Lemos, J. A., et al. (2017). Development and Validation of a
of positive predictions that are actually correct. Precision is Machine Learning Risk Score for Heart Disease in Patients With
often more important than accuracy in medical Diabetes. Diabetes Care, 40(8), 1147-1154.
applications, because it is more important to avoid false [9] Flavio A. Almeida, et. al. "Heart Disease Prediction Using
positives (i.e. the diagnosis of heart disease in an individual Machine Learning Techniques." IEEE-CIS Data Mining Cup 2017.
who does not have it) than it is to prevent systematic error Available: https://ieee-cis.org/competition/2017/cis-dm-cup.
(i.e. predicting that a patient does not have heart disease [10] J.M. Gonzalez, et. al. "Heart Disease Prediction Using Machine
when they do). Learning Techniques." International Conference on Advances in
Computing, Communications and Informatics, 2016. Available:
Once the machine learning algorithm has expertise in the https://ieeexplore.ieee.org/abstract/document/7839190
field and evaluated, it could be used to produce forecasts [11] Sharean, TM Angelin Monisha, and G. Johncy. "Deep learning
based on fresh data. This is typically done by providing the models on Heart Disease Estimation-A review." Journal of
algorithm with a new set of data (such as a patient's Artificial Intelligence 4, no. 2 (2022): 122-130.
medical history) and having it predict whether or not the [12] Chambless, L. E., et al. (2017). Development and Validation of a
patient has cardiac affliction. Machine Learning Risk Score for Heart Disease in Patients With
Hypertension. American Journal of Hypertension, 30(5), 473-480.

V. CONCLUSION [13] Dangare Chaitrali S and Sulabha S Apte. "Improved study of the
heart disease prediction system using data mining classification
The machine learning-based technique for accurately techniques." International Journal of Computer Applications 47.10
detecting disease is an effective tool that can aid specialists (2012): 44-8
in assessing a physician's probability of developing heart
[14] Shanmugasundaram, G., Selvam, V.M., Saravanan, R., Balaji, S.:
disease. After observing the results of the models, An investigation of heart disease prediction techniques. In: 2018
exploring and analysing the data, we can conclude that IEEE International Conference on System, Computation,
there are a number of risk factors for cardiovascular Automation and Networking (ICSCA). pp. 1–6. IEEE(2018)
disease. Youth, sexual identity, and genetic factors are a [15] Venkatalakshmi, B., Shivsankar, M.: Heart disease diagnosis using
few of these risk variables that cannot be altered. Smoking, predictive data mining. International Journal of Innovative
nutrition, and exercise are a few more independent Research in Science, Engineering and Technology 3(3), 1873–7
predictors that can be modified. (2014)

[16] Soni J, Ansari U, Sharma D & Soni S (2011). Predictive data


Based on these risk variables, machine learning can be used mining for medical diagnosis: an overview of heart disease
to predict the developing heart disease. In this project, to prediction. International Journal of Computer Applications,17(8),
estimate the likelihood of developing cardiovascular 43-8

disease, we have employed several machine learning [17] Ramalingam VV, Dandapath A, Raja MK. Heart disease prediction
techniques. We have found that the heart disease prediction using machine learning techniques: a survey. Int J Eng
Technol.2018;7(2.8):684–7.
system correctly predicted heart disease in 96.7% of the test
cases while using random forest Classification model.
This accuracy is not too perfect, and there is room for
improvement. But for estimating the likelihood of
developing heart disease, the random forest approach is a
solid place to start.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 728


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[18] Soni Jyoti. "Predictive data mining for medical diagnosis: An [20] Jee S H, Jang Y, Oh D J, Oh B H, Lee S H, Park S W & Yun Y
overview of heart disease prediction." International Journal of D (2014). A coronary heart disease prediction model: the
Computer Applications 17.8 (2011): 43-8. Korean Heart Study. BMJ open, 4(5), e005025.

[19] Ganna A, Magnusson P K, Pedersen N L, de Faire U, Reilly M, [21] Khateeb, Nida, and Muhammad Usman. "Efficient heart disease
Ärnlöv J & Ingelsson E (2013). Multilocus genetic risk scores prediction system using K-nearest neighbor classification
for coronary heart disease prediction. Arteriosclerosis, technique." In proceedings of the International Conference on
thrombosis, and vascular biology, 33(9), 2267-72. Big Data and Internet of Thing, pp. 21-26. 2017.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 729


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Poaceae Family Leaf Disease Identification and
Classification Applying Machine Learning
Arpana Prasad V Asha Binju Saju
Master of Computer Application Master of Computer Application Master of Computer Application
New Horizon College of Engineering New Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India Bengaluru, India
arpanaprasad2013@gmail.com asha.gurudath@gmail.com binjusaj@gmail.com

Likhitha S Mayuri P
Master of Computer Application Master of Computer Application
New Horizon College of Engineering New Horizon College of Engineering
Bengaluru, India Bengaluru, India
likhithas1111@gmail.com mayuri21prakash@gmail.com

Abstract— Agriculture efficiency is something on which the spots in leaves, blight, rusty brown, and rich health. The
economy profoundly depends on. Thus, there is always a need to proposed model will use these input data to generate
enhance the yield of crops. In agriculture, identification of the patterns by which disease can be predicted in early stage
plant disease is important for ensuring yield. Use of machine using these patterns. The quality of the dataset used for
learning algorithms from the field of Artificial Intelligence is
being majorly used by the researchers. In ongoing research,
training is very important in supervised learning.
efforts are being undertaken to analyze and derive the best Numerous studies and research have been
classification technique from the discipline of computer science conducted in this field by making use of learning algorithms
for plant disease identification. This paper comprises an overview Traditional machine learning approach used are
of the Convolutional Neural Network using machine learning Convolutional Neural networks, Random Forest classifier
approach for disease identification and classification. The (RFC), K-Nearest Neighbor classifier (KNN), and Support
dataset used in current research is explicitly described and result Vector Machine (SVM) classifier. Selection of features from
are presented in this paper. the dataset and the size of data used for training form key to
the performance of any machine learning classifier. Features
Keywords— Diseased Leaf, Machine Learning Classification,
EfficientNet, Convolutional Neural Network, Image preprocessing.
mainly considered by the plant disease classifiers are the
color of the leaves, amount of damage, texture parameters
I. INTRODUCTION like smooth, shiny, and leathery. Image processing
techniques are used majorly in image classifications of the
In provincial regions of the country, it is quite hard to detect dataset.
any disease which may be present in their harvest. Plant Introduction and presentation of the related studies is
diseases are one of the major issues which will cause the presented in Section I and II respectively. Experimental
shortage of food productions as plant disease will affect the outline and proposals are given in Section III. Results with
quality and growth rate of the plant and also it will cause discussions thereof are given in Section IV. Section V
threat to the overall agriculture production and thereby highlights the conclusion drawn from the current study with
decline the economy of country. This research is to detect the future scope of work.
the diseased plants or the affected plants belonging to
poaceae family and thus enable it to reach its maximum II. LITERATURE REVIEW
potential of production. The current research is conducted so
as to outline the destruction of plant disease on productions. Systematic review of literature is carried out in the present
The research shows that disease caused to several types of work. To start with the areas where the machine learning
plant has caused tremendous loss to yield of crops such as techniques are gaining the attention of the researchers are
wheat, rice, potato, corn and soybean, in this rice yield has reviewed to arrive a t the area to be explored in the current
been affected by 40%, wheat is affected by 30% loss of work. Machine learning is a subject of study in Computer
yield, potato is affected with 21% loss of yield, corn has Science which is discovering applications in a variety of
affected by 41% loss of yield and soyabean is affected by computer applications like disease identification[1], [2],
30% loss of yield [1]. Knowledge about management of annotation [3], and business intelligence/ training chat
disease control is less in most of the regions in India, drastic bots[4]. On systematic review of literature a problem related
climate changes, poor disease control are one of the main to plant disease identification was narrowed. To understand
key factors that arise in reduced productions. the role of machine learning in various disease identification
Various inventions and technologies has been tasks some related work was identified and studied.
introduced to reduce post-harvest crop processing and to Analytical highlight of use of machine learning in health
increase the sustainability of crops and also to upscale the care domain is well illustrated by a researcher. Various
production. Modern methods like Machine Learning have algorithms and testing techniques are highlighted[5]
been introduced. It is well-liked due to its straightforward
design and wide applicability. Supervised anomaly detection Research close to the area of the current research uses
is used as the base where trained datasets are created and convolutional Neural network classifier using two stages to
items in the dataset are labeled into four categories: grey classify herbal Tulsi leaves. Color, measurement and shape

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 730


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

based features are used for training the classification model methods. The suggested model consists of transform of
[6]. wavelets in its discrete form, principal analysis of
components, grey level cooccurrence in two dimensions
Feature subset selection is an important component in vector and convulsionary neural network are used along
machine learning algorithms. The researchers have with other ML techniques. It is evaluated using 600 samples
illustrated in detail the process of feature selection for from the tomato village dataset and has a 99.5% accuracy
diagnosis of cervical cancer[7]. rate [12]

Machine learning is typically utilized by a variety of The Research was conducted to identify the pattern
businesses to improve performance. Additionally, machine and detect the disease caused in cotton plant by using the
learning methods are employed to tackle some challenging snake segmentation along with HU moments acting as
issues in systems that could hold extremely important data. identification character. The BPNN classifier will address
It is important to assess a machine learning algorithm's various problems of classes and in mean time the active
performance and tolerance to attacks. In research, using four couture model is used to restrict the active components
distinguished datasets and three metrics, the resilience and inside infected area. The categorization rate is
performances of six machine learning algorithms is studied approximately 85.52% [13].
and analyzed against two forms of adversarial attacks. An Convolutional Neural Network is chosen to conduct the
analysis of the performance of each algorithm for a specific study and it shows an accuracy of 94.6% accuracy in early
dataset is done through the modifying of the amount of disease detection of plants in a research [14].
poisoned data and behavior analysis for the rate of accuracy
with AUC score and f1 score. Machine learning algorithms A Le-Net architecture using convolutional neural networks
provide a range of performance results and robustness for object recognition and image classification using 12673
against various adversarial approaches, according to samples of plants implements a model with 99.32%
analysis results. Additionally, each level of an adversarial accuracy [15].
attack has a varied impact on machine learning algorithms.
Furthermore, the kind of the dataset has a significant impact For the evaluation of the performance of the proposed
on how a machine learning system behaves [8]. model
III. PROPOSED SYSTEM
In research conducted on potatoes plant to detect the disease
uses the feature of potato disease identification using Fig. 1 and Fig. 2 gives a brief layout of the preprocessing and
principles of image segmentation after preprocessing. Here subsequent steps involved in the proposed system. The steps
help to develop an experimental setup for the model to identify
seven classification algorithms of machine learning are used
and classify disease in poaceae family of leaves. This section
in the research to check the effectiveness of each algorithm.
gives explanation of pre-processing of the dataset, extraction of
Among these Random Forest classification shows the better the features, and Poaceae Family Leaf disease prediction with
accuracy of potato leaf detection with 97% accuracy [9]. classification.

In research aiming at contributions towards detection and


classification of diseased plants and trees, the researchers
use a methodology with five major steps namely; Image
acquisition (IA), Image processing(IP), Segmenting Image
(SI), Feature Extraction(FE), Prediction and Classification
(PC) of the disease. K-means and Hue saturation value
alteration for segmentation and Random Forest for
classification is used to get an experimental result with 98%
accuracy [10].

Research on banana bacterial disease and black


sigatoka is conducted using automated vision to diagnose
the disease. They have extracted the histogram and
converted those RGB histograms HSV and L*a*b. Analysis
of the area bounded by the curve is is used to classify and
components which are peak are taken in account to form the
max of the tree and other about five attributes related to
shape. Other classifiers considered are Decision Tree
Classifier, Naïve Bayes Classifier, Extremely and Normal
random Forest Classifier, and SVM. Randomized trees give Fig. 1. Overview of the proposed system
more score among seven classifiers, offer real-time data, and
give the application flexibility [11].
In research conducted using computer vison and
ML to detect the disease caused to plant, they have created a
model for leaf disease identification based on IP and ML

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 731


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 2. Poaceae Family Leaf disease classification process


Fig. 4. Ratio distribution of the input dataset.
A. Pre-Processing
1) Plant Image Collection: Image of variety of leaves 3) Image Segmentation: Segmentation breaks up
from the family of poeceae is collected. A high-resolution images into units called segments based on a significant
camera is used for the same. Some datasets from pre- correlation along the region of interest. The features
existing repositories are also used for the purpose. Dataset extracted from the segmented image will enable the
available on a forum discussion is taken for experimentation differentiation between healthy and diseased leaves. In
purpose [16]. As part of the stage 1 of the study only 2000 segmentation, the method is selected based on the
images from the 4000 plus images available is taken for the generation of masks utilizing color information, color
scope of experimentation. Specifically leaves with gray leaf intensity, and brightness in the HSV color space. For the
spot, blight, common rust along with heathy leaves are purpose of separating green and brown colors, this research
chosen in the collected data. In order to achieve an effective employs the HSV color image threshold. Uninfected leaves
result, size and resolution are crucial. The Fig.3. illustrates a are green, but infected leaves are brown. The Fig.5
sample image of the collected specimen. The bar graph in illustrates the segmented image of poaceae leaf.
Fig. 4 illustrates the ratio distribution of the type of ailments
in the collected data. The ailments are as follows; blight,
common rust, grey leaves spot and healthy leaves.

Fig. 5. Illustrates image segmentation of the leaf

B. Feature Extraction
Extracting various characteristics of image or a leaf which
include color, texture and shape features is called as feature
extraction. Global Feature Descriptor is used in the current
research. Feature of image is extracted as a whole with
global feature descriptor. Instead of taking a part of the
image, global feature descriptor takes the entire image for
processing and extracting features. The major feature
descriptors used for feature extraction are:
Fig. 3. Sample images of the specimen collected for the dataset
a) Hu Momemts: Hu Moments are used to quantify an
2) Plant Image Processing: Image normalization and object's form in an image. The object's outline is typically
denoted by it. Iteratively computing the image's moments
color conversion are the two main processes in the process.
after converting a color image to a grayscale version. Once
During picture normalization, an image is resized to
it is done, the shape feature's vector is returned.
260x260 pixels and any extraneous noise is also eliminated.
For the purpose of using the procedure, the BRG color b) Haralick Texture: Haralick texture features
descriptor extracts texture features. The images that are
format is transformed into RGB and HSV.
coloured are converted into the gray scale images to extract
the feature of the leaf through the obtained gray images. The
obtain the feature of the Haralick feature and texture grey
level co-occurrence matrix is used as key element.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 732


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

c) Color Histogram: It illustrates the distribution of


color throughout the image and will output the count of
pixels in each of the color range and it also evaluates the
intensity of the color in the image and thus by obtaining a
color histogram it is very helpful in extraction the feature of
the leaf.
C. Classification
The process of identifying various diseases utilizing the data
comes after feature extraction. Data are grouped by
classification based on commonalities. The ailments that the
leaves have in this instance are categorized. The machine
picks up the correct name of a sick leaf. Although there are
many different kinds of models, this suggested methodology Fig. 6. Euclidean Expression for distance calculation
allows for the usage of any of the following models to 5) Support Vector Machine(SVM): The hyperplane
accomplish the desired results.
discovered by the SVM technique will classify the data
1) Convolutional Neural Network: It is one of the
points. The hyperplane, which aids in categorizing the
effective and robust technique of machine learning and also
values, is an N-dimensional space (the number of features -
belongs to the deep leaning neural network. One of the
N). There are numerous ways to find a hyperplane to divide
major advantages about convolutional neural network is that
two data points, but we must select an ideal hyperplane with
there is no need for manual preprocessing of data unlike
the largest possible margin (there should be a maximum
other machine learning models. It contains several layers
distance between two points of both the classes). A dataset
among which convolution layer is the most important and
can be categorized with a higher percentage of confidence
backbone of entire model. The results obtained using is
by maximizing the distance (margin). Features can be
models is very accurate and remarkable.
converted into even higher dimensions using Support vector
2) Random Forest: It is machine learning
machine.
categorization techniques which is known of the most
accurate results. This method can be used to classify a huge D. Disease Prediction
dataset. It is a combination of decision tree in which each The experiments conducted in the current study for disease
tree is trained using a random selection of N training prediction is presented in the algorithm given below:
samples with replacement.
3) Decision Tree: The main method in data mining for Step 1: Import packages from python such as json,
classification large data and extracting those data with pandas, numpy, tqdm, cv2, defaultdict, os, counter,
similar patterns is called as decision tree. The dataset is matplot.lib, train_test_split, tf, EarlyStopping,
bifurcated into small units, and a decision tree is created in ModelCheckpoint, VGG16, preprocessing,
addition. The outcome of decision tree with leaf nodes is OrdinalEncoder, deque.
obtained as result. Since decision tree is efficient in
classifying huge data along with extracting those data Step 2: Open the database.
patterns, it will produce a remarkable result.
4) K-Nearest Neighbor: The K-Nearest Neighbor Step 3: Data is split into two categories, training and
classification approach divides the data into comparable and testing dataset using split_folders function of python.
different classes. To represent the train set, N-dimensional
Step 4: Data exploration is performed using
numeric attributes are employed. Each value in the
ImageDataGenerator function of
collection is represented by a point in N-dimensional space.
tensorflow.keras.preprocessing.image.
By examining the patterns in the training set that are closest
to the unknown samples, a K-Nearest Neighbor classifier Step 5: Plotting graph to illustrate the dataset of
categorizes the dataset. Euclidean distance determines how training data.
close together these samples are. The image is assigned to a
particular class by utilizing the features that were inherited Step 6: Convolutional neural network algorithm used
during the feature extraction process. Fig .6. depicts the in the proposed method is illustrated in Fig. 7. which
expression for Euclidean distance calculation used in K- illustrates the layer-by-layer classification process of
Nearest Neighbor classifier. the CNN algorithm for the input dataset as discussed
earlier. The layer wise outcome is mentioned as
follows. Convolutionary layer is to extract features
while preserving the relationships between pixels
using mathematical operations. From the images
given in the input dataset the convolutionary layer
extracts features using mathematical operations,
these features from the input datasets are selected in
groups and the selected features are input to the data

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 733


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

pooling layer. Non linearity is applied to the selected


features in the pooling layer and outcome of the
pooling layer reduced the number of dimensions to
be learnt by the algorithm. All possible connections
from layer to layer for the purpose of classification is
made in the fully connected layer and the final
outcome is the classification of the leaves in the
dataset to the four categories namely; blight,
common rust, gray leaf spot and healthy is used for
classify plant disease.

Fig. 8. Model accuracy graph for training and validation

Fig. 7. Illustration of convolutional neural network algorithm.

A pretrained model known as EfficientNet is used in the


experiment. EfficientNet forms the convolutionary
neural network architecture and is a scaling tool. The
tool is used to scale the dimensions of depth of the
neural network, width and resolution uniformly by the
use of compound coefficient.
IV. RESULTS
Dataset consist of 2000 photographs of defected leaf and
healthy leaves belonging to poaceae family is input into the
system in this experimental investigation. Images of 500
leaves with blight, 500 leaves with common rust, 500
leaves with gray leaf spot and 500 healthy leaves are Fig. 9. Model loss graph for training and validation
inputted as a dataset for experimentation. In this
experiment, the dataset is categories into two, training,
which consist 80% of the photographs, and testing, which
consist of 20% of the photographs of leaves. EfficientNet
pretrained model is applied for training and classification of
disease. This model shows the maximum accuracy of
93.28% over the testing dataset at an 80%-20% train-test
split. Fig. 8. shows the accuracy model obtained using the
proposed algorithm. Fig. 9. shows the loss model obtained
using the proposed algorithm. Fig. 10. depicts the confusion
matrix which consist of test dataset for Blight (label of
class- condition: Blight), Common rust (label of class-
condition: Common_Rust), Gray leaf spot (label of class-
condition: Gray_Leaf_Spot) and healthy (label of class-
condition: Healthy). This matrix shows the performance of
the proposed algorithm using EfficientNet model over the
training dataset.

V. CONCLUSION AND FUTURE WORK


In the paper presented from the current research, the
common diseases seen in poaceae family taken in
consideration are blight, common rust, gray leaf spot. Fig. 10. Snapshot of the Confusion matrix

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 734


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

These diseases are classified and predicted in early stage by [13] P. R. Rothe and R. V. Kshirsagar, “Cotton leaf disease identification
using pattern recognition techniques,” in 2015 International
using convolutional neural network model EfficientNet.
Conference on Pervasive Computing (ICPC), Pune, India, Jan. 2015,
EfficientNet is an efficient convolutional neural network pp. 1–6. doi: 10.1109/PERVASIVE.2015.7086983.
method which outperforms in providing accuracy and exact [14] S. Kumar, V. Chaudhary, and S. K. Chandra, “Plant Disease
scaling in predicting disease. Healthy leaves are also Detection Using CNN,” p. 7, 2021.
[15] S. Wallelign, M. Polceanu, and C. Buche, “Soybean Plant Disease
considered in the input data set as a comparative element in
Identification Using Convolutional Neural Network,” p. 7.
the model. The proposed model in this paper distinguishes [16] “corn-or-maize-leaf-disease-dataset.”
healthy leaves also. Convolutional neural network is mainly https://www.kaggle.com/datasets/smaranjitghose/corn-or-maize-leaf-
used as of now and results thereof are presented in the disease-dataset
research. The same is chosen due to the findings of the
author of this paper from review of literature. Convolutional
neural network algorithm is chosen for present study as it
has automatic and adaptive hierarchies of feature and also it
is most efficient algorithm according to several research in
field of plant disease detection when compared to other
machine leaning algorithm.
Future experiments may be conducted using other machine
learning algorithms. Input dataset may be further distributed
more rationally on other disease types. More pre-existing
datasets may be considered for future experimentation.
REFERENCES
[1] J. Azmi, M. Arif, M. T. Nafis, M. A. Alam, S. Tanweer, and G.
Wang, “A systematic review on machine learning approaches for
cardiovascular disease prediction using medical big data,” Medical
Engineering & Physics, vol. 105, p. 103825, Jul. 2022, doi:
10.1016/j.medengphy.2022.103825.
[2] E. Dritsas and M. Trigka, “Machine Learning Techniques for Chronic
Kidney Disease Risk Prediction,” BDCC, vol. 6, no. 3, p. 98, Sep.
2022, doi: 10.3390/bdcc6030098.
[3] J. B. Fernandez, G. M. Venkatesh, D. Zhang, S. Little, and N. E.
O’Connor, “Semi-Automatic Multi-Object Video Annotation Based
on Tracking, Prediction and Semantic Segmentation,” in 2019
International Conference on Content-Based Multimedia Indexing
(CBMI), 2019, pp. 1–4. doi: 10.1109/CBMI.2019.8877450.
[4] E. Tebenkov and I. Prokhorov, “Machine learning algorithms for
teaching AI chat bots,” Procedia Computer Science, vol. 190, pp.
735–744, 2021, doi: 10.1016/j.procs.2021.06.086.
[5] B. Nithya and V. Ilango, “Predictive analytics in health care using
machine learning tools and techniques,” in 2017 International
Conference on Intelligent Computing and Control Systems (ICICCS),
2017, pp. 492–499. doi: 10.1109/ICCONS.2017.8250771.
[6] S. Manoharan J, “Flawless Detection of Herbal Plant Leaf by
Machine Learning Classifier Through Two Stage Authentication
Procedure,” JAICN, vol. 3, no. 2, pp. 125–139, Jun. 2021, doi:
10.36548/jaicn.2021.2.005.
[7] B. Nithya and V. Ilango, “Enhanced machine learning based feature
subset through FFS enabled classification for cervical cancer
diagnosis,” Int. J. Knowl. Based Intell. Eng. Syst., vol. 26, no. 1, pp.
79–89, 2022, doi: 10.3233/KES-220009.
[8] M. Govindaraj, P. Murugeswari, N. Bharathiraja, R. Thiagarajan, I.
S. B. Ahamed, and T. Manikandan, “Evolution of IOT in health care
by protecting and safeguarding private security in healthcare,” ijhs,
pp. 5912–5920, Jul. 2022, doi: 10.53730/ijhs.v6nS6.11133.
[9] Md. A. Iqbal and K. H. Talukder, “Detection of Potato Disease Using
Image Segmentation and Machine Learning,” in 2020 International
Conference on Wireless Communications Signal Processing and
Networking (WiSPNET), Chennai, India, Aug. 2020, pp. 43–47. doi:
10.1109/WiSPNET48689.2020.9198563.
[10] P. Panchal, V. C. Raman, and S. Mantri, “Plant Diseases Detection
and Classification using Machine Learning Models,” in 2019 4th
International Conference on Computational Systems and Information
Technology for Sustainable Solution (CSITSS), Bengaluru, India,
Dec. 2019, pp. 1–6. doi: 10.1109/CSITSS47250.2019.9031029.
[11] G. Owomugisha, J. A. Quinn, E. Mwebaze, and J. Lwasa,
“Automated Vision-Based Diagnosis of Banana Bacterial Wilt
Disease and Black Sigatoka Disease,” p. 6.
[12] S. S. Harakannanavar, J. M. Rudagi, V. I. Puranikmath, A. Siddiqua,
and R. Pramodhini, “Plant leaf disease detection using computer
vision and machine learning algorithms,” Global Transitions
Proceedings, vol. 3, no. 1, pp. 305–310, Jun. 2022, doi:
10.1016/j.gltp.2022.03.016.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 735


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

An Extensive Study on HAR Systems to Recognize


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Daily Activities using Deep Learning Approaches


Ms.Gayathri Tippani Dr.Veerraju Gampala
Research Scholar, Associate Professor,
Department of Computer Science and Engineering, Department of Computer Science and Engineering,
Koneru Lakshmaiah Education Foundation, Vaddeshwaram, Guntur, AP, India
Vaddeshwaram, Guntur, AP, India drgveerraju@kluniversity.in
tgayathri84@gmail.com

ABSTRACT: "Human Activity Recognition" (HAR) refers The Logistic Regression can also be implemented as a
to the ability to recognise human physical movements using multi-classification problem by dividing the data into subsets of
wearable devices or IoT sensors. In this epidemic, the majority binary class. The reason for choosing the Logistic Regression for
of patients, particularly the elderly and those who are comparison with M LP is it handles the categorical class labels
extremely ill, are placed in isolation units. Because of the quick efficiently[24]. The given dataset contains class labels in
development of COVID, it's tough for caregivers or others to categorical form. The models to solve the multi-classification
keep an eye on them when they're in the same room. People are problem, the Logistic Regression uses one versus rest mechanism
fitted with wearable gadgets to monitor them and take i.e., for finding the activities related to sitting it considers sitting as
required precautions, and IoT-based video capturing 1 and all the remaining 5 labels are considered as 0 [19]. Let us
equipment is installed in the isolation ward. The existing illustrate the one versus rest mechanism using some sample records
systems are designed to record and categorise six common as shown in table x.
actions, including walking, jogging, going upstairs, downstairs,
Table 1: S ample Dataset to illustrate one versus rest
sitting, and standing, using multi-class classification
algorithms. This paper discussed the advantages and mechanism
limitations associated with developing the model using deep
Us X X X2 … ZS TAND RES ULCLAS
learning approaches on the live streaming data through sensors
er 0 1 … DEV TANT S
using different publicly available datasets. … LABE
…. L
Keywords: WEKA, Convolution Neural Networks, Human 33 0. 0. 0.1 4.05 11.96 Joggin
Activity Recognition, Sensor Signals, Bi-Long Short Term 04 09 4 g
Memory, Semi-Supervised learning, SUB Interactions 34 0. 0. 0.0 5.43 12.05 Joggin
12 12 6 g
INTRODUCTION: 35 0. 0. 0.1 3.13 8.63 Walki
To capture the human activities and to classify those using CNN 09 09 ng
36 0. 0. 0.1 2.09 9.87 Upstai
algorithms many researchers have worked on open-access datasets
12 12 2 rs
by measuring their Inertial M easuring Units (IM U) [17]. The 37 0. 0. 0.1 1.98 9.62 Downs
proposed system has attached IoT sensors to the user and 1 1 4 tairs
maintained an Actitracker[16] Dataset in the local server to capture The above sample database is converted into one versus rest matrix
and predict the class labels of the human activities. To develop as shown in table 1.
algorithms for these types of problems is the best domain to utilize
is “Image Processing integrated with Artificial Intelligence”. Table 2: One versus Rest Matrix for Actitracker Dataset
Image processing [18] is a technique for performing operations on S ample
an object to maintain it or obtain helpful information. It's a type of
modulation processing where the input is an image and the output Walki Joggin Upstai Downstai S ittin S tandi
can be either an image or its features. The goal of artificial ng g rs rs g ng
intelligence is to boost computer functions that are close to real 3 0 1 0 0 0 0
3
knowledge, along with reasoning, learning, and problem-solving.
3 0 1 0 0 0 0
One of the main aims of Artificial Intelligence is to replicate the 4
human recognition process. 3 1 0 0 0 0 0
For handling continuous numerical data, regression 5
algorithm implementation is popular. To handle the categorical 3 0 0 1 0 0 0
data class labels requires some additional conversion mechanism 6
like one versus one or one versus rest mechanisms. Different 3 0 0 0 1 0 0
regression mechanisms like linear, lasso, polynomial, ridge, and 7
other regression algorithms are popular and many of the real-world
problems use linear regression, Support Vector M achine The existing system obtains the binary value to construct the one
regression, Decision Trees Regression for getting accurate results.
versus rest matrix by using the linear parameter known as
The proposed paper considered Logistic Regression for performing “sigmoid”. If the predicted value is greater than or equal to 0.5 it
the comparative study with the deep learning technique [20].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 736


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

outputs the value as 1 otherwise it outputs the value as 0. A similarity matching loss for convolution layer and prediction loss
hypothesis function is defined to optimize the objective, which is for linear classifier layer. The similarity matching loss is defined as
used to update the function value so that a clear relationship process of minimizing the difference between output of CNN layer
maintains between the class labels and features. The model also and target variable for each layer by adjusting the weights. The
computes the cost function using the gradient descent method to computation is shown in equation (1)
find the distance between the predicted label and the actual label.

LITERATURE SURVEY:
[1] Federico Cruciani et al designed a feature learning algorithm - (1)
using CNN with a pre-trained model. The model considered IM U
and Audio datasets and automatically extracted the features. Using The model assumes two matrices as input; one matrix containing
hyper parameterization concept, the model analyzed the quality of output direction of each layer, second contains target values in the
the extracted features. This model greatly focused on training the form of one-hot encoding. It needs number of layers and the value
system by neither considering neither less nor huge amount of data. of certainty layer as input. The computation of local losses design
The model considered the hyper parameters values as represented is represented in figure 1.
in table 3. The hyper parameters are chosen by performing Random
Forest search with 5 folded validations.

Table 3: Hyper Parameter Variables

S .No Parameter Name Possible Best


Values Value
1 Number of Convolution 1 to 8 4
Layers
2 Kernel Size [21] 2, 4, 8, 16, 32, 16
64
3 Number of Filters 12, 24, 48, 96, 24
128

The model evaluated the performance by accessing the data from


extra sensors attached to the human. The model implemented a
simple architecture to validate the design by considering 3 layers of Figure 1: Working of Loss Functions
conv1D separated by max-pooling layers[22]. Each layer applies
filter double in size with ReLu activation function and adam [3] Eunji Kim et al, designed a device using IACNN, which can
optimizer. efficiently access the signals captured from the multiple sensors
attached to the human being. The model focused on interpreting the
[2] Qi Teng et al, proposed a local loss CNN for training the human sensible signals rather than analy zing all the signals it captures.
activities. The global loss occurs due to the wastage of memory for The model captures time variant signals and constructs a matrix
the maintenance of hidden layers weights. This memory cannot be where the captured signals are stored under the time at which they
reutilized if the model contains back propagation technique. This have recognized along with the count of signals it accepted. The
address is issued by computing the loss at each hidden layer. architecture of this system is illustrated in figure 2.
During the training phase, at each phase the model computes

Figure 2: Workflow of S ensor S ignals though GL S patial Intensity

The temporal CNN filters identify the hidden patterns associated reducing the width of the image using pooling layers. Since these
with the previous layers and a feature map is constructed by features are non linear in nature it summarizes that the application

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 737


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of ReLu activation function improvises the extraction process[23]. dimensions using bayesian optimization. The major goal of this
The Spatial Group Lasso (SGL) technique analyzes the each technique is to maximize the convergence of data point by
parameter of each signal captured and computes their relevant computing the conditional independence probability at each sample
scores. At this junction, the dimensionality of the matrix gets point.
reduced and most of the values becomes scalar. These filtered
parameters are grouped based on the threshold value, which is [7] Nidhi Dua et al, GRU based CNN by creating the data
hyper parameter initialized by the model. From these normalized segments using sliding window protocol. The model integrated
vectors and importance measure, the model classifies the activity RNN along with CNN by considering CNN to store the acquired
performed by the human. features in multiple arrays. These reduced features are obtained by
performing multiplication between the local variables with filter
[4] Negar Golestani et al, implemented a framework to recognize variables. The summation of these outputs is passed as a non-linear
the signals using magnetic induction. The model initially function to RNN to find the interesting features by attaching a local
established communication between signals and humans through patch to each region. The time series data is stored in the form of
magnetic induction, which is a wireless mechanism. A matching 1D by analyzing the time series pattern and the context between the
network improves the efficiency of the communication through L- series of activities. M any human beings do a lot of continuous
reversed process. The network generates voltage gain to analyze activities, so this model implements GRU units to store that
the patterns associated with time based signals continuously. Eight sequence of activities. The model efficiently handles the local
different parts of the human are attached with M I coils and based dependencies problem by varying the filter sizes dynamically
on their movements; geometric operations are applied to create a changing the size of filter depending on the reduced number of
synthetic dataset. The model applies cross coupling techniques on features and time span for the required for the living stream.
time and frequency related parameters to eliminate the inferences
during the recognition process. R-square mechanism identifies the [8] Zhongzheng et al, utilized transfer learning model which adapts
similarities between the actions and ignores the one with least the joint probability and it also assumed pseudo labels. These
weighted average. The RNN with 5 layers classifies the activities labels are generated using JPDA to minimize the cumulative errors.
by extracting the necessary features. The main focus of the algorithm lies in the process of domain
transfer by mapping unknown samples to known samples based on
[5] Emilio Sansano et al analyzed different neural network the knowledge base. The data is reconstructed using PCA, which
algorithms to recognize the human activity. In the pre-processing has low feature space. A sub space is created by analyzing the
step, the class labels are segmented based on the measurements learning parameters associated with each domain using SLPP and
obtained from different sensors. For every measurement, the time promotion of class alignment is achieved. Sub samples belonging
is recorded to evaluate the load performance of the model. All the to the same class are projected on the domain space and their
studied deep learning models contain one convolution layer and closeness is estimated through laplacian regularization matrix. An
two pooling layers with a softmax classifier to store the Eigen decomposition technique is applied to classify the data by
dependencies between the values obtained from different sensors. using the pseudo and ground truth class labels.
These models can handle the problem of overfitting by performing
the 5-folded cross-validation and adding dropouts for all the layers [9] M d M ofijul Islam et al, proposed a learning approach using
of CNN. Among the different deep learning models, the gradient GAT network to deal with the noisy captured by the sensors. It also
recurrent unit (GRU) performs better on all the available datasets allows the complicated system to learn the patterns hierarchically
with optimal loss value and maximal accuracy rate. by finding the complement of the multi modal features. The model
has the following sequential models as presented in figure 3.
[6] Sakorn et al proposed sensor based LSTM with 4 layers
associated with time series domain for recognition. The model uses
smart phone to capture the movements of human being instead of
sensors. Instead of single split of dataset, the model once again
divides the training dataset into validation and train. On this
validation data, the model applies five types of LSTM models by
hyper turning the estimators of the CNN. The model gets the data
segments through gyroscope and accelerometer to evaluate all the

Figure 3: Multi Models to Learn Features from series of activities

Initially from the sensor signals, the features are batches. The model employs pre-trained encoder model
processed in the form of segments, with different to fuse the different interactions to create inter and intra

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 738


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

modularity. The RGB colors are extracted using the to end training. The temporal information from the live
ResNet model using integrated LSTM , because it has to stream videos are captured through Bi-LSTM . The model
capture long sequences. The salient features are extracted extracts all the essential features using Inspection-V3
based on the context and it adapts to the training model pre-trained model and divides them into two input blocks
by designing attention model. and one output block. Since, the model contains
interaction activities, it implements RM SProp optimizer
[10] Kemilly et al, designed autonomous auto encoder by to reduce overfitting problem. All the symmetric
analyzing the hand crafted features. In this model, interactions are filtered through block A and asymmetric
complex features are taken care by the multi are filtered through block B. The length of the captured
classification algorithm. Ensemble KVN which is a video frame is not known in advance, so the module
combination of kNN, very fast DT and NB are applied to implements Bi-LSTM , which can handle varying amount
recognize the human activities. The noise data is of input data. The advantage of Bi-LSTM lies in storing
segmented through filters of auto encoders which are both past and future features extracted from the video
integrated with window sliding and overlapping factors. analyzed sentiment. The model implements fusion
The major goal of this auto encoder is to co-train and re- techniques to create dynamic activities and finally CNN
train the model to extract the M eta heuristic features so classifies the activities.
that it needs very simple and useful classifiers to achieve
the task. The model applies offline training to collect the [13] Vasundhara Ghate et al discussed hybrid approaches
data from multiple users but performs online validation of deep learning to recognize the daily activities of the
to recognize the activity. human being. The data is pre-processed using the
traditional filter approaches and segmented using sliding
[11] TANG et al, designed a self training HAR system window. Instead of gathering the essential data from
based on the unlabeled data, which is a semi-supervised single parameter, it extracted important features from
process. In this model, the process starts with training the multiple parameters and constructed its one input vector.
labelled data segments using teacher model later these Finally, it applied neural networks with different
are formed to larger group of unlabelled data. The fine activation functions.
tuning process is performed by the student model which
gets one more input data from pre-trained classifiers. [14] Sravan Kumar Challa et al, proposed multi branch
During the teacher training phase, the loss function of the system by invoking nominal filters to pre-process the
multi classification is computed using the following data. Based on the captured sensor data, it is converted
equation (2) into fixed size windows. The major task of this division
is to avoid overlapping by defining the correct size of
filter. The strongly correlated features are stored as 1-D
vector and then the frames are converted into multi
dimensions based on the relation between local variables
and time series data. The model to classify the activities,
- (2)
it constructs a multi branch decision node and based on
the input along with time distribution a flatten pool is
created. These flatten layers are concatenated to act as
The data available in the public datasets are not input to the Bi-LSTM and classification is done using the
sufficient, so the model trains the samples to compute the softmax layer.
highest softmax probability. The obtained values are used
[15] Khan M D et al, developed attention based NN by
to generate the synthetic data, which improves the size of dilating the layers to perform semantic segmentation of
the dataset. The validation of the data is performed using the video frames captured. The model down samples the
the student model, where loss is computed for every residual layers and constructs its own learning block by
single iteration. The iterations with minimum error rate enhancing the quality of the extracted features. It
are frozen and the remaining layers are designed to implements skip connection technique which is famous
predict the class labels. for learning the features globally. The main advantage of
this technique lies in avoiding the loss of structure during
[12] Tej Singh et al, implemented coupled network by the transformation process. Instead of local loss, the
utilizing RGB frames at the last layer of network. The model computes the central loss and adjusts the weights
first layers of CNN act as fine tune of color by giving end accordingly

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 739


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Table 4: Comparative S tudy on Existing Models

S .NO Author Name Algorithm Dataset Merits Demerits


1 Federico Cruciani Feature IM U and Audio The model has The model has
Learning designed a best CNN explored only few
architecture that suits activities duration but
both types of datasets. the re-usage of CNN
with transfer learning
can include many
more crucial activities.
2 Qi Teng Local Loss UCI HAR, The concept of local Construction of
CNN uniM ibSHAR, loss computation similarity in between
PAM AP, instead of global loss the activities using
OPPORTUNITY, helps the model to unsupervised learning
WISDM adjust the weights is complicated process
appropriately at each
iteration rather than
waiting till the
complete cycle
3 Eunji Kim SGL based ADL annotated data The model performs The feature
IACNN model of Kitchen feature selection during importance measure is
the sensor capturing considered based on
time which improves the threshold value,
the efficiency of the which is static in
memory nature. A slight wrong
initialization also has
a big impact on the
module.
4 Negar Golestani M IDRNN BM L dataset Usage of wireless Identification of
system helps the model estimator values is
to have less power difficult for RNN
consumption and because of the time
eliminates the lossy series nature
medium interaction
5 Sakorn 4-Layered UCI-HAR dataset The validation process The model solves only
LSTM is evaluated using OW regular and simple
& NOW datasets with activities. It cannot
Lasso cross fold predict some
technique unexpected activity
performed by the
human
6 Nidhi Dua CNN+ RNN+ WISDM The model can handle The model failed to
GRU single input or multiple capture the shallow
inputs simultaneously features variations
during very short span
of time
7 Zhongzheng Transfer Own dataset The sensors The model
learning with implemented by this implemented proposed
joint model has integrated work on their own
probability parts of crucial dataset, which cannot
distribution components, which has solve the generalized
greatly reduced the nature of human being
thickness of the node
8 M ofijul Islam M ulti GAT M M Act It deals with both intra The model needs
and inter features enhanced attention to
work with close
proximity
9 Kemilly Autonomous WISDM The compact Due to the
encoders+ representation obtained combination of offline
EkVN during feature and online, the model
extraction using auto requires different
encoders reduces the mechanisms for pre-
memory utilization processing the data
10 TANG Self Training HHAR, The complement of the Instead of semi-
UCI-HAR, PAAS, unlabelled data helps supervised, the
WISDM the model to leverage categorization of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 740


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the activities unlabelled data can be


improved by
unsupervised
11 Tej Singh Bi-LSTM SBU Interaction It efficiently deals with The model can be
+Couple the shallow high extended to access
DCNN dimension features multi view from
skeletal structures
using dynamic
parameters
12 Vasundhara Ghate CNN with WISDM Inclusion of
Random randomness properties -
Forest made the influence of
hyper tuning more
13 Sravan Kumar Challa M ulti Branch PAM AP2, WISDM , The model explored M ulti branch node
CNN and UCI-HAR different activities other takes a lot of time to
than daily routines process the activity
14 Khan M D Attention UCF11 The proposed algorithm Two way streaming
based LSTM has successfully learning strategy is
evaluated all the bench improves the
mark functions recognition of
continuous sequential
interactions

CONCLUSION:
In computer vision and pattern recognition, human [3] E. Kim, "Interpretable and Accurate Convolutional Neural
activity recognition in videos is a hot topic. Artificial Networks for Human Activity Recognition," in
intelligence (AI)-based solutions are now required for IEEE T ransactions on Industrial Informatics, vol. 16, no. 11, pp.
7190-7198, Nov. 2020, doi: 10.1109/T II.2020.2972628.
human behaviour analysis and security. Pre- trained [4] Golestani, N., Moghaddam, M. Human activity recognition
weights of different AI architectures for the visual using magnetic induction-based motion signals and deep
representation of video frames in the training stage are recurrent neural networks. Nat Commun 11, 1551 (2020).
https://doi.org/10.1038/s41467-020-15086-2
used in most extant action recognition systems, which
affect feature discrepancy determination, such as the [5] Sansano, E., Montoliu, R., & Belmonte Fernández, Ó.
(2020). A study of deep neural networks for human
separation between visual and temporal indications. All activity recognition. Computational Intelligence, 36(3),
the existing systems have proposed either traditional 1113–1139. https://doi.org/10.1111/coin.12318
machine learning algorithms or compared deep learning [6] Mekruksavanich, S., & Jitpattanakul, A. (2021). LST M
Networks Using Smartphone Data for Sensor-Based
algorithms using public datasets. Deep learning (DL)- Human Activity Recognition in Smart Homes. Sensors,
based approaches have recently been effectively applied 21(5), 1636. doi:10.3390/s21051636
to time series data collected by smart phones and [7] Dua, N., Singh, S. N., & Semwal, V. B. (2021). Multi-input
wearable sensors in order to anticipate various human CNN-GRU based human activity recognition using
wearable sensors. Computing. doi:10.1007/s00607-021-
behaviours. Even while DL-based techniques fared well 00928-8
in activity recognition, managing time series data is still a [8] Fu, Z., He, X., Wang, E., Huo, J., Huang, J., & Wu, D.
hurdle. With time-series data, a number of challenges (2021). Personalized Human Activity Recognition Based
persist, including difficulty extracting features, on Integrated Wearable Sensor and T ransfer Learning.
Sensors, 21(3), 885. doi:10.3390/s21030885
excessively biased data, and so on. Furthermore, the
[9] Islam, M. M., & Iqbal, T. (2021). Multi-GAT : A Graphical
majority of HAR methods rely on manual feature Attention-Based Hierarchical Multimodal Representation
engineering. A mix of convolutional neural networks Learning Approach for Human Activity Recognition. IEEE
with transfer learning using the re-trained models can Robotics and Automation Letters, 6(2), 1729 –1736.
doi:10.1109/lra.2021.3059624
improve the efficiency of reorganization system.
[10] Garcia, K. D., de Sá, C. R., Poel, M., Carvalho, T .,
Mendes-Moreira, J., Cardoso, J. M. P., … Kok, J. N.
REFERENCES: (2021). An ensemble of autonomous auto-encoders for
[1] Cruciani, F., Vafeiadis, A., Nugent, C. et al. Feature learning human activity recognition. Neurocomputing, 439, 271–
for Human Activity Recognition using Convolutional 280. doi:10.1016/j.neucom.2020.01.125
Neural Networks. CCF T rans. Pervasive Comp. Interact. 2, [11] T ang, Chi Ian, et al. “SelfHAR.” Proceedings of the ACM
18–32 (2020). https://doi.org/10.1007/s42486-020-00026-2 on Interactive, Mobile, Wearable and Ubiquitous
[2] Q. T eng, K. Wang, L. Zhang and J. He, "T he Layer-Wise T echnologies, vol. 5, no. 1, Mar. 2021, pp. 1 –30,
T raining Convolutional Neural Networks Using Local https://doi.org/10.1145/3448112.
Loss for Sensor-Based Human Activity Recognition," in [12] Singh, T ., & Vishwakarma, D. K. (2020). A deeply coupled
IEEE Sensors Journal, vol. 20, no. 13, pp. 7265-7274, 1 ConvNet for human act ivity recognition using dynamic
July1, 2020, doi: 10.1109/JSEN.2020.2978772. and RGB images. Neural Computing and Applications,
33(1), 469–485. doi:10.1007/s00521-020-05018-y
[13] Ghate, V., & C, S. H. (2021). Hybrid deep learning
approaches for smartphone sensor-based human activity

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 741


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

recognition. Multimedia T ools and Applications.


doi:10.1007/s11042-020-10478-4
[14] Challa, S. K., Kumar, A., & Semwal, V. B. (2021). A
multibranch CNN-BiLST M model for human activity
recognition using wearable sensor data. T he Visual
Computer. doi:10.1007/s00371-021-02283-3
[15] Muhammad, K., Mustaqeem, Ullah, A., Imran, A. S.,
Sajjad, M., Kiran, M. S., … de Albuquerque, V. H. C.
(2021). Human action recognition using attention based
LST M network with dilated CNN features. Future
Generation Computer Systems, 125, 820–830.
doi:10.1016/j.future.2021.06.045
[16]ActitrackerDataset:
https://www.cis.fordham.edu/wisdm/dataset.php
[17] Bevilacqua, A., MacDonald, K., Rangarej, A., Widjaya, V.,
Caulfield, B., & Kechadi, M. (2018). Human Activity
Recognition with Convolutional Neural
Networks. ECML/PKDD.
[18] Padmanabhuni, Ms. S. S. (2020). AN EXT ENSIVE
ST UDY ON CLASSIFICAT ION BASED PLANT
DISEASE DET ECT ION SYST EM. JOURNAL OF
MECHANICS OF CONT INUA AND MATHEMATICAL
SCIENCES, 15(5).
https://doi.org/10.26782/jmcms.2020.05.00002
[19] Srinivasa Reddy, K., Suneela, B., Inthiyaz, S.,Kumar,
G.N.S., Mallikarjuna Reddy, A.” Texture filtration module
under stabilization via random forest optimization
methodology “International Journal of Advanced T rends in
Computer Science and Engineering, Volume 8, No.3, May
- June 2019
[20] Hazar Mliki, Fatma Bouhlel, Mohamed Hammami, Human
activity recognition from UAV-captured video sequences,
Pattern Recognition, Volume 100, 2020, 107140, ISSN
0031-3203, https://doi.org/10.1016/j.patcog.2019.107140.
[21] Krishnaraj, N. "Implementation of a Human Activity
Monitoring System through IoT Sensor and Blynk Cloud
Platform." Journal of Information Technology and Digital
World 4, no. 2 (2022): 105-113.d here for the article.
[22] Sri Silpa Padmanabhuni and Pradeepini Gera, “Synthetic
Data Augmentation of T omato Plant Leaf using Meta
Intelligent Generative Adversarial Network: Milgan”
International Journal of Advanced Computer Science and
Applications(IJACSA), 13(6), 2022.
http://dx.doi.org/10.14569/IJACSA.2022.0130628
[23] Reddy, A. M., Reddy, K. S., Jayaram, M., Venkata Maha
Lakshmi, N., Aluvalu, R., Mahesh, T. R., Kumar, V. V., &
Stalin Alex, D. (2022). An Efficient Multilevel
T hresholding Scheme for Heart Image Segmentation
Using a Hybrid Generalized Adversarial Network. In S.
Bhattacharya (Ed.), Journal of Sensors (Vol. 2022, pp. 1–
11). Hindawi Limited.
https://doi.org/10.1155/2022/4093658
[24] Lakshmi N, V. M., & Rout, R. K. (2022). A Novel
Approach for Feature Selection Using Artificial Neural
Networks and Particle Swarm Optimization. In Artificial
Intelligence T echnologies for Computational Biology (pp.
141–160). CRC Press.
https://doi.org/10.1201/9781003246688-7

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 742


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Deep Network Analysis and Prediction of Ophthalmic


Disorders
M .Darshini M .Hemamalini Jeyasheela rakkini G.Bagyalakshmi
Student Student Assistant Professor Assistant professor,
School of Electrical & School of Electrical & School of Computing School of Electrical &
Electronics Enigneering, Electronics Enigneering, SASTRA University, Electronics Enigneering,
SASTRA University, Thanjavur, SASTRA University, Thanjavur, Tamilnadu, SASTRA Uniiversity, Thanjavur,
Tamilnadu, Thanjavur, Tamilnadu, Tamilnadu,
darshini2026@gmail.com hemanika83@gmail.com jeyasheelarakkini@cse.sastr bhagya@eie.sastra.edu
a.ac.in

V.Gomathi
Assistant Professor
School of Electrical &
Electronics Enigneering,
SASTRA Uniiversity, Thanjavur,
Tamilnadu
gomathi@eie.sastra.edu

Abstract— Everybody, around the globe, is aware that their kids, causative agents of mucormycosis are various species of
relatives, and family are suffering from the pandemic COVID-19. fungi of the family MUCORACEA. Like other molds,
S everal people are still facing post-COVID-19 issues. During mucor fungi are widely distributed in nature and are
COVID-19's second wave, mucormycosis, sometimes known as found in the soil, manure, fusty hay, on bread and
"black fungus," plagued people, especially those who had vegetables, etc [3]. [1] Sushma K Sattigeri1 et. al.
previously been infected with the virus. The clinical
developed the model to detect the four types of eye
manifestations of mucormycosis are quite varied, the disease
affects the skin, subcutaneous fatty tissue, and visceral organs
disorders. Today, in the field of Ophthalmology, a lot of
such as the eyes and brain. This paper surveys the procedures are involved to find eye diseases. To decrease
Mucormycosis-affected eye diseases due to post-COVID-19 these impacts, visual inspection and validation have been
complications and leverages the Machine learning model to used. Digital Retinal Imaging is used to inspect
differentiate it from other eye diseases. COVID-19-associated abnormalities in the eyes and is widely used across the
Mucormycosis carries a very high mortality rate and timely world for its detailed diagnosis and benefits. Despite this,
detection that can assist people in starting therapy at an early they introduce delays in predicting eye problems. Because
stage of the disease, increasing their chances of recovery. Though the Ophthalmologists normally use mydriatic (dilation of
it was evaluated for a specific disease (COVID-19-associated
the eye) for the eyes and they wait for some time, if it
mucormycosis) we ended up developing a framework that can
detect other eye diseases. Thus, the goal of this research is to
doesn’t work again, it requests more installations of
distinguish Mucormycosis from other eye diseases such as mydriatic and scans your eyes. It involves multiple
Bulging Eyes, Cataracts, Crossed Eyes, Glaucoma, and Uveitis. doctors for the final diagnosis and takes more time [3].
This study implies Deep learning techniques with a Current developments in several countries show that this
Convolutional Neural Network based on the TensorFlow and measure can be technologically accompanied by mobile
Keras model to detect and make use of computer vision to apps and on-the-go COVID-19 detection technologies. By
accurately classify eye diseases. We achieved a precision of 70% removing the manual method, automated detection of eye
in this study by developing a webpage using the trained model damages and subsequent quantification (severity) of such
for an eye diseases evaluation.
damages would aid Ophthalmic surgeons and technicians
Keywords— Eye Diseases Detection; Deep learning; Convolutional in precisely and quickly predicting eye disorders.
Neural Network; Tensor flow; Keras.
1) The latest development in Artificial intelligence,
I. INTRODUCTION particularly in deep learning can automatically
diagnose eye diseases and provide promising results.
In the year 2019, an incredible spread of COVID-19 has The Convolutional Neural Network (CNN), like the
destroyed human lives and disrupted economic growth Artificial Neural Network, is a feed-forward neural
worldwide. Moreover, India faces more COVID-19 cases network (ANN). With images, the problem with
than other countries. In the second wave of COVID-19, artificial neural networks is that they require more
mucormycosis is an invasive fungal infection that has nodes in the first layer to process each pixel, which is
seen a rapid rise among patients with coronavirus [2]. The

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 743


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

insufficient, difficult to train, and does not produce data in deep learning MobileNetV2. The grades predicted on a
satisfactory results. So, because CNN is good with dataset with 250 fundus eye descriptions and finally trained in
image classification and is inspired by the animal the deep learning method, in MobileNetV2 and the final
cortex, it overcomes this problem. [5]. Convolutional accuracy of 96.2% [10]. In 2019 globally spread disease
Neural networks are mostly used algorithms for known as COVID-19, caused a severe negative impact on
object recognition and image segmentation. But the human health as well as Economically. During second -wave
growth of deep learning methods is mainly focused COVID-19, black fungus disease stepped into the world, the
on binary classification with the aim to classify patients affected by COVID-19 are used steroid -orient drugs
normal and disease eye images. The majority of to reduce the consequence of COVID-19 infection. The main
current models are intended to treat specific eye advantage of Hybrid learning-based Neural Network Classifier
ailments such as cataracts, or diabetic retinopathy [6]. is predicting accurately, timely and easily [8]. Alex Net and
The concept is greater satisfaction for patients, in InceptionV3 classify tiny medical image data in a deep
terms of faster results. learning method in terms of accuracy and efficiency [9]. CNN
for eye tracking algorithm, this paper studied the development
2) In this paper, we used one of the Deep Learning and tracking of a neural network-based eye tracking model
technique the Convolutional Neural Network (CNN) used to implement eye track in virtual reality (VR) and
to distinguish between the Mucormycosis -affected augmented reality (AR) and also used an Infrared eye-tracking
eye and other eye disorders such as Bulging eyes, algorithm (it keeps track of the pupil move), Electro-
Cataracts, and Crossed eyes, Glaucoma, and Uveitis, oculography (electric potential between the front and back
as well as the normal eye. Due to features such as eye) [10]. The CNN and SVM are popular machine learning
considerable inter-class similarity and hardly methods used in this paper [10][8]. Glaucoma was detected by
detectable diseases, the classification process is using deep learning models[17] In this paper, deep learning
difficult. This project introduces the concept of was used to contract detection and wavelet feature was extract
detecting eye diseases with CNN and a TensorFlow from the retinal vascula. SVM and softmax were used for
backend. TensorFlow is an open-source library that is cataract classification.
used to develop and train a model. We were able to
minimize the overall project size and compilation III. METHODOLOGY
time by using TensorFlow.

3) [12]Multi-layered convolutional neural network were


used for facial expression and face recognition.
[15]Different automated methods used for
classification of different disease using convolutional
neural network. [14] Analyzed public perception
through sentiment analysis(sad, anger, joy and fear)
regarding black fungus by using Support vector
Fig. 2 Convolutional Neural Network
machine.[13] Binary tree representation is needed to
solve the eye detection and localization problem. The model takes the eye as an input image from the
dataset. The Convolutional Neural Network (CNN) is made up
II. RELATED STUDY of four basic layers which are the Convolutional layer, the
Normalization layer, and the Pooling layer to extract the high-
level features out of the images and then feed them to a Fully
The black fungus infection epidemiology and diagnosis of Connected layer. These layers are stacked up on each other
mucormycosis are occurred due to fungi of the order and used multiple times. A filter in a 2D Convolutional layer
Mucorales [8][9]. Depending on the clinical side it is has been initialized with random weights. The Conv2D
classified as rhino cerebral, cutaneous, pulmonary, or other. performs the operation by multiplying pixel intensities with a
The disease was found in 1876, when Fur-binger found in corresponding value of filters and then taking the average
Germany a patient who died of cancer. Most of the report value. But the resultant image might have positive and
regarding the epidemiology of mucormycosis derives from negative pixel intensities too. So, in the Batch Normalization,
case reports and sample series. The different eye disease can all the negative pixels become zero by using ReLU activation.
be predicted by Deep Convolutional Neural Network(DCNN). A ReLU is the rectified linear unit, it does not change positive
Here is predicting and finding different eye diseases, intensities but it changes all the negative values to zero and is
glaucoma, maculopathy, pathology, retina pigments, and used for each convolutional layer. By lowering the number of
myopia. proposed to transfer learning methods and trained pixels in the output from the preceding convolutional layer

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 744


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and taking one maximum value from the pooling window size, IV. DATASET DESCRIPTION
the MaxPooling2D layer minimizes the dimensions. The
feature map is flattened after pooling, and it turns all matrices The implementation starts with data collection. We
collected the images from a dataset on Kaggle
into a single vector, which is then sent back to the neural
(https://www.kaggle.com/datasets/kondwani/eye-disease-
network for processing. The completely connected layer is
dataset) and Google open source. The dataset contains 800
coupled to the neural network through the dense layer. Our images from seven classes which are 124 bulging eye images,
CNN model comprises 10 layers . Hence, the model has 1 fully 147 cataract images, 149 crossed eye images, 122 glaucoma
connected layer with 32 filters and the input layer size is 224 images, 146 uveitis images, and 80 normal eye images. No
224 3. A ReLU activation is used for each convolution sufficient dataset of images with Black fungus eyes has been
layer. Digital images are 3D arrays in which each pixel values found, so we created our own custom dataset. We manually
are integers that range from 0 to 255. Table 3 shows that CNN analyzed all collected data and deleted the unrelated ones. We
model with augmentation refines the concepts and provides divided the data into two groups: 80% for training and 20%
greater execution. for testing. In order to model the affected eye and type of
normal eye as well, we manually assigned labels (0 to 6) to the
T ABLE III. TEST EXACTNESS WITH CNN resulting dataset, which is summarized in Table 1. We
assigned only one label of every category to each of the
images. Figure 1 shows the portrayal of the dataset.

T ABLE I. DAT ASET LABELS FOR CLASSIFICAT ION

0 Bulging eyes
Data pre-processing is the first and most important stage,
1 Cataracts
which allows us to resize and process images by transforming
our raw data into a usable format. In data pre-processing 2 Crossed eyes
dimensionality reduction is a crucial stage because the number 3 Glaucoma
of characteristics keeps growing, requiring us to downsize the
4 Mucormycosis
photos in order to train the model. All pre-processing steps
should apply to the training as well as the testing set. 5 Normal
Following the testing phase, the model can predict eye 6 Uveitis
diseases. Figure 3 shows the methodology of this study.

Fig. 1 Sample Images of mucormycosis, glaucoma, uveitis, cataract, bulging,


crossed, and normal eye

A.Data augmentation

In data augmentation we get more dataset for training and it


creates new data from our existing data set to create more
samples. So it is realized that the creation of new augmented
data by making reasonable modifications to data in our
training set by flipping other images either horizontally or
Fig. 3 Implementation of the methodology vertically, zoom in or out, crop, rotate (-20 to 20 degrees) and
even vary the color of the images. By using
ImageDataGenerarator from keras which helps us to apply all

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 745


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

the data augmentation techniques. Data augmentation reduces accuracy and loss do not change much. The training accuracy
overfitting in the images because we will get more differences is increasing linearly and overall precision is low. [2] & [11]
in the images and greater variance. Table 2 indicates the size So this model is over fitting because of limited dataset. So we
of the train and test set. use data augmentation technique to reduce this overfitting.
T ABLE II. CLASSIFICAT ION OF OUR DATASET

T ypes of T raining data Augmented training T est data size


Class size size

All 800 3810 170


classes

A.Data visualization
(a) (b) (c)
activation of the Grad-CAM classes is one of the initial steps
toward interpretability. Grad-CAM (gradient weighted
activation mapping) is an acronym for gradient weighted
activation mapping. By using data visualization, we can see
which individual region in the image has the highest-class
activation since we can extract a layer from the CNN and
analyze the neural network as it is trained on an image like
Fig.4. The core idea behind grad-CAM is to use the gradient
to understand each parameter affecting the final convolutional (d) (e) (f)
layer, then use that information to create a localization map
showing the image's key regions. The feature map activation
shows the original final convolution output and gradients of
this prediction in Fig.4. Mucormycosis eye. The weights from
the feature map are used to create a heatmap.

(g)

Fig. 5. (a) Mucormycosis (b) Bulging eye (c) Cataracts (d) Crossed eye
(e) Glaucoma (f) Uveitis (g) Normal eye

Fig.4. Visualization of Mucormycosis eye using grad-CAM

V. RESULTS

A CNN model is designed to predict Mucormycosis and


also other eye diseases including bulging, cataract, crossed,
glaucoma, and uveitis from the normal eye. The CNN model
implemented through the use of KERAS and TensorFlow
libraries is measured for model accuracy. A model training a) b)
part was fully implemented on the Google Colab. We were
able to obtain a 70% accuracy rate by employing our efficient Fig. 6. (a) T raining accuracy and (b) T raining loss
approach. We used the categorical cross -entropy loss function
We have done the data augmentation to prevent overfitting
and the Adam optimizer for the model compilation stage.
before training the CNN Model. Figure 7 shows the
Figure 5 depicts the sample selection used to demonstrate that
augmented image.
this method is effective. Figure 6 illustrates the model training
process of the proposed approach. After 10 epochs, the

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 746


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig.7 . Data augmentation

A. Web Evaluation

For evaluation we created a web page with Python and (b)


Bootstrap expedite the eye disease prediction process with
computer vision and deep learning. Figure 8 represents the
predicted eye disease to accuracies such as mucormycosis of
86%, bulging eye of 89%, cataract eye of 89%, crossed eye of
95%, glaucoma eye of 90%, uveitis of 95% and normal eye of
71%. Figure 8 illustrates the confusion matrix of the proposed
solution on the test dataset. The group labels are 0 used for
Bulging, 1used for Cataract, 2 used for Crossed eye, 3 used for
Glaucoma, 4 used for Mucormycosis, 5 used for Normal, and
6 for Uveitis.

(c)

(a)

(d)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 747


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig.8. Confusion matrix

b. Performance Metrics

The performance metrics of classification is


( e) calculated by using different methods. The confusion
matrix give the real output and predict output is
formed by segmentation or classification methods.
Figure 8 shows the confusion matrix for proposed
method.

Precision=

Accuracy =

Recall =

Classification Precision Accuracy Recall

Bulging eyes 0.6 0.9 0.37

Cataracts 0.81 0.96 0.9

Crossed eyes 0.69 0.79 0.86


(f)
Glaucoma 0.42 0.81 0.61

Mucormycosis 1 0.98 0.66

Normal 0 0.94 0

Uveitis 0.71 0.93 0.62

True Positive: Accurate segmentation or


classification
False Positive: Incorrect segmentation or
classification
False Negative: Erroneous Classification of true
tumor tissue as non-tumor
(g)
True Negative: Accurate prediction of non-tumor
Fig. 8. (a) Mucormycosis (b) Bulging eye (c) Cataracts (d) Crossed eye tissue as non-tumor
(e) Glaucoma (f) Uveitis (g) Normal eye

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 748


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VI. CONCLUSION [13] J. Wu and M.M. Trivedi, “ A binary tree for probability learning in eye
detection”, IEEE 2005 Computer Vision and Pattern Recognition Conference, pp.
164–171, 2005.
we presented an intellectual knowledge based
[14] M. N. Islam, N. I. Khan, and T. Mahmud, “ COVID-19 and black fungus:
feedback for eye diseases prediction. Even though it was only
analysis of the public perceptions through machine learning,” Health Science,
trained on 800 pictures, the Convolutional Neural Networks 2021.
system is accurate in evaluating eye diseases in this study.
With a higher quality dataset, we could go one step further and [15] A Anitha, P Padmapriya, P Preethi, T Swetha, K Banumathi , “ Fundus Image
predict eye diseases based on the image. We were able to Classification of Eye Disease Using CNN Method (Convolution Neural Network)”,
International Research Journal of Engineering and Technology (IRJET), Vol.8,
reduce the overall project size from 3 GB to 2.19 MB using no.4, 2021.
TensorFlow. This would help us to deploy the project in an
easy and convenient way. Based on the accuracy, we've seen [16] Chai Y, Liu H, Xu J, “ Glaucoma Diagnosis Based on Both Hidden Features
that our eye detection technology can permit modernization and Domain Knowledge through Deep Learning Models”, Knowledge-Based
for future applications. This technology speeds up the Systems, 1- 29,2018.
procedures, reducing the amount of time spent detecting eye [17] Dong Y., Zhang Q., Qiao Z., Yang J. Classification of cataract fundus image
diseases to a higher level. This study paves the way for future based on deep learning; Proceedings of the 2017 IEEE International Conference on
partnerships on these initiatives in general, and on the Imaging Systems and Techniques (IST); Beijing, China. 18–20 October 2017; pp.
prediction of eye disease in particular. 1–5.

VII. REFERENCES
[1] Sushma K Sattiger, Harshith N, Dhanush Gowda N, K A Ullas, Aditya M S
“ Eye disease identification using Deep learning”, International Research Journal of
Engineering and Technology (IRJET), Volume: 09 Issue: 07 , July 2022.

[2] Jesil Mathew Aranjani, Atulya Manuel, Habeeb Ibrahim Abdul Razack, Sam T.
Mathew, “ COVID-19–associated mucormycosis: Evidence-based critical review of
an emerging infection burden during the pandemic’s second wave in India”, PLOS
Neglected Tropical Diseases, vol.15, no.11, 2021.

[3] Richardson M. “ The ecology of the Zygomycetes and its impact on


environmental exposure external icon”. Clin Microbiol Infect, vol.15, no.10, pp.2-
9, 2009.

[4] Michael D.Abramoff, Mona K.Garvin, Milan Sonka, ” Retinal Imaging and
Image Analysis”, Proceedings of IEEE, vol.3, no.12, 2010.

[5] Rikiya Yamashita, Mizuho Nishio, Richard Kinh Gian Do, Kaori Togashi,
“ Convolutional neural networks: an overview and application in
radiology”, Insights Imaging 9, pp.611–629, 2018.

[6] Shruthi Bhat, Som Mosalagi, Tejal Bhalerao, Pushpak Katkar, Rahul Pitale,
“ Cataract Eye Prediction using Machine Learning”, International Journal of
Computer Applications, vol.176, no.35, 2020.

[7] Anna Skiada, Ioannis Pavleas, Maria Drogari-Apiranthitou, ”Epidemiolgy and


Diagnosis of Mucormycosis: An Update”, Multidisciplinary Digital Publishing
Institute (MDPI), vol.6, no.11, 2020.

[8] Karthikeyan.S, Ramkumar.G, Aravindkumar.S, Tamilselvi.M, Ramesh.S,


Ranjith.A, ”A Novel Deep Learning-Based Black Fungus Disease Identification
Using Modified Hybrid Learning Methodology'', vol.2022, no.1, 2022.

[9] Chen Guo, Minzhong Yu, Jing Li,” Prediction of Different Eye Diseases Based
on Fundus Photography via Deep Transfer Learning”, Multidisciplinary Digital
Publishing Institute (MDPI), vol.10, no.11,2021.

[10] Jonathan Griffin, Andrea Ramirez,” Convolutional Neural Network for Eye
Tracking Algorithm”, 2018.

[11] Jerry, Chi Ling Lam and Moshe Eizenman,” Convolutional Neural Networks
for Eye Detection in Remote Gaze Estimation Systems”, vol.1, pp, 2008.

[12] B. Fasel, “ Robust face analysis using convolutional neural networks,” in


Proceedings of the International Conference on Pattern Recognition (ICPR 02), vol.
2, 2002, pp. 40–43.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 749


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Artificial Intelligence based System in Protein


Folding using Alphafold
Pragya Srivastava Shreyansh Suyash N. Jayapandian
Department of CSE Indian Institute of Technology Department of CSE
CHRIST (Deemed to be University) Indian School of Mines, Jharkhand, India CHRIST (Deemed to be University)
meethi7499@gmail.co m suyash.sh19@gmail.com Jayapandian.n@christuniversity.in

Abstract— Artificial Intelligence has a high potential to solve explicit, three-dimensional shapes for their proper functioning.
many real-world problems. In the recent years researchers are Unfolded or misfolded proteins are either fixed or destroyed by
dealing with one of the biggest complications in biology, which is enzymatic action. These proteins if not fixed can cause serious
protein folding. With the assistance of technology, we can foresee disorders. Alzheimer's, Parkinson's, and Huntington's diseases
how proteins fold from a chain of amino acids into 3D shapes are some examples of neurodegenerative diseases which occur
that do life's errands. There are mainly three big problems due to accumulation of misfolded protein molecules [5].
associated with folding of proteins. The first problem is there any
particular folding code. The second one there is a folding system. Protein folds in four stages that are primary protein folding,
Then the final problem is we able to determine the 3D structure secondary protein folding, tertiary protein folding and
of proteins. Proteins are the microscopic machines and structural quaternary protein folding. The primary protein folding
building blocks of our cells. They carry out important functions structure is the unfolded polypeptide chain in which amino
like breaking down foods, storing oxygen and forming scaffolds acids are bonded by peptide bonds forming a structure like a
to help cells keep their shape. Each one is built up of one amino chain [6]. The secondary structure is the protein starting to fold
acid chain that folds in on itself into a mostly defined structure. with the help of non-covalent interactions like hydrogen bonds.
Each part of our body and in any other organism is made either Different secondary structures are formed in this stage, like the
from or by proteins and this is true for every living creature, alpha helix and beta sheets. In the case of alpha helix, a
even for viruses. The structure of very small proteins can be
particular portion of the polypeptide chain (depending on the
foreseen using the computer method. This article is all about the
protein folding problem with more spotlights on the role of AI- sequence) forms a helical structure held by hydrogen bonds.
based systems in protein structure forecasts. The motivation Beta sheets are more like a two dimensional sheets formed by
behind this article is to convey an overall understanding of AI- adjacent amino acid chains held together by hydrogen bonds.
based answers for protein folding problems. The tertiary structure is a protein folded into a more condensed
form where different secondary structures are held together by
Keywords— Artificial Intelligence; AlphaFold; Biomolecules; different non-covalent interactions like hydrogen bonds,
Protein folds; 3D structure; Molecule Vander Waal interactions, and hydrophobic interactions and in
some cases ionic interactions and disulfide bridges are also
involved. Most of the proteins are found in their tertiary
I. INT RODUCT ION structure only which determines their functions [7]. The
quaternary structure is the association of different protein
How exactly does a protein fold? This unsolvable mystery subunits. These subunits interact with one another forming a
of molecular biology has hampered almost 50 years of more closely packed structure. The most relevant example is
advances in medication and biotechnology [1]. Presently, on hemoglobin which is present in our blood. Machine learning
account of astounding advances utilizing AI this stupendous plays a major role in this protein folding [8].
test is viewed as tackled, opening the way to an altogether new
time of AI helped by computational science [2]. Proteins play The change in the shape of a protein results in a
various parts in our body; they contract our muscles, digest our conformational change in the binding pocket of the protein and
food, fire our neurons and power our safe framework. All that this alteration may cause inactivation of the protein molecule,
occurs in science nearly occurs with the contribution of so, if we are able to understand the folded shape of protein
proteins. Proteins are an important component in an organism targets it will help in designing the drugs as inactivation or
often termed as ‘structural blocks of life’. These biomolecules activation of a particular protein involving in a disease can be
have different shapes and functions [3]. Also, these functions done. Experimental analysis of a protein's structure requires
are dependent on the shape of the protein molecule, yet proteins in crystallized form, but some proteins like
understanding the folding of a protein molecule in that special hydrophobic membrane proteins are very difficult to crystallize
shape is an undeniably challenging undertaking. Inside our as they aggregate in aqueous solutions [9]. This difficulty in
body protein folding occurs in a special compartment of a cell sample preparation makes the experimental methods a time-
called the endoplasmic reticulum [4]. This is an essential cell consuming process, also, the result analysis and structure
process, since proteins should be accurately folded into determination part is lengthy as it is based on trial and error

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 750


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

using data from different methods .Unlike this, computational of researchers in computational biology has been related to the
methods accurately predict and visualize a protein's structures structure of protein prediction and figuring out relations
and that too in a shorter span of time. With the introduction of between 3D structures of proteins and its sequence of amino
AI in the field of protein structure prediction it is being acid [12]. This could assist with speeding up the drug
speculated that it in future it will play very important role in discovery process as the fast and comparatively less expensive
increasing the current databases of protein structures and also computational method replaces slow and expensive
in improving our understanding of relation between a protein experimental methods. In this event different research groups
sequence and its 3D structures [10]. In structure prediction, can participate and try to figure out the shapes of unknown
numerous accessible data sets and bioinformatics strategies can proteins using their own structure prediction technique. The
assist with finding the variables responsible like folding and event organizers identify proteins which are to be solved, and
stability of proteins and to anticipate the most favorable and the participating groups have roughly 1 to 1.5 months to
stable 3D structure from the sequence of amino acid. Mostly In predict their structures. In CASP1 in 1994 there were only 35
recently developed tools utilize an AI strategy named deep predictor groups and 24 target sequences but eventually this
learning which can foresee the s hape of proteins to the closest number increased and in CASP7 in 2006 there were over 200
atom. groups and 100 plus targets. If there is a mutation in a protein
of an individual, this may cause failure in protein folding due
to change in the sequence of amino acid of that particular
protein. However, mutation is not the only reason behind the
failure of protein to fold, not every time protein folds in its
destined conformation, that is success rate of protein is high but
not 100%. As protein function is dependent on its 3D structure,
the correct folding of protein is necessary. Techniques which
are used to analyze 3D structure of proteins require protein
molecules in crystallized form. Use of experimental methods to
find the shape of protein in the form 3D structure is still a
costly and complicated process. The exact 3D structure is
recognized for just a minute fraction of the proteins which are
present in the nature and are known to science. This gap in
known protein and known structure needs to be filled at the
Fig. 1. Different Stages of Protein Folds earliest as it can be very helpful in tackling different diseases,
also, our understanding of how the living system will enhance.
The figure 1 is deliberate the different stages of protein At present 100 million proteins are already known to us and
folds [11]. According to Christian Anfinson’s theory, a protein this number is increasing every year. The most important point
3D structure can be completely determined by sequen ce of its is each protein molecule has a unique 3D structure that
amino acid. This hypothesis led researchers to invest their determines its function.
resources in computationally predicting the protein shapes on
the basis of on its sequence of amino acid. The major challenge III. PROBLEM ST AT EMENT
faced by the scientists working in this field was that a pro tein
The process by which protein get its mature, stable and
can theoretically fold in numerous ways and this number can
functional tertiary shapes is called protein folding, and it
be astronomical. An American molecular biologist Cyrus
generally starts along with the translation process of mRNA. In
Leventhal mentioned that if we try to calculate the number of
molecular biology many problems are unsolved [13], but the
all possible configurations for a protein molecule. It would
most important problem is protein folding that is getting the
consume a lot of time to complete that calculation, it is a very
accurate shapes of protein in the form of 3D shapes from the
time consuming process. However, this is not what happens in
sequence of its amino acids [14]. There are a huge number of
nature, in a living system the proteins fold independently, few
collaborations between the different atoms of single protein
can even fold in a less than milliseconds. This paradox then led
molecules and this is the main difficulty which arises while
to a new approach of predicting folding pathways to get the
modeling [15]. The total number of interactions is so large that
most stable conformation or native state of a protein molecule
it is difficult even for modern computers to handle. Protein
and ever since then, scientists from all over the world have
folding is a highly sensitive process and it is affected by
been trying to predict these folding pathways and get the
various external factors which includes temperature, pH, and
modeled structure using advanced computational techniques
chemicals present in the system and number of molecules.
involving computer simulations in which physical interactions
These factors may alter the ability of protein molecules to fold
between the atoms of the molecules is approximated, this helps
and attain their correct native structure or functional form.
in understanding the folding process.
There could be some complications in this folding process due
II. ST AT E OF A RT to genetic mutation in an individual human which changes an
amino acid sequence in the protein molecule. Generally, these
The issues of protein folding has glimpse of tremendous kinds of mutations are found in inherited genes, where it affects
progress in recent days. New computational and theoretical only a particular protein molecule and its function. The three
methodologies have been introduced which includes multiple- experimental techniques are available. The experimental
sequence alignments, three dimensional structure databases or techniques are highly accurate but at the same time they are
web servers, highly accurate force fields. The major objective

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 751


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

very laborious and time taking. The shortcoming of these At the time of launch the database was not this huge but
techniques is that being a time taking process it restricts us to contained 3D models predicted by Alpha Fold of almost the
minimize the difference between available sequence of protein full UniProt proteome of humans and also of 20 different
and the 3D shapes of the protein. Figure 2 is movement of model organisms, making the total structure, over 365,000.
amino acid sequence to 3D structure. With more people working in this field the number of predicted
structures is increasing every day. Alpha Fold showed us a
newer approach for structure prediction and changed the
traditional dependence on experimental techniques .
DeepMind claims to have instructed the Alpha Fold
program more than 170,000 proteins for which sequence and
structure were already known. Alpha Fold uses a deep learning
technique, the attention network which enables it to break
down the problem in small parts. The AI algorithm then
focuses on these small parts which are later put together to
obtain the overall solution. In the case of Alpha Fold a total of
100-200 GPUs power was used for the overall training. Even
with this hardware system the overall training took a few
weeks to complete after which additional few days would be
required for each protein structure. Alpha Fold 1 is not mu ch
Fig. 2. Amino Acid Sequence Structure complicated architecture; an intricate feature extraction process
initiates the complete program. Also, Multiple sequence
IV. PROPOSED M ET HODOLOGY alignment is performed for the query sequence using an
external database. Multiple sequence alignment is performed in
Alpha Fold is a Computational science approach which
utilizes machine learning aimed at the prediction of highly order to compare the query sequences or the sequence of the
accurate three-dimensional protein structure. The combination desired protein to similar protein from different species which
are descendants of a common ancestor. The basic idea of
of bioinformatics and physical approaches is known as Alpha
Fold. Alpha Fold is newly developed program based on AlphaFold1 is to take the query sequence or the desired protein
sequence and then search some external databases to obtain
Artificial intelligence. This was designed by Google's
DeepMind and helps in predictions of 3D structure or shapes of some evolutionary matches in the protein sequences from
closely related species. The obtained information along with
biomolecules (especially proteins). This program is dependent
on a deep learning system that utilizes protein’s amino acid some additional input features is then processed into a 2-
sequence to predict it’s in the 3D structure. It mostly achieves dimensional array. This convolutional network is quite similar
high accuracy competitive with experiments. In CASP14, to the one generally used in image classification. The output
Alpha Fold was the top-ranked protein structure prediction from the complete program is obtained in the form of a
distogram which contains information about the protein
technique by an outsized margin, predicting with high
accuracy. Alpha Fold had the foremost correct predictions of molecule, the sequence of which was fed in the program for
structure prediction. Distogram contains a fixed number of
any CASP participant in its 25-year history by a good margin.
Alpha Fold uses convolutional neural networks and has an rows and columns forming a two-dimensional array which has
data of distances between amino acid residues of the protein.
incredible architecture which can not only predict but also
refine the predicted structure to get the best model. An iteration This helps in determining the three-dimensional distance
process is adopted by Alpha Fold to increase accuracy of its between amino acid residues. A distogram can be considered as
a representation or projection of the 3D structure of the protein
predictions; it also has an internal measure. This assessment we
can check the reliability of its predictions. It is derived from an in two-dimensional form. Since the distogram is dependent on
the distance between amino acid residues it does not change
already available metrics in protein structure prediction. The
regions with high accuracy get a high score and likewise with rotation or translation of the whole protein molecule. Also
as the distance between amino acids measured from A amino
regions with lower accuracy are given low scores, this scoring
system does not depend on the accuracy of the whole predicted acid to B will be the same as measured from B to A, the
protein model. This helps Alpha Fold to continuously improve distogram formed is symmetrical across its principal diagonal.
To convert this distogram data into 3D prediction AlphaFold1
its predictions which results in a more accurately predicted
structure of protein molecules. DeepMind collaborate with the uses Gradient Descent approach. This 3D prediction can be
observed in the form of a physical model of protein molecule
European Molecular Biology Laboratory has published a
database with over 200 millions protein shapes from 21 model and parameterized by psi and phi angles between carbon-
carbon atom and carbon-nitrogen atom respectively. This
organisms. This database is open source so can be accessed by
anyone and all the structures in this database have been obtained backbone structure is refined iteratively by scoring
predicted using Alpha Fold. This database consists the very function which depends on both the prediction obtained by
high accuracy. Previously the number was as low as 17%, neural network and set of physical forces. This iterative
which were obtained through experimental techniques. On refinement helps in obtaining the most favorable and accurate
conformation of protein molecules.
July 22,2021 the database was launched, and in such short
span of one year it has already reached the 200 million mark.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 752


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Alpha Fold 2 follows a similar pattern but uses a slightly time span, but it falls behinds conventional / Experimental
different approach. There are three main building blocks. First Method in prediction of complex protein structure and
one is pre-processing stage - In this stage additional detection of active sites . In addition to this, AlphaFold2 will
information about the sequence to be fed is extracted from also search for structural templates. These structural templates
different external databases. All the information is used to are known protein structures, the sequence of which is similar
perform the multiple sequence alignment. Second one is to the query sequence. The information’s from the MSA of the
mapped MSA and a pair representation are then refined by an input sequence and from the template structures are then
unique system, Evo former. Evo former is a transformer-like integrated into MSA representation and pair representation.
network which is 48-layer deep and uses attention mechanisms These information’s are further refined multiple times before
to refine and update the MSA and pair representations. Final passing on to the structure module. Before being forwarded to
component of Alpha Fold is generally called the structure the structure module, the MSA and pair representations are
module. It is fed with the outputs obtained from Evo former passed to the Evo former. Evo former has 48 layers and helps
and transforms that into three-dimensional coordinates of the with the refinement of information; each block has an MSA
protein molecule. Like AlphaFold1, AlphaFold2 also initiates and a pair representation as input as well as its output and it
with creating multiple sequence alignment of the fed protein processes them with several layers. The Alpha Fold not only
sequence. predicts the positions of each residue in the protein, but it also
shows how certain the program is about the predicted structure
Table I: Conventional Method Vs Alpha Fold
and this is represented through different color gradients. Alpha
Fold was first trained using all the available protein structures
Conventional
Parameters Alpha Fold in the Protein Data Bank but then it predicted the structures of
Method
roughly 300,000 additional proteins with unknown structures
and recently this number is increased to 200 million; the
Tools XRD, NM R and AI/M L
predicted structures in training stage were added back to the
CryoEM
training dataset for further training and refinement out of these
Duration Takes relatively more M uch less time is added predicted structures only the ones that Alpha Fold is
time required more certain of correct prediction with high precision were
used for further processing. To increase the depth and to refine
M anual input For sample No manual input is each model the prediction outputs were fed back into the same
preparation manual required module multiple times. Alpha Fold is able to predict protein
input is required structure accurately even with some odd cases like intertwined
homomers or complex protein structure which is dependent on
Accuracy Highly accurate Recent study suggests non-protein molecules for folding. Alpha Fold has made it is
it to be relatively more possible to design many more life-saving drug therapies by
accurate targeting proteins. Alpha Fold has some limitations like it is
difficult to interact with protein and multimer that are not
Prediction of Comparatively more Accurate prediction of present in the protein database bank. Alpha Fold is designed by
protein complex reliable protein complex using the Convolutional Neural Network. The architecture of
structure is a bit Convolutional Neural network is Alex Net. Alex Net
difficult architecture are used for image detection task. Alex Net has 8
layers in which there are 5 connected layer and 3 fully
Based on Chemical Database of known connected layer. Pooling layers are reducing the size of images.
composition of the structures and For images detection we can use the ANN i.e., Artificial
protein molecule evolutionary relation Neural Network but Artificial Neural Network has some
disadvantages like it required too much computation. In Alpha
Post translational NM R can identify Alpha Fold does not
Fold we need a less computation time for image detection or
modifications effects of PTM s consider impact of shape detection for numbers of proteins. In Convolutional
(PTM s) PTM s on protein
Neural Network connections sparsity reduce overfitting. With
structure
the help of convolutional neural Network and pooling gives the
Database size Number of protein Increasing at an location invariants features detection. Convolutional Neural
structure increasing enormous rate Network helps in Parameter sharing which means parameter of
but slowly A filter can be apply in the entire images. With the help of
information or data Alpha Fold able to design or construct a
Active site Detects and Not much effective in graph of similar related to amino acid. Alpha Fold is a kind of
characterize protein detection of active sit deep residual neural network. AlphaFold is an example that
ligand binding technologies like AI (Artificial Intelligence) are often very
useful in bioscience. Alpha fold software has two version that
is Alpha Fold 1 that launched in 2018 and Alpha Fold 2 that
The table I is the comparison of conventional method and launched in 2020. Alpha Fold after making the database public
Alpha Fold method. This table indicates that Alpha Fold is and providing the colab version gained immense attention not
better at providing highly accurate protein structure in shorter only from researchers but also from entrepreneurs and it is

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 753


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

highly expected that there will be a rise in both biotech structure determination using different tools and techniques. It
research and startup ecosystem utilizing this incredible AI was established in 1994. This community conducts a
system. Two major fields where AlphaFold is very useful are competition for protein structure prediction every 2 years. In
drug discovery and protein designing. recent years integration of AI in protein structure prediction
tools has increased. Deep Mind's AlphaFold and AlphaFold 2
are prime examples of this. Both these versions of AlphaFold
won the last two CASP events in 2018 and 2020 indicating this
AI integration in protein structure prediction to be successful.
Table II is provide the comparison AlphaFold and AlphaFold2.
Table II: Comparison of AlphaFold Vs AlphaFold2

Details AlphaFold AlphaFold2

Releases AlphaFold released on AlphaFold 2 released


date July 2018 on July 22,2020

Availability Data is available freely Predictions are freely


for both commercial use available for the
and educational use. scientific community.
Source code is available Google colab version is
on Github also available.

Limitations AlphaFold can predict AlphaFold 2 are not


the shape or structure of able to accurately
protein; only the similar predict the protein
Fig. 3. Proposed Flow Model of 3D Structure structure of proteins is complex structure.
available in the protein
As Alpha Fold is able to predict a large number of protein
database bank.
structures in much less time it has made it possible to work
efficiently in different fields like biotechnology, food CASP In CASP 13 AlphaFold In CASP 14 AlphaFold
technology, drug development and agriculture. Understanding secured the first rank in secured the first rank in
the structure and function of a protein molecule has got a new overall ranking. the overall ranking.
and effective approach and using these approach researchers
are now able to predict protein structures from different Package AlphaFold does not have AlphaFold 2 has a pre-
organisms including the newly discovered SARS-Cov-2 virus. a pre-processor pipeline. processors pipeline.
AlphaFold is the best example that defines the power of With the help of a
Artifical Intelligence in life Science. AlphaFold is an important pipeline we can execute
tool for biopharma research. The structure of AlphaFold is try the number of
to disclose the cause of rare genetic diseases. With the help of programs for executing
AlphaFold helps in discovery of drugs and it also help scientist the database query.
to find potential medicines. With the help of Alpha Fold one of
the fiendish puzzles solve in biology that is nuclear pore Table III: Comparison of Finest Prediction
complex. AlphaFold prediction helps in to interpret and
complete any areas that are unclear. Data Set Name AlphaFold AlphaFold2
Data Set 1
V. RESULT AND DISCUSSION 23 35
(43 protein targets)
AlphaFold is predicting only the single state. It is very
Data Set 2
difficult to figure out the state of protein which is captured by 41 48
(55 protein targets)
Artificial Intelligence. AlphaFold 2 is an advanced version of
AlphaFold 1 with better accuracy or efficiency. The size of the Data Set 3
53 62
database is increasing at a very high rate and has already (68 protein targets)
surpassed the experimental database. Last year the size of the Data Set 4
database was around one million but this year the size o f the 68 75
(80 protein targets)
database is over 200 million. In the future it is expected to Data Set 5
increase furthermore. In AlphaFold and AlphaFold2 no manual (97 protein targets) 79 88
input is required. For input AlphaFold uses the similar
sequence and from the similar sequence get the information or
data with the help of a neural network. For the design or The table III and figure 4 is deliberate the finest prediction
production of the structure, pass the information to another accuracy levels. This will indicate the performance of the
neural network. CSAP is a community focused on protein AlphaFold2. The average finest prediction level of AlphaFold

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 754


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

is 52, at the same time AlphaFold2 finest prediction level is 61. mainly in increasing the accuracy of the prediction. This AI
So nearly 10% of improvement is there in AlphaFold2. system is expected to update and improve in future for better
prediction with high accuracy. Also, AlphaFold was trained
using a dataset of naturally occurring proteins for which
structures were already available, so, it's difficult to assume
that AlphaFold can also predict de novo protein structures with
high accuracy. But with constant growth and improvement of
AI technologies in recent years it is very much possible for
researchers to reduce the limitations associated with Alpha
Fold. Beside the mentioned shortcomings it is also a fact that
this is doubtless one of the most impactful Machine Learning
models of this decade.

REFERENCES

[1] Giwa, S., Lewis, J. K., Alvarez, L., Langer, R., Roth, A. E., Church, G.
M., ... & T oner, M. T he promise of organ and tissue preservation to
transform medicine. Nature biotechnology, 35(6), 530-542. (2017)
Fig. 4. Accuracy level of Finest Prediction
[2] Nikitha, M. A., Swetha, S., Mantripragada, K. H., & Jayapandian, N.
T he Future Warfare with Multidomain Applications of Artificial
Table IV: Comparison of Median Score Intelligence: Research Perspective. In Proceedings of Second
International Conference on Sustainable Expert Systems (pp. 329-341).
Data Set Springer. (2022)
AlphaFol d AlphaFol d2
Name [3] Roden, C., & Gladfelter, A. S. RNA contributions to the form and
Data Set 1 58.9 87 function of biomolecular condensates. Nature Reviews Molecular Cell
Biology, 22(3), 183-195. (2021)
Data Set 2 62 89 [4] Ma, W., & Mayr, C. A membraneless organelle associated with the
Data Set 3 69 91 endoplasmic reticulum enables 3′ UT R-mediated protein-protein
Data Set 4 73 93 interactions. Cell, 175(6), 1492-1506. (2018)
[5] Johnston, H. E., & Samant, R. S. Alternative systems for misfolded
Data Set 5 65 92 protein clearance: Life beyond the proteasome. T he FEBS Journal,
288(15), 4464-4487. (2021)
[6] Biswas, G., Ghosh, S., Basu, S., Bhattacharyya, D., Datta, A. K., &
Banerjee, R. Can the jigsaw puzzle model of protein folding re‐
assemble a hydrophobic core?. Proteins: Structure, Function, and
Bioinformatics. (2022)
[7] Skolnick, J., & Gao, M. T he role of local versus nonlocal
physicochemical restraints in determining protein native structure.
Current Opinion in Structural Biology, 68, 1-8.(2021)
[8] Sree, S. R., Vyshnavi, S. B., & Jayapandian, N. Real-world application
of machine learning and deep learning. In 2019 International Conference
on Smart Systems and Inventive Technology (ICSSIT ) (pp. 1069-1073).
IEEE.(2019)
[9] O’Keefe, S., Zong, G., Duah, K. B., Andrews, L. E., Shi, W. Q., & High,
S. An alternative pathway for membrane protein biogenesis at the
endoplasmic reticulum. Communications Biology, 4(1), 1-15. (2021)
[10] Jumper, J., Evans, R., Pritzel, A., Green, T., Figurnov, M., Ronneberger,
Fig. 5. Median Score Levels O., & Hassabis, D. Highly accurate protein structure prediction with
AlphaFold. Nature, 596(7873), 583-589. (2021)
The table IV and figure 5 is discussed about median score. [11] Maguire, J. B., Haddox, H. K., Strickland, D., Halabiya, S. F., Coventry,
The median score indicates the performance of both models. B., Griffin, J. R., & Kuhlman, B. Perturbing the energy landscape for
The average median score of AlphaFold is 65.8, similar to that improved packing during computational protein design. Proteins:
average median score of AlphaFold2 is 90.4. More than 30% is Structure, Function, and Bioinformatics, 89(4), 436-449. (2021)
getting the better performance in AlphaFold2. [12] Marx, V. Method of the year: Protein structure prediction. Nature
methods, 19(1), 5-10. (2022)
VI. CONCLUSION [13] Das, S., Vera, M., Gandin, V., Singer, R. H., & T utucci, E. Intracellular
mRNA transport and localized translation. Nature Reviews Molecular
Alpha Fold is an engineering masterpiece developed by one Cell Biology, 22(7), 483-504. (2021)
of the most exceptional minds working at Deep Minds. This [14] Smys, S., and Jennifer S. Raj. "Future Challenges of the Internet of
integration of AI in biological studies is going to improve the T hings in the Health Care Domain-An Overview." Journal of T rends in
existing computational biology approach and will become an Computer Science and Smart T echnology 3, no. 4, 274-286 (2022)
integral part of different fields in biological sciences including [15] Hariharakrishnan, Jayaram, and N. Bhalaji. "Adaptability Analysis of
drug discovery, antiviral therapies and determination of disease 6LoWPAN and RPL for Healthcare applications of Internet-of-T hings."
pathways. However, there is still some scope of improvement Journal of ISMAC 3, no. 02, 69-81, (2021).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 755


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Online Voice based Smart Security and Automation


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

System for Real Time Application using Artificial


Intelligence
M.Bhavani R.Brinda P.S.Manoharan
Department of EEE, Department of EEE, Department of EEE,
Government College of Engineering, Government College of Thiagarajar College of
Srirangam Engineering, Srirangam Engineering, Madurai
bhavani.shravantika@gmail.com rbrinda7971@yahoo.co.in psmeee@tce.edu

S.Ramalingam
Department of ECE,
Sri Eshwar college of
Engineering, Coimbatore
ramece74@gmail.com

Abstract— Nowadays, security is a major issue everywhere, systems have been shown to be inefficient for alternatives,
and as a result, there are numerous assets available to resolve low-cost replication, and necessary interruptions [2]. The
this controversy. Most security systems have several bank's rooms, houses, shops, and vital stores are seen to
vulnerabilities that can be resolved to access the desired have security penetrates that lead to disastrous impacts that
location, home and environment. Furthermore, theft and cause a huge monetary calamity. Furthermore, it likewise
unauthorized access to places have become severe problems.
prompts the loss of delicate and private data. Conventional
To this end, the design and prototype of an online digital
password lock and automation system were awarded in this locking instruments are sufficiently alarming to analyze
work. This research work will propose the design and physics traded-off access, and security penetrates and does not give
of a basic online security and digital surveillance system. The a solid verification strategy. Electronic locking frameworks
system employs an integrated nodeMCU wireless protocol for are intended to improve security and verification. The
remote security testing via an Android smartphone running scrambled and secure shrewd locking framework can be
the IoT app. This framework is applied with the standard local associated with GSM and Bluetooth [3]. The cell phone is
voice command transmitted to the Google Assistant through currently best in class for a few applications contrasted with
IFTTT and BLYNK platforms. The Voice secret word orders calls and messages. The bank's voice lock frame and various
are then sent to the NodeMCU and control the transfers to kill
applications can be remotely screened in real time using a
on or the gadget associated with the individual hand-off in line
with the client to the Google Assistant. Wi-Fi is used for portable work frame and an internal application.Fig.1 shows
communication between the ESP32 and the cloud and that IFTTT architecture for intelligent homes is given
applications. The digitally intelligent safety system is a special below.
amalgamation that offers an unquestionable remedy to the
safety issues of the various safety functions mentioned above
from that point on. The device was efficiently implemented and
the purpose was performed except for deviations. This study
has much future space because of its security capabilities.

Keywords—Internet of Things, Automation, Webhook,


Google Assistant, BLYNK Server, Security,
Authentication
I. INTRODUCTION
Security is a top priority in today's competitive
world, and people can't figure out how to protect their assets
on their own. Instead, find an alternative that can offer
complete and atomized security [1]. In the ubiquitous
networking network, where individuals can without much of
a stretch, access their data whenever, anyplace, individuals Fig.1 shows the IFTTT architecture for smart home security and
likewise chance to have the option to get to that data automation
whenever, anyplace. Because of this hazard, there is an Day after day, we advance ourselves and our environment to
enthusiasm for individual ID innovation, which can separate outline ourselves as developed. Many years ago, when the
between enrolled real clients and impostors. As of now, a technology was first introduced, i.e., When the first
secret phrase, government disability number, or character computer was created, no one imagined the system being
card is utilized for individual ID. controlled by voice commands.
Everyone needs a locking system. The locking Since we understand that voice transmission is a tremendous
system is traditionally a mechanical lock with a key. These means of communication with less effort, ideas can be easily

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 756


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

defined and executed. In the current scenario, the rigor of numerous disadvantages, such as forgetting the password,
electrical energy is one of the primary issues we face in our being able to crack the password, or being unable to open
everyday lives [4]. This can be serious in the future if we do the door when the power is turned off. A biometric system is
not focus on it as it is. Since we understand that assets are a technological system that uses personal information to
not available in massive quantities, we must use them as identify a person. Biometric authentication systems such as
needed and keep them for future use because if we lose face authentication, fingerprint authentication, and iris/retina
them, they will expire soon and everything will be useless. authentication are used for security [10-14]. Ramalingam et
Therefore, to overcome this situation, a system is proposed al. proposed smart WSN and IoT based data collection and
that will only work when it is to be used. In any other case, monitoring system for waste management, agriculture and
it will go into energy-saving mode. Controlling or switching WSN application [15, 16]. Karupasamy and krishnaraj
units away from the person can be difficult, so we have presents the IoT based smart human health monitoring
developed our proposed system until it can be used remotely system using Blynk Server [18, 19].
by voice [5]. With this functionality, our gadget thus
becomes applicable and environment friendly with an A. Fingerprint Verification
economical budget. This could be a pleasant way to keep The biometric fingerprint lock system allows you to
energy. Many strategies have been introduced to achieve the accumulate ID points. Despite its high security, this system
above objectives can be cloned.

A. Objective B. Face Recognition


The goal of this work is to alleviate the existing
A facial recognition system is a logical piece of
difficulties and inconveniences experienced by seemingly
technology that links particular facial images with labeled
frail individuals in lock systems. By using voice passwords
for Android apps, it also improves physical security. The facial expressions. However, alterations in human
aim of the proposed work contribution in, appearance, such as hair, age, ambient light, and facial
expression, have an impact on 2D human face recognition.
 Internet of thing Blynk IoT platform
 IFTTT -Google Assistant and webhook C. Retina
 Voice control- Long-range communication The bio - metric iris recognition method was used
 High security and low-cost automation for real-time security applications. However, it has a high
cost, is time-consuming, and is complex. However, these
II. LITERATURE REVIEW systems are not perfect. To address these issues, we
Voice recognition is the interdisciplinary area of considered a voice password-based security lock system
computational etymology that creates advances and using a Smartphone voice app.
techniques for perceiving and deciphering words expressed
via PCs into the content. Market contemplation and
III. PROPOSED METHOD
perceived market data confirmed that 4 million home
robotization items were sold in 2013. By the end of 2017, 90 This work proposes an online voice-based security
million computerized goods were purchased domestically, and automation system. Here the system was designed and
according to a similar association [1]. Mechanization is implemented by new IoT esp32 devices. It has low power
characterized as a programmed endeavor of the framework and lost devices. Its operating voltage is 3.3v. This work
without the help of human communication. The electrical proposed IFTTT technology to integrate Google Assistant
switch is situated in more than a few rooms of the house, and webhook. Google Assistant sends the voice code word
making it difficult for the people from the house, especially via the internet and webhook is used for security
those with physical inabilities. A mechanized framework applications. In IFTTT, the India network IP address was
was, in this way, propelled available [2-3]. programmed to connect the system and person. The relay
Existing computerization advances include of circuit is interfaced with esp32 and triggered by IoT. The
Blue-Tooth and Zigbee described in paper [4-5]. The voice code word is sent via Google Assistant and the
biggest drawback of Bluetooth and Zigbee-based corresponding Relay pin is initialized by webhook 1 or 0. If
technologies is how close humans can actually receive data. the password matches the corresponding GPIO pin, it
Three essential components are needed to solve this issue: triggers the Output Devices. If the voice code word is
an internal network with wired or wireless communication correct, it automatically replies to the corresponding status
over the Internet (WC), intelligent control, and automation of output devices through Voice command using Artificial
has been described in paper [6]. An IoT application, by and intelligence. The JSON application code was used in IFTTT.
large, is associated with the sensors such as Humidity and The system contains three modules: android
room temperature for observing the network. With the goal Devices, Esp32 unit, and relay control circuit. The BLYNK
that the computerization strategy is reasonable to specific platform generated a specialized authentication token. This
circumstances and thus it makes agreeable for the client [7- token was written into a webhook using IFTTT. Blynk app,
9]. IFTTT and the Google Assistant apps were integrated into
Since 2000 years ago, we have been using locks the Android device. The control unit includes the
and keys. The electronic locking system on the keypad is NodeMCU microcontroller and the four-channel driver
notable. This system uses a password and a password to control circuit. The signal is sent via Google Assistant Voice
lock the system, so no key is required. However, there are command, automatically triggering security lock and load in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 757


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

an intelligent home. The suggested system was utilized for 3.2.2 Relay
automation and security purposes applications. The
proposed block diagram is given in figure.2. Relay act as an electrically operated switch. It can
be interfaced with an esp32 device. All smart home devices
A. Block diagram and lock mechanism is controlled by relay using IFTTT.
The voice code word is sent through Google Assistant. It
automatically sent the binary signal 1 or 0 to Esp32 devices
via the internet. Fig.4 shows the proposed circuit diagram.

Fig.2 Proposed Block diagram


Fig.4 Relay board
IV. WORKING PRINCIPLE:
VI. IFTTT
The system functions by transmitting a voice
Fig.5 presents the controlling mechanism of
password to the ESP32 device. This mobile app uses Wi-Fi
IFTTT. It means "if this, then that" This site and android
to connect to esp32 devices. The power supply will be sent
application were propelled in 2010. It is generally used to
to the Arduino device, which positions and enters the
defeat any obstruction between the Google Assistant
password. Google Assistant is used to familiarize with
requests and the Blynk application. Webhook and Google
password status information. The esp32device in which the
Assistant facilitate is used to interact with IoT and User
password is already programmed compares the signal given
using Authentication token. The message is communicated
with the stored signal. To lock/unlock the workbench
to user via Internet. Here, we need to make an applet and a
cabinet, a relay control circuit is used. If the passwords
short time later, "This," for example, is the trigger; in this
match, the block is confidential; otherwise, a status message
case, we choose Google Assistant. Next, we type the
is sent to the authenticated person's mobile number via the
commands we want the Google Assistant to carry out in
IoT module, and the block remains unchanged via IoT.
response to those commands, such as controlling the
V. ESP32 relevant machine or movement. In a similar fashion, the
Google Assistant response request can be created as needed.
ESP32 is a dual-core processor and peripherals
The IP address of the Blynk server is currently
inbuilt Low Cost IoT devices. It has an inbuilt temperature
typed in the URL, followed by the authentication token sent
sensor, i2c, SPI, and more ADC. The data communication
by Blynk, and then the pin number of the microcontroller
between the device and the cloud through Wi-Fi. It operates
that is connected to the device that needs to be controlled.
in four modes: active mode, Sleep mode, hibernates mode
and idle mode. The operating voltage of esp32 is 3.3v.It
comsume only minimum power. It has been programmed by
Embedded C using Arduino IDE 1.8.10. Fig.3 shows the
esp32 model chip

Fig.3 ESP32 Board

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 758


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

provides historical data visualization, automation control,


and email notification features.

VIII. RESULT ANALYSIS

Fig.5 controlling mechanism of IFTTT

Fig.7 Implementation hardware


We choose the webhook technique, "PUT," with
the substance type set to "Application/JSON," and the body
set to "Compose 1 represents ON and 0 represents OFF." Fig.7 shows the implementation of Smart home security and
Every action it takes has an impact on how the Blynk app or automation hardware. It was developed by ESP32 and relay
associated devices operate. Last but not least, add to esp32 circuit and power supply circuit. The power supply circuit
the tasks that must be completed after obtaining the provides 3.3V for nodeMCU and 12V for control circuits.
signature from the Blynk app. In order to do this, Blynk and The ESP32 device receives the command password
the microcontroller had to communicate, and they did so via thoroughly online using the IFTTT method.
the Internet of Things.

VII. BLYNK IOT P LATFORM


Blynk is an open-source IoT platform that acts as a
Local Server. A specialized Home security and automation
app was built through the BLYNK platform. All nodeMcu
and raspberry/pi controllers were integrated into the Blynk
server. Ethernet, USB and Wi-Fi connect the device and IoT
cloud Server. In the Blynk App, the authentication token
was generated to communicate the device through the
Internet. The data visualization has been designed via Blynk
IoT platform. This authentication token is inbuilt with
IFTTT to communicate between the device and person via
voice command. IFTTT is a cloud platform for IoT Fig.8. Output of Google Assistant voice command
application. The data monitoring and control process is
developed via IFTTT using Webhook and Google Assistant.

Figure.6 Blynk cloud architecture

Fig.6 describes the architecture of BLYNK. It


supports all API and UI for hardware devices connected
via Wired or Wireless medium. This BLYNK App
Fig.9.Webhook Control Setting In IFTTT

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 759


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig.8 and 9 show the result of the IFTTT password setting Android App. The proposed enlistment method encourages
process and Google Assistant voice command. Suppose the clients to arrange smart homes, mainly in-house
password sends through Google assistant via the internet. proprietorship trading safely. The validation convention
The ESP 32 device receives the password and turns on the joins various components: client's memory (secret key), past
locker, any load fan light, etc. The AI algorithm has been meeting key, sequential number and equipment address of
done through IFFFT efficiently. It has no time delay and the home portal, to commonly check the actual
efficient recognize the command using Google assistant and correspondence substances. The proposed framework shows
webhook. that our plan accomplishes preferable security and
protection over existing plans. The execution examination
result uncovers that the proposed scheme is reasonable for
A. Software description
usage. In future work, highly secured communication
 Arduino IDE 1.8.10 protocol will be designed to improve the security using
 Blynk IoT platform artificial intelligence and security mechanism.
 IFTTT -Google Assistant and Web hook
 Embedded C Programming
REFERENCES
 Embedded C Programming
[1]. M. A. Khan and K. Salah, ”IoT Security: Review, Block chain
Solutions, and Open Challenges”, Future Generation Computer
B. Advantage
Systems, vol. 82, pp. 395-411, 2018.
 Simple to implement [2]. Michael Shanler, "Predicts 2015: The Rise of Digital R&D
Innovation for Manufacturers",
 Anywhere to observe and manage Available:https://www.gartner.com/doc/2941518?ref=SiteSearc
 Helped speed h\&sthkw=a\%20typical\%20family\%20home\%20could\%20c
 Maximum security ontain\%20more\%20than\%20500\%20smart\%20devices\%20
by\%202022\%2C\&fnl=search\&srcId=1-3478922254.
[3]. Katherine Albrecht, Liz Mcintyre "Privacy Nightmare: When
C. Application Baby Monitors Go Bad" IEEE Technology and Society
Magazine, vol. 34, no. 3, pp.14-19, 2015.
 Home security applications [4]. Brian Barret, "Hack Brief: Hacker Strikes Kids’ Gadget Maker
 In banks, industries, and so on VTech-childrens gadget-maker-hack-5-million-accounts/.
[5]. B. Baruah and S. Dhal, "A Two-factor Authentication Scheme
 In laptops to keep information private. against FDM Attack in IFTTT Based Smart Home System,"
 Smart home COMPUTERS & SECURITY, vol. 77, pp. 21-35, 2018.
 Smart street lighting system [6]. "Smart Home Market by Product (Lighting Control, Security &
Access Control, HVAC, Entertainment, Smart Speaker, Home
 Industrial Healthcare, Smart Kitchen, Home Appliances, and Smart
 Shopping mall Furniture), Software & Services, and Region - Global Forecast
to 2024".
 Library [7]. B. Ali and A. Awad, "Cyber and Physical Security Vulnerability
 Office automation Assessment for IoT-Based Smart Homes", Sensors, vol. 18, pp.
1-17, 2018.
 College auditorium [8]. Q. Do, B. Martini, K.-K. R. Choo, "Cyber-physical Systems
Information Gathering: A Smart Home Case Study," Computer
Table.1 Result performance using AI Voice Command Networks, vol. 138, pp. 1-12, 2018.
[9]. B.-C. Chifor, I. Bica, V.-V. Patriciu, F. Pop, "A Security
S. Voice Nodemcu Relay output Output Authorization Scheme for Smart Home Internet of Things
No Command Output Response devices," Future Generation Computer Systems, vol. 82, pp.
1 Light ON D1=1 Relay1= ON Lamp1=ON 740-749, 2018.
[10] J. Shen, C.Wang, T. Li et al., "Secure Data Uploading Scheme for
2 Light OFF D1=0 Relay1= OFF Lamp2=OFF
A Smart Home System," Information Sciences, vol. 453, pp.
3 Hall Light D2=1 Relay2= ON Lamp3= ON 186-197, 2018.
ON [11]. G. - J. Ra and I. - Y. Lee, "A Study on KSI-based Authentication
Management and Communication for Secure Smart Home
4 Hall Light D2=0 Relay2= OFF Lamp3 = OFF
Environments," KSII TRANSACTIONS ON INTERNET
OFF AND INFORMATION SYSTEMS, vol. 12, no. 2, pp. 892-
5 Locker D3=1 Relay3= ON Locker= Open 905, Feb. 2018.
Open [12]. Y. Ashibani, Q. H. Mahmoud, "An Efficient and Secure Scheme
for Smart Home Communication using Identity-Based Sign
6 Locker D3=0 Relay3= OFF Locker-= encryption," in Proc. IEEE 36TH international performance
Close Close computing and communications conference (ipccc), 2017.
[13] V. Sivaraman, H. Habibi, Gharakheili et al., "Smart IoT Devices
IX. CONCLUSION in the Home Security and Privacy Implications" IEEE
technology and society magazine, pp. 71-79, Jun. 2018.
This work implemented an online password-based [14]. M. Wazid, A. k. Das, V. Odelu et al., "Secure Remote User
intelligent home automation and security system using Authenticated Key Establishment Protocol for Smart Home
Environment," IEEE Transactions on Dependable and Secure
IFTTT and Google Assistant. The door, fan, light and all Computing, pp. 1-15, 2017.
devices are controlled by Voice Command using IFTTT. [15]. S. Murugesan, S. Ramalingam, P. Kanimozhi, Theoretical
These methods provide high security for intelligent home modeling and fabrication of smart waste management system
and online password-based security and automation system. for clean environment using WSN and IoT, Materials Today:
Proceedings, Volume 45, Part 2, 2021, Pages 1908-1913.
It also gives the status of output devices locker or any [16]. S. Ramalingam, K. Baskaran and D. Kalaiarasan, "IoT Enabled
device by artificial Intelligence using Google assistance Smart Industrial Pollution Monitoring and Control System

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 760


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Using Raspberry Pi with BLYNK Server," 2019 International


Conference on Communication and Electronics Systems
(ICCES), 2019, pp. 2030-2034, doi:
10.1109/ICCES45898.2019.9002430.
[17]. Karuppusamy, Dr P. "A Sensor based IoT Monitoring System for
Electrical Devices using Blynk framework." Journal of
Electronics and Informatics 2, no.3: 182-187.
[18] Krishnaraj, N. "Implementation of a Human Activity Monitoring
System through IoT Sensor and Blynk Cloud Platform."
Journal of Information Technology and Digital World 4, no. 2
(2022): 105-113.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 761


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Diagnosis of Neurodegenerative Diseases by


Gait Analysis using Triblock CNN and Deep
RQA Techniques
Vajiha Begum S.A1* Pushpa Rani M 2
Research Scholar Professor & Head
Department of Computer Science, Department of Computer Science,
Mother Teresa Women’s University, Mother Teresa Women’s University,
Kodaikanal, TamilNadu, India. Kodaikanal, TamilNadu, India.
vajihabegum7391@gmail.com drpushpa.mtwu@gmail.com

pattern will pave a way in identifying the type of brain


Abstract— Neurodegenerative diseases are one of the most disorder of the individual [1]. Thus, clinical gait analysis is a
concerning medical disorders worldwide. Millions of global type of computer-based technology which helps doctors
deaths and suffering could be averted through early diagnosis of identify accurate diseases [7].
neurodegenerative diseases necessitating the crucial need for
technological innovations. Therefore, novel techniques are Most people in the world are affected by
required urgently for this international humanitarian cause
neurodegenerative disorders upon ageing. Parkinson's
potential to saving numerous lives every day. With this in mind,
disease, Alzheimer's, Amyotrophic Lateral Sclerosis, cerebral
a new technique based on Deep learning and Machine learning
models has been presented. Neurodegenerative diseases (NDD) palsy and Huntington's Disease are the most common
are caused by brain dysfunctions, triggering severe walking neurodegenerative diseases (NDD) [3]. NDD are caused from
abnormalities. Human gait analysis distinguishes people using nerve cell damage of the brain or loss of central nervous
their walking style, which indicates the unique walking pattern system functions. Ageing population are highly vulnerable to
of an individual. Personal examinations are vital in individual such diseases [4]. Individuals affected by neurodegenerative
disease identifications, however intelligence-based systems are diseases exhibit corresponding symptoms including tremor,
proficient in precise diagnosis of distinct Neurodegenerative abnormal walking and muscle weakness [4].
Diseases than conventional approaches. The study data
comprises gait patterns of Parkinson's Disease, Huntington's
Disease, Amyotrophic Lateral S clerosis and healthy control Parkinson's disease (PD) is stimulated owing to the
subjects. The proposed system recognizes gait patterns with dopaminergic neuron deprivation in the midbrain, reflecting
utmost precision, distinguishing NDD using a remarkable gait in motor and non-motor impairments [15]. The symptoms of
analysis method. Hence, to extract optimal gait features Parkinson's include slow movement, shaking of hands, legs,
ensuring accurate disease identification, this study proposes jaws and face, stiffness of the limbs, tremors, and difficulties
Triblock Convolutional Neural Network architecture and in speech [2,11,13]. Huntington disease (HD) is another type
compact Deep Recurrence Quantification Analysis of progressive brain disorder that usually affects people with
(TBCNN_DRQA) techniques. The Machine learning classifier involuntary movements and depression symptoms in the age
helps in the categorization and disease diagnosis using feature group of 30 to 40 [4]. The weakening of motor neurons in the
vectors of TBCNN_DRQA. The TBCNN_DRQA technique with
random forest classifier, achieves in identifying NDD with
brain causes Amyotrophic Lateral Sclerosis (ALS) disease.
99.96% higher accuracy. The results certain the precision and Eventually, the brain loses its ability to control voluntary
reliability of the proposed technique, thereby effectuating movements [7]. Neurodegenerative diseases cannot be cured
advanced identification of disease types thereby aiding doctors as the symptoms of this disease gets initiated gradually and
to start effective early treatment and rehabilitation. will increase over time. Early diagnosis of the disease helps
one start treatment early on, avoiding dire health
Keywords- Convolution Neural Network; Gait Pattern; Machine consequences.
Learning Techniques; Neurodegenerative Diseases; Recurrence
Quantification Analysis. Thus, observing the gait dynamics of individuals gives
gait clues to diagnose the accurate disease. Detecting these
I. INTRO DUCTIO N
movement disorders is possible at an early stage by
scrutinizing the Individual’s gait [14]. Since ALS, PD and
With a global population of more than 7.9 billion people,
HD show correspondingly similar gait patterns, accurate
about one in six humans of the world’s population suffer
identification of these diseases is crucial. In recent years, the
from neurodegenerative diseases and over 6.8 million people
convolutional neural network (CNN) involved in most
are dying from its conditions [10]. The risk of complications
studies has accurately recognized speech, gesture, biometric
and increased suffering can be vastly reduced, if accurate
and other computer vision fields [13,21].
early diagnosis is possible with subsequent medical
intervention. The diagnosis and disease identification can be
The gait parameters are studied based on spatial and
effective through analysis of human gait patterns.
temporal features. The temporal gait features are observed in
this study. The temporal features are non linear, non
Human gait is the locomotion or walking pattern of the
stationary and requires new methods to meticulously identify
human body. Each individual human being has a unique
ND diseases. In our previous work [20], we proposed a new
walking pattern. If an individual is affected with any brain
technique based on twin layered CNN and Statistical
disorder, it results in abnormal walking. Analyzing the gait

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 762


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
approach which works well in NDD identification and got statistical measures. AdaBoost model got accuracy of 99.17%
99.89% accuracy. Since gait data is non-linear, we need more in classification of normal and disease group using VGRF
specific non-linear quantification technique. In order to data.
increase accuracy and reduce complexity in classification
task, more specific features need to be extracted from the Since ALS, PD and HD show some similar gait patterns,
input nonlinear gait signals, hence we pilot new combination accurately identifying these diseases is critical. This study's
of CNN and Recurrence Quantification Analysis (RQA) vision is to develop a novel technique to extract the most
techniques in this work. prominent gait features to achieve absolute accuracy in
identifying NDD compared to existing techniques in
The proposed method comprises the two-dimensional literature. This proposed work includes concatenating deep
Triblock Deep Convolution Neural Network (TBCNN) for Triblocks CNN architecture and Deep RQA technique to
automatic extraction of prominent deep features along with generate optimal gait feature vectors and thereby applying
Deep Recurrence Quantification Analysis (DRQA) method machine learning classifiers to achieve accurate disease
which acts as an enhancer to retrieve nonlinear deep features classification.
with TBCNN deep signals. The concatenated deep TBCNN
features and DRQA handcrafted features is fed to Machine The commitments of the proposed work are:
Learning algorithms that recognize NDD and healthy • This work utilizes a 2D convolution neural network
subjects accurately. This paper has been systematized as framed as Triblock CNN (TBCNN) to automatically
follows. Section II highlights the previous related works in extract the most prominent deep features.
the literature. The materials and methods developed in this • This work also employs nonlinear feature extraction
study are presented in Section III. Section IV provides the technique by implementing the recurrence quantification
discussions and experimental result in the classification of analysis method in the form of Deep RQA with deep
each NDD group. Section V concludes the proposed work. CNN short signal data to notably scale classification
performance.
II. RELAT ED W ORKS • This hybrid method combines TBCNN deep features and
nonlinear Deep RQA (DRQA) features exploit accurate
Some of the literature's related works to recognize and classification of NDD using supervised machine learning
classify gait signals with different gait feature extraction techniques.
techniques are highlighted. Eckmann [18] introduced the • The proposed model (TBCNN_DRQA) has higher
recurrence plot (RP) in 1987, which provides a visualized accuracy rate in classification of NDD using less
description of states recurrence of deterministic dynamical computational intricacy than former models.
structures. Webber and Zbilut [12] proposed Recurrence
Quantification Analysis (RQA) by calculating an array of
recurrence variables quantifying the Recurrence Plot's (RP)
dynamical structure. RQA technique is compatible with non-
stationary, non-linear and short signals. P.Prabhu et al. [7]
implemented RQA technique to measure the non-linear gait
patterns. The Support Vector Machine and Probabilistic
Neural Network were applied to classify diseases. The SVM
produces classification accuracy of 96% for AC and 100%
for other subjects.

Qiang Ye et al., [3] projected the Adaptive Neuro Fuzzy


Inference System (ANFIS) to classify neurodegenerative
diseases. ANFIS model was framed by the neural network
adaptive technique and qualitative fuzzy method. The particle
swarm optimisation (PSO) system was applied with ANFIS
model to learn its parameters. Nandy [16] presented the
statistical approach for recognizing Parkinson's disease using
the Fisher Discriminant Ration (FDR) method to select the
most discriminative statistical features. The experimental
result shows, Bayes classifier achieves accuracy up to Fig. 1. The stride intervals of PD, HD, ALS and Healthy
95.83% in classification. subjects taken from Physionet database [9].

Vasquez-Correa et al., [15] presented the multimodal III. M AT ERIALS AND M ET HODS
evaluation of parkinson's disease based on Deep learning
algorithm. The gait, handwriting and speech data were A. Gait Dataset
recorded for parkinson's and healthy subjects. The 2D-CNN
and 1D-CNN were applied for feature extraction from these The Physionet public database is hereby deployed to
three types of data and fused into one feature vector. Finally, accumulate the dataset of Gait neurodegenerative disease
the SVM classifier achieves 97.3% accuracy in classification [10,17], which enumerates the severity of NDD in individual
of PD subjects. Lin et al, [17] proposed a deep learning and subjects. The delicate force resistors were used to record the
recurrence plot feature extraction method in identification of step dynamics by noticing the force beneath each subject's
NDD which achieves accuracy of 98.91%. Fraiwan et al. [5] foot. The eight sensors were attached to the foot of every
presented various ensemble decision trees classifiers in individual and assessed the vertical ground response force.
identification of NDD with gait signals by measuring The gait dynamics recorded were within real efforts

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 763


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
for each male and feminine subject. This data set incorporates

Fig. 1. Flow diagram of the proposed (TBCNN_DRQA) work

with subjects like Parkinson's Disease (PD=15), Huntington's with a sequence of filters automatically [13]. In this work,
Disease (HD=19), Amyotrophic Lateral sclerosis (ALS=13) two-dimensional convolution neural network (2DCNN) is
and healthy controls (CO)=16) persons. Gait boundaries such applied to extract most influential features for accurate
as stance interval, swing interval, stride interval and double classification. The Triblock CNN architecture is mounted
support intervals of left and right foot are specified for with three separate CNN structures and input is fed through
every subject which are 1D signal data. The format of dataset each CNN block. Each block of CNN is framed with a
is timeseries (.ts) file and size is 17.9 MB [9]. different kernel size. The raw input gait signals considered in
this study consists of stride, stance and swing time series
B. The Proposed Work (TBCNN_DRQA) signal parameters of both feet. Instead of using raw gait
signals as input, Absolute Differences (AD) of left and right
In this work, the Triblock CNN Architecture (TBCNN) foot are calculated for each gait signal parameters (stride,
stance, swing) for every subject, defined by the matrix shown
and the compact representation of Deep signals with
in Eq. (1).
Recurrence Quantification Analysis (DRQA) are framed to
gather prominent gait features from the input gait signals.
The classification of Neurodegenerative disease group (ALS, 𝐴𝐷𝑖,𝑗 (𝜀) = (1 − 𝑀𝑖 −𝑁𝑗 ), 𝑖, 𝑗 = 1, … , 𝑛 (1)
HD, PD) and healthy control is done by machine learning
classifiers using TBCNN_DRQA trained features. Fig.1, Where M i is the left leg gait signal and Nj is the right leg
exhibits the flow chart of the proposed architecture. The gait signal. Correspondingly, the absolute difference is
techniques of the proposed architecture are explained in the calculated for individual subjects with stride, swing and
following sections. stance intervals. Fig.2 shows the (i) actual and (ii) absolute
difference of gait intervals for one of the Parkinson patients
1) Triblock CNN (TBCNN) Architecture: for (a) Stride, (b) Swing and (c) Stance. This absolute
difference of stride, swing and stance such as 1860 gait signal
A Convolution Neural Network (CNN) is a form of data is fed as input to each 2D CNN block separately in the
feedforward neural network with multiple hidden layers, Triblock Convolution Neural Network (TBCNN)
usually called Deep CNN. The CNN algorithm is architecture. Three blocks of CNN is structured with different
predominantly applied in present-day studies. Deep CNN kernel sizes to derive multifarious informative feature maps
helps automatically extract the most informative features on the input gait signals.
978-1-6654-6084-2/22/$31.00 ©2022 IEEE 764
Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Triblock CNN Layers: Each CNN block consists of two CNN1, CNN2 and CNN3 are first, second and third CNN
convolutional layers, one Rectifier Linear Unit (ReLU) blocks respectively, AD is the absolute difference of input
activation function layer, one cross channel normalization signal and A is the added result of each CNN block. After the
layer and one pooling layer. The input of 1D gait signals is addition of three CNN blocks, one ReLU, cross
converted to two-dimension in each CNN convolution layer normalization, max pooling and fully connected layer
which performs 2D convolution with the input. In follows. The output of max-pooling layer is reduced to
convolution layer, the number of kernels, size of the kernels 1x465x32 feature map, which will be subsequently provided
and stride are the parameters to be determined. The input size as input to the Fully connected layer. Also, output features
of 1×1860×1 gait data is given to three CNN blocks from the max-pooling layers which are non linear compact
separately, which performs 2D convolution, where the deep signals are processed using the Recurrence
number of convolution kernels is set as 64 and 32 for two Quantification Analysis (RQA) technique for further feature
convolution layers in each block. Size of convolution kernels extraction. The fully connected layer flattens 1x465x32
in first block is set as 1x64, 1x32, second block positioned to feature map to a single vector of 1024 features. Finally, 1024
1x32 and 1x16, and the third block as 1x128 and 1x64. The prominent compact deep CNN features are automatically
convolution layer uses the local connection, weight and bias extracted from TBCNN architecture, which will be utilized as
as its output is computed as shown in Eq. (2). input for classification process.

Zi,j = ∑ wi . xi,j + b (2)  Selecting the CNN Parameters and Training Process:
The hyperparameters have to be chosen carefully to extract
Where xi,j =ADi,j (absolute difference), w is weight, b is the best features for improving the convolutional neural
bias and Zi,j is output of convolution layer. The feature map network's performance. The two types of hyperparameters
of 1×1860×64 is the output from the first convolutional layer chosen for CNN are (i) hyperparameter for network and (ii)
where each block is applied with the non-linear activation hyperparameter for training. The hyperparameter for the
function. Some of the common nonlinear activation functions network such as kernel size, number of kernels and the input
used in most studies are rectified linear units (ReLU), size. The hyperparameters for training the system such as
exponential linear units and leakage rectified linear units. The momentum, minibatch size, maximum epochs, number of
CNN is linear in nature, thus maintaining non-linearity and iterations per epochs and learning rate, is determined. In this
improving network accuracy requires assigning weights and work, we focus on the number of CNN layers and
kernel size, hence ReLU activation function is used in this hyperparameters for the Triblock CNN (TBCNN)
CNN block. The ReLU layer does not change the input size architecture to improve its performance. In our several
and performs a threshold operation to each input element by experiments through the trial-and-error process, we run the
changing the less than zero value to zero. ReLU function that system by varying values of hyperparameters to get accurate
applies max(0, Zi,j ) to each of the inputs which are results using the proposed network.
represented by Zi,j as in eq. (3)
2) Deep Recurrence Quantification Analysis (DRQA): Gait
signals are habitually noisy, non-linear and nonstationary.
ReLU = max (0, Zi,j ) (3) The non-linear nature is because of the way gait dynamics
are facilitated by coordinated activities of the brain. Henry
The transformation of output from ReLU layer is given as Poincare [6] presented the idea of recurrence, this can be
input into the Cross-Channel Normalization layer. The understood that any chaotic framework displaying
purpose of normalization is to efficiently organize gait data inconclusive movement of directions can repeat. In view of
by ensuring data dependency while eliminating redundant this reality, one can induce that the chaotic behaviour of gait
data. This layer helps create a local response normalization dynamics is recurring in nature. Recurrence Quantification
layer for each element based on the number of channels and Analysis (RQA) can investigate this recurring character of
window size. In first two CNN blocks, a window of 4 gait.
channels normalizes each input element and 5 channel
normalizes in third CNN block. Thereafter, the pooling layer To improve the performance of the proposed system in
is applied following normalization layer with 1×1860×64 classification phase, we implemented Deep RQA method
feature maps to reduce the number of parameters and using the input which is the compact representation of deep
computation. Pooling layer helps in reduction of dimensions CNN gait signals which are nonlinear. The RQA technique
of each feature map done as Z=max{z}. Here max pooling maintains non linearity in the input data and afford useful
layer with a kernel size 1×2 and stride value of 2 is applied in information concerning the pattern even for short interval
each block, which calculates the maximum value in each data [18]. Deep RQA technique is used in this work as an
feature map channel. additional feature extractor to make precise diagnosis of
NDD. The gait signals are transformed into deep compact
The feature map of 1×930×64 with optimal features is the representation of signals by implementing the triblock CNN
output of max-pooling layer. The output of max-pooling (TBCNN) architecture. The output from the seventh max
layer is given to the second convolutional layer in each block. pooling layer of TBCNN is the compact deep signals of
Thereby the output feature maps of three CNN blocks are length 1x465x32, which is averaged and acquired 465 deep
added element-wise and gathered 1×930×32 feature maps, compact signals. These deep signals are computed with the
which is shown in Eq. (4). RQA technique to compute deep RQA (DRQA) features.

A = CNN1 (AD) + CNN2 (AD) + CNN3 (AD) (4)

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 765


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
Eckmann.et.al.[18] developed a technique called the the associated feature maps [8], which is represented in Eq
Recurrence Plots (RP), which illustrates a dynamical system's (4).
deterministic property. The RP matrix visualizes orbits xi's 𝑅𝑃𝑖 ,𝑗 (𝜀) = 𝐻 𝜀 − 𝑎𝑖 −𝑎𝑗 , 𝑖. 𝑗 = 1, … , 𝑁 (4)
time-dependent behavior in the phase space [19]. The RP
matrix [12] depicts spatial and temporal correlations among Where, N=L-(m-1)τ is the number of state 𝑎𝑖 , ε is the
threshold value (ε = εi ), and H is the Heaviside function.

Fig. 2. Time series plot represents the (i) actual Interval and (ii) absolute interval difference of (a) stride, (b) swing and (c) stance
data of Parkinson patient.

In this work, RP with a fixed number of nearest neighbours Recurrence Rate signposts the ND disease whereas lower RR
(FAN) is implemented. For each state 𝑎𝑖 (i=1,…, N) the confirms the controls subjects [8]. The recurrence rate is
threshold value εi alters to certify the same recurrence density defined in Eq.(5).
in all columns of the RP (i.e., RR= Nn /N). In this work,
visualizing the RP with FAN parameters are constructed with 𝑅𝑅 = 1 𝑁 2 𝑁
𝑖,𝑗=1 𝑅𝑃𝑖 ,𝑗
(𝜀) (5)
utmost care by observing RP's result. The parameters of RP
applied are as follows, the input for x is 465 deep compact The Determinism (DET) [8] measures the correlation of
signals from Triblock CNN architecture (N=465), the RP that forms the smallest diagonal lines of length𝐿𝑀𝑖𝑛 . The
embedding dimension m=40, delay time τ=5, nearest DET is measured as shown in Eq. (6).
neighbours Nn =40 and the index as one depicts the maximum 𝑁
𝐿 =𝐿𝑀𝑖𝑛 𝐿𝑝 ( 𝐿)
distance. The DRQA features are calculated from the RP The 𝐷𝐸𝑇 = 𝑁 𝐿𝑝 ( 𝐿) (6)
𝐿=1
features observed from DRQA are Recurrence Rate, Entropy, Where L is the length of slanting line and the histogram is
Determinism and Average Diagonal Line [8,] which are denoted by 𝑝 (𝐿 ). The extended diagonal lines formed due to
calculated below: The recurrence rate (RR) [8] quantifies the periodic signals will indicate the diseases while short lines
density of each points in a recurrence plot (RP). Increase in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 766


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
will denote the healthy subjects [8]. The average diagonal compared. In this work, the Random Forest classifier is
line (AL) is the average of successive 1's which are parallel profound and accurately classifies the disease compared to
to each other in Recurrence Plot. The Average Diagonal Line other classifiers with the features gathered from
defined as shown in Eq. (7). TBCNN_DRQA technique.
𝑁
𝐿 =𝐿𝑀𝑖𝑛 𝐿𝑝 ( 𝐿) IV. EXPERIMENT AL RESULT S AND DISCUSSION
𝐴𝐿 = 𝑁 ( )
(7)
𝐿 =𝑀𝑖𝑛 𝑝 𝐿
A. Performance Evaluation
Entropy (E) is the rate of existence of all diagonal lines
whose length is more than 𝐿𝑀𝑖𝑛 . Smaller the measure of Initially, from the feature extraction of TBCNN_DRQA
entropy indicates the healthy subjects and larger shows the architecture, 70% gait features is taken for training and 30%
gait disorders. It is noted that recurrence of gait pattern is data is left for testing. The classification performance of each
more in ALS patients. The measure of Entropy is shown in Machine Learning classifiers is evaluated by the leave one
Eq.(8). out cross validation (LOOCV) method. LOOCV technique
𝑃 ( 𝐿) 𝑃 ( 𝐿) randomly picks only one feature for the validation purpose
𝐸 =− 𝑁 𝐿 =𝐿𝑀𝑖𝑛 ( )𝐿𝑛( ) (8)
𝑆 𝑆 leave the rest for training. The training procedure continues
several periods by picking diverse features for the validation,
Where, 𝑝 (𝐿 ) indicates the possibility of diagonal line’s
and finally, the performance of each ML algorithms is
recurrences in RP’s, S is the sum of diagonal lines and L is evaluated. The performance metrics such as Accuracy,
the diagonal line length. These DRQA features and Triblock Sensitivity, Specificity and Precision are observed by
CNN features were concatenated as a feature vector and fed LOOCV method for validation of each machine learning
as input to machine learning classifiers for the classification classifier individually with TBCNN_DRQA features. The
of neurodegenerative diseases to minimize computational confusion matrix is calculated in the classification of diseases
complexity. for the machine learning classifiers. The confusion matrix
values are the sum of True Positives (TP), True Negatives
C. Classification using Machine Learning Algorithms (TN), False Positives (FP), and False Negatives (FN)
measured for performance evaluation [8]. The loss function
The features gathered from the Triblock CNN and DRQA computes the distance between the current output of the
were concatenated as an optimal feature vector and used for model and the expected output. The Performance metrics
the classification purpose. In this study, the machine learning measured for ML classifiers are as shown below: These
(ML) classifiers such as Random Forest (RF), K Nearest metrics are very important loss function to measure the
Neighbor (KNN), Decision Tree and Multi Support Vector proposed model performance.
Machine (Multi-SVM) are involved in the classification task.
𝑇𝑃 +𝑇𝑁
The Triblock CNN and Deep RQA (TBCNN_DRQA) 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (9)
𝑇𝑃+𝑇𝑁+𝐹𝑁+𝐹𝑃
combined feature vectors are given as input to each machine 𝑇𝑃
learning classifiers separately in order to classify 𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦 = (10)
𝑇𝑃+𝐹𝑁
𝑇𝑁
Neurodegenerative disease and healthy controls [8]. The 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = (11)
𝑇𝑁+𝐹𝑃
classification accuracy is compared for each ML classifiers. 𝑇𝑃
The Random Forest algorithm picks the TBCNN_DRQA 𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 = (12)
𝑇𝑃+𝐹𝑃
features randomly for generating a group of decision trees.
The decision tree's forest is designed by identifying the tree's B. Experimental Results of Proposed Work
root node and splitting each node's features, which will run
randomly and classifies each group. KNN algorithm The proposed experiments were implemented using a
calculates the Euclidean distance between the test data and software called MATLAB 2019 and tested on an Intel Core
the trained feature vectors. The Kth least distance is sorted to i3 2.0 GHz computer with 4 GB RAM. The gait dynamics
fix the nearest neighbors and the primary class of nearest dataset of individuals with Parkinson’s, Huntington’s,
neighbors is projected as one group. Amyotrophic Lateral sclerosis and healthy subjects were
taken from the physionet gait database. The gait attributes
Decision Tree classifier predicts the label of each input such as stance, swing and stride intervals of both feet were
class data from the tree root. Based on comparing the feature taken as input for the feature extraction phase [9]. With these
values of root with the record's features, the branch follows gait dynamics, each parameter's absolute difference is
that values and moves to the next node. The prediction of calculated and fed into the Triblock CNN (TBCNN)
class value continues by comparing the root feature values architecture. The optimal deep compact features from the
with the record's features and the branch follows those values TBCNN architecture are automatically extracted. To enhance
and jumps to next node until reaching the leaf node. The the performance of the system the max polling layer output
Multi SVM classifier with Radial basis function kernel is also of TBCNN is fed as input to the Recurrence Quantification
utilized in identification of each NDD with the trained Analysis (RQA) method for acquiring additional features.
TBCNN_DRQA features. Since SVM is a binary
classification method, the multiclass classification i.e Multi- The Triblock CNN features and deep Recurrence
SVM is done here by comparing any two groups and then the Quantification Analysis (RQA) features are fused into a
result is compared with the other group consecutively. feature vector for disease classification. In the Classification
phase, the machine learning algorithm such as KNN,
Likewise, these ML classifiers are involved in the Random Forest, Decision Tree and Multi SVM are applied
classification task and the classification accuracy is individually with TBCNN_DRQA combined feature vector.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 767


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
The RQA features assists as a supporter to triblock CNN TBCNN_DRQA features. The classification result of each
features for the accurate classification of disease. The NDD group with healthy subjects is explained below.
training process of the proposed TBCNN network applies
Stochastic Gradient Descent with Momentum (SGDM) 1) Classification of Neurodegenerative Diseases (NDD) vs
algorithm. The training parameters such as mini-batch size is Control Subjects: The classification of Neurodegenerative
set as 1, max-epochs as 5, the iteration number per echo as 47 diseases (ALS, HD, PD) group vs healthy controls is done
and learning rate as 0.004 in TBCNN network which takes with Machine Learning classifiers (ML) using
3.17 minutes for training. In this proposed work, the random TBCNN_DRQA features. At this stage, Random forest
forest classifier achieves maximum accuracy of 99.96% in classifies the NDD group with 99.96% accuracy. The KNN,
the classification of NDD and healthy subjects with Decision Tree and Multi SVM classifies the NDD group with
an accuracy of 88.24%, 85.29% and 88.24% respectively.

TABLE I. P ERFORMANCE OF ML CLASSIFIERS WITH T BCNN_DRQA METHOD FOR THE CLASSIFICATION OF NDD VS CONTROL GROUP S

Pe rformance Metrics Random Forest KNN De cision Tree Multi SVM


Accuracy 99.96% 88.24% 85.29% 88.24%
Sensitivity 95.83% 79.17% 70.83% 75%
Specificity 98.08% 91.61% 89.69% 90.91%
Precision 95% 79.17% 74.17% 65%

TABLE II. P ERFORMANCE OF ML CLASSIFIERS WITH T BCNN_DRQA METHOD FOR THE CLASSIFICATION OF TWO - GROUP S

ALS vs Healthy Control PD vs Healthy Control HD vs Healthy Control


Classifie rs
Accura Sensitiv Specific Precisi Accura Sensitiv Specific Precisi Accura Sensitiv Specific Precision
cy ity ity on cy ity ity on cy ity ity

RF 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%

KNN 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%

De cision 85.71% 83.33% 83.33% 90% 100% 100% 100% 100% 100% 100% 100% 100%
Tre e

Multi SVM 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100% 100%
NDD dataset for classification of NDD vs control. The
Table I summarizes the performance of ML classifiers in the proposed Triblock CNN and Deep RQA technique with
classification of NDD and control group. The proposed Random forest classifiers (TBCNN_DRQA_RF) classifies
TBCNN_DRQA technique with Random Forest classifier neurodegenerative diseases with 99.96% improved accuracy.
achieves maximum accuracy than other classifiers in Table III represents the assessment of proposed work with
categorization of NDD. the previous works based on accuracy, sensitivity and
specificity. The result of Qiang Ye et.al [3] present the
2) Classification of Two Groups: The classification of two
accuracy of 90.63%, Fraiwan et al. [5] work gives 99.17%
groups such as ALS vs healthy controls, Parkinson’s vs
accuracy, Beyrami et.al. [19] work shows 99.57% accuracy,
healthy controls, and Huntington’s vs healthy control subject
is performed separately using the proposed technique. The Che-Wei Lin [17] gives 98.9% accuracy, while our proposed
performance of machine learning algorithms with work gives an improved accuracy rate of 99.96% compared
TBCNN_DRQA features is analyzed on metrics of accuracy, to others in the classification of NDD.
sensitivity, specificity and precision. The optimal features
obtained using the proposed TBCNN_DRQA technique helps The results of two group classification are also compared
the Machine learning classifiers achieve 100% accuracy in with other related works which is tabulated in Table IV and
classifying each disease group separately. represented in Fig.3. The work of Qiang Ye et al. [3] showed
an accuracy of 93.10%, 90.32%, and 94.44% for the
The performance of two group classification with ML
classification of ALS, PD and HD against healthy control
classifiers is summarized in Table II Random forest, KNN
and multi SVM works well with TBCNN_DRQA features (CO) subjects. P. Ghaderyan et al. [11] work shows 98%,
and classifies all two group with 100% absolute accuracy. 97%, and 95% accuracy in classification of ALS, PD and HD
Decision tree classifies ALS and healthy controls with against control subjects. Saljuqi et al. [2] work gives
85.71% accuracy and achieves 100% accuracy in other two accuracy of 94%, 97% and 93% for ALS, PD and HD
group classification. classification against control group.

C. Comparison of proposed work (TBCNN_DRQA_RF)


with other related works

The proposed work's performance is compared with other


related works in literature using the same Physionet gait

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 768


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
proposed to extract the optimal features from the gait signals
for accurate neurodegenerative disease identification and
TABLE III. ASSESSMENT OF P ROP OSED WORK WITH OTHER WORKS precise classification. The combination of TBCNN and
(NDD VS. CONTROL SUBJECTS)
DRQA techniques substantially performs in automatic
Works Accuracy Se nsitivity Specificity
feature extraction and is well suited for the accurate
classification of disease with machine learning algorithms
T BCNN_DRQA_RF 99.96% 95.83% 98.08% which also reduces computation complexity than other
(Propose d Work) former models. The Random Forest ML classifier with
Qiang Ye et.al., [3] 90.63% 91.67% 87.50% TBCNN_DRQA technique achieves 99.96% improved
accuracy in classification of NDD vs healthy subjects and
Fraiwan et al. [5] 99.17% 98.23% 99.43% attained 100% accurate result in two group classifications.
Beyrami et.al. [19] 99.57% 99.71% 99.14% Thus, the proposed TBCNN_DRQA architecture with
Random Forest classifier has accomplished outstanding
Che-Wei Lin [17] 98.9% 99.0% 98.5% performance and is reliable in classification and diagnosis of
NDD using gait signals compared to existing methods. This
TABLE IV. ASSESSMENT OF PROPOSED WORK WITH RELATED P REVIOUS machine intelligence-based approach helps physicians to
WORKS IN TWO - GROUP CLASSIFICATION ( IN TERMS OF ACCURACY ) effectively diagnose specific neurodegenerative disease, to
Two Group Classification ALS vs CO HD vs CO PD vs CO start early treatment and rehabilitation process. In future, this
T BCNN_DRQA_RF 100 100 100 proposed architecture can be applied with more real-time
(propose d work) data and can be incorporated in other applications to observe
Qiang Ye et al. [3] 93.10 94.44 90.30 the performance.
P. Ghaderyan et al. [11] 98 95 97
References
Beyrami et al. [19] 100 99.9 99.78
[1] T . Carletti, D. Fanelli, A. Guarino., A new route to noninvasive
Fraiwan et al. [5] 98.8 99.40 98.80
diagnosis in neurodegenerative diseases?, Neuroscience Letters 394
Saljuqi et al. [2] 94 97 93 (2006) 252–255.
[2] M. Saljuqi, and P. Ghaderyan, “ A novel method based on matching
pursuit decomposition of gait signals for Parkinson’s disease,
Whereas our proposed work TBCNN_DRQA with Amyotrophic lateral sclerosis and Huntington’s disease detection”,
Random forest achieves 100% absolute accuracy in all two- Neuroscience Letters, Vol.761, No.136107, 2021.
[3] Qiang Ye, Yi Xia, Zhiming Yao., Classification of gait patterns in
group classification compared to other works. The triblock patients with neurodegenerative disease using adaptive neuro-fuzzy
CNN architecture highlights prominent gait features and inference system, Computational and Mathematical Methods in
RQA technique efficiently aids in framing more features Medicine, vol. 2018, https://doi.org/10.1155/2018/9831252
from the Deep CNN features which effectively improves its [4] Hausdorff JM., Gait dynamics in parkinson's disease: common and
distinct behavior among stride length, gait variability, and fractal-like
performance than our previous work [20]. Finally, Random scaling, Chaos. 2009;19(2):26113. Available
Forest Classifier classifies the neurodegenerative diseases from: http://aip.scitation.org/doi/10.1063/1.3147408
more accurately employing these combined feature vectors. [5] L. Fraiwan, and O. Hassanin, “Computer-aided identification of
Since the public dataset utilized in this study is limited and, degenerative neuromuscular diseases based on gait dynamics and
ensemble decision tree classifiers”, Plos One, Vol.16, No.6, 2021.
this proposed architecture is qualified to be applied with [6] H. Poincaré, On the problem eme of the three bodies and equations of
further more real-time data in the future, to observe dynamics, Acta Mathematica 13 (1890).
actionable performance utilizations of this system. [7] Pooja Prabhu, A.K. Karunakar, H. Anitha, N. Pradhan., Classification
of gait signals into different neurodegenerative diseases using
statistical analysis and recurrence quantification analysis, Pattern
Recognition Letters, Volume 139, (2020)(pp. 10-16),
https://doi.org/10.1016/j.patrec.2018.05.006.
[8] S.A.Vajiha Begum, M. Pushpa Rani., Recognition of
neurodegenerative diseases with gait patterns using double feature
extraction methods, 2020 4th International Conference on Intelligent
Computing and Control Systems (ICICCS), IEEE Explore, 2020, pp.
332-338.
[9] https://www.physionet.org/content/gaitndd/1.0.0/
[10] https://news.un.org/en/story/2007/02/210312-nearly-1-6-worlds-
population-suffer-neurological-disorders-un-report
[11] P. Ghaderyan, S.M. Ghoreshi Beyrami, Neurodegenerative diseases
detection using distance metrics and sparse coding: a new perspective
on gait symmetric features, Computers in Biology and Medicine,2020.
https://doi.org/10.1016/j.compbiomed.2020.103736
[12] C.L. Webber Jr, J.P. Zbilut., Dynamical assessment of physiological
systems and states using recurrence plot strategies, Journal of Applied
Physiology, 1994, 76:2, 965-973.
https://doi.org/10.1152/jappl.1994.76.2.965
Fig. 3. Performance Analysis of proposed work with previous [13] Maarten De Vos, Johan Prince, T im Buchanan, James J FitzGerald,
works for Two Group Classification Chrystalina A Antoniades., Discriminating progressive supranuclear
palsy from Parkinson's disease using wearable technology and machine
learning, Gait & Posture, Volume 77, 2020, Pages 257-263.
V. CO NCLUSIO N https://doi.org/10.1016/j.gaitpost.2020.02.007.
[14] Hausdorff JM, Lertratanakul A, Cudkowicz ME, Peterson AL, Kaliton
A new technique with the combination of Triblock D, Goldberger AL., Dynamic markers of altered gait rhythm in
Convolutional Neural Network and Deep Recurrence amyotrophic lateral sclerosis, Journal of Applied Physiology, vol. 88,
issue 6, 2000, pp. 2045-2053.
Quantification Analysis (TBCNN_DRQA) method are

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 769


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5
[15] J. C. Vásquez-Correa, T . Arias-Vergara, J. R. Orozco-Arroyave, B.
Eskofier, J. Klucken and E. Nöth., Multimodal assessment of
parkinson's disease: a deep learning approach, IEEE Journal of
Biomedical and Health Informatics, vol. 23, no. 4, pp. 1618-1630, July
2019, doi: 10.1109/JBHI.2018.2866873.
[16] Nandy, A. Statistical methods for analysis of Parkinson’s disease gait
pattern and classification. Multimed Tools Appl 78, 19697–19734
(2019). https://doi.org/10.1007/s11042-019-7310-4
[17] Che-Wei Lin, Tzu-Chien Wen and Febryan Setiawan, Evaluation of
Vertical Ground Reaction Forces Pattern Visualization in
Neurodegenerative Diseases Identification Using Deep Learning and
Recurrence Plot Image Feature Extraction , Sensors, 2020.
[18] Eckmann, J. P, Kamphorst, S. O, Ruelle D, Recurrence plots of
dynamic system, Eur. Lett. 4, 973–977 (1987).
[19] L. Fraiwan, and O. Hassanin, “Computer-aided identification of
degenerative neuromuscular diseases based on gait dynamics and
ensemble decision tree classifiers”, Plos One, Vol.16, No.6, 2021.
[20] Pushpa Rani Mariathangam. Vajiha Begum Sheik Alaudin, Emerson
Raja, “ Identification and Analysis of Neurodegenerative Diseases with
T win Layered CNN Using Gait Dynamics”, International Journal of
Intelligent Engineering and Systems, Vol.15, No.2, Pg.68-78, 2022.
[21] Vivekanandam, B. "Automated Multimodal Fusion Technique for the
Classification of Human Brain on Alzheimer’s Disorder." Journal of
Electrical Engineering and Automation 3, no. 3 (2021): 214-229.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 770


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Secured IoT Malware Detection Framework


using AI based Fuzzy Logic Systems
1*V. S. Saranya, Research 2*Dr. G. Ramachandran, 3*Dr. S. Chakaravarthi,
Scholar, Department of Associate Professor, Dept. of Professor Department of
Computer Science and Computer Science and Computer Science and
Engineering, Annamalai Engineering Annamalai Engineering, Bharath Institute
University, Annamalainagar – University, Annamalainagar – of Higher Education and
608002, Email: 608 002, Email: Research, Chennai, Tamil Nadu,
lord.shivam1988@gmail.com gmrama1975@gmail.co, India, Email:
chakra2603@gmail.com.

Abstract-- Internet of Things (IoT) system is emerged


enormously today and it is utilized in all the applications McKinsey Global Institute projected that 64
of human lives. Security of IoT systems seem more million IoT devices will be used globally in 2025 which
challengeable in terms of malicious software’s which are implies that per second 127 new connected devices will
referred as malwares. IoT malwares are also evolved with be available in the IoT ecosystem [3]-[4]. Vast
the employment of advanced obfuscation and evading utilization of IoT devices lead to the enormous amount
techniques. It is a very challengeable job for the security of attacks now days [5]. It is important to combat
analysts as well as security providers. In this paper, an strongly against their exploitation to avoid infections.
enhanced IoT malware detection framework is proposed IoT malware detection and prevention mechanisms
by making use of AI based Fuzzy Logic Systems (AIFLS) need to be implemented effectively and efficiently
by considering the shortcomings of existing recent where classical systems failed to fight against advanced
detection methods. Fuzzy rules are generated malwares and their techniques.
automatically without any human intervention. Further, Each and every devices and equipment’s in the
Fuzzy Pattern Trees (FPT) are generated and utilized for IoT ecosystem should be switched on for all time which
fastening classification of IoT malwares and enhancing makes attackers easy to investigate power mode of the
detection accuracy. Experimentation results provide devices any time. Further, IoT ecosystem is made of
better results. interconnected devices and equipment’s which will
allow attackers accessing those interconnected devices.
IoT malwares impair IoT ecosystem because of
Keywords – IoT malware, Fuzzy Logic Systems, Fuzzy improper encryption features and weak authentication
Pattern Tree, Artificial Intelligence, Security methods of interconnected devices. In addition, all the
interconnected devices require full time internet which
I. INTRODUCTION will allow attackers to perform vulnerable attacks to
IoT security market value is projected as $40.3 IoT. Appropriate security measures need to be
billion by the year 2026 while IoT market worth is incorporated in the interconnected devices of IoT for
predicted as $1102.6 billion for the same year on the combating against attacks by considering the issues
basis of current research report [1]-[2]. IoT related to security, confidentiality and privacy.
securitymarket is evolved with 22.1% Compound Characteristics and attributes of malware may vary for
Annual Growth Rate (CAGR) from the year 2021. one device and other. IoT applications based cyber
Google, Microsoft, AWS, Cisco, IBM, Ericson and attacks can be either as internal attack or external attack
Thales are playing key roles in the market of IoT or both. Attacker comprises node of the network during
security. While considering the application areas of inside attack where as in outside attack attacker is out
IoT, banking and financial services are on the top of the of network. Different types of IoT attacks taxonomy is
list followed by IT services. It is observed that even depicted in Fig.1.
healthcare and government related applications also
hold more percentage of market value. Massive
connectivity through billions of devices in IoT
ecosystem requires secure end to end communication
without any issues related to security and privacy.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 771


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

(1) AI based Fuzzy Logic System is utilized for


Node
tampering
RF
interface
Physical
Impair
designing the proposed IoT malware
Physical IoT
attacks
detection framework.
Node jamming Social
& attack engineering
(2) Recent research works on IoT malware
Code Buffer
detection are studied in detail and the shortcomings are
Phishing
injection overflow
considered for the development of proposed
IoT Software IoT
attacks attacks Data privacy Malware
Side channel framework.
breaches attack

(3) Automatic fuzzy rules generation system is


RPL Attacks implemented for enhancing the effectiveness of the
system and it is validated with the performance metrics
Man in the Selective Black hole
Middle forwarding attack True Positive Rate (TPR), False Positive Rate (FPR),
Network IoT Sinkhole Warmhole
False Negative Rate (FNR) and Classification Rate
attacks attack attack (Accuracy).
Hello flooding Sybil
DDoS
attack attack (4)Fuzzy Pattern Trees are too used for improving
detection efficiency of the proposed framework.
The remaining sections of the paper is arranged as
Fig. 1 Types of IoT Attacks
following: Section II explains the existing and recent
research works in detail with the summary table,
Based on SonicWall, amount of IoT malware Section III describes about AI based Fuzzy Logic
attacks is enlarged by 30% with the size of 32.4 million System in comprehensive manner, Section IV provides
in 2020 [6]. IoT devices require more advancement in the details of proposed IoT malware detection
security aspect for avoiding IoT attacks. In the mid of framework and at the end the conclusion of this
2020, Linux malware Kaiji is identified. It is entirely proposed research work is provided.
developed by making use of Golang for targeting IoT
devices by applying brute force attacks in Secure Shell II. RELATED WORK
(SSH). Similarly another malware Mirai is the This section details about the recent research
dangerous one which involves in 40% of malware works of IoT malware detection whereas multiple
assaults. In 2016, it is developed by kids for performing research works are carried in order to ensure the
online services based DDoS attacks. Self replication security of IoT devices as well as IoT ecosystem.
method is used for contaminating IoT devices and their Summary of the recent research works is presented in
Command and Control (C&C) severs and Industrial IoT Table 1.Power consumption prototypes are used for
is affected heavily with advanced Mirai malwares. detecting crypto ransomware in IoT environment along
Further, Mirai botnets are also developed by employing with ML techniques [7]. KNN affords better
Trojans. performance in accurately detecting malwares by
Palo Alto Networks identified Muhstik botnet in considering the time and similarity based metrics than
the beginning of 2020 which implements authentication other ML techniques like Random Forest, SVM and
based brute force attacks towards tomato routers. Neural Networks. Result is shown with 95.65%
Likewise, another malware Mukashi Mirai is detection rate and 89.19% precision.
discovered by the same Palo Alto Networks which Deep Eigenspace learning based IoT and Internet
execute brute force attacks in C&C server. These kinds of Battlefield Things (IoBT) malware detection method
of IoT malwares are very hazardous which are intended is proposed [8]. Operational Code (OpCode) sequence
to impair IoT devices and ecosystem. Secured and of the devices is utilized and they are converted into
strong resistance system is required for avoiding and vector space. Graph is generated using selected
combating against IoT malwares and many security features. Afterwards deep eigenspace learning
analysts and providers are working on it. Multi factor technique is applied for classifying malwares and
authentication based security systems are recommended benign files. As per experiment results, 99.68%
by several analysts. accuracy, 98.59% precision and 98.37% recall are
The key contributions of the work are summarized attained. To detect IoT malwares effectively, dynamic
as follows: programming algorithm is proposed on the basis of
control flow features [9]. It concentrates on polynomial
time O(n2) in which N describes basic blocks of
decompiled exe codes. While applying this algorithm in

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 772


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

IoT datasets, better results are achieved which are topology size of network and it attained 5.88 Root
99.05% accuracy, 1.31% TPR and 0.66% TNR. Mean Square Error (RMSE).
Blockchain and ML techniques are combined to RGB images based feature representation
detect android IoT malwares. Malware information is technique is applied for proposing enhanced malware
extracted using clustering and classification methods of visualization scheme for detecting IoT malwares by
ML and blockchain is used for information storing [10]. making use of CNN [15]. Created image includes
Clustering algorithm enhance feature selection by information of binary, assembly and string. CNN model
computing weights for every feature set, developing is utilized for combining self attention mechanism with
optimized parametric study and reducing unwanted spatial pyramid pooling. Spatial pyramid pooling helps
features repeatedly. Multi-purpose Naïve Bayes in avoiding information loss though IoT files are
classifier is used for classification purpose with more received in various sizes and it increases detection
accuracy. Accuracy of 98% is achieved with 0.98 F accuracy and efficiency. For experimental purpose,
measure according to the results. above 10K malware samples of 25 families are utilized
and 98.57% accuracy achieved.
In information centric IoT environment, advanced
persistent threats detection scheme is proposed by Large scale IoT malware and family classification
making use of domain graphs [11]. Relations between is performed on the basis of characteristics and
malicious domains and their corresponding IP addresses relationships among malwares [16]. More than 70K
are discovered. Subgraphs with more links are recent malware executable files including Covid related
incorporated for acquiring domain graph. Dataset of malware samples are utilized for analysis purpose.
257535071 DNS requests and 73136 domain names is Multi level strings based similarity analysis technique is
processed to analyze the performance. applied for classification by considering difficulties in
binary obfuscation of malwares. Features such as rival
Intelligent and dynamic analysis based IoT
IP addresses and malware specific strings are
malware detection scheme is proposed in order to detect
considered for performing reverse engineering.
familiar as well as novel IoT malwares [12].
Convolution Neural Network (CNN) model is utilized Industrial Internet of Things (IIoT) malware
for performing dynamic analysis in the IoT detection architecture Fed-IIoT is presented which is
environment. Feature extraction involves with the based on federated learning [17]. Fed-IIoT concentrated
features like network, memory, process, system call and in the detection of malicious android applications of
Virtual File System (VFS). Behavioral images of IoT IIoT. It is included with 2 parts which are participant
malwares are generated after converting extracted and server. In participant part, data triggering is
behavior data. CNN model is trained with the performed with 2 dynamic poisoning attacks on the
behavioral images of malwares. Based on the basis of Generative Adversarial Network (GAN) and
experimental results, 99.28% accuracy is attained. Federated Generative Adversarial Network (FedGAN).
In server part, global model monitoring and robust
ML methods are utilized for effective malware
training model modeling are aimed for avoiding
detection and classification. Byte sequences of
Anomaly in Aggregation by GAN Network (A3GAN).
executable program files are discovered for detection as
Fed-IIoT ensures secure communication without
well as classification [13]. With the 7 CPU
privacy related issues. Proposed method is validated
architectures, large sized dataset is utilized which is
with 3 IoT datasets. It is observed that Fed-IIoT
comprised with 111K benign samples and 111K
provides 8% better accuracy than earlier methods.
malware samples. Experimental results are depicted
with 99.96% accuracy and 98.47% accuracy for DL based multi-dimensional classification
malware detection and malware family classification approach is proposed to secure future networks like 5G
respectively. Further, Support Vector Machine (SVM) by considering the issues of IoT malware obfuscation
is combined for enhancing performance. [18]. For feature extraction, executable binary files are
represented in strings and image formats. More than 70
Two levels IoT malware detection mechanism is
thousand samples of IoT malware are analyzed and
proposed by considering node level and network level
99.78% accuracy is achieved for familiar malware
[14]. Light weighted runtime malware detector is
families. Further for unknown malware samples, IoT
deployed at node level to detect malwares which
tailored method is used.
utilizes Hardware Performance Counter (HPC) values.
Information of node level malware and malware TABLE 1
propagation are combined together without obstructing Summary of Recent Works
the performance of network. In addition, multi-attribute Proposed Performanc
Paper Features
graph translation is proposed to range and predict the Model/Algorith e results

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 773


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

m Nghi Phu Control flow Dynamic 99.05%


et al features, programming accuracy,
Dib et al Binary files, DL based multi- 99.78% (2019)[9] polynomial 1.31% TPR
(2021) IoT tailored dimensional accuracy time and 0.66%
[18] method classification TNR
approach Azmoode Sequence of Deep 99.68%
Taheri et Federated Fed-IIoT 8% better h et al opcodes, IoT Eigenspace accuracy,
al (2021) learning, accuracy (2018) [8] and IoBT learning 98.59%
[17] FedGAN malware precision
and 98.37%
Torabi et Characteristic Multi level 86.6% recall
al (2021) s and strings-based detection
[16] relationships similarity Azmoode Power KNN 95.65%
amid analysis h et al consumption detection
malwares approach (2018) [7] prototypes rate and
89.19%
Li et al RGB images, CNN 98.57% precision
(2021) binary, accuracy
[15] assembly and
string III. AI BASED FUZZY LOGIC SYSTEMS
information Fuzzy logic system is based on rules which in the
form of multiple values where the truth values related
Dinakarra HPC values, Two level IoT 5.88 RMSE to the variables lie amid 0 and 1. It will be considered
o et al multi- malware as AI’s subset and applied mainly for decision making
(2020) attribute detection process. In real time environment, there will be some
[14] graph complicated situations where unable to state if it is true
translation or false. In such situation, fuzzy logic makes decision
Wan et al 7 CPU ML, SVM 99.96% making simple. Truth values of Boolean system are
(2020) architectures, accuracy displayed with fixed truth value 1 and false value 0
[13] Byte for where as in fuzzy logic system no logic is applied for
sequences of malware, fixed truth and false value and it is comprised with in-
exe 98.47% between values which are utilized for displaying partial
accuracy true and false values. Further in fuzzy logic system,
for membership functions are utilized for mapping values
malware in between 0 and 1 with graph representation.
family Fuzzy logic algorithm considers all the offered
Jeon et al Network, CNN 99.28% data for resolving problem. Further, finest feasible
(2020) memory, accuracy decision is obtained from the specified input. FL
[12] process, resembles the decision making process of human being
system call which focuses each and every possibilities amid T value
and VFS, and F value. Fuzzy logic concept is learned from 1920s
behavioural and its term is initially used by Lotfi Zadeh in the year
images 1965 where conventional computer logic is observed by
him for data manipulation.
Ma et al IP address, Large-Scale 257535071
(2019) APT Domain Graph DNS While considering the characteristics of Fuzzy
[11] detection in requests Logic, it seems flexible for machine learning, resembles
IoT, Domain and 73136 human decision process, two valued solution
graph domain representation, appropriate for approximate reasoning
names and permits to develop non linear functions. Fuzzy
Logic System is designed with 4 important components
Kumar et Android Multi-purpose 98% which are depicted in Fig. 2.
al (2019) malware in Naive Bayes accuracy,
[10] IoT, Block 0.98 F Rule Base: It includes all rules where experts
chain & ML measure offer conditions on the basis of If-Then to influence
decision making process. Recent fuzzy theory offer

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 774


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

several techniques to design and altering fuzzy the important components of framework are explained
controllers. This updated system decrease number of as follows.
rule sets.
Debugging
Fuzzification: Inputs are converted in UNSW-NB15 and Bot-IoT datasets are used in
fuzzification stage. Crisp numbers are transferred into which 80% of records of both datasets are applied for
fuzzy sets. After that computed crisp inputs of sensors training and remaining 20% records of both datasets are
are conceded towards control system. utilized for validating the proposed framework. It will
Inference Engine: It facilitates the selection of help to analyze and train the behavioral features of IoT
appropriate match amid rules and fuzzy input. Match is malwares. IoT malware detection is performed by
measured in terms of % and based on that rules to be executing all the executable files in real time
implemented are decided for the input given. Then environment which includes both benign and malware
related rules are integrated for developing control samples. After that, debugging is performed over the
actions. accomplished files.

Defuzzification: It is the last stage where fuzzy Feature Processing


sets are converted into crisp values by using various After debugging step, feature processing is
available methods. Based on the requirements, suitable implemented. Feature processing is performed in two
techniques are utilized by an expert system. stages which are feature preprocessing and feature
extraction. Feature preprocessing involves cleansing of
unwanted or not required features for malware
detection. During feature extraction all the available
Rules
behavioral features are analyzed for IoT malwares from
the datasets provided by considering all the attributes of
both benign files and malware files. Output of feature
processing is forwarded as the input for feature
Crisp
Input
Fuzzifier Defuzzifier
Crisp
Output
selection.
Feature Selection and Classification
Fuzzy Fuzzy
input
set
output
set In feature selection, appropriate feature is selected
Intelligence for categorizing benign and malware files in IoT
ecosystem. AI based Fuzzy Logic System (AIFLS) and
Fig. 2 Fuzzy Logic System
Fuzzy Pattern Tree (FPT) is utilized in feature selection
Fuzzy Logic Systems provides simple and classification stage to improve detection rate
understanding, accurate reasoning, controls machines, effectively.
highly robust and effectively resolves complex issues. AI based Fuzzy Logic Systems
Further, it is applied into various fields like anti-lock AIFLS is a rules based system used for effective
brakes, auto transmission, auto engine, dishwasher, decision making. Automated fuzzy rules generation is
elevator control, microwave oven, fitness management, implemented with effective learning. Fuzzy rules are
palmtop computer, plasma catching and so on by the provided by experts by analyzing the malicious
various familiar companies like Nissan, Canon, Honda, behaviors usually and for large scaled data with more
Matsushita, Fujitec, Mitsubishi Electric, Toshiba and attributes. It is hard to define fuzzy rules manually. One
others. length of frequent items of attributes are identified from
utilized UNSW-NB15 and Bot-IoT datasets by making
IV. PROPOSED FRAMEWORK use of Apriori mining algorithm by considering only
Comprehensive view of proposed IoT malware two classes benign and malware. Appropriate attribute
detection framework is presented in this section. It also selection of rule generation is implemented because all
includes the details of utilized datasets and performance attributes need not to be utilized for effective detection.
metrics utilized for validating security performance. Suitable attribute selection will enhance the process of
Input of the framework includes both benign and classifying benign and malicious records. Deviation
malware files. method is utilized for suitable attribute identification by
using one length frequent items. One length frequent
A. Proposed Framework
items of every attribute are carried out as a vector of
Proposed framework is categorized into various two classes (i.e class1 for benign and class2 for
stages which are debugging, feature processing, feature malware) and it is defined as
selection and classification. It is portrayed in Fig. 3 and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 775


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Ci = [V1,V2,….Vn] are discovered. Definite and indefinite rules are


developed using 2 intersection points. If-Then condition
is applied for deciding whether the data is benign or
Where for benign, i is assigned as 1 and for
attack. Based on range, various rules are generated and
malware i is assigned as 2. Every vector (Vj) includes
in some cases two rules only generated. Generated
frequent items and frequency should be maximum than
rules are filtered for effective designing of classification
minimum support.
system by considering two conditions. First condition is
Vj={fi;1<=i<=m};support(fi)>=min_support.
about reducing more number of possible fuzzy rules
Afterwards for every attribute, frequent item’s
where second condition is about shortening if section in
deviation range {max, min}is computed by performing
fuzzy rules. Definite rules are used for making fuzzy
the comparison in available frequent items of vector
rules. Numerical variables of definite rules are
and it is formulated as follows.
fuzzified. So that effectiveness of the proposed system
Dv(j)={fmax, fmin} where fmax=Max(fj) and is improved.
To find a suitable classification from test input,
fmin=Min(fj)
test dataset is provided for developed fuzzy logic
system. Fuzzifier transfers attributes as linguistic
For identifying appropriate attribute, one to one variable by making use of triangular membership
comparison is applied for both max and min classes. function. Resultant of fuzzifier is provided for inference
Attributes without similar range are selected for engine which evaluates specified input using rule base.
appropriate attribute which will improvise the detection Rule base is defined as knowledge base which includes
and classification of the system. Appropriate attribute set of rules acquire by definite rules. Outcome of
selection is defined as follows: inference engine is in the form of linguistic values with
the set {Low & High} after that defuzzifier converts
Ci=[V(1), V(2), V(3),…. V(j),… V(k)] where k<=n
into crisp values. Crisp value of fuzzy inference engine
is ranged from 0 to 1 where ‘0’ defines data as entirely
During rule generation, valuable attributes
benign and ‘1’ defines data as entirely malicious.
selected from earlier stage are used which are resultant
of {max, min} deviation. Deviation range is compared
amid benign and malicious data and intersection points
Fuzzy processing
iteration while implementing iterative method. Pattern
AI based
tree with minimum prediction error is considered as
Feature Fuzzy
Dataset
preprocessing
Fuzzy Logic
Systems
Pattern
Tree (FPT)
best pattern tree. Datasets are applied with fuzzy pattern
(AIFLS)
tree for IoT malware detection with instance vector
Malware Benign
Feature
extraction
X=(x1,x2,…...,xn) 𝟄 X1xX2x…xXn where Xi is defined
as the ith attribute of every domain.
Feature Malware detection
selection

Debugging
Feature
processing
Fuzzy partition Fi is described by descretizing the
value of Xi which is defined as Fi={F(I,1),….F(I,di)}
Classification
Malware
and fuzzy subset Fi,j is defined as Fi,j=Xi→[0,1]
(j=1,….di) and ∑𝑑𝑖 𝑗=1 𝐹𝑖, 𝑗(𝑥𝑖 ) for all x 𝟄 Xi. Fi,j
Benign
describes the unary fuzzy predicator as attribute which
are defined with the labels ‘large’ or ‘small’.
Fig. 3 Proposed Framework
On other side, every instance is also related with
label benign or malware for output space Y {benign,
malware}. Fuzzy partition Fi,j links each and every leaf
Fuzzy Pattern Tree nodes.
Fuzzy pattern tree is also employed for fastening
Fuzzy pattern classifier is defined as a set of
IoT malware detection effectively. It is included with a
Fuzzy Pattern Trees (FPT). FPT is defined as FPT =
tree like structure where fuzzy logic arithmetic
{FPTi|i =1,..,k} and every FPTi is related with class yi
operators are considered as inner nodes and input
attribute based fuzzy predicates are considered as leaf 𝟄 Y. To classify fresh instance x, prediction is done on
nodes [19]. Fuzzy pattern tree is depicted in Fig. 4. the basis of class of the tree with maximum score which
Bottom up induction is applied for fuzzy pattern tree in is defined as follows
which values of leaf nodes are combined by making use y^ = argmax(PTi(x)) for yi𝟄 Y
of fuzzy operators. At the end, output is presented to its
ancestor. Various pattern trees are created in every

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 776


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Prediction Error of a pattern tree at every iteration malware execution. Fig. 5 and Fig. 6 show the
is computed for selecting best pattern tree. It is performance analysis plot of the proposed framework.
computed as follows

𝑒𝑟𝑟𝑜𝑟(𝐹𝑃𝑇𝑧) = 1/𝑁√∑(𝑦 𝑗 − 𝑃𝑇𝑧( 𝑥 𝑗 ))


𝑗=1

Percentage of
metrics
IoT
malware
precision Time
precision f1-score

Fig. 5 Performance Metrics of the Proposed Model (Iteration1)

Fuzzy AND

Feature 1

percentage of
metrics
Fuzzy OR

Time
precision recall f1-score
Feature 2 Feature 3
Fig. 6 Performance Metrics of the Proposed Model (Iteration2)
Fig. 4 Fuzzy Pattern Tree
C. Security Validation
Proposed framework is validated with the
B. Datasets Utilized following performance metrics TPR, TNR, FPR, FNR
UNSW-NB15 and Bot-IoT datasets are utilized and classification rate.
for the proposed IoT malware detection framework. True Positive Rate (TPR):
UNSW-NB15 dataset contains 257673 data records
which are based on network intrusions [20]. Further, it It is computed with the ratio amid appropriately
describes about 9 different attacks including trojans, forecasted IoT malware count and completely predicted
DDoS, DoS, worms, backdoors and fuzzers. IoT malware count. TPR value will be 1 while all the
malwares are detected and it is very rare. TPR is called
Bot-IoT dataset is related to real time dynamic in other words as the Sensitivity or Detection Rate
network environment [21-24]. It is included with (DR). It is formulated as follows.
72000000 records and size of Bot-IoT dataset is 69.3
GB of pcap files. It is available in csv format too for 𝑇𝑃
𝑇𝑃𝑅 =
downloading in 16.7 GB size. DDoS, DoS, OS and 𝑇𝑃 + 𝐹𝑁
service scan, data exfiltration and keylogging are the
different types of included attacks of the dataset. True Negative Rate (TNR):
Experimental Setup and Results A true negative is an outcome where the model
The proposed framework is experimentally tested correctly predicts the negative class. It is formulated as
in a secured lab setup. The server runs in Ubuntu server TN/TN+FP.
automated using kubernetes for deployment. The False Positive Rate (FPR):
kubernetes is configured to automate the data
It is computed with the ratio amid the number of
processing and deployment. The experimental
benign samples wrongly classified like an attack and
validation is performed in the basis of two situations 1)
the total number of benign samples. It is formulated as
with malware executed environment and 2) without
follows.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 777


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

𝐹𝑃 [3] C. Petrov, “Internet of things statistics from 2019 to justify


𝐹𝑃𝑅 = the rise of IoT”, (2019), https://techjury.net/stats-
𝐹𝑃 + 𝑇𝑁 about/internet-of-things-statistics/. Accessed 25 Oct 2019.
[4] Azmoodeh, A. Dehghantanha,M. Conti, K.K.R. Choo,
False Negative Rate (FNR): “Detecting crypto-ransomware in IoT networks based on
energy consumption footprint”, J. Ambient Intell.
Humaniz. Comput. 9(4), 1141–1152 (2018).
False negative is referred as while a detection https://doi.org/10.1007/s12652-017-0558-5
system fails to recognize a variance and categorized as [5] J. Sakhnini, H. Karimipour, A. Dehghantanha, R.M.
benign. It is expressed as follows. Parizi, G. Srivastava, “Security aspects of internet of
things aided smart grids: a bibliometric survey”, Internet
𝐹𝑁 of Things, 100111 (2019).
𝐹𝑁𝑅 = https://doi.org/10.1016/j.iot.2019.100111
𝐹𝑁 + 𝑇𝑃
[6] https://www.sonicwall.com/news/new-sonicwall-research-
finds-aggressive-growth-in-ransomware-rise-in-iot-
Classification Rate (CR) or Accuracy: attacks/
CR is computed by measuring how the detection [7] Azmoodeh, A. Dehghantanha,M. Conti, K.K.R. Choo,
system accurately detects IoT malwares and it is also “Detecting crypto-ransomware in IoT networks based on
described in terms of percentage of correctly detected energy consumption footprint”, J. Ambient Intell.
IoT malwares from the entire dataset. Humaniz. Comput. 9(4), 1141–1152 (2018).
https://doi.org/10.1007/s12652-017-0558-5
𝑇𝑃 + 𝑇𝑁
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = [8] Azmoodeh and Choo, “Robust Malware Detection for
𝑇𝑃 + 𝑇𝑁 + 𝐹𝑃 + 𝐹𝑁 Internet Of (Battlefield) Things Devices Using Deep
Eigenspace Learning”, DOI
10.1109/TSUSC.2018.2809665, IEEE Transactions on
Sustainable Computing, 2018.
V. CONCLUSION
[9] I. Sofia, “Institutional Approaches to Support
IoT ecosystem is vast and it is emerged with Entrepreneurship in Global Economic Crisis,” Journal of
enormous volume of data, devices and equipments Enterprise and Business Intelligence, pp. 1–3, Jan. 2021.
where all are interconnected through internet. This
[10] A. L. Vartanova, “Study of Commuting to Origin on the
kind of interconnectivity increases the possibility of Weekend: Case study of Migrant Workers,” Journal of
more types of attacks of malicious attackers who are Enterprise and Business Intelligence, pp. 4–13, Jan. 2021.
eagerly aiming the security shortcomings related to IoT [11] M. Mikhali, “Performance and Religious Aspects of
ecosystem as well as devices. Number of attack Supply Chain Marketing System,” Journal of Enterprise
instances reached its apex level in the back to back and Business Intelligence, pp. 14–26, Jan. 2021.
pandemic periods of Covid 19. In this work, secured [12] T. Nghi Phu, N. Dai Tho, L. Huy Hoang, N. Ngoc Toan
malware detection framework is presented for IoT and N. Ngoc Binh, “An Efficient Algorithm to Extract
ecosystem on the basis of AI based Fuzzy Logic Control Flow-Based Features for IoT Malware Detection”,
Systems (AIFLS). Automatic fuzzy logic rules The Computer Journal, vol. 64, no. 1, pp. 599-609, Nov.
2019, doi: 10.1093/comjnl/bxaa087.
generation is implemented. In addition, IoT malware
classification is fastened and accurate by adopting [13] R. Kumar, X. Zhang, W. Wang, R.U. Khan, J. Kumar, A.
Sharif, “A multimodal malware detection technique for
Fuzzy Pattern Trees (FPT). UNSW-NB15 and Bot-IoT android IoT devices using various features”, IEEE Access
datasets are employed for validating proposed 7, 64411– 64430 (2019).
framework and its performance is assessed by making https://doi.org/10.1109/ACCESS.2019.2916886
use of the standard performance measures like TPR, [14] Z. Ma, Q. Li and X. Meng, “Discovering Suspicious APT
FPR, FNR and classification rate. Experiment results Families Through a Large-Scale Domain Graph in
depict that improved results are attained by the Information-Centric IoT”, IEEE Access, vol. 7, pp. 13917-
proposed framework while comparing with existing 13926, 2019, doi: 10.1109/ACCESS.2019.2894509.
recent research works. [15] J. Jeon, J. H. Park and Y. -S. Jeong, “Dynamic Analysis
for IoT Malware Detection With Convolution Neural
Network Model”, IEEE Access, vol. 8, pp. 96899-96911,
REFERENCES 2020, doi: 10.1109/ACCESS.2020.2995887.
[1] https://www.marketsandmarkets.com/pdfdownloadNew.as
p?id=67064836&utm [16] T. -L. Wan et al., “Efficient Detection and Classification
of Internet-of-Things Malware Based on Byte Sequences
[2] Fortune Business Insights, “COVID-19 impact: high from Executable Files”, IEEE Open Journal of the
dependency on novel technology to bode well for market”, Computer Society, vol. 1, pp. 262-275, 2020, doi:
2020, https://www.fortunebusinessinsights.com/industry- 10.1109/OJCS.2020.3033974.
reports/internetof-things-iot-market-100307.
[17] S. M. P. Dinakarrao et al., “Cognitive and Scalable
Technique for Securing IoT Networks Against Malware

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 778


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Epidemics”, IEEE Access, vol. 8, pp. 138508-138528,


2020, doi: 10.1109/ACCESS.2020.3011919.
[18] Q. Li, J. Mi, W. Li, J. Wang and M. Cheng, “CNN-Based
Malware Variants Detection Method for Internet of
Things”, IEEE Internet of Things Journal, vol. 8, no. 23,
pp. 16946-16962, 1 Dec.1, 2021, doi:
10.1109/JIOT.2021.3075694.
[19] S. Torabi, M. Dib, E. Bou-Harb, C. Assi and M. Debbabi,
“A Strings-Based Similarity Analysis Approach for
Characterizing IoT Malware and Inferring Their
Underlying Relationships”, IEEE Networking Letters, vol.
3, no. 3, pp. 161-165, Sept. 2021, doi:
10.1109/LNET.2021.3076600.
[20] R. Taheri, M. Shojafar, M. Alazab and R. Tafazolli, “Fed-
IIoT: A Robust Federated Malware Detection Architecture
in Industrial IoT”, IEEE Transactions on Industrial
Informatics, vol. 17, no. 12, pp. 8442-8452, Dec. 2021,
doi: 10.1109/TII.2020.3043458.
[21] M. Dib, S. Torabi, E. Bou-Harb and C. Assi, “A Multi-
Dimensional Deep Learning Framework for IoT Malware
Classification and Family Attribution”, IEEE Transactions
on Network and Service Management, vol. 18, no. 2, pp.
1165-1177, June 2021, doi:
10.1109/TNSM.2021.3075315.
[22] R. Senge, E. H•ullermeier, “Top-down induction of fuzzy
pattern trees”, IEEE Transactions on Fuzzy Systems, 19
(2), 241-252, 2011.
[23] https://research.unsw.edu.au/projects/unsw-nb15-dataset
[24] J. M. Peterson, J. L. Leevy and T. M. Khoshgoftaar, “A
Review and Analysis of the Bot-IoT Dataset”, 2021 IEEE
International Conference on Service-Oriented System
Engineering (SOSE), 2021, pp. 20-27, doi:
10.1109/SOSE52839.2021.00007.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 779


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Corneal Ulcer Feature Extraction and Image


Classification using a Deep Convolutional
Network and the VGG 16 Model

S.Janet Grace Susila Dr.D. Kavitha


Research Scholar, Department of Computer Science and Associate Professor, Department of Computer Science and
Applications, St. Peter’s Institute of Higher Education and Applications, St. Peter’s Institute of of Higher Education and
Research, Research, Chennai, India.
Chennai, India. janetinba1980@gmail.com

how CUs manifest clinically. economies that have


undergone industrialization and still-developing
Abstract— The most common kind of corneal issue is economies [1,3,4]. It was reported that there were around
keratitis, an infection of the cornea commonly referred to 65,000 early-onset CU cases in the United States of
as a corneal ulcer. In order to minimize the overall problem America [3]. Since corneal abrasions are often the first
of visual heaviness that happens throughout the many sign of an eye injury, treating corneal blindness in patients
phases of ulceration and the consequences, such as who have them is much more difficult.
permanent vision loss or blindness, a technical solution that
permits a distinction to be formed is needed. An image the advanced surgical technique being used on the
categorization technique using Deep Convolution Neural present patients' Treatment for corneal blindness is
Networks is described in this article. This technique allows possible, but only with the help of skilled medical
for the diagnosis of a wide variety of corneal ulcers using personnel and cutting-edge equipment. Manual visual
the data from ulcer images. The suggested technique is very appraisal, on the other hand, takes a long time and has
useful and permits the automated extraction of crucial limited treatment options. Furthermore, human visual
traits, which has significant ramifications in both the appraisal of the frequently employed feature extraction was
theoretical and practical arenas. The VGG16model based on assumption and clinical awareness rather than an
integrates the two goals, serving as both a method and a
evidence-based study [7] formational data analytics were
high-throughput network for the categorization of a large
particularly relevant [8]. The impressive advancements in
number of photos for investigating CUs data processing
problems. By expediting the reduction of provocative
medicine, particularly in terms of automated sickness
application and induction monitoring of customized detection and prevention, have been greatly aided by the
medical treatment, we provide a contribution to the area of recent surge in funding for research into healthcare
information technology-based healthcare. Early corneal systems[8-15].
ulcer identification helps to achieve this. There are two Deep Convolution Neural Networks (DCNNs) have
different employment categories to choose from. Data proven itself as a successful solution in image processing
preprocessing is used to extract features and classify data
tasks, particularly due to their high routine [16-20], which
during the initial phase of the process. DCNN is used in the
is especially relevant in the healthcare arena [8].
second assignment to extract features from the data.
According to the results of experimental research, the One of the main advantages of DCNNs [18,20] is the
classification accuracy obtained using features produced automated extraction of vivid and discriminative
from DCNN is only slightly better than that obtained using characteristics. Several attempts have been made to use
features from neural networks. classification on DCNN. machine learning techniques to automate the detection of
CUs, but none have been successful. They're Either draw
Keyword: Feature Extraction, Deep Convolution Neural conclusions based on a relatively tiny sample size, or don't
Network, VGG16 model. make any distinctions between the different forms of
disease, or don't have enough precision to be used in
healthcare [9, 21-23].
I. INTRODUCTION This problem is addressed in this research by
An estimated 1.5 to 2.5 million new instances of introducing a feature extraction-based DCNN-based
monocular blindness are reported each year. [Reference classification system.
required] The main cause of corneal erosion, which may
This is how the paper is structured: First, we provide
result in blindness, are corneal ulcers, commonly known
our research history, which includes relevant work on
as CUs [1, 2]. A spherical form has been used to describe
automated CUs examination, emphasizing the importance

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 780


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

of our technique. Then we go over the basics of The pictures have been kept there JPG format with a
methodology, such as our model design, evaluation data, resolution of 2592*1728 pixels and a 32-bit RGB colour
and preprocessing. The reregulation of our CU palette.
categorization mode is then presented. Following that, we
discuss the findings before establishing boundaries and Corneal ulcers are divided into three categories based
on their appearance and location.:
making recommendations for future work.
II. RESEARCH BACKGROUND TABLE 1.CLASSIFICATION SPECIFICATIONS FOR
DATASETS
A. Corneal Ulcer Manifestations. ________________________________________
Identifier category number Proportion
CU is the most prevalent symptom of corneal disease
0 point-likecornealulcers 358 50.28%
(also known as keratitis).CUs are induced by a variety of
reasons and often result in mild to severe ocular discharge 1 point-flakymixedcorneal ulcers 263 36.95%
as well as decreased vision[1,2,]. In humans, late 2. flaky corneal ulcers 97 12.78%
diagnosis or insufficient treatment can result in
irreversible vision loss or even blindness [1, 2, 7]. To ______________________________________________
diagnose corneal illnesses and avert visual impairment,
medical diagnostics are critical[1].
B. Preset Examination of Corneal Ulcer IV. DATAPREPROCESSING
A variety of semi-automated and fully-automated
developments in CU examination have been expected. The following pre-processing techniques were used to
Rodriquezetal.[24] employed digital image analysis to improve the classification performance of the network.
extract the CU region of interest, whereas Chantal.[25] These strategies were used throughout the network's
and Petersonetal.[25] built a colour extraction technique. training period. Figure 1 may display the three various
Based on manual CU area segmentation, Deng et al[23] types of corneal images that were processed.
also anticipated automatic progress. Sun et al.[22] and
Loo et al. [17] created innovations based on deep Place a mask over the images to do information
learning with a view to market segmentation. CU region filtering and identify the primary site of the corneal ulcer.
in the setting of completely automated advances.
To boost contrast and allow for additional information
Furthermore, DCNNs were employed by Akram and
on cornea images, adaptive histogram equalisation (AHE)
Debnath [19] to locate the ulcer region and define a
[24] should be utilised.
perimeter around it.
To speed up the network's convergence time, all of the
However, although all of these research point to
cornea pictures are scaled to the same size and averaged.
advances in CU segmentation, Specifically, they do not
allow for the classification of several distinct CU pattern In 2017, Google and CMU [25] partnered on a work
types, as we propose and which is feasible without the that showed that deep learning efficiency in visual
need of a detection breakthrough. problems requires a lot of marker data. In this study, we
use a range of techniques to enhance the data operations
Kuo et al. [21] The development of a deep learning-
including miscue transformation, scaling, angle rotation,
based corneal image model for the aim of differentiating
and random roll off, among others. When more data are
between the various forms of microbial keratitis is one
made accessible for the model's training, the model's ability
of the most recent developments in the area, as well as
to generalise is enhanced.
the one that is most equivalent to the work that we have
done. The average level of diagnostic accuracy is 69.5
percent, which is good but falls short of the high level of
precision anticipated in the healthcare industry [16].
All of the technologies that were discussed have had
positive effects in terms of identifying sickness and
preventing it. Automated CU assessment, which use
images of the cornea and fluoresce in staining, is used to
get these findings. On the other hand, the projected
models prove to be inaccurate and ineffective at
achieving the desired results.
III. DATASET
A total of 512 Patients with various degrees of corneal
ulcers were given fluorescein-staining pictures of the
Figure-1 Three types of corneal images
eyeball's surface at the SunYat-sen Eye Center at SunYat-
sen University. These photos were taken by patients. [10].

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 781


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

V. FEATURE EXTRACTION USING DCNN fluorescein staining images and a range of datasets (e.g.,
An artificial neural network called a deep SUSTech-SYSU), all of which add to our model's routine
convolutional neural network (DCNN) collects features and strength.
from input and classifies high-dimensional data. The
DCNN algorithm is a two-dimensional form rearranging
technique that is very resistant to changes, scaling,
skewing, and other imperfections. Feature extraction,
feature mapping, and sub sampling layers are among the
layers in the structure.
A DCNN is made up The third level, which is an
entirely connected output layer, comes after the first two
levels, which are made up of several convolution and
subsampling processes. Multilayer Neural Networks are
physically relocated variations of Deep Convolution
Neural Networks [6]. [3] based on the experiments. Each
cell has a receptive field, which is a small part of the
diagram fields. According to [4] separates cells into two
categories: both simple and complex cells. Complex cells
are able to acquire a large portion of these geographically
specific properties, while simple cells can only extract
local attributes. from a geographic perspective
surrounding. DCNN aims to apply this structure by
aggregating information from the input space in a similar
way, then staging the classification. Figure 2 Active corneal ulcer scar of VGG16 model

Unlike traditional methods, which extract features


physically and feed them to the model for classification
[3], this method does not rely on physical extraction. VII. METHOD OF ASSESSMENT
As a 1024-dimensional vector, a 2424-color image
can be represented. A 4096-pixel vector is a more precise Multiple assessment indicators were utilised to assess
description of the image. considering distinct color the VGG16's classification performance in this paper, a
values (R, G, and B) (dimensions). Shallow networks model True positives (TP), false positives (FP), false
may mimic such high-dimensional data but need negatives (FN), and true negatives (TN) are the four
estimations for a large number of parameters. Unless you different categories of true positives (TN). The
have a substantial quantity of training data. VGG16model displays positives (FP), false negatives (FN),
and true negatives in the network (TN).
VI. PROPOSED VGG MODEL
TABLE II CLASSIFICATION PERFORMANCE OF VGG16
MODEL [23]
Utilizing the pre-trained DCNN-based VGG16
model provided by Simonyan et al. [25] and the transfer
learning approach, As a common network approach for
investigating CU segmentation difficulties, the VGG16
model has been developed [22]. It is a high-performance
network that was extensively constructed to provide
services.
The VGG16 model provides a significant amount of
initial network data that may be used to match the
analysis of fluorescein staining images and a variety of
datasets (such as SUSTech-SYSU), all of which improve
the consistency and robustness of our model.
Simonyan et al. [25] created a DCNN-based VGG16
model that was used to apply the transfer learning
technique. The VGG16 model was created as a typical
network technique for CU segmentation study [22]. It's a
high-performance network for processing huge amounts
of data.
The VGG16 model provides a huge quantity of initial
network information that may be utilised to match

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 782


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VIII. EXPERIMENTAL SETUP References


[1] J.P.Whitcher,M.Srinivasan,andM.P.Upadhyay,“Corneal blindness:
A deep learning framework was employed in this a global perspective,” Bull. World Health Organ.,
experiment. IntelCorei7-8750HCPU@2.20GHz and vol.79,no.3,pp.214–221, 2001.
NIVIDIA GeForceGTX1050Ti graphics card with 4G [2] K.H.Cheng,S.L.Leung,W.Hoekman,W.H.Beekhuis,P.Mulder
memory were used to train the networks. During the A.Geerards, andA.Kijlstra,“Incidence of contact-lens-associated
training The dataset was randomly split into the training microbialkeratitis anditsrelated
orbidity,”Lancet,vol.354,no.9174,pp.174–175,1999.
dataset and the verification dataset during the whole
process of constructing the model. a 4:1 ratio. The input [3] G.Amescua, D. Miller, and E. C. Alfonso, “What is causing he
corneal ulcer? Management strategies for unresponsive corneal
network's picture size in the experiment was 256*256*3. ulceration,” Eye, vol. 26, pp. 228–236,2011.
The optimizer was Adam, and he was the one who chose [4] J. P. Whitcher and M. Srinivasan, “Corneal ulceration in the
the learning rate bto 0.0001. developing world–asilenepidemic Brit.J.Ophthalmol.,
vol.81,no.8,pp.622–623,1997.
[5] M. P. Upadhyay, P. C. Karmacharya, S. Koirala, D. N.Shah, S.
IX. RESULTS AND DISCUSSION Shakya, J. K. Shrestha, H. Bajracharya, C. K.Gurung, and J. P.
Whitcher, “The Bhaktapur eye study: ocular trauma and antibiotic
prophylaxis for the prevention of cornea l ulceration in Nepal,
VGG 16 on corneal ulcer classification VGG16's two ”Brit.J.Opthalmol., vol.85,no.4,pp.388–392, 2001.
layers with 4096 The nerve nodes were eliminated and [6] D.Yorston,M.Wood,andA.Foster,“Penetratingkeratoplasty in Africa
replaced with a complete connecting layer that included :graft survival and visual outcome,”Brit.J. Opthalmol.,
512 nerve nodes. A This was followed by the addition of vol.80,pp.890–894,1996.
a dropout layer and a SoftMax classification layer. As a [7] A. Haldorai and S. Anandakumar, “A Review of Tools Applied in
direct result of this modification, the other VGG16 model Processing of Medical Images,” Journal of Biomedical and
Sustainable Healthcare Applications, pp. 42–49, Jan. 2021.
parameters have There was no change. Weighed were
[8] A. Ramu and A. Haldorai, “Wavelet Methods and Pattern
images that had been altered before to this investigation Recognition for Clinical Image Fusion,” Journal of Biomedical and
and were used in the course of it. The accuracy curves of Sustainable Healthcare Applications, pp. 50–57, Jan. 2021.
the various models that were included in the verification [9] A. K, “Knowledge and Information Management Tools in
dataset were computed using experiments. These curves Architectural Dimensions,” Journal of Biomedical and Sustainable
may be seen. in Figure Healthcare Applications, pp. 58–66, Jan. 2021.
[10] W. Y. Dong and W. Na, “The Classification of Patient Semantical
Records and Medical Images,” Journal of Biomedical and
Sustainable Healthcare Applications, pp. 67–75, Jul. 2021.
[11] P.B.MorganandC.Maldonado- dina,“Cornealstaining: do we really
understandwhatweare
seeing?,”Cont.LensAnteriorEye,vol.32,no.2,pp.48–54,2009.
[12] K.Tsoi,S.Poon,andP.Hung,“Introduction to the minitrack on big
data on healthcare application,”inHICSS-53 Proc.,p.3215,2020.
[13] J.P.Whitcher, M.Srinivasan,and M.P.Upadhyay, “Corneal
blindness: a global perspective,” Bull. World Health Organ.,
vol.79,no.3,pp.214–221, 2001.
[14] K.H.Cheng,S.L.Leung,H.W.Hoekman, W.H.Beekhuis, P.Mulder,
. A.Geerards, and A.Kijlstra, “Incidence of contact-lens- associated
microbial keratitis and its related
morbidity,”Lancet,vol.354,no.9174,pp.174–175,1999.
Figure 3. Accuracy curves of corneal ulcer in verification dataset. [15] G. Amescua, D. Miller, and E. C. Alfonso, “What is causing the
corneal ulcer? Management strategies for unresponsive corneal
ulceration,” Eye, vol. 26, pp. 228–236,2011.
Table.3. TRAINING RESULTS OF VGG16 MODEL [16] J. P. Whitcher and M. Srinivasan, “Corneal ulceration in the
developing world –a silent epidemic
Models Params Accuracy Sensitivity Precision f1score c,”Brit.J.Ophthalmol.,vol.81,no.8,pp.622–623,1997.
[17] G. Amescua, D. Miller, and E. C. Alfonso, “What isca using t he
VGG16 81,825,603 86.81% 66.67% 57.87% 61.60%
cornea ulcer? management strategies for unresponsive corneal
ulceration,” Eye, vol. 26, pp. 228–236,2011.
___________________________________________
[18] D.Yorston,M.Wood,andA.Foster,“Penetratingkeratoplastyinafrica:g
An appropriate number of parameters generated from raftsurvivalandvisualoutcome,”Brit.J.Opthalmol., vol.80,pp.890–
894,1996.
Table 3 were considerably simplified by the VGG 16
model. Meanwhile, the VGG16 model had the best [19] J.P.Whitcher,M.Srinivasan, and M.P.Upadhyay, “Corneal
blindness: a global perspective,” Bull. World Health Organ.,
accuracy of 86.81 percent, sensitivity of 66.67 percent, vol.79,no.3,pp.214–221, 2001.
precision of 57.87 percent, and F1score of 61.60 percent. [20] K.H.Cheng,S.L.Leung,H.W.HoekmaH.Beekhuis, P.Mulder
On all evaluation metrics, the VGG 16 model A.Geerards andA.Kijlstra ,“Incidence of contact-lens-associated
outperformed the other models. microbial keratitis and its related morbidity.
[17] DH Hubel and TN Wiesel, “Receptive fields of single
neurons the cat’s striate cortex”, The Journal of physiology,
Vol.3,pp.574–579,1959.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 783


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[18] Segmentation of corneal ulcer are a based on ocular staining


images,” Biomedical Applications in Molecular Structural and
Functional Imaging,vol.10578,2018.
[19]J.D.Rodriguez, K.J.Lane, G.W. Ousler, E. Angjeli,
L.M.Smith,andM.B.Abelson,“AutomatedGrading System for
Evaluation of Superficial Punctate Keratitis Associated With Dry
Eye,” Investig. Ophthalmol. Vis.Sci., vol. 56,no.4,pp.2340–2347,
2015.
[20] Y. S. Chun, W. B. Yoon, K. G. Kim, and I. K. Park, “ Objective
Assessment of Corneal Staining Using Digital image Analysis
,”Investig .Ophthalmol .Vis.Sci.,vol.55,no.12, pp.7896–
7903,2014.
[21] R. Peterson and J. Wolffsohn, “Objective grading of the anterior
eye,” Optom. Vis. Sci., vol. 86, pp. 273– 278,2009.
[22] D. Chiu, P. Hung, V. Cheng, and E. Kafeza, “Protecting the
Exchange of Medical Images in Healthcare Process Integration
with Web Services,” in HICSS-40 Proc., pp.131–140,2007.
[23] Punn, Narinder Singh, and Sonali Agarwal. "Automated
diagnosis of COVID-19 with limited posteroanterior chest X-ray
images using fine-tuned deep neural networks." Applied
Intelligence 51, no. 5 (2021): 2689-2702.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 784


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Intelligent Deep Residual Network based Brain


Tumor Detection and Classification
K.Kartheeban,1 Kapula Kalyani,2 Sai Krishna Bommavaram,3 Dr. Divya Rohatgi,4 Mathur Nadarajan Kathiravan,5
Dr. S. Saravanan. 6
1
Associate Professor, Department of Computer Science and Engineering, Kalasalingam Academy of Research and Education,
Anand Nagar, KrishnanKoil, Srivilliputtur, Tamilnadu, India, k.kartheeban@klu.ac.in
2
Assistant Professor, Department of ECE, Aditya College of Engineering and Technology, Surampalem, Andhra Pradesh, India,
kalyani.kapula@acet.ac.in
3
Student, Department of Electronics and Communication Engineerin g, National Institute of Technology, Warangal, Telangana,
India, sanjurao2000@gmail.com
4
Associate Professor, Department of CSE, Amity University, Maharashtra, India, divi.rohatgi@gmail.com
5
Professor, Department of Biotechnology, Dr. N.G.P Arts and Science College, Kalapatti Road, Coimbatore, Tamilnadu, India,
kathiravanmn@drngpasc.ac.in
6
Assistant professor, Department of Commerce, Dr. Ambedkar Government Arts College, Vyasarpadi Chennai, Tamilnadu,
India, prof.s.saravanan@gmail.com

Abstract—Brain tumor has an impact on people in every age physiological designs can be handled and controlled to assist
group and considerably raise the global mortality rate. A tumor with envisioning stowed away indicative elements that are
is comprised of tissue from collected abnormal cells. The benign generally troublesome or difficult to recognize utilizing planar
brain tumor is non-destructive and is not cancerous. S everal imaging techniques [3]. A brain tumor (BT) is a dangerous or
brain MRI scans are widely required for classifier technique of non-carcinogenic development of strange cells in the brain,
machine learning (ML) for the segmentation of brain tumors. In which prompts harmless or threatening BTs [4]. The majority
optimal classification model, the factors that are to be deliberated of the analysts are participating in the essential kind of tumors
include computational resources, classification accuracy, and
like Gliomas. Gliomas is treated through chemotherapy,
algorithm performance. This study emphasizes the design of
Intelligent Deep Residual Network based Brain Tumor Detection radiotherapy, and medical procedure. Robotization by PC
and Classification (IDRN-BTCC) approach. The presented
helped gadgets can be utilized to get vital clinical information
IDRN-BTCC method majorly aims to recognize and classify the like tumor presence, area, and type [5]. Be that as it may, it is
presence of BT or not in the medical images. To do so, the as yet an extremely difficult errand in surveying their shape,
projected IDRN-BTCC model follows two subprocesses namely volume, limits, tumor recognition, size, division, and
feature extraction and classification. Primarily, residual network arrangement. Likewise, BT force shifts from one person to
(ResNet) model is exploited as a feature extractor which helps to another. MRI is liked over other treatment and finding
generate feature vectors. In addition, multilayer perceptron strategies since it gives unrivaled picture contrast in delicate
(MLP) module is exploited to categorize the medical images into tissues and has painless properties [6].
distinct classes. The hyperparameter tuning of the ResNet model The moving errand in BT is because of high changeability
takes place using chicken swarm optimization (CS O) algorithm. and innate MRI information qualities [7], e.g., fluctuation in
For examining the enhanced performance of the suggested tumor sizes or shapes, tumor location, region estimation,
IDRN-BTCC module, an experimental validation process is division, grouping, and tracking down vulnerability in
tested using benchmark data set and the result highlights the sectioned districts. The main assignment in picture
enhancements of the IDRN-BTCC approach over recent understanding is picture division since it helps highlight
methodologies. extraction, region computation, and importance in some
genuine applications [8]. It tends to be utilized, for instance,
Keywords— Brain tumor, Deep learning, Intelligent models, assessment of tumor volume, tissue grouping, platelet outline,
Medical imaging, ResNet model
restriction of tumors, matching of a map book, careful
preparation, and picture enlistment [9]. For checking oncologic
I. INT RODUCT ION treatment, the exact and morphology evaluation of tumors is a
Clinical centers offer numerous choices to help patients in basic undertaking. Be that as it may, broad scale work has been
discovery of medical conditions. Late advances in PC research acted out in this field; yet at the same time; clinicians rely upon
acquired numerous novel thoughts in the field of robotized manual assurance of tumors, because of absence of connection
clinical and emotionally supportive networks [1]. New among scientists and clinicians [10].
magnifying lenses are utilized to notice tissues and organs. This study emphasizes the design of Intelligent Deep
Sight and sound frameworks help in assessments [2]. Residual Network based Brain Tumor Detection and
Consequences of screenings and sweeps are assessed on Classification (IDRN-BTCC) method. The presented IDRN-
screens which gives great show support in point by point BTCC approach majorly aims to recognize and classify the
assessments. With PC strategies, complex advanced pictures of presence of BT or not in the medical images . To do so, the
projected IDRN-BTCC model follows two subprocesses

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 785


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

namely feature extraction and classification. Primarily, residual images. To do so, the projected IDRN-BTCC model follows
network (ResNet) module is exploited as a feature extractor two subprocesses namely feature extraction and classification.
which helps to generate feature vectors. The hyperparameter
A. Feature Extraction and Classification
tuning of the ResNet model takes place using chicken swarm
optimization (CSO) algorithm. In addition, multilayer ResNet applies residual block (RB) to resolve the
perceptron (MLP) module is exploited to classify the medical degradation and GD problem existing in common CNN [17].
images into distinct classes. For examining the enhanced The RB isn’t depending on network depth and improves the
performance of the suggested IDRN-BTCC module, an process of the system. It is noted that ResNet networks have
experimental validation process is tested by utilizing given effective outcomes in ImageNet classification method:
benchmark dataset. ( ) ( )
In Eq. (1), indicates the input of RB; denotes the
II. RELAT ED W ORKS weight of remaining block; indicates the consequence of RB.
In [11], the author modelled a method that employs deep ResNet network has various RB in which convolutional kernel
TL to automatically categorize abnormal and normal brain MR sizes of convolutional layers is different. The conventional
images. CNNs related ResNet34 method was employed as a structure of ResNet encompasses ResNet101, RetNet18, and
DL method. The author has employed current DL methods like RestNe50. Here, ResNet50 is applied as a feature extractor.
fine-tuning, optimal learning rate finder, and data augmentation Fig. 1 illustrates the framework of ResNet technique.
for training the method. Gull et al. [12] presented a unique
classification and segmentation structure related to effective
TL. In this structure, threshold and fast bounded box
approaches were employed for segmenting purposes. The two
pre-trained CNNs VGG-19 and AlexNet were employed for
categorization utilizing TL. In pre-trained techniques, 2 TL
methods fine-tuning and stochastic gradient descent with
restarts (SGDR) can be enforced via MRI through Figshare and
Kaggle data.
In [13], the Grab cut technique was implemented for
precise segmentation of actual lesion symptoms whereas TL
method visual geometry group (VGG-19) can be finely tuned
for obtaining attributes which can be concatenated with hand
crafted (texture and shape) features with the use of serial-
oriented technique. Such features will be optimized by using
entropy for fast and accurate classification and the fused vector
was dispersed to classifiers. In [14], the author leverages brain
contrast-enhanced MRI (CE-MRI) benchmark datasets for
categorizing 3 kinds of brain tumors (pituitary, glioma, and
meningioma). Owing to the small number of trained data, this (A)
classifier systems assess deep TL for extracting feature through
9 deep pre-trained CNNs structures. The work, mainly intends
to rise the classifier precision, speed the training period and
evade overfitting.
Asif et al. modelled a robust and efficient technique related
to TL approach to classifying brain tumors through MRI. To
boost brain tumor diagnostic system, the popular DL structures
were used in this study [15]. The pre-trained techniques like
InceptionResNetV2, Xception, DenseNet121 and NasNet
Large were leveraged for the abstraction of the deep features
from brain MRI. The experiments were executed with the help
of 2 benchmark data that are openly available on the web.
Images from the datasets are initially augmented, cropped, and
preprocessed for fast and accurate training. Arbane et al. [16]
devise a DL approach for classifying brain tumors from MRI
images with the use of CNNs depending upon TL. The
enforced system would explore a number of CNN structures, (B)
such as MobilNet-V2, ResNet, and Xception.
Fig. 1. (A & B) Basic Block diagram and Structure of ResNet
III. THE PROPOSED M ODEL
In this study, a new IDRN-BTCC method majorly aims to Features attained as ResNet architecture are set in MLP
recognize and classify the presence of BT or not in medical layer for the classification of images. MLP method
encompasses three mechanisms such as output, input, and
hidden layers [18]. The MLP module comprises different

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 786


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

hidden layer that allows the system to have processing and demonstrates the place of mothers of the chicks.
computation abilities to produce the output: implies the arbitrary variables which represent that the
chick is followed by its mother to search for food. Assume
∑ ( ) separate differences, the of all chicks will be in interval of
zero and two.
In Eq. (2), indicates the input variable, indicates the
weight amongst the input variable and neuron , and IV. RESULT S AND DISCUSSION
indicates the input parameter bias term. The result analysis of the RDCN-MLDR model is tested on
( ) ( ) the benchmark Kaggle dataset which holds images under five
classes.
In Eq. (3) indicates the sigmoid function for neuron and
denotes the sum of weights. Finally, the output neuron is
defined as:

∑ ( )

where is the output of neuron , is the weight among


the output parameter and neuron , denotes the bias term
of the output parameter and indicates the activation function
for neuron .
B. Hyperparameter Tuning
The hyperparameter tuning of the ResNet model takes
place using the CSO algorithm. CSO can be referred as a SI
optimized method established by Meng et al. [19]. This method
Fig. 2. T ACC and VACC analysis of IDRN-BT CC system
separates chicken flock as to hen, chick, and rooster groups
according to separate fitness values of chicken flocks. Then, The TACC and VACC of the IDRN-BTCC approach are
the hen, chick, and rooster exploration from the solution space considered on BT performance in Fig. 2. The figure is implicit
in particular method. Each particle in the method represents a that the IDRN-BTCC method has shown enhanced
feasible solution to problems. At last, the fitness value of 3 sets performance with improved values of TACC and VACC. It is
is extremely related to identifying the global optimal particles observable that the IDRN-BTCC system has reached maximal
and global optimal value. The rooster equivalents separate TACC outcomes.
from best fitness values in flocks. The position upgrading
respective to rooster was provided under.
( ( )) ( )

{ [ ]
( )
( )
( ) implies the Gaussian distribution with mean
of and standard deviation (SD) of represents the lesser
constant in computation. For preventing failures in separating
by 0, implies the label of roosters arbitrarily selected in
rooster populations. stands for fitness respective to . The
place of hens is upgrading as:
( )
Fig. 3. TLS and VLS analysis of IDRN-BTCC system
( ) ( )
(( ) ( ( ) )) ( ) The TLS and VLS of the IDRN-BTCC method are tested
( ) ( ) on BT performance in Fig. 3. The figure inferred that the
In which signifies the arbitrary value in zero and one. IDRN-BTCC P model has revealed better performance with
indicates the label of roosters arbitrarily selected in the least values of TLS and VLS. It is evident that the IDRN-
populations as spouse of hen. defines label of chicks BTCC approach has resulted in reduced VLS outcomes.
arbitrarily selected, and and , thus Table 1 reports the comparative analysis of RDCN-MLDR
If , it determines that hen is merely methodology with current algorithms.
taking food from another chick [20]. The place of chicks is
upgrading as:
( ) ( )

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 787


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

T ABLE I
COMPARAT IVE ANALYSIS OF RDCN-MLDR MET HOD WIT H
RECENT T ECHNIQUES

Me thods Sensitivity Specificity Accuracy


IDRN-BT CC 97.17 98.77 98.07
D-CNN Model 96.58 96.14 97.31
FBGBT DS-ANFIS 96.20 95.10 96.40
SGT -CNN 91.20 93.40 93.30
BT S-MRI-CNN 94.20 94.40 94.60
Multi-Modal BT S 92.60 93.00 93.30
Multifractal T E-
DSBT 94.30 95.10 95.90

Fig. 5. analysis of RDCN-MLDR approach with recent algorithms

Fig. 4. analysis of RDCN-MLDR approach with recent algorithms

Fig. 4 exhibits an overall assessment of the IDRN- Fig. 6. analysis of RDCN-MLDR method with current approaches
BTCC model with other classification models. The figure
represented that the SGT-CNN model has exhibited worst Fig. 5 shows an overall assessment of the IDRN-
performance with of 91.20%. Next, the multi-modal BTCC model with other classification models. The figure
BTS model has depicted slightly improved of 92.60%. represented that the Multi-Modal BTS model has exhibited
In contrast, the multifractal TE-DSBT model has exhibited worst performance with of 93.00%. Subsequently, the
considerable outcomes. Although the D-CNN and FBGBTDS- SGT-CNN approach has depicted slightly improved of
ANFIS models have demonstrated reasonable performance 93.40%. In contrast, the FBGBTDS-ANFIS model has
with values of 96.58% and 96.20% respectively. But the exhibited considerable outcomes. Although the Multifractal
IDRN-BTCC model has shown enhanced results with supreme TE-DSBT and D-CNN techniques have established reasonable
of 97.17%. performance with values of 95.1% and 96.14%
correspondingly. But the IDRN-BTCC method has shown
enhanced results with supreme of 98.77%.
Fig. 6 exhibits an overall assessment of the IDRN-
BTCC model with other classification models. The figure
represented that the SGT-CNN model has exhibited worst
performance with of 93.30%. Followed by, the Multi-
Modal BTS model has shown slightly improved of
93.30%. Conversely, the Multifractal TE-DSBT approach has
exhibited considerable outcomes. Although the Multifractal
FBGBTDS-ANFIS and D-CNN methods have established
reasonable performance with values of 96.4% and
97.31%% correspondingly. However, the IDRN-BTCC
approach has revealed improved results with supreme of
98.07%.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 788


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

At last, a detailed study of the IDRN-BTCC method is [2] Amin, J., Anjum, M.A., Sharif, M., Jabeen, S., Kadry, S. and Moreno
made with respect to CT in Fig. 7 and Table 2. With respect to Ger, P., 2022. A New Model for Brain T umor Detection Using
Ensemble T ransfer Learning and Quantum Variational
CT, the IDRN-BTCC system has gained least CT of 19.99s Classifier. Computational Intelligence and Neuroscience, 2022.
whereas the D-CNN, FBGBTDS-ANFIS, SGT-CNN, BTS- [3] Rehman, A., Naz, S., Razzak, M.I., Akram, F. and Imran, M., 2020. A
MRI-CNN, Multi-Modal BTS, and Multifractal TE-DSBT deep learning-based framework for automatic brain tumors classification
techniques have reached increased CT of 51.61s, 56.60s, using transfer learning. Circuits, Systems, and Signal Processing, 39(2),
57.10s, 40.72s, 31.22s, and 23.33s correspondingly. pp.757-775.
[4] Polat, Ö. and Güngen, C., 2021. Classification of brain tumors from MR
T ABLE II images using deep transfer learning. The Journal of
Supercomputing, 77(7), pp.7236-7252.
CT ANALYSIS OF IDRN-BT CC APPROACH WIT H RECENT
ALGORIT HMS [5] Amin, J., Sharif, M., Yasmin, M., Saba, T ., Anjum, M.A. and Fernandes,
S.L., 2019. A new approach for brain tumor segmentation and
Me thods Computational Time (sec) classification based on score level fusion using transfer learning. Journal
of medical systems, 43(11), pp.1-16.
IDRN-BT CC 19.99

D-CNN Model 51.61 [6] Kaur, T . and Gandhi, T .K., 2020. Deep convolutional neural networks
with transfer learning for automated brain image classification. Machine
FBGBT DS-ANFIS 56.60 Vision and Applications, 31(3), pp.1-16.
[7] Mehrotra, R., Ansari, M.A., Agrawal, R. and Anand, R.S., 2020. A
SGT -CNN 57.10
transfer learning approach for AI-based classification of brain
BT S-MRI-CNN 40.72 tumors. Machine Learning with Applications, 2, p.100003.
[8] Kumar, K.A., Prasad, A.Y. and Metan, J., 2022. A hybrid deep CNN-
Multi-Modal BT S 31.22 Cov-19-Res-Net T ransfer learning architype for an enhanced Brain
tumor Detection and Classification scheme in medical image
Multifractal TE-DSBT 23.33 processing. Biomedical Signal Processing and Control, 76, p.103631.
[9] Khan, H.A., Jue, W., Mushtaq, M. and Mushtaq, M.U., 2020. Brain
tumor classification in MRI image using convolutional neural
network. Math. Biosci. Eng, 17(5), pp.6203-6216.
[10] Ahmad, S. and Choudhury, P.K., 2022. On the Performance of Deep
T ransfer Learning Networks for Brain T umor Detection using MR
Images. IEEE Access.
[11] T alo, M., Baloglu, U.B., Yıldırım, Ö. and Acharya, U.R., 2019.
Application of deep transfer learning for automated brain abnormality
classification using MR images. Cognitive Systems Research, 54,
pp.176-188.
[12] Gull, S., Akbar, S. and Shoukat, I.A., 2021, November. A Deep Transfer
Learning Approach for Automated Detection of Brain T umor T hrough
Magnetic Resonance Imaging. In 2021 International Conference on
Innovative Computing (ICIC) (pp. 1-6). IEEE.
[13] Saba, T ., Mohamed, A.S., El-Affendi, M., Amin, J. and Sharif, M.,
2020. Brain tumor detection using fusion of hand crafted and deep
learning features. Cognitive Systems Research, 59, pp.221-230.
[14] Chelghoum, R., Ikhlef, A., Hameurlaine, A. and Jacquir, S., 2020, June.
T ransfer learning using convolutional neural network architectures for
Fig. 7. CT analysis of IDRN-BT CC approach with recent algorithms brain tumor classification from MRI images. In IFIP International
Conference on Artificial Intelligence Applications and Innovations (pp.
189-200). Springer, Cham.
V. CONCLUSION
[15] Asif, S., Yi, W., Ain, Q.U., Hou, J., Yi, T . and Si, J., 2022. Improving
In this study, a new IDRN-BTCC method majorly aims to Effectiveness of Different Deep T ransfer Learning-Based Models for
recognize and classify the presence of BT or not in medical Detecting Brain Tumors From MR Images. IEEE Access, 10, pp.34716-
images. To do so, the projected IDRN-BTCC model follows 34730.
two subprocesses namely feature extraction and classification. [16] Arbane, M., Benlamri, R., Brik, Y. and Djerioui, M., 2021, February.
Primarily, ResNet module is applied as a feature extractor T ransfer learning for automatic brain tumor classification using MRI
images. In 2020 2nd International Workshop on Human-Centric Smart
which helps to generate feature vectors. In addition, MLP Environments for Health and Well-being (IHSH) (pp. 210-214). IEEE.
approach was exploited to classify the medical images into [17] Pustokhin, D.A., Pustokhina, I.V., Dinh, P.N., Phan, S.V., Nguyen, G.N.
distinct classes. For examining the enhanced performance of and Joshi, G.P., 2020. An effective deep residual network based class
the suggested IDRN-BTCC module, an experimental validation attention layer with bidirectional LSTM for diagnosis and classification
process was tested ny utilizing benchmark dataset and the of COVID-19. Journal of Applied Statistics, pp.1-18.
result highlights the developments of the IDRN-BTCC model [18] Mahmoudi, J., Arjomand, M.A., Rezaei, M. and Mohammadi, M.H.,
over recent methodologies. 2016. Predicting the earthquake magnitude using the multilayer
perceptron neural network with two hidden layers. Civil engineering
REFERENCES journal, 2(1), pp.1-12.
[19] Meng, X., Liu, Y., Gao, X. and Zhang, H., 2014, October. A new bio -
[1] Deepak, S. and Ameer, P.M., 2019. Brain tumor classification using inspired algorithm: chicken swarm optimization. In International
deep CNN features via transfer learning. Computers in biology and conference in swarm intelligence (pp. 86-94). Springer, Cham.
medicine, 111, p.103345.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 789


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[20] Ci, Y., Wu, H., Sun, Y. and Wu, L., 2022. A prediction model with
wavelet neural network optimized by the chicken swarm optimization
for on-ramps metering of the urban expressway. Journal of Intelligent
Transportation Systems, 26(3), pp.356-365.
[21] Vijayakumar, T . "Classification of brain cancer type using machine
learning." Journal of Artificial Intelligence 1, no. 02 (2019): 105-113.
[22] Karuppusamy, Dr P. "Hybrid Manta Ray Foraging Optimization for
Novel Brain T umor Detection." Journal of Soft Computing Paradigm
(JSCP) 2, no. 03 (2020): 175-185.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 790


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Systematic and Bibliometric Review on Face


Recognition: Convolutional Neural Network

Aakanksha Gurpreet Singh Jaspreet Singh Deval Verma


Scholar Data Science Department of CSE Department of CSE Department of Mathematics
Chandigarh University Chandigarh University Chandigarh University Chandigarh University
Mohali, India Mohali, India Mohali, India Mohali, India
aakankshagoel46@gmail.com aiet.cse.gurpreet@gmail.com cec.jaspreet@gmail.com deval.e11601@cumail.in

Abstract—CNN (Convolution Neural Network) has boosted


computer vision research by delivering outstanding outcomes
in a variety of domains, including voice recognition, activity
recognition, classification as well as segmentation of images, video
analysis, as well as object recognition. In addition, the availability
of cheap technology and massive volumes of data has created new
possibilities for research for CNN. Alternative transfer functions,
regularization, parameter optimization, including architectural
enhancements, are a few inspiring ideas that have been re-
searched for the advancement of CNN. Additionally, attaining
architectural advancements leads to a significant increase in the
deep CNN’s capability. This paper has a primary focus on a depth
study of CNN (convolution neural network) on its activation
functions and architecture for convolution neural networks.
Furthermore, the bibliometric analysis has been done by using
Scopus and Web of Science databases processed in VOSviewer
software, by which researchers have ideas towards this domain.
The findings of this paper will contribute to knowledge and Fig. 1. Web of Science Core Collection for: Deep Convolution Neural
practice of researchers working in this field by increasing their Networks
understanding of convolution neural networks.
Index Terms—Convolutional Neural Network, Architectures
for CNN, Activation Functions in CNN, Image Recognition
that are spatially dependent. This breakthrough has pushed
researchers and developers create both larger models in order
I. I NTRODUCTION to perform difficult tasks, which was not achievable with
The component of machine learning that has gained the classic ANNs. A Convolutional Neural Network is a specific
greatest attention in current research and development is kind of Artificial Neural Network that is used to process pixel
Convolutional Neural Network (CNN). Machine learning is data in image recognition and processing. A Convolutional
the idea that a computer can comprehend the structure of Neural Network that typically analyses visual pictures using
data using a mathematical or statistical model. Convolutional grid-like data processing. ConvNet is another name for it,
neural networks, on the other hand, require more processing to teach an algorithm how to recognize items in images, A
than standard methods because they deal with intricate Convolutional Neural Network is used for object detection
patterns in vast amounts of data. In its execution process, and classification in an image, 3,628 results from Web of
it uses a variety of methodologies, including supervised Science Core Collection for: Deep Convolutional Neural
learning, unsupervised learning, and reinforcement learning. Networks (All Fields) and computer vision (All Fields) web
Communities are still exploring and accepting research of science. It shows the use of this technology with other
on neural network algorithms as of right now. In the last field, most of research has been done in this field as shown
ten years, convolutional neural networks have achieved in figure 1.
ground-breaking results in a range of pattern recognition
applications, from image processing to voice recognition. The Their names are derived from one of the network’s most
decrease in ANN’s parameter count is one of CNNs’ most crucial operations: Convolution. The brain is the inspiration
advantageous features. The most crucial premise regarding behind convolutional neural networks, because it can recognize
issues that CNN solves is that they shouldn’t include features objects in pictures. They are helpful in medicine because of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 791


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 3. Pooling Layer: Deep Convolution Neural Networks[1]

Fig. 2. Citations and Publication Report: Deep Convolution Neural Networks


architectures alter their completely linked layer with
a universal norm pooling layer, as in Lin et al. [4]
this ability. for MRI diagnosis, as an illustration. CNN is also “Network in Network” (NIN)
useful in the farming industry. Figure depicts that cititaions and
publications report for deep convolutional‘ neural networks f (x) = max(0, x) (1)
(All Fields) and computer vision (All Fields), survey from 5) Loss Layer: The final completely linked layer serves as a
Web of Science Core Collection data base that shows in 2021 loss layer, which assess the loss or error especially fine
have highest numbers in citation and publications as given in for the difference between desired and actual output.
figure 2. Out of K exclusive classes that are mutually exclusive,
1) ConvNet Layers: These are incredibly cognate to regular Softmax loss is utilized to forecast one class. As a
neural networks, which can be represented as a group of loss function, it is frequently employed. It is essentially
neurons and put in order of an acyclic graph [1]. With a multinomial logistic regression. In order to obtain a
neural network, the major distinction is, if just a portion probability distribution over classes, it normalizes the
of neurons in the covered layer are linked neurons from prognosis and transfers them to non-negative values.
the preceding layer. Hinge loss is used to train the Support Vector Machine,
2) Convolutional Layer: The foundational layer of the a large margin classifier. Euclidean loss can be applied
ConvNet is where the majority of the computation. It while revert to labels with real values.
is an arrangement of the feature maps with neurons. II. ACTIVATION F UNCTIONS
A collection of learnable filters, or kernels make up
the layer’s parameter. In order to create the separate 2- A single number is taken on by activation functions, which
dimensional activation map, these filters are convolved are discontinuance and performs various mathematical opera-
with the feature map. This map is then layered through tions on it. Such functions are numerous and the most popular
the depth measurement is to create the out-turn extent. ones are covered here.
Sharing parameters among neurons in the paired feature Sigmoid: As stated in equation (1), the non-linearity accepts
map reduce the convolution of the network by limiting a real-valued functions as input and produces the numbers
of parameters [2]. which lie between 0 and 1. it is frequently applied in the field
3) Pooling Layer: Basic ConvNet architecture alternates of neural networks, however with CNN it has two significant
between Convolutional layers and Pooling layers, with flaws-
the bottommost serving to lower the structural dimension • Saturate and vanishing gradient.

of the activation maps and the amount of the framework • Sigmoid output are not zero-centered leading gradients to

in the network, hence lowering the extensive figuring swing between positive and negative values.
intricacy. This resolves the issue of Overfitting. The 1
f (x) = (2)
requirement for various ConvNet section is questioned in 1 + e−x
the study of Alexey Dosovitskiy et al. [3], who discov- Tanh: Equation (2) makes it evident that Tanh, which produce
ered that conv layers swap max pooling layers. And this values between -1 and 1, can be viewed as an advanced
primarily applies to basic nets with outperformed various adaption of the sigmoid. Although this function also has the
complicated current architectures depicts in figure 3. saturating gradients issue, the second issue mentioned above
4) Fully Connected Layer: As in a typical neural network, is resolved because the outputs are zero-centered. Tanh is
all of the neurons in the preceding layer are completely therefore practically favored to sigmoid.
linked to the neurons in this layer. This involves using
tanh = 2f (2x) − 1 (3)
complex logic. A conv layer unable to come after a
fully linked layer since the neurons are not entirely ReLU: According to Equation, it is a linear activation
ordered. The latest developments have seen some function with a threshold at zero (3). By using ReLU,

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 792


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 6. Architecture for Neocognitron: Convolution Neural Networks[5]


Fig. 4. Country-wise Survey for Convolution Neural Networks

IV. N UMEROUS A RCHITECTURES FOR C ONVOLUTIONAL


N EURAL N ETWORKS
Convolutional Neural Networks (CNN) are a family of
artificial neural networks that are most frequently employed
for image analysis in the field of deep learning. Since its
creation, CNN designs have evolved quickly, and recently
they have produced results that were previously thought to be
only attainable through human execution or assistance. Various
architectures are available today, depending on the task at hand
and the related constraints. Perhaps the earliest forerunner of
CNN.
Neocognitron: Neocognitron was the first architecture of
its type. In the neocognitron, recognition or classification was
proposed as the penultimate step after the concepts of feature
Fig. 5. Survey for Convolution Neural Networks from Scopus database extraction, layer pooling, and convolution in a neural network
were presented [11]. The visual nerve system of vertebrates
served as an inspiration for the structure of the. The feature
gradient descent’s convergence can be hastened. extraction by s cells and positional shift tolerating by c cells
processes were performed throughout the entire network with
its alternate levels. Local features obtained in earlier rounds of
rect(x) = max(0, x) (4) this procedure are eventually combined with additional global
features. It was listed under tasks requiring the recognition of
Leaky ReLU: One of the primary issues with deep networks is handwritten characters and other patterns. and furthered the
the issue of being too snug. Regularization is a strategy used to development of the convolutional neural network shown in
a solution to this issue. DropConnect [6] and Dropout [5] the figure 6.
two primary regularization methods. As seen in the figure of Lenet-5: The Lenet was created by Yann Lecun and his
convolutional layers, it depicts a common neural network and crew, and that is where the name Convolutional Neural Net-
applying Dropout is equal to sampling a network of neurons. work actually came from (paper). It was primarily developed
Px for the handwritten digital recognition problem between 1989-
f (x) = 0.01x x <= 0 otherwise (5) 1998 [12]. It has been demonstrated that CNN. It replaces
the necessity for manually created feature extractors. This
III. R ELAED W ORK paper introduces a gradient-based learning method for graph
modified networks. It examines million of personal and bank
The literature survey briefly addressed the CNN technology checks each day commercially and delivers and accurate
with description along with error rate shown in given table 1. information on both type of checks shown in figure 7.
Scopus data:4,942 document results deep convolutional neural AlexNet: Researchers continued to work on the CNN model
networks given in figure describe that country-wise research throughout the 1990’s and the first part of the 2000’s. Follow-
done on this field. China top most country that work according ing a CNN dubbed AlexNet state of-the-art performance la-
to given data from scopus database given in figure 4 and 5. belling images in the ImageNet competition, CNN experienced

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 793


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

TABLE I
L ITERATURE S URVEY RELATED TO CNN T ECHNOLOGY

Authors Model Brief Description Error (%)


Srivastava et al.,(2015) Highway Networks Learning gate mechanism for regulating 0.45
DCNN information flow
Stollenga et.al(2014) Deep Attention Selective Net DCNNs with feedback .34
He et al.,(2016) Deep Residual Net- Residual blocks with identity mappings .22
works
Schmidhuber et.al,(2014) Stochastic Pooling Stochastic rather than deterministic 0.47
pooling procedure
Romero et al.,(2015) FitNets Thin, deep networks with intermediate- 0.51
level hints to guide training
Ciresan et al.,(2012) Multicolumn DCNN Multicolumn DCNNs, with data aug- .23
mentation
Ranzato et al.,(2006) Pretrained DCNN Energy-based unsupervised pretraining, .60
followed by DCNN
Graham et.al,(2014) Fractional max pool- Fractional stochastic version of max .26
ing pooling
Wan et al.,(2013) DropConnect Ensemble of DropConnect networks, .21
with data augmentation
Liao Carneiro,(2016) MIM Maxout network in Maxout network .35
Lin et al.,(2013) NIN MLP integrated into DCNN architectur .47
Jarrett et al.,(2009) DCNN-NN Dual CNN feature extractor followed .53
by dual neural network
Liang Hu et.al,(2015) RCNN Recurrent connections in convolutional .31
layer

VGGNet: A new architecture known as the VGGNet was


introduced in 2014, which was one of the year’s most
significant contributions (paper). Visual geometry Group’s
(VGGNet) invention is a (arcade) architecture (at Oxford
University). In order to solve issues better and achieves a
reduced error rate on the ImageNet classification challenge, it
was proposed that CNN should be made deeper. As depicted
in figure, numerous structures of various depths were tested.
Fig. 7. Architecture for Lenet-5: Convolution Neural Networks[6] This architecture primary distinguishing feature is its better
network wide usage of computing resources. We enhanced
the network’s depth and width while maintaining a fixed
a large increase in popularity around 2012. AlexNet which computing budget by carefully crafted the design. The Hebbian
was evidently trained on the ImageNet Dataset, comprises principle and the multi-scale processing heuristic were used
a total of 8 layers, including 5 convolutional layers and 3 to guide architectural decisions [15]. Additionally, VGG-19,
fully connected layers. The first normalization layer introduced a deeper variation, was created. In comparison to VGG-16 it
was the response normalization layer. It standardized all the was only slightly superior. Accordingly, performance increased
values for a specific place, across all the channels in a specific with depth until VGG-16, but it seemed to peak at a specific
layer [13]. Additionally, the rectified linear unit (ReLU) was depth.
introduced as an activation function, it has roughly 60M GoogLeNet: Google unveiled GoogLeNet in 2014(Paper).
parameters. Surprisingly, only around 5% of the parameters GoogLeNet once more emphasized deeper networks, but this
also contained in the convolutional layers, which together time with the aim of improving efficiency to lower parameter
account fot 90-95% of the processing. count, memory utilization and processing. We test residual nets
ZFNet: The very next year 2013, ZFNet was named the Im- on the ImageNet dataset that have a depth of upto 152 layers,
ageNet LSRVC champion, Although ZFNet’s architecture was which is eight times deeper than VGG networks but still has a
similar to Alexnet’s, a few hyperparameters had been altered. lower these residual nets. On the 2015 ILSVRC classification
In this study, they tested very deep Convolutional networks task [16], this outcome took home the first prize. A significant
for large-scale picture categorization (up to 19 weight layers). advancement in the strategy was the inception module. The
It was shown that representation depth improves classification network used this module/block numerous times in place of
accuracy, and that utilizing a traditional ConvNet architecture convolutional layers. The name “inception” comes from its
with significantly increased depth [14]. role as the building block for the architecture given in figure

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 794


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 8. Architecture for GooLeNet: Convolution Neural Networks[16]

8. The structure is additionally known as inception-v1.


ResNet : A stack of several blocks is a residual network. Fig. 9. Block Diagram Convolution Neural Networks[17]
Two 3*3 convolutional layers are present in each residual
block (as shown in fig.). The group popularized skip connec-
tions and proceeded even deeper, adding 152 layers, without
sacrificing the generalization ability of the mode [17]. Effi-
ciency was increased by using a “bottleneck” layer for deeper
networks as similar to GoogLeNet. ResNet took first place
in ILSVRC and COCO 2015 contest, and has since been a
popular option for many applications.

V. C ASE S TUDY OF FACE R ECOGNITION


A. Machine Learning Implementation in Face Recognition
: Face recognition is the operation of perceiving a char-
acter’s face by way of observation system. In view of the
fact that its implementation in various security systems such
as video surveillance systems, security platforms and even in
commercial areas. The earliest research on face recognition
may be found in the engineering literature from the 1960s
and the least the 1950s in the psychology. Darwin’s research Fig. 10. Case Study of Face Recognition: Convolution Neural Networks[19]
on face expression and emotions is among the oldest inves-
tigations. However, after kanade’s ground breaking discovery,
research on automatic machine facial recognition began in the B. Mechanism
1970s [18]. A comprehensive overview of facial recognition CNNs are basically multilayered neural network which
technologies at the time was provided in a review paper from indulges multiple neurons along with their weights. CNN
1995 [19]. A. S. Dhavalikar and R. K. Kulkarni” has been architecture embodies various layers of Convolution layer,
proposed an Automatic Facial Expression Recognition System pooling layer, ReLU (Reflected linear unit) and at the end
(AFERS) has been proposed [20]. In terms of performing op- one fully connected layer as shown in figure 9.
erations while recognizing faces deep learning methodologies
had performed far better than orthodox ML mechanism. As C. Dataset
the evolution of artificial intelligence has caught speed, face Dataset that we are using contains 4 images of different
recognition came into picture. Along with its fascinating way individuals that has taken at different times. Each one in
of proceeding in terms of verifying an individual it was and the dataset presented by multiple colored images with the
is one of the most accurate way of confirming the identity background which is cluttered and having a resolution of 640
of a human being. Deep learning operations can extract far pixels as given in figure 10. Images shows inclined faces and
more synthesized facial utterance of human being. There are frontal with different condition such as scale and lightning.
several deep learning affairs such as CNN (Convolution neural MatConvNet software tool Beta23 version has been used while
network), SAE (Stacked auto encoder) and DBN (Deep belief designing this CNN model. After pre-processing size of each
network). We use CNN because of its high efficiency in face image has been reduced. Distribution of dataset is done in two
recognition and also in image classification. sets one training set where we are putting 70% data and other

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 795


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

tion and Signal Processing (ICCSP), 2017, pp. 0588-0592, doi:


10.1109/ICCSP.2017.8286426.
[2] G. Hinton, N. Srivastava, A. Krizhevsky, I. Sutskever and R. Salakhutdi-
nov, ”Improving neural networks by preventing co-adaptation of feature
detectors”, pp. 1-18, 2012.
[3] J. Springenberg, A. Dosovitskiy, T. Brox and M. Reidmiller, ”Striving
For Simplicity: The All Convolutional Net”, vol. 141268063, pp. 1-14,
2015. [Accessed 28 August 2022].
[4] Singh, Jaspreet, et al. &quot;Cloud Resource Management Optimization:
Taxonomy and Research Challenges.&quot; 2020 8th International Con-
ference on Reliability, Infocom Technologies and Optimization (Trends
and Future Directions)(ICRITO). IEEE, 2020.
[5] G. Hinton, N. srivastava, A. Krizhevsky, I. Sutskever and R.
Salakhutdinov, ”Improving neural networks by preventing co-adaptation
of feature detectors”, no. 120705801, pp. 1-18, 2012. Available:
https://doi.org/10.48550/arXiv.1207.0580.
Fig. 11. Top-1 Error Rate: Convolution Neural Networks[19] [6] W. Li, Z. Matthew, Z. Sixin, L. Yann and F. Rob, ”Regularization of
neural networks using dropconnect”, pp. 1-9, 2013.
[7] A. Choromanska, M. Henaff, M. Mathieu, G. Arous and Y. Lecun, ”The
loss surfaces of multilayer networks”, pp. 1-13, 2015
[8] Singh, J., Agarwal, S., Kumar, P., Rana, D. and Bajaj, R., 2022,
August. Prominent Features based Chronic Kidney Disease Prediction
Model using Machine Learning. In 2022 3rd International Conference
on Electronics and Sustainable Communication Systems (ICESC) (pp.
1193-1198). IEEE.
[9] S. Hochreiter, Y. Bengio, P. Frasconi and J. Schmidhuber, ”Gradient flow
inrecurrent nets: the difficulty of learning long-term dependencies”, pp.
1-15, 2001.
[10] X. Glarot, A. Bordes and Y. Bengio, ”Deep sparse rectifier networks”,
Proceedings of the Fourteenth International Conference on Artificial
Intelligence and Statistics, no. 15315-323, pp. 1-9, 2011.
[11] Singh, J., Bajaj, R. and Kumar, A., 2021, October. Scaling Down Power
Utilization with Optimal Virtual Machine Placement Scheme for Cloud
Data Center Resources: A Performance Evaluation. In 2021 2nd Global
Conference for Advancement in Technology (GCAT) (pp. 1-6). IEEE.
Fig. 12. Top-5 Error Rate: Convolution Neural Networks[20] [12] Y. Lecun, L. Bottou, Y. Bengio and P. Haffner, ”Gradient-based learning
applied to document recognition”, Proceedings of the IEEE, vol. 86, no.
11, pp. 2278-2324, 1998. Available: 10.1109/5.726791.
[13] A. Krizhevsky, I. Sutskever and G. Hinton, ”ImageNet classification with
test set 30% of data. By implementing multiple changes in deep convolutional neural networks”, Communications of the ACM, vol.
learning rate, frequent changes in batch size and after making 60, no. 6, pp. 84-90, 2017. Available: 10.1145/3065386.
a change in image size also and performs so many tests on [14] Singh, J., Singh, G. and Verma, A., 2022, March. The Anatomy of Big
Data: Concepts, Principles and Challenges. In 2022 8th International
dataset. Error rates are shown in figure 11. Top-5 error rate is Conference on Advanced Computing and Communication Systems
lowest with 3 channels was achieved from all images. Error (ICACCS) (Vol. 1, pp. 986-990). IEEE.
rates are shown in figure 12. Top-5 error rate is lowest with 3 [15] C. Szegedy et al., ”Going deeper with convolutions,” 2015 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), 2015,
channels was achieved from all images. pp. 1-9, doi: 10.1109/CVPR.2015.7298594.
[16] K. He, X. Zhang, S. Ren and J. Sun, ”Deep Residual Learning for Image
VI. CONCLUSION Recognition,” 2016 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), 2016, pp. 770-778, doi: 10.1109/CVPR.2016.90.
A distinct variety of neural networks termed as deep con- [17] K. Takeo, ”Computer recognition of human faces”, vol. 47, 1977.
volutional neural Network (CNN) recently performed in a [18] R. Chellappa, C. L. Wilson and S. Sirohey, ”Human and machine
recognition of faces: a survey,” in Proceedings of the IEEE, vol. 83,
number of computer vision challenges. Deep CNN uses many no. 5, pp. 705-741, May 1995, doi: 10.1109/5.381842.
extracting features to automatically learn representations from [19] Singh, J., Singh, G. and Aggarwal, G., 2022, August. Inclusion of Aerial
the data, which contributes to its strong learning capabilities. Computing in Internet of Things: Prospects and Applications. In 2022
Third International Conference on Intelligent Computing Instrumenta-
This research aims to demonstrate the efficient utilization of tion and Control Technologies (ICICICT) (pp. 1664-1669). IEEE.
convolution neural network technology in computer vision. [20] K. He, X. Zhang, S. Ren and j. Sun, ”Deep Residual Learning for Image
This analysis used bibliometric analysis to establish the users Recognition”, pp. 1-9, 2016.
[21] C. Szegedy et al., ”Intriguing properties of neural networks”, pp. 1-10,
’ preferences in convolution neural networks connected to 2014. Available: https://doi.org/10.48550/arXiv.
computer vision. Several factors were properly considered,
including citations and published reports. This article also
provided a face-recognition case study, which illustrated how
this technology could be utilized to change relationships and
improve efficiency.

R EFERENCES
[1] N. Aloysius and M. Geetha, ”A review on deep convolutional
neural networks,” 2017 International Conference on Communica-

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 796


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Artificial Intelligence based Smart Cosmetics


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Suggestion System based on Skin Condition


Kavyashree N Rama Satish K V Prasanna Rajaram Rasal
Department of MCA Department of AIML Department of Computer Application
Dr.Ambedkar Institute of Technology, RNS Institute of technology, Bengaluru. Bharati Vidyapeeth (Deemed to be
Bangalore ramasatish.k.v@rnsit.ac.in University) Yashwantrao Mohite
kavyashree1283@gmail.com Institute of Management,Karad
Dr. M.Saidireddy prasanna.rasal@bharatividyapeeth.
Dr.Rahul Jalindar Jadhav Department of CSE edu
Department of Computer Application Computer Science and Engineering
Bharati Vidyapeeth (Deemed to be Koneru Lakshmaiah Education K G Kharade
University) Yashwantrao Mohite Foundation Department of Computer Science
Institute of Management,Karad msreddy33@klh.edu.in Shivaji University Kolhapur
rahul.jadhav@bharatividyapeeth.ed Maharashta
u cinderallacynthia@gmail.com

Abstract— Today, cosmetics have a big impact on how practices and supplies. As a result, it could be challenging
people look. Customers can access a range of products and for the general public to keep up a healthy routine and select
conduct e-commerce on the website. Choosing the best product the appropriate products for their skin type.
for our skin might be challenging. It offers a prediction
approach so that individuals can select the goods that are
suitable for their skin type. Configuration concepts perform II. RELATED WORK
better than conventional methods. It uses deep learning
technology to streamline the complex procedures in the IT Numerous applications of deep learning exist, including
industry for cosmetics and beauty care. Along with its clients speech recognition, computer vision, and natural language
and product offerings, the beauty sector has grown over time. processing (NLP). I incorporate it into my recommendations
With the expansion of products and consumers, selecting the as well. Recent applications for session-based suggestions,
right cosmetics becomes more and more important. Due to the music recommendations, and news recommendations are
substantial influence that cosmetics have on a person's noteworthy [1]. Tingting Li, Ruihe Qian, and colleagues
appearance, the client should choose the best cosmetics for
suggested a Deep Generative Adversarial Network to
themselves based on personal factors (skin type). Given that
every person has a distinct type of skin, choosing cosmetics that
transfer cosmetics from one image to another.
suit the person may be difficult. The composition depends on
whether the client has oily, dry, or neutral skin. Even the Rio Iwabuchi, Yoko Nakajima, and others suggested a
product the user is looking for can have an extremely difficult system for making recommendations that is based on user
skin condition; AI algorithms are perfectly suited to address feedback and cosmetic ingredients. Her research focuses on
this problem since they can evaluate massive amounts of identifying cosmetics that include lots of ingredients that
unstructured data and generate insightful results. make people look beautiful using user feedback. In essence,
they created a group of individuals with equivalent skin-
Keywords— Deep learning Technology, Consumers,
extracted user characteristics (such as age and skin quality)
Artificial Intelligence, Skin Type
selected by the individuals during registration. For every
cosmetic product, we create lotions with a high percentage
I. INTRODUCTION of beauty effect tags. To determine this threshold, they
A skin care regimen is a method for taking care of your employed natural classification techniques. For component
skin. To make sure that the skin is healthy and in good extraction, they applied the TF-IDF concept, which is
condition, this process is crucial. It should take different intended to pinpoint the words that best capture the meaning
routines into consideration depending on the skin type. It of a text. Values from the IF-IPF calculation were sorted.
must comprehend your skin's health and symptoms in order The recommendations are based on the IF-IPF values' top
to establish the skin type. As a result, determining one's own components after sorting [5].
skin type might be challenging for those who are unfamiliar
with their own skin. Skin type can be established using a Yuki Matsunami et al. created a tag-recommendation
variety of factors, such as gender, age, amount of sleep, and approach for evaluating cosmetics in a recommendation
skin condition. Four categories of skin exist: mixture skin, system. This study aims to draw attention to the review text.
normal skin, oily skin, and dry skin. Dryness has an eerie An automatic scoring system was used to assign scores to
resemblance to rough, scaly, or scaly skin. the review text. To determine the review's score, the
algorithm reads the text, rates the sentences, extracts k units
Shiny, oily, or potentially big pores are signs of the oily from the review text, rates the sentences, and adds up all of
condition. It possesses qualities that are in the middle. the components. After that, the machine recommends high-
Combination skin, as opposed to normal skin, is skin that is scoring tags to assess the expression [6]. Asami Okuda et al.
oily in some places and dry in others. There are no resources suggested a technique to discover comparable users based
available to assist non-experts in identifying their skin type. on preferences across cosmetic clusters
Visit a beauty salon to receive guidance on skincare

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 797


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. SKIN CARE ROUTINE the Kaggle website. There are 120000 records in the data
Skin care routine is a set of processes to take care of collection overall (80% training records and 20% testing
individual skin. Different types of skin have a different records). The epoch in this situation denotes how many
routine and procedure to be followed. In this section will times the loop has finished. An entire data collection cannot
discuss skin type determination, skin routine and chemicals be given to a neural network at once. The training data set is
that need to be avoided by the user. then used to build a stack.

3.1. Skin Type Determination

A person's skin care regimen entails numerous phases.


There are different procedures and regimens that should be
used for various skin types. This section will teach you how
to identify your skin type, how to take care of it, and what
products to stay away from determining one's skin type.
This study takes into account four different skin types:
normal skin, oily skin, dry skin, and combination skin.
skilled cosmeticians 1, [14]–[16] frequently discuss choice.
Sensitive skin is not taken into account because it is prone to
allergies and skin problems [3], [17], as well as other
medical factors such food, chemicals, dust, and family
history. Skin type is determined by responses, illnesses, and
symptoms [20]. However, other elements like exercise, the
environment, and sleeping patterns might also have an
impact on skin type.

It can treat a variety of skin problems for dry skin, including


tightness, redness, roughness, and itching. The majority of
skin care regimen websites concur that roughness and
irritation are traits of dry skin. If adequate skin care
practices are not followed, aging can result in dry skin. As a
result of the sebaceous glands' excessive activity, oily skin
is characterized by an increase in surface lipids. The skin
typically appears glossy and thick, and pores are frequently
enlarged. It mainly affects teenagers and young individuals
and frequently produces blemishes like blackheads.
Hormones, stress, and humidity all have an impact.

People with combination skin may experience dry patches


on their bodies and oily patches. The cheeks and the area
around the eyes (nose, forehead, chin) may become dry in
addition to the T-sebum zone's production. Different skin
care regimens are needed for oily and dry skin. This kind of
skin is relatively typical.

IV. METHODOLOGY

The proposed method(Fig1) creates appropriate cosmetic


setups using AI architecture (convolutional neural
networks). In the suggested automatic characteristic learning
approach, input attributes like skin type and product
component compatibility are transmitted to the input layer
and subsequently to the hidden layer. Finally, the cosmetics Fig. 1 Flow Diagram of Cosmetic Suggestion System
combination is displayed in the output layer. Alternative
composition techniques are better than traditional ones. 4.2 PreProcessing
A resizing, patching, and expanding procedure was used
4.1. Dataset during the preprocessing stage. Normalizing the size of the
This helps in retaining the “spatial” properties of images. So input image is the first step in the preprocessing procedure.
here different types of skin datasets which consist of four The majority of the images were rectangles with various
categories are used. In this study, the primary method of heights (median matrix size: 1,800). As a result, it will
data gathering is used. The information was collected from maintain the aspect ratio while converting every image to a
consistent 224224 pixel square. The input photographs were

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 798


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

initially preprocessed with a second-stage processing patch initially be trained on a lot of data in order for it to extract
since the input data is required to assess the effectiveness of input features.After receiving input, an algorithm first does
deep learning (a cropped portion of each image). In order to image preprocessing, then features are extracted using the
verify that the patches had adequate segmentation for saved dataset, followed by data classification, and lastly
analysis, patches were obtained using bounding boxes. output.
Then, using mirror images that had been rotated 30, 10, 10,
and 30 degrees and had been turned from right to left, data Only inputs for which a CNN has been trained and data
augmentation was carried out exclusively on the training stored can be processed by a CNN. They are employed in
dataset is illustrated in Fig.2 image recognition, classification of images, medical image
analysis, and recommendation systems.
4.4. Image Labeling and Dataset Distribution
Each subject was ranked separately using four sets of
photos. In the Image Archive and Communication System
(PACS), the annotations were first scored on the original
images and then again on the shrunk-down images utilized
for the actual training data. Internal and temporary data sets
were used to score the tests. The internal dataset was
separated into subgroups for training (70%), testing (15%),
and validation (15%) as shown in Fig.4
Fig. 2 Data Preprocessing

4.3. Feature Extraction

Fig 4. Image Labeling

V. RESULT AND IMPLEMENTATION


Fig 3. Feature Extraction [20]
Utilizing the web application, the system has created the
When processing needs to be done quickly and efficiently suggested solution effectively. Tests are still being
without sacrificing crucial or pertinent information, feature conducted, though. Public and expert testing are conducted
extraction is a good strategy as shown in fig 3. Feature in each of his two types of contexts. In preparation for open
extraction can reduce the amount of duplicate data for a testing, user knowledge will be evaluated both before and
particular test. The learning and generalization stages of the after system use. But models and laws are put to the test for
machine learning process are also accelerated by data professionals. Inputs, outputs, and data from the suggested
reduction and machine effort to construct combinations of solution are displayed in this test of the system. The step by
variables (features). step process of web application and cosmetic suggestion
system is displayed as shown Figure 5-Figure 9.
4.3. CNN

Convolutional neural networks (CNNs) are a unique kind of


deep neural network used in deep learning that analyze data
sets and extract knowledge from them. CNN may use
media, including images for data extraction. A CNN
essentially comprises three elements. Priority is given to
local receptive fields, then shared weightings and biases,
and last activations and bundling. A neural network must

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 799


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 5. Choosing skin type

Fig 6. Skin type


identification with one
product

In Figure 4 and Figure 5, a trained data set identifies the


customer's skin type such as normal, oil, dry or combination
skin. Based on the skin type of the customer the product
such as cleanser (Fig.6), Sun Protect(Fig.7) and Eye cream
(Fig.8) is recommended.

Fig. 9. Training and Validation Accuracy

Figures 10 illustrate the training loss after the model was


trained using the dataset. Loss is plotted along the Y axis,
Fig. 7. Recommended Cleanser while epoch is plotted along the X axis.
Fig. 7. Recommended Sun Protect

Fig. 10. Training Loss

VI. CONCLUSION
Making decisions in the modern world is more difficult than
Fig. 8 Recommended Eye cream it was in the past, particularly for customers who are now
faced with a wide range of options for numerous brands and
The graph of training & validation of accuracy and training product categories. Based on different skin types, this
& validation of accuracy is shown below Figure 9. method provides the composition (i.e. dry, oily or natural).
The improvement of cosmetic product composition is our

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 800


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

primary goal. A better composition of cosmetic items will


undoubtedly result from using the proposed system.

A few areas that can be improved upon by this system and


are being considered for future work include expanding the
dataset, expanding the system to recommend for both men
and women, learning the knowledge base rules directly from
the labeled data, and adding more templates and colors to
the makeup synthesis library to recommend more styles.

REFERENCES
[1] Jason Brownlee. “What is Deep Learning?” accessed on 29
November 2019, https://machinelearningmastery.com/what-is-
deeplearning/.
[2] Jan Goodfellow, Yoshua Bengio, and Aaron
Courville.2016.DeepLearning.MITPress.http://www.deeplea
rningbook.org, pp-800.
[3] Wikipedia. “Deep Neural Network”, accessed on
30November,2019.https://en.wikipedia.org/wiki/Deep_lear
ning#Deep_neural_networks.
[4] Wikipedia. “Deep Belief network”, accessed on
30November,2019.julyhttps://en.wikipedia.org/wiki/Deep_
belief_network.
[5] Rio Iwabuchi et al, “Proposal of Recommender System Based on
User Evaluation and Cosmetic Ingredients”, IEEE 2017.
[6] Yuki Matsunami et al, “Tag Recommendation Method for a
Cosmetics Review Recommender System”, iiWAS’17, ACM 2017
[7] Asami Okuda et al, “Finding Similar Users Based on Their
Preferences against Cosmetic Item Clusters”, iiWAS’17, ACM 2017.
[8] Christopher J. Holder et al, “Visual Siamese Clustering for Cosmetic
Product Recommendation”, ACCV 2018, Springer, 2017, 510-522.
[9] Yuncheng Li et al, “Mining Fashion Outfit composition using an End-
to-End deep learning approach for set data”, IEEE transaction on
multimedia 2017, IEEE, 2017.
[10] Jiwon Jiong, “For Your Skin Beauty: Mapping Cosmetic Items with
Bokeh”, accessed on 23 June 2019.
[11] Yun Fu, Shuyang Wang. “System for the beauty, cosmetics and
fashion”. United States Patents US 20170076474A1, 2017.
[12] Sid Salvi, Meghan Maupin, Nava Haghighi. System and methods for
formulizing personalized skin care product. United States Patents US
20190237194A1, 2019.
[13] Alexandros Karatzoglou and Balázs Hidasi. “Deep Learning for
Recommender Systems”, RecSys’17, August 27– 31, 2017.
[14] Weiwei Guo, Huiji Gao, et al, “Deep Natural Language Processing
for Search and Recommender Systems”. KDD ’19, ACM, 2019.
[15] Taleb Alashkar, Songyao Jiang et al, “Examples-Rules Guided Deep
Neural Network for Makeup Recommendation” Association for the
Advancement of Artificial Intelligence, AAAI, 2017.
[16] Tingting Li, Ruihe Qian et al, “BeautyGAN: Instance-level Facial
Makeup Transfer with Deep Generative Adversarial Network”,
Multimedia (MM, 2018), ACM, 2018.
[17] Songsri Tangsripairoj, Kwanchanok Khongson et al, “SkinProf: An
Android Application for Smart Cosmetic and Skincare Users”,
International Joint Conference on Computer Science and Software
Engineering, JCCSE, 2018.
[18] Florian Strub, Romaric Gaudel et al, “Hybrid Recommender System
based on Autoencoders”, DLRS ’16, September 15 2016, Boston,
MA, USA, ACM, 2016.
[19] Valeriy Gavrishchaka, Zhenyi Yang, Rebecca Miao, and Olga
Senyukova. “Advantages of Hybrid Deep Learning Frameworks in
Applications with Limited Data”, International Journal of Machine
Learning and Computing IJMLC, 2018.
[20] Najm, Hayder, Hayder Ansaf, and Oday A. Hassen. "An Effective
Implementation of Face Recognition Using Deep Convolutional
Network." Journal of Southwest Jiaotong University 54, no. 5 (2019).

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 801


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Indian Agriculture Supply Chain Management


using Blockchain Technology and CNN

Dr. D.N.V.S.L.S.Indira1 M. Hema Reddy1 G. Sri Jyothi2


Department of Information Department of Information Technology, Department of Computer Science and
Technology, SR Gudlavalleru SR Gudlavalleru Engineering College, Engineering,
Engineering College, Gudlavlleru, Gudlavlleru, Andhra Pradesh, India- SR Gudlavalleru Engineering College,
Andhra Pradesh, India-521356 521356 Gudlavlleru, Andhra Pradesh, India-
indiragamini@gmail.com hemareddymuppidi@gmail.com 521356
https://orcid.org/0000-0003-1631- srijyothiraogoriparthi@gmail.com
1156
K. Rohith3 K. Sravya4 G. Jahnavi4
Department of Electronics and Department of Computer Science and Department of Computer Science and
Communication Engineering, Engineering, Engineering,
SR Gudlavalleru Engineering SRKR Engineering College, SRKR Engineering College,
College, Gudlavlleru, Andhra Chinnamiram, Bhimavaram, Andhra Chinnamiram, Bhimavaram, Andhra
Pradesh, India-521356 Pradesh, India- 534204 Pradesh,India-534204
rohithkakumanu@gmail.com sravyakakumanu2020@gmail.com jahnaviraogoriparthi@gmail.com

Abstract—India is a key player in the global food production I. INTRODUCTION


industry. Indians have been cultivating land since the Indus
Valley Civilization. Although historically significant, this The agricultural sector in India is vital since it
country's farmers are starving to death while their contributes 18% to the GDP and 50% to employment.
counterparts in other countries receive the benefits of their Pulses, rice, wheat, spices, and spice products are all areas
labour to the tune of billions. Lack of proper supply chain in which India excels. Inefficient middlemen slow the
management is a contributing factor. It's common knowledge movement of agricultural items from the farmer to the
that poorly cared-for farming machinery quickly deteriorates. consumer in India. The farmer and consumer in the middle
However, current methods of supply chain management do not
do not have the same access to market information like
enable farmers to track the whereabouts of their commodities,
prices, supplies, and stock levels. Problems with
even though the government supplies them with storage
facilities. Since no system is in place, they have no idea where
communication, trust, and centralized control persist despite
their packages are at any one time during the shipping process. the availability of several planning and management tools
Therefore, there is a need for more stringent supply chain such as Material Requirements Planning, Enterprise
management, including checks at each level and double- Resource Planning, and Advanced Supply Chain Planning
checking by farmers and government officials to ensure the and Optimization.
integrity of goods. This study suggests implementing Governments at the federal and state levels have
Blockchain technology, which allows for more transparent unveiled a slew of new supports intended to improve and
information on the status of commodities, to enhance the
secure farmers' livelihoods. There are only a limited number
relationship between producers and consumers. By recording
of resources available to help farmers with the cost of
this information on the blockchain, all of the farmers and
government employees involved in the shipping process can planting and storing their crops. Growers can maximize
stay apprised of the operation's finer points. Records can be their earnings by preserving their products for later sale
kept forever in an immutable format. when demand is highest. Due to a lack of storage facilities,
very few farmers were forced to make the long trek from
Keywords: Supply Chain Management, Blockchain Technology, their homes to the nearest facility. If farmers wanted to
Ledger, Agriculture maximize their profits, they had to ship their produce far
away. Since more time is needed for farming, small farmers
have less time for marketing and distribution. The current
situation when farmers keep their goods in government
godowns lacks any means for them to track the whereabouts
of their stored goods. Due to a lack of knowledge about their
goods' current condition and the state of the market, many

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 802


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

farmers may be duped by agents into paying less than they and selling of agricultural products can all benefit from
are worth. blockchain technology. Smallholder farmer financial
To address these problems, the blockchain-based transaction tracking and the application of blockchain
agricultural supply chain management venture FARmer was technology in the food and agricultural industries are two
created (Farmer And Rely). Farmers are increasingly further research foci [10,14].
adopting Blockchain Technology (BCT) to manage supply
chains in the agriculture sector due to its rising popularity in
recent years. Information from a supply chain can be safely
stored using Distributed Ledger Technology (DLT), which
is used in conjunction with Blockchain. A hash and a pre-
hash Signature Value link one block to the next. As part of a
decentralized network, servers all over the world process
transactions. Once the information has been input or
committed, no modifications can be made. No piece of
information is ever compromised. Agriculture has a lot to
gain from using blockchain technology, and so do
customers. Thanks to cryptography and peer-to-peer
architecture, all participants may rest certain that their data Fig 1: Model representation of Blockchain
will be secure and unchangeable in the event of a breach,
and that all transactions will be open for scrutiny by all
parties involved. Its allure cannot be denied. The blockchain B. Smart Agriculture
improves distributed networks' efficiency, openness, and The backbone of Agri-food systems is the collection of
trustworthiness [7,11,15]. vital data and information on the natural resources necessary
for the continuation of all types of farming. The flow of
II. LITERATURE SURVEY money is from outputs to inputs, but the flow of information
A. Blockchain and data is the other way around, via intermediary value-
The use of blockchain technology for the storing and adding phases. Many different people and organizations,
movement of data has enormous potential to improve each with their own unique set of resources and expertise,
agricultural operations. This innovation can benefit both contribute to the development and upkeep of databases and
industrial farming and home gardens. Using cryptography to bodies of knowledge. These days, "smart agriculture" also
secure data integrity and permanence, a peer-to-peer design uses ICT and the IoT in the form of unmanned aerial
that eliminates the need for middlemen, and collective vehicles (UAVs), sensors, and machine learning to collect
governance principles that allow any participant to witness and analyze data [5].
transactions and verify their legality give Bitcoin an obvious The development of a comprehensive security system
attractiveness[17,18]. Therefore, blockchain promotes that allows for the use of data and provides support for its
openness, transparency, and efficiency in multi-party administration is a vital step toward the realization of smart
systems. In this piece, we'll discuss how supply chain agriculture. Due to their centralized nature, conventional
management, insurance, smart farming, and the purchasing approaches to data management are vulnerable to issues

Fig 2: Model representation of Blockchain

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 803


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

such as inaccurate information, distortion, improper use, and depriving them of their due portion of earnings [4].
even cyber attacks. For instance, government agencies with
a vested interest in environmental monitoring data are more
likely to archive that data for posterity. They can affect data-
based decision-making [11,16].

III. EXISTING SYSTEM


A. Food Supply Chain
Supply chains for food are increasingly lengthy and
complex as a result of rising globalization and cutthroat
market competition. Challenges to society, the economy,
and human health can be broken down into several
categories, including food supply chain inefficiencies, lack
of faith in food, lack of food traceability, and food safety
and quality all rank high [1,9].
Fig 3: Supply chain management in an agricultural nation
By releasing information about individual items within
the blockchain, blockchain technology allows manufacturers B. CNN Operation
to increase the credibility of their products and foster a There must be a robust first convolutional layer in any CNN
reliable relationship with their customers. One strategy for a architecture. Convolutional kernels, or filters, are employed
company to gain a competitive edge is to improve the extent in sequence to create a feature map from an input image (N-
to which customers may benefit from its products and dimensional metrics). Convolutional Neural Networks
services. This would make it impossible for dishonest (CNNs), also known as ConvNets, are a type of Artificial
companies or those who send subpar goods to remain in Neural Network (ANN) with a deep feed-forward
business, and it would put pressure on all agricultural and architecture and outstanding generalizing capacity compared
food suppliers to raise their standards [7]. to other networks with FC layers, making them ideal for
learning highly abstracted aspects of objects, especially
It tracks the origins and destinations of food, and
spatial data. Different features can be abstractly learned by
blockchain technology is useful to consumers. It aids in
the various processing layers of a deep convolutional neural
addressing customers' worries about food safety,
network (CNN) model (such as an image). The first few
sustainability, and quality. With the help of blockchain
layers are responsible for learning and extracting high-level
technology, the complicated process of food production can
features (with less abstraction), while the latter levels are
be broken down into manageable steps, and consumers may
responsible for learning and extracting low-level features
have a deeper understanding of how their food is made.
(with more abstraction) (with higher abstraction). In fig. 4,
Lowering transaction costs, strengthening customer
we saw the overarching idea of CNN; in the following
connections, and reassuring shoppers about the quality of
sections, we'll take a closer look at its component layers [6].
their food, benefit consumers. There are a variety of ways in
which this helps consumers. By using distributed ledger
technology (Blockchain), regulatory bodies can get reliable
and accurate data on which to base quick, effective
decisions [3].

There is no system of accountability or traceability


within the current paradigm of supply chain management.
Intermediaries have the power to unilaterally raise prices
without repercussions to either farmers or consumers.
Modern supply chains are plagued by widespread
dishonesty and corruption. Customers have no way of
knowing the degree of quality of the things they buy. Fig 4: Model of CNN [19]
Intermediaries benefit at the expense of farmers by
First, you must understand the format that CNN expects
inputs to be in. Unlike conventional neural networks, which
take input in vector format, CNN takes in multi-channel
images as its input (e.g., for RGB image as in fig: 4, it is 3
channeled, and for Gray-Scale image, it is single
channeled). The convolution process is now shown using a

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 804


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

4x4 grayscale image and a 2x2 kernel with random weights quality and condition. Assuring that only the correct items
(see Fig: 5). Convolution involves sliding the 2x2 kernels are transported requires this level of scrutiny. The smart
across the full 4x4 image horizontally and vertically, contract in the blockchain is in charge of checking
everything out. A computer application will include the
multiplying the corresponding values of the kernel and input
smart contract's stipulations. A new transaction is generated
picture to get the dot product, and then summing those dot once the smart contract verifies the user interface parameters
products to produce the scalar value in the output feature as accurate. Following a predetermined amount of time, the
map. The process should be repeated until the kernel is generated transaction is mined into a block. Thus, the
immobile. A feature map will be produced when the full product records are now stored in a decentralized,
convolution method has been executed. immutable ledger known as Blockchain [12,13].
We used the Deep Learning Method and the cotton and
plant-village datasets to train and verify the CNN model. To
create this model, we used a 70%-30% split between
training and validation, yielding 4200 training shots and
1800 validation photos from the Plant Village and Cotton
Dataset. Sometimes abbreviated to "CNN," Convolutional
Fig 5: 4x4 Grey Scale Image and Kernal of size 2x2 Neural Networks are a sort of deep learning model that takes
in data and assigns weights to the different features of that
With no padding and a stride (the size of the steps along the input. As a type of neural network, the Convolutional
horizontal and vertical axes) of 1, a convolution operation is Neural Network (CNN) sees widespread application in
performed on the input image. However, in a convolution image-centric datasets [6].
process, the stride value need not equal 1. As the step size of Our convolutional neural network (CNN) architecture
consists of a dropout layer, an activation function called
the convolution process grows larger, the shrinking of the
ReLU, a maximum pooling layer, and four basic
feature map becomes more noticeable. Specifically, without convolutional layers with filter sizes of 32, 64, 128, and 128.
the padding, the input image's border-side details are lost The softmax activation function shows which class has the
too quickly, thus it's crucial to employ it to give the border highest probability and comes after the convolutional layers,
size information greater weight. Padding increases the size the flattening layer, and the dense layer. This step is
of the input image and thus the size of the resultant feature performed after the convolutional layers have been applied.
map [8].
C. Role of Activation Function
A neuron's input value is computed by summing the values
of its 10 inputs and then biasing this sum by some amount;
the primary role of an activation function in a model based
on neural networks is to map the input to the output (if there
is a bias). Simply expressed, the activation function
determines whether or not a neuron fires in response to a
specific input. CNN’s utilize non-linear activation layers
after each educible layer (weighted layers such as
convolutional and FC layers). Due to the non-linear nature
of these layers, the CNN model has the potential to learn
more nuanced data and map inputs to outputs on the fly.
When training a model, error backpropagation relies on the
activation function's capacity to discriminate between
different inputs. These are the most popular activation
functions for usage in DNNs (including CNN) [2,8].

V. PROPOSED SYSTEM

A. Farm-based Blockchain protocol


Whenever agricultural commodities are moved from a
farmer's location, data on the quantity and quality of the
items (size, color, defect-free, natural/manure-free/organic,
time of cultivation, humidity, current market price, etc.) is
recorded in the Blockchain. A form is used to gather all the
important information about the product. The information
gathered in this manner is then compared to the
predetermined standards of the smart contract. Before
anything can be shipped, it usually needs to be tested for Fig 6: DApp Strato Architecture

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 805


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

and condition of the items before transporting them.


The purpose of this check is to guarantee that only
authorized items are shipped. The smart contract in a
Blockchain network performs this validation
automatically. All of the rules will be written into a
computer program, which is the smart contract. A new
transaction is generated after the smart contract
confirms the accuracy of the parameters provided by
the user interface. The produced transaction is included
in a block via mining after some time. Since Blockchain
is an immutable ledger, all product information may
now be safely stored there[11,13].
• Step 6: Development of Application Programming
Interfaces.
• Step 7: Designing the Admin and User Interface.
Designing "user-product" interaction scenarios as a
means to an end (applicable to the chosen interface
options and user roles). Situations are prioritized in
Fig 7: DApp Flow Diagram terms of their significance based on factors including
how often they are used and the responsibilities of the
individuals that perform those uses. Designing a user-
friendly interface for navigating and exploring content
to maximize efficiency in terms of features, content,
and interactions with the site's audience.
• Step 8: Incorporate New Technology.

V. RESULTS AND DISCUSSION

Fig 8: Block Management over Strato Node

A. Steps for Implementation


• Step 1: Find a Use Case That Makes Sense.
• Step 2: Identifying the Most Appropriate Mechanism
for Consensus.
• Step 3: Determine Which Platform Is Best for You
Node design is the next step (considerable factors
are Security, SEO, Responsive Web Design, Support of
Multiple Selling Channels, Integrations, Technical
Support, Scalability, and Price).
• Step 5: Create an Instance of the Blockchain.
• When agricultural products leave a farmer's location,
information about the quantity, state of the
goods/quality (including size, color, defect-free,
natural/manure-free/organic, time of cultivation,
humidity, current market price, etc.), and provenance
(including time of cultivation, location of the farmer,
etc.) is recorded and stored in the Blockchain. All of the
aforementioned information about the items is gathered
using a form. When this form is submitted, the data is
checked against the criteria outlined in the smart
contract. Typically, it is necessary to check the quality Fig 9: Login Page

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 806


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig 12: Training and Validation Loss

Fig 10: Visualization of Output in node VI. CONCLUSION

This initiative employs blockchain technology to provide a


Table 1: Performance Comparison in AP
user-friendly web-based platform for managing supply
Year Ending Registered Percentage of chains in the agricultural sector. This online service is a
Marketers wholesale safe, decentralized network that raises both product quality
assembling and openness. There will be far less opportunity for
markets dishonest intermediaries to take advantage of the farmers
2001 236 3.23 because of their low levels of literacy. Produce pricing for
farmers will be reasonable. Blockchain technology allows
2006 470 6.44
for the monitoring of the property. From the farmer to the
2008 715 9.80
final user, we know exactly where this asset has been. To
2012 1012 13.87
find out if the item has been tampered with, we can run a
2016 3528 48.37
check. Further, the entire supply chain will become more
2018 5766 79.06 open and transparent. Inflation can be contained if prices are
2019 6968 95.54 not jacked up unjustly for the benefit of middlemen. It's a
2020 7161 98.19 win-win for everyone concerned when consumers don't have
2021 7190 98.96 to pay inflated costs for the goods they purchase. The
general populace's quality of life will improve as a direct
result.

REFERENCES

[1] M. Chamakh, M. Hamdi, and S. E. Asmi, "A new architecture for


supply-chain management," 2017 14th IEEE Annual Consumer
Communications & Networking Conference (CCNC), 2017, pp. 77-
82, doi: 10.1109/CCNC.2017.7983085.
[2] B. Ding, H. Qian and J. Zhou, "Activation functions and their
characteristics in deep neural networks," 2018 Chinese Control And
Decision Conference (CCDC), 2018, pp. 1836-1841, doi:
10.1109/CCDC.2018.8407425.
[3] Beamon, B. M., “Supply Chain Design and Analysis: Models and
Methods”, International Journal of Production Economics, Vol. 55,
281-294, 1998.
[4] A. P. Barbosa-Povoa, "Operations and supply chain management,"
2008 IEEE International Engineering Management Conference, 2008,
pp. 1-2, doi: 10.1109/IEMCE.2008.4618002.
[5] Caro, M. P., Ali, M. S., Vecchio, M., and Giaffreda, R. (2018).
“Blockchain-based traceability in agri-food supply chain
management: a practical implementation,” in Proceedings of the 2018
IoT Vertical and Topical Summit on Agriculture-Tuscany (IOT
Tuscany), (Tuscany: Institute of Electrical and Electronics
Engineers), 1–4.
Fig 11:Training and Validation Accuracy
[6] Y. Kominami, H. Ogawa and K. Murase, "Convolutional neural
networks with multi-valued neurons," 2017 International Joint
Conference on Neural Networks (IJCNN), 2017, pp. 2673-2678, doi:
10.1109/IJCNN.2017.7966183.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 807


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[7] Chod, J., Trichakis, N., Tsoukalas, G., Aspegren, H., and Weber, M.
(2019). “On the financing benefits of supply chain transparency and
blockchain adoption”. doi: 10.2139/ssrn.3078945
[8] M. Pavlova, "Comparison of Activation Functions in Convolution
Neural Network," 2020 28th National Conference with International
Participation (TELECOM), 2020, pp. 65-67, doi:
10.1109/TELECOM50385.2020.9299559.
[9] Elizabeth J.Woods,“supply chain management: understanding the
concept and its implications in developing countries”. ‘Agriproduct
supply chain management in developing countries edited by G I
Johnson and P J Hofrean, ACIAR Proceedings No.119e pp. 18-26.
[10] Birthal, P.S., and V.K. Taneja. 2006. The livestock sector in India:
Opportunities and challenges for smallholders. Paper presented in the
international workshop on Smallholder livestock production in India:
Opportunities and challenges. Indian Council of Agricultural
Research, New Delhi; and the International Livestock Research
Institute, Nairobi. New Delhi: January 31-February 1, 2006.
[11] Quoted from King, Robert P., Michael Boehlje, Michael Cook, and
Steven+T. Sonka(2010) “Agribusiness Economics and
Management”, American Journal of Agricultural Economics,
Special Issue Commemorating the Centennial of the AAEA, Vol.92,
No.2, April.
[12] V. Sudha, R. Kalaiselvi and P. Shanmughasundaram, "Blockchain-
based solution to improve the Supply Chain Management in Indian
agriculture," 2021 International Conference on Artificial Intelligence
and Smart Systems (ICAIS), 2021, pp. 1289-1292, doi:
10.1109/ICAIS50930.2021.9395867.
[13] V. Sudha, R. Akiladevi, S. Nithya Roopa, P. Nancy, "A Study of
Blockchain Technology in Agriculture Supply Chain", 2021
International Conference on Advancements in Electrical, Electronics,
Communication, Computing and Automation (ICAECA), pp.1-4,
2021.
[14] Udit Agarwal, Vinay Rishiwal, Sudeep Tanwar, Rashmi Chaudhary,
Gulshan Sharma, Pitshou N. Bokoro, Ravi Sharma, "Blockchain
Technology for Secure Supply Chain Management: A Comprehensive
Review", IEEE Access, vol.10, pp.85493-85517, 2022.
[15] S. Bhalerao, S. Agarwal, S. Borkar, S. Anekar, N. Kulkarni and S.
Bhagwat, "Supply Chain Management using Blockchain," 2019
International Conference on Intelligent Sustainable Systems (ICISS),
2019, pp. 456-459, doi: 10.1109/ISS1.2019.8908031.
[16] Brock, A. (2016). Beyond Blockchain: Simple Scalable Crypto
currencies. Retrieved from https://medium.com/holochain/beyond-
blockchain-simple-scalablecryptocurrencies-1eb7aebac6a .
[17] Madhura, S. "A Secure Protocol for Smart Meters using IoT Enabled
Distribution Networks and Blockchain Security Mechanism." Journal
of Ubiquitous Computing and Communication Technologies (UCCT)
2, no. 01 (2020): 48-58.
[18] Kamel, D. K. "Wireless IoT with blockchain-enabled technology
amidst attacks." IRO Journal on Sustainable Wireless Systems 2, no.
3 (2021): 133-137.
[19] Benhammou, Yassir, Siham Tabik, Boujemâa Achchab, and Francisco
Herrera. "A first study exploring the performance of the state-of-the
art CNN model in the problem of breast cancer." In proceedings of
the international conference on learning and optimization algorithms:
theory and applications, pp. 1-6. 2018.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 808


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

Real-Time Face Mask Detection from CCTV Video


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Frames using Deep Neural Networks


V Anantha Natarajan Putta Vishnu Vardhan Nayakula Murahara Sai Priya
Dept. of Computer Science and Dept. of Computer Science and Dept. of Computer Science and
Engineering Engineering Engineering
Sree Vidyanikethan Engineering Sree Vidyanikethan Engineering Sree Vidyanikethan Engineering
College College College
Tirupati, India Tirupati, India Tirupati, India
vananthanatarajan@vidyanikethan.edu 421pvv@gmail.com nmsaipriya@gmail.com

Nunna Vineeth Parthu V


Dept. of Computer Science and Dept. of Computer Science and
Engineering Engineering
Sree Vidyanikethan Engineering Sree Vidyanikethan Engineering
College College
Tirupati, India Tirupati, India
vineethnunna19@gmail.com parthu.valapala@gmail.com

Abstract—The coronavirus, commonly known as SARS concepts followed by developing a face mask detection
COVID-19, is causing a pandemic that is affecting individuals system.
all over the world. The spread of the virus compelled the
authorities to impose a rigorous lockdown on its citizens. Every By identifying persons who aren't covering their faces with
person in society may experience a variety of issues as a result a mask and emphasising their faces, the suggested model may
of this. According to WHO (World Health Organization) be merged with video frames to thwart the coronavirus
regulations, the sole method to halt the virus's spread is to wear transmission. The lightweight neural network MobileNetV2
a face mask. Therefore, the suggested approach makes sure that and Single Shot Detector (SSD) employing transfer learning
everyone appropriately wears a face mask in public locations. technique are integrated in this approach to achieve a
The objective of this approach is to detect people without face compromise between resource restrictions and identification
masks and people who wear facemasks incorrectly in social accuracy. This makes it possible to use real-time video
environments. This system consists of multiple face detection surveillance to keep an eye on public areas and identify
modules to find the area of interest within the video frames. In persons wearing face masks while maintaining a secure social
the next level, using the trained Deep Learning model, the distance. Our method analyses Real-time Streaming Protocol
presence of a mask is detected and faces without mask and faces (RTSP) video streams using neural networking models
wearing masks incorrectly are highlighted. The dataset for face utilising OpenCV and MobileNet V2.
mask identification comprises of 8190 photos with unique facial
annotations from the Kaggle and RMFD datasets that come into II. RELATED WORK
two categories: “with mask” and “without mask”.
A. Face Detection
Keywords—COVID-19, Face Detection, Convolutional It is a process with several applications, including position
Neural Networks, Transfer Learning. estimation, compression, and face tracking. Face detection is
I. INTRODUCTION a two-class issue that requires us to determine whether or not
a face is present in a photograph. Identifying whether or not
The coronavirus, commonly known as SARS COVID-19, there are human faces in the input image is the main objective
is causing a pandemic that is affecting individuals all over the of face detection. Correct face detection may be hampered by
world. The spread of the virus compelled the authorities to changes in lighting and facial expression. Pre-processing
impose a rigorous lockdown on its citizens. Every person in activities are carried out to make it easier to create a more
society may experience a variety of issues as a result of this. powerful face detection system. The human face picture may
According to WHO (World Health Organization) regulations, be found and located using a variety of methods, like the
the sole method to halt the virus's spread is to wear a face mask “Viola-Jones detector” [2, 3], “Principal Component Analysis
[1]. However in crowded areas like bus stations, railway (PCA)” [4], and the “Histogram of Oriented Gradient (HOG)”
stations it is very hard to monitor each and every person [5]. It may also be used to classify videos and images, find
whether they are wearing the face masks correctly or not. In objects, find regions of interest, and more [6].
order to address this issue, technology comes into the picture.
The solution is to develop a system that can identify faces in B. Face Mask Detection
live video frames and assess whether or not their faces are Although WIDERFace, MAFA, and SSD were used by D.
covered. There are presently no reliable face mask detection Chiang [7, 8] to construct a face mask dataset for detection,
applications available, which are highly sought after by large- the dataset's accuracy was only 89.6% owing to the number of
scale manufacturing, transportation systems, densely parameters being compressed for real-time efficiency. Jiang et
populated places, residential neighbourhoods, and other al.'s RetinaMask [9] proposal integrated a content attention
organisations to assure safety, owing to Covid-19. mechanism with a Feature Pyramid Network (FPN) and used
Additionally, the lack of substantial datasets of "with mask" ResNet or MobileNet [10] as the backbone network to operate
photographs has made this process more complicated and on both high and low-computation hardware. Rahman, R. [11]
difficult. Therefore, the need of the hour is to generate an built a CNN model and OpenCV for authorized entry using
artificial dataset of “with mask” images using computer vision face mask detection. For improved feature extraction and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 809


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

classification, Loey et al. [12] employed the hybrid transfer C. Convolutional Neural Networks (CNN)
learning model and machine learning techniques. However, “Convolutional neural networks” (“CNNs”, or
there was no discussion of the detecting speed. The accuracy “ConvNets”) are often employed in deep learning to analyse
of mask detection was the primary focus of the research works visual data. Since the arrangement of the visual cortex is
mentioned above, and speed of detection was not well similar to the connection pattern between neurons in CNNs,
addressed. These techniques also could not determine if the these networks were motivated by biological processes. CNNs
masks were properly worn. They could only detect the need less pre-processing than other image classification
presence of masks. methods in comparison. Each layer incorporates patches from
III. METHODOLOGY earlier levels. These ConvNets are “multistage architectures”
that can be trained. Each step's input and output are sets of
A. Dataset arrays called “feature maps”. A specific feature retrieved from
A custom dataset was created utilizing the Kaggle each position on the input will be reflected in each feature map
datasets, RMFD dataset, and Bing Search API. A Python in the output. A “filter bank layer”, a “non-linearity layer”, and
script was used for Bing Search API to find images with a “feature pooling layer” make up each stage. A classification
multiple queries related to “covid” and “face mask” which module follows one, two, or three of these phases of three
aids us in data collection. A total of more than 10,000 layers to make up a ConvNet [13, 14]. Basic CNN architecture
photographs were gathered, but only a small number of them is shown in Fig. 2.
were accepted since they were distorted, blurry, or
unproductive. They were eliminated, and as a result, data
pruning was carried out. This enables our model to improve
its accuracy. After the data pruning, around 4000 photographs
are selected. The data augmentation involves rotating and
flipping of images in our dataset to create more data using
Keras’ ImageDataGenerator class.
Real photographs of faces wearing and not wearing
protective face masks make up this custom dataset. 8190
photos from two classes make up this dataset.
• “with_mask”: 4330 images Fig. 2. The fundamental components of CNN are the convolution layers
Conv1, Conv3 and the pooled/sampled layers Pool2, Pool4.
• “without_mask”: 3860 images
D. Face Detector based on SSD Framework combined with
With the aid of the Scikit-learn (Sklearn) library, the
MobileNetV2 Architecture
dataset was split into two sets. The training set has 7371
images (90%), whereas the testing set contains 819 images A compromise between "YOLO" and "R-CNN" based
(10%). object detection approaches is achieved by SSDs, which were
first developed by Google. Comparatively speaking, the
B. Architecture algorithm is simpler than faster R-CNNs. MobileNets are
In Fig. 1, the architecture is displayed. designed for low-resource devices [10]. So, a rapid and
efficient deep learning-based item recognition method may be
obtained by combining the "Single Shot Detector (SSD)"
framework and the MobileNet architecture. The OpenCV’s
Face Detector based on the SSD Framework combined with
MobileNetV2 architecture was used to achieve detection of
face.
E. Transfer Learning
The machine learning method known as transfer learning
uses a model developed for one job as the foundation for
another. The concept is to get past the isolated learning
paradigm and use the information you gain to address one
problem to others that are related. The flow of tasks in transfer
learning is shown in Fig. 3.

Fig. 3. Transfer Learning.

Traditional learning is solitary and relies only on a limited


number of tasks, datasets, and the training of distinct, isolated
models. No information that can be applied to another model
is maintained. With transfer learning, you may train newer
models using knowledge (features, weights, etc.) from older
Fig. 1. Architecture of the proposed system.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 810


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

models that have already been trained, even if the new task the model, we see the summary of our model. The output of
has less data. Learning is a difficult process for both people model.summary() gives us the total parameters including the
and robots. It was crucial to develop a strategy that would total number of trainable and non-trainable parameters.
avoid a model from forgetting the learning curve it obtained
from a given dataset and also allow it to learn more from fresh • Total params: 2,422,210
and varied datasets because it is a laborious, resource- • Trainable params: 164,226
intensive, and time-consuming operation. Transfer learning
basically involves utilising a model that has previously been • Non-trainable params: 2,257,984
trained on one dataset to train and make predictions on a Since we are solely training the top layers of our network,
different dataset [15]. the total number of non-trainable parameters are greater than
We can have two ways to apply transfer learning on a pre- the total number of trainable parameters. This approach helps
trained model: us to save time when training the model as we are not training
the model from scratch and hence the model will take lesser
• Feature Extraction - Take advantage of a prior time to train.
network's representations learnt to identify
significant aspects in fresh data. The pre-trained Now, we train our model. The training time taken by our
model is simply added on top of a fresh classifier that model is 78 minutes. The total training time taken would have
will be trained from start in order to reuse the feature been a lot more than the actual time if we trained all the layers
maps that have already been created for the dataset. of our model and hence the transfer learning approach helped
The complete model does not need to be (re)trained. here. The parameters we used to train our model are given in
There are existing elements in the underlying TABLE Ⅰ.
convolutional network that are generally helpful for
categorising images. The final classification TABLE I. LEARNING PARAMETERS
component of the pre-trained model, however, is
specific to the first classified job. As a result, it is
unique to the collection of classes that were used to
train the model [16].
• Fine-Tuning - Unfreeze some of the top-most layers
of the “base model” which is frozen and train the
base model's final levels as well as the newly added
classifier layers simultaneously, which enables us to IV. EXPERIMENTS
"fine-tune" the basic model's “higher-order feature Learning rate decay approach was adopted for training the
representations” which makes them more pertinent network, wherein the initial learning rate will higher and
to the particular job. reduced iteratively. It is inferred from experiments and results
The MobileNetV2 model created by Google will serve as given in various literature that the learning rate decay aids in
the foundation for our basic model. The ImageNet dataset optimization and generalization. The initial high learning rate
with 1.4 million pictures and 1,000 classes, served as the pre- helps to accelerates training avoids the model from falling into
training data for this. ImageNet is a training dataset for local minima. Further during the model training reducing the
researchers with many different categories [10]. We can learning rate helps the model to converge to the optimal
categorize "Mask" and "No Mask" from our unique dataset minimal value and avoid oscillation. At the same time an
with the use of this knowledge base. Before we build and train initial high learning rate may prevent model from overfitting
the model, the convolutional base must be frozen. We can do by memorizing data and improve the learning ability as the
this by freezing the layer to prevent the weights from learning rate is reduced iteratively.
changing. A. Training Loss and Accuracy
F. Model Training It is observed from the Fig. 4 that the model training with
The MobileNetV2 architecture will first be ready for fine- learning rate decay prevented model from overfitting and
tuning through the following three steps: prevented oscillation in the training process.
• Remove the head of the network from MobileNet
and load it with pre-trained ImageNet weights.
• Add new FC layers in place of the previous, fully
connected layers, which is where the real predictions
for the class label are formed.
• Freeze the base layers to prevent their updating
throughout the backpropagation process and just
adjusting the weights of the classification layers.
Now, compile the face mask detector network. Images of
size 224×224 are supplied to our model. These images are
achieved by OpenCV’s blobFromImage and blobFromImages
functions that facilitate image pre-processing. These functions
will perform mean subtraction and scaling. After compiling
Fig. 4. Number of epochs plotted against accuracy or loss.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 811


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

B. Confusion Matrix feeds and properly identified their existence. The trained
As shown in Fig. 5, only 7 out of 819 samples are binary classification model with pictures of persons wearing
incorrectly classified using the established architecture. While and not wearing masks in order to develop our face mask
they are in the without mask class, it classifies 05 samples as detector. The proposed model will then be refined using
having a mask, and while they were in the with mask class, it MobileNetV2 on the mask/no mask dataset to create an image
classifies 02 samples as having no mask. The system's primary classifier that has 99% accuracy. Considering that the
goal is to identify samples inside the class of samples without MobileNetV2 architecture is being used, the model can be
masks, and this design only incorrectly categorized 05 more easily deployed to embedded systems because it is
samples in this class, demonstrating the system's computationally efficient. Due to the coronavirus outbreak,
dependability. this technology can thus be employed in real-time applications
that demand face-mask detection for security reasons. To
guarantee that public safety regulations are obeyed, this
research work may be connected with embedded technologies
for use at airports, train stations, schools, offices, malls and
other public spaces.
REFERENCES
[1] World Health Organization, 2. (2020). “Coronavirus disease 2019
(COVID-19): situation report, 99”.
[2] Viola, P., & Jones, M. (2001, December). “Rapid object detection using
a boosted cascade of simple features.” In Proceedings of the 2001 IEEE
computer society conference on computer vision and pattern
recognition. CVPR 2001 (Vol. 1, pp. I-I). Ieee.
[3] Yang, H., & Wang, X. A. (2016).“Cascade classifier for face
detection.” Journal of Algorithms& Computational Technology, 10(3),
187-197.
Fig. 5. Confusion Matrix. [4] Shah, J. H., Sharif, M., Raza, M., & Azeem, A. (2013). “A Survey:
Linear and Nonlinear PCA Based Face Recognition Techniques.” Int.
C. Performance Evaluation Arab J. Inf. Technol., 10(6), 536-545.
After testing with 819 images, the observations from the [5] Rettkowski, J., Boutros, A., & Göhringer, D. (2017). “HW/SW Co-
Design of the HOG algorithm on a Xilinx Zynq SoC.” Journal of
confusion matrix are tabulated as shown in TABLE Ⅱ. Parallel and Distributed Computing, 109, 50-62.
Various metrics like “Precision”, “Recall”, “F1 Score” and
[6] Kortli, Y., Jridi, M., Al Falou, A., & Atri, M. (2020). “Face recognition
“Accuracy” are calculated from the four observations. The systems: A survey.” Sensors, 20(2), 342.
values of these metrics are shown in TABLE Ⅲ. [7] Yang, S., Luo, P., Loy, C. C., & Tang, X. (2016). “Wider face: A face
detection benchmark.” In Proceedings of the IEEE conference on
TABLE II. TP, TN, FP AND FN VALUES computer vision and pattern recognition (pp. 5525-5533).
[8] Chiang, D. (2020). “Detect faces and determine whether people are
wearing mask.” Face Mask Detection.
[9] Jiang, M., Fan, X., & Yan, H. (2020). “Retinamask: A face mask
detector.” arXiv preprint arXiv:2005.03950.
[10] Howard, A. G., Zhu, M., Chen, B., Kalenichenko, D., Wang, W.,
Weyand, T., & Adam, H. (2017). “Mobilenets: Efficient convolutional
neural networks for mobile vision applications.” arXiv preprint
TABLE III. CONFUSION METRICS arXiv:1704.04861.
[11] Rahman, R. (2022). Automatic Temperature Detection and
Sanitization with Authorized Entry using Face Mask Detection. Journal
of Electronics, 4(3), 168-181.
[12] Loey, M., Manogaran, G., Taha, M. H. N., & Khalifa, N. E. M. (2021).
“A hybrid deep transfer learning model with machine learning methods
for face mask detection in the era of the COVID-19
pandemic.” Measurement, 167, 108288.
[13] O'Shea, K., & Nash, R. (2015). “An introduction to convolutional
V. CONCLUSION neural networks.” arXiv preprint arXiv:1511.08458.
A detection system for face masks has been developed that [14] Koushik, J. (2016). “Understanding convolutional neural
networks.” arXiv preprint arXiv:1605.09081.
meets standards comparable to those of the most recent
[15] Weiss, K., Khoshgoftaar, T. M., & Wang, D. (2016). “A survey of
cutting-edge technology. Recent advances in deep learning transfer learning.” Journal of Big data, 3(1), 1-40.
and computer vision are used in this research. The assessment [16] Liu, Y. H. (2018, September). “Feature extraction and image
of the model on the test dataset was found to be consistent. A recognition with convolutional neural networks.” Journal of Physics:
custom dataset was created utilizing the Kaggle datasets, Conference Series (Vol. 1087, No. 6, p. 062032). IOP Publishing.
RMFD dataset, and Bing Search API. The algorithm
recognized face masks on human faces in real-time video

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 812


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

An Intelligent Convolutional Neural Network based


Potholes Detection using Yolo-V7

Madarapu Sathvik *G.Saranya S.Karpagaselvi


Student Assistant Professor School of Electrical and Computer
Networking and Communications Networking and Communications Engineering Ethiopian Institute of Technology,
School of Computing, School of Computing, Mekelle, Ethiopia
SRM Institute of Science & Technology, SRM Institute of Science &Technology, karpaga.selvi@mu.edu.et
Kattankulathur, Chennai – 603203 Kattankulathur, Chennai – 603203
ms5597@srmist.edu.in saranyag3@srmist.edu.in

Corresponding Author: G.Saranya


saranyag3@srmist.edu.in

Abstract - Road travel is one of the most common modes of must therefore address this issue. According to a survey, potholes
transportation in the world, where more than 60% of the population are causing many accidents for about 3.5k persons every year.
commutes by personal or shared automobiles. According to a poll, More than 4k people were hurt because of road accidents
potholes are a major contributing factor in several incidents. broughtby the potholes.
Pothole detection techniques have been created to address these
issues, including the use of sensors and many others, but they are According to recent data provided by the government,
actually expensive to produce and difficult to put into practice. As a around 2k people died last year due to traffic accidents caused
result, solid strategy that utilizes CNN is developed. According to by potholes, and more than 4k people were injured in more
the evidence presented, potholes are the principal factor responsible than 4,800 of these accidents. This is actually a serious problem
for the degradation of roadways. It is essential to give some thought which must be addressed. Therefore, a long-term solution to
to the question of how to locate potholes in the most efficient and
address this issue by creating a user-friendly app that allows
economical way. Convolutional neural networks, often known as
CNNs, have the ability to filter through vast volumes of data and people to know the condition of the road's surface. Our
extract the aspects that are most relevant to their purpose. YOLOv7 approach makes use of the camera and location capabilities of
was used to annotate and train a pothole image dataset for this a smartphone and is quick, precise, and affordable to use. The
research, and the findings were analyzed in terms of recall, suggested method effectively recognizes many potholes in the
accuracy. The model was validated by examining a wide range of image by using the YOLO algorithm and defines the road
photographs relating to potholes. Our model had given a F1 score surfaceconditions in response.
of 0.51 and this increases proportionally (more the value of F1
score more efficient is the training model) with the number of As a consequence of improvements in technology, there
epochs increased. are now a greater variety of solutions accessible to assist in
Keywords - Convolution neural network, Object detection, locating potholes and maintaining one's independence. These
Pothole detection, YOLOV7 object detection model, Google API, days, the majority of detection is handled automatically by the
dataset, pothole count, Accelerometer. system by means of artificial intelligence models such as deep
neural networks. The effectiveness of every deep learning
I. INTRODUCTION model is directly proportional to the amount of data that is
Most well-known nations in the world have a rapidly utilized for training. The identification of holes in roads has been
growing economy. Every country is currently concentrating made easier by a diverse collection of sensors. Data obtained
primarily on the transportation sector. According to a survey it from GPS and accelerometers included into cellphones are
is proved that there is lot of increase in the number of currently being utilized in the training of deep learning
automobiles in India, and it has resulted in a higher likelihood models.
of accidents and also the majority of the streets are small, As the fields of science and technology continue to
crowded, and have poor surface quality; additionally, the advance, more and more solutions for identifying potholes and
needs for street maintenance are not fully satisfied. Driving in allowing individuals to live independently will become
India is always a breath-holding exercise. accessible. AI models, such as deep neural networks, are now
The state of the roads will actually affect how safely and commonly employed in the vast majority of systems to
comfortably you can drive. The user should be informed of the automatically perform detection. Data used for training plays
state of the road for safety's sake.. No automated system for an important part in the overall success of any deep learning
detecting potholes exists as of yet. Citizens and city authorities model. The location of potholes on roadways has been greatly

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 813


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

facilitated by the deployment of a large number of sensors. At In their study, the authors [8] used deep learning methods
this time, models of deep learning are being trained using data to examine road photo archives in order to pinpoint any
obtained from the inertial measurement units and global damage. Damages to roads have been categorized using
positioning systems included inside mobile devices. RetinaNet. During the course of their research, the authors of
[9] gathered a dataset that consists of around 1.5k
II. LITERATURE REVIEW photographs depicting road and highway damage. The
An increase in precipitation, a lack of routine road YOLO algorithm has been used as the primary descriptor for
maintenance, or the occurrence of a natural disaster are just a the dataset's classification and training. YOLOv3, YOLOv2,
few of the events that might set in motion the process of and YOLOv3-tiny have all been trained on the collected
discovering potholes, also known as the detection of road data, and their performance is compared to that of the
anomalies. Deterioration of roads is a big problem in many original versions. The mAP has been used to analyze each
of the world's developing countries today. This is attributable and every data point, with accuracy and recall being the
to many factors, including poor road maintenance, heavy primary metrics. The accuracy of the model was determined
rains and traffic, an uneven landscape, natural disasters, and by comparing it to numerous pothole images, and the
the use of substandard materials in road construction. The findings were quite promising.
following is a summary of the work done by various By using thermal imaging and thermal sensors, the
researchers to detect road issues such as potholes, cracks, authors of this [10] paper were able to create their own CNN
signboards, traffic signals, pavement damages, and lines models without resorting to the more expensive and
becoming blurry (crosswalks, white/yellow lines). resource-intensive resnet50 or latest models, making better
Our country has long been dependent on the vehicle as a use of the data collected about the surrounding environment
primary mode of transportation. Over 295 million and its features (such as air, road, pothole detection time,
automobiles have been registered worldwide to far, pothole severity, location, shade, and so on). The problem is
according to a recent survey [1], and that figure is steadily that they might not be able to adjust to extreme weather.
growing. India is ranked as the fourth most likely place to be Some examples of spectral clustering that appear in the paper
engaged in a traffic collision, according to data conducted by [11] are SC, CNN, and AlexNet. Data augmentation is the
Zutobi [2,] a worldwide supplier of driving instruction. Due process of extending the scope of a dataset by modifying its
to their deteriorated state, the roads themselves are a constituent pieces (pictures) in a variety of ways (rotation,
significant contributing element. According to information translation, flipping, cropping, etc.). Data augmentation was
that was made public by the Ministry of Road Transport and used in place of the new image dataset; however, Alexnet
Highways [3], it is anticipated that the total number of was used as the training method, which is a less accurate
individuals died in road accidents that may be attributable to technique. The authors [12] created a prototype by
potholes would increase to 2,015, 2,140, and 1,471 in 2018, combining components such as a Pi-Camera, GPS, and the
2019, and 2020, respectively. Google Maps API with a low-cost ultrasonic sensor. Due to
The authors of the study proposed [4] have utilized an the fact that an older version of YOLO v2 was utilized, it is
image processing-based system that can identify potholes in probable that there will be problems with the accuracy of the
photographs. Although effective on still images, this method pothole classification. The author of this [13] paper has
is impractical for use with moving pictures due to the lengthy implemented a Support Vector Machine which is used for
identification time required. Using a deep learning model image acquisition and segmentation, sample dataset
that analyses photos and videos, the researchers in [5] found preparation, and feature selection. As well, it employs
a way to limit the number of accidents caused by potholes. A ANNs. From all of the references that were mentioned, the
F RCNN, inception-V2 model is used in this model to detect most common issues were using a lesser version of the
these hazards. YOLO algorithm, which would have an effect on the
accuracy, and constructing hardware prototypes, which are
One researcher entered a system for detecting and particularly tough to install in the places where you will be
categorizing road damage in the 2018 IEEE Bigdata Cup working with them. A few of the authors have utilized
Challenge [6]. Utilizing deep learning techniques for object expensive sensors, which can result in an increase in the total
recognition, this method trains an object detection algorithm cost of the project. The authors of [15] Transfer Learning
to identify varied degrees of road damage by exposing it to a with TensorFlow Object-detection API and F-RCNN (Faster
dataset of photos labelled with the damage type provided by Region-based Convolutional Neural Network) develop the
the Japan Road Association. The Intelligence Transport model by using CNN, pooling, ReLU activation function,
System uses Deep Learning to collect and analyze data for Adam Optimizer, and Sigmoid function. Finally, the author
identifying road damage. Although state-of-the-art methods in [16] has developed a real-time machine to find the
were employed in the work proposed by [7], such as a 3D potholes and this same can be implemented in my research
scene architecture that relied on vibration-based sensors and by using updated yolo versions (yolov7).
a 2D vision-based model, the usage of yolov2 was
problematic due to its poor accuracy level and the time it
would take to identify potholes.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 814


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

III. YOLOV7 Microsoft's COCO dataset without the use of any pre-learned
The accuracy of real-time object detection is significantly weights in the process.
enhanced by YOLOv7, without any accompanying increase in
the expenses of inference. When compared to other known
object detectors, YOLOv7 is capable of effectively reducing
approximately 40% of the parameters and 50% of the
computation of state-of-the-art real-time object detections.
Additionally, it is able to achieve faster inference speed and
higher detection accuracy. This was demonstrated previously
in the benchmarks. In summary, YOLOv7 offers a quicker and
more robust network architecture, which in turn offers a more
effective approach for feature integration, more accurate
object recognition performance, a more robust loss function,
as well as an enhanced label assignment and model training
efficiency. As a consequence of this, the computer hardware
requirements for YOLOv7 are much lower than those for other
deep learning models. It is possible to train it far more quickly
on smaller datasets without using any pre-trained weights.
Fig.1. Proposed Pothole Detection using YOLOv7
IV. METHODOLOGY
The proposed flow of Pothole Detection using YOLOv7
is shown in Fig 1. The information that has been gathered
should be separated into three distinct categories: training,
testing, and validation. In order to set up an object detection
network, you need make use of YOLOv7. In the third stage of
the procedure, the model will be trained by having an epoch
value and weights added to it. This will be done in order to
make the model more accurate. Examine the model to see how
accurate it is as well ashow reliable it is.

A. Dataset
The Roboflow [16] pothole detection dataset is an open-
source dataset includes a total of 289 photographs which can
be accessed through the url
[https://universe.roboflow.com/srm-institute-of-science-and-
technology-yk2zw/pothole-de] published in the journal
RoboFlow Universe that are put to use in the process of
developing and training models. Providing the model with an
epoch value and weights is the focus of the third and final step
of the training process. The fourth step is to assess how well
the model corresponds to the data. Sample Pothole images are
shown in Fig 2. Fig. 3. E-ELAN Computational block (used by yolov7)

TABLE 1. IMAGE DIVISION IN DATASET


C. E-ELAN (Extended Efficient Layer Aggregation Network)
Training Set Validation Set Testing Set inYOLOv7
184 71 34
The YOLOv7 architecture's primary compute node is
denoted by the acronym E-ELAN. This technique was built on
the foundation of research on the most effective ways to
B. YOLOv7 Object Detection Network enhance the performance of a network. The architecture of the
The YOLO model, often known as the "You Just Look E-ELAN framework contributes to improvements in the
Once" model, just needs to do it once to recognize items. By system's capacity for learning. As a primary building block, it
processing visual frames using attributes retrieved from a employs the ELAN processing unit. E-ELAN Computational
backbone, merging and blending in the neck, and then sending block used by yolov7 is shown in Fig 3.
the results to the head of the network, YOLO is able to make
predictions aboutthe locations, classes, and objects of bounding
boxes.YOLOv7 is a real-time object detector that has ground- The number of parameters and computational density of a
breaking characteristics and is now revolutionizing the way model are significant concerns for extended efficient layer
computer vision is practised.YOLOv7 is trained using aggregation networks. The seventh version of YOLO, dubbed

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 815


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

"E-ELAN," is an evolution of the ELAN language. One of


ELAN's biggest benefits was that it allowed for a deeper
network to learn and converge more quickly by regulating the
gradient route.
When it comes to the computing block, E-ELAN makes
significant alterations, but the transition layer remains
structurally same. This method improves the network's
learning capacity by using expand, shuffle, and merge
operations, all without compromising the integrity of the
original gradient route. Here, we use group convolution, which
multiplies all the blocks in a given computational layer by the
same group parameter and channel, to increase both the
channel size and the number of blocks. The feature map
generated by each processing unit is then randomly combined
using a concatenation operation. Therefore, the original Fig 2. Sample Pothole images present in the dataset
architecture's total number of channels will be reflected in the
VI. PERFORMANCE ANALYSIS
number of channels in each set of feature maps. Conclude by
combining these feature map sets. E-ELAN has also improved 1) Recall curve
its capacity to learn new and different kinds of characteristics. The term "recall," which is synonymous with
"sensitivity," may be stated as, where "TP" refers to the
number of true positives and "FN" refers to the number of
V. EXPERIMENTATION AND RESULTS false negatives. The term "recall" refers to the percentage of
accurate predictions in relation to the total number of instances
when the forecast was true in the data set as shown in fig 4.
The evaluation was carried out on a computer running TruePositives
Windows 11 by using Google Collaboratory. CUDA has recall =sensitivity= (1)
TruePositives + FalseNegatives
already been installed into the system, which allows for
faster computations and more efficient use of the graphics
hardware. CUDA is used in situations in which it is important
to do processing on a graphics processing unit (GPU). Even
though it ensures a neural network with lightning-fast
processing speeds, it is only compatible with the NVIDIA
GPU. The length of time necessary to finish training has been
slashed in half as a direct result of CUDA’sefforts.
This model will function properly with size of 416 by 416
pixels. When the font size is increased, the accuracy increases
along with it; nevertheless, the reading speed decreases. Due
to the fact that the model was only developed for a single kind
of pothole, the filter that was used was 18, and the filter size
was calculated to be (class + 5) * 3. Due to the fact that there
is only one category, we could restrict the maximum batch size
to a maximum of one thousand and still provide identical
metrics. YOLOv7 uses the weights that are included inside the
pre-trained yolov7 training.pt file in order to successfully build its
convolutional layers. After the aforementioned configurations Fig. 4. R-Curve
have been applied to the model and the implementation has 2) Precision Curve
been completed, training may start, and the weights file can be
When expressed mathematically, precision, also known as
saved after 1000 iterations have been completed. Few
positive predictive value, looks like this: where TP stands for
predicted potholes by YOLOv7 are shown in Fig 7.
the number of true positives and FP stands for the number of
false positives. One way to think about precision is as the
proportion of correctly predicted positive outcomes that really
fall into the predicted positive class as shown in fig 5.

TruePositives
Precision= − (2)
TruePositives + FalsePositives

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 816


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Fig. 5. P-curve
3) F1 curve
The F1 score curve illustrates the compromise that must
bemade between precision and recall as shown in fig 6.
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛. 𝑟𝑒𝑐𝑎𝑙𝑙 (3)
F1=2.
Fig 7. Few predicted potholes by YOLOv7
𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛+𝑟𝑒𝑐𝑎𝑙𝑙 TABLE 2: MODEL PERFORMANCE METRICS
MODEL YOLOV7
Precision Recall
(416*416)
Confidence
1.0 0.95
ThresholdmAP@0.5

The results that were obtained when the YOLOv7


(416*416) training dataset was used are shown in Table 1 and
various metrics are captured as shown in fig 8. We have
determined that a confidence level of 0.5 mAP is appropriate
given that our recallis 0.95 and our precision is 1.

Fig 6. F1 score

Fig 8. Performance metrics using yolov7

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 817


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

VII. COMPARISON BETWEEN YOLO MODELS IX. FUTURE SCOPE


At some point in the future, the latitude and longitude
coordinatesthat have been saved in the database will be used to
power software that operates in real time and locates individual
potholes on a map. When all of the gaps have been found, we
will be able to compile a report that outlines the most effective
strategy for navigating around them. It is possible that real-
time pictures obtained with a camera may be added to the
dataset and used for classification purposes. This would make it
easier to appropriatelycategorize the potholes.
REFERENCES
[1] P. Pachaivannan, R. Hemamalini Ranganathan, P. Navin Elamparithi
and R. Dhanagopal, "Indian Road Conditions and Accident Risk
Predictions using Deep Learning Approach – A Review," 2020 3rd
International Conference on Intelligent Sustainable Systems (ICISS),
2020, pp. 199-202, doi: 10.1109/ICISS49785.2020.9316128.
[2] P. Pachai Vanna, R. Hemamalini Ranganathan, P. Navin Elamparithi
and R. Dhanagopal, "Indian Road Conditions and Accident Risk
Predictions using Deep Learning Approach – A Review," 2020 3rd
Fig 9. Comparison with other real-time object detectors International Conference on Intelligent Sustainable Systems (ICISS),
2020, pp. 199-202, doi: 10.1109/ICISS49785.2020.9316128.
[3] https://www.deccanherald.com/national/road-accidents-caused-by-
In order to analyze the performance of YOLOv7, prior potholes-killed-over-5600-people-between-2018-and-2020-
versions of YOLO (YOLOv4 and YOLOv5) as well as 1138292.html
YOLOR were used as baselines. All of the parameters were [4] K. Zoysa, C. Keppitiyagama, G. Seneviratne, W.Shihan, “A Public
used throughout the training of the models. When compared to Transport System Based Sensor Network for Road Surface Condition
Monitoring”, via NSDR, August 2007
other state-of-the-art object detectors, the new YOLOv7
demonstrates the best speed-to-accuracy balance possible. [5] A. Kumar, Chakrapani, D. J. Kalita, and V. P. Singh, “A modern pothole
detection technique using deep learning,” 2nd Int. Conf. Data, Eng.Appl.
YOLOv7 is the fastest and most accurate object detector IDEA 2020, doi: 10.1109/IDEA49133.2020.9170705. https://www.
ever made, with frame rates from 5 FPS to 160 FPS. While researchgate.net/publication/342054622_Deep_Learning_based_Detecti
on_of_potholes_in_Indian_roads_using_YOLO / https://ieeexplore.ieee.
alternative real-time object recognition algorithms may be able org/document/9112424 - Deep Learning based Detection of potholes in
to attain 30 FPS or greater with a GPU V100, YOLO v7 is the Indian roads using YOLO
most accurate. [6] Y. Li, M. Yang, S. Ji, J. Zhang, and C. Wen, “An Online-Updating Deep
CNN Method Based on Kalman Filter for Illumination-Drifting Road
YOLOv7 is able to achieve an accuracy level that is 2% Damage Classification,” ICCAIS 2018 - 7th Int. Conf. Control. Autom.
higher than the best-performing R-CNN models while also Inf. Sci., no. Iccais, pp. 395–400, 2018, doi: 10.1109/ICCAIS.2018.
being 509% faster throughout the inference process. This is 8570426Deep Learning Approach to Detect Potholes in Real-Time using
notable in light of the fact that the multi-stage detector Smartphone, IEEE
architectures that are employed in these R-CNN variations [7] A. Thakallapelli, S. Ghosh and S. Kamalasadan, "Real-time frequency
based reduced order modeling of large power grid," Power and Energy
have been found to be capable of much higher detection Society General Meeting, 2016, Boston, MA, USA.
accuracies than their single-stage equivalents in the past. [8] L. Ale, N. Zhang, and L. Li, “Road Damage Detection Using
RetinaNet,” Proc. - 2018 IEEE Int. Conf. Big Data, Big Data 2018, pp.
5197–5200, 2019, doi: 10.1109/BigData.2018.8622025.
[9] J. Dharneeshkar, S. Dhakshana, S. Aniruthan, R. Karthika, and L.
VIII. CONCLUSION Parameswaran, “Deep Learning based Detection of potholes in Indian
roads using YOLO,” Proc. 5th Int. Conf. Inven. Comput. Technol.
When compared to other forms of object detections, ICICT 2020, pp. 381–385, 2020, doi:
including those of people, vehicles, airplanes, etc., the 10.1109/ICICT48043.2020.9112424.
identification of potholes stands out as particularly new. The [10] Bhatia, Yukti, Rachna Rai, Varun Gupta, Naveen Aggarwal, and Aparna
appearance of a pothole might vary greatly from one instance Akula. "Convolutional neural networks based potholes detection using
thermal imaging." Journal of King Saud University-Computer and
to the next. As a consequence, detecting it is tough. Due to the Information Sciences (2019).
aforementioned constraint, enhancing the mean average [11] Srinidhi, Gorityala, and Renuka Devi SM. "Pothole detection using
accuracy for pothole recognition is tough. CNN and AlexNet." In 2nd International Conference on Communication
& Information Processing (ICCIP). 2020.
In this study, multiple forms of YOLO are utilized to train
[12] Borgalli, R. "Smart Pothole Detection and Mapping System." Journal of
on a dataset of 289 photographs. Changes to the design could Ubiquitous Computing and Communication Technologies, vol. 2, 2020),
also result in an increase in the mean and average accuracy. pp. 136-144.
The system will ultimately be implemented in real-time on a [13] Pan, Yifan, Xianfeng Zhang, Guido Cervone, and Liping Yang.
car's dashboard leveraging android studio code written in "Detection of asphalt pavement potholes and cracks based on the
kotlin and acamera. unmanned aerial vehicle multispectral imagery." IEEE Journal of

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 818


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Selected Topics in Applied Earth Observations and Remote Sensing 11,


no. 10 2018, pp. 3701-3712.
[14] https://universe.roboflow.com/srm-institute-of-science-and-technology-
yk2zw/pothole-detection-zrfw5/dataset/2/images/?split=train
[15] https://ieeexplore.ieee.org/document/9170705 - A Modern Pothole
Detection technique using Deep Learning.
[16] Borgalli, R. "Smart Pothole Detection and Mapping System." Journal of
Ubiquitous Computing and Communication Technologies, vol. 2, 2020,
pp. 136-144.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 819


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)

A Review of Generative Adversarial Networks


DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

(GANs) for Technology-Assisted Learning: Solving


Teaching and Learning Challenges
K. Dinesh Kumar Sarot Srang Dona Valy
Mechatronics and Information Mechatronics and Information Department of Information and
Technology Technology Communication Engineering
Institute of Technology of Cambodia Institute of Technology of Cambodia Institute of Technology of Cambodia
Phnom Penh, Cambodia Phnom Penh, Cambodia Phnom Penh, Cambodia
dinesh.kumar@itc.edu.kh srangsarot@itc.edu.kh dona@itc.edu.kh

Abstract— During the COVID-19 outbreak, all the physical physical therapy. The suspension of physical classes has a
classes suspended, and switched to online learning. The new disproportional impact, especially for learners with
era of learning presented several challenges for the teachers disabilities. Learners are looking for distance learning
and students. The students did not have the opportunity to (online learning) opportunities with innovative teaching
participate in the classroom activities successfully as a physical methods to continue their education.
class due to a lack of educational creativity, a lack of digital
tools, and a dependency on the internet. Strengthening self- The purpose of distance learning is to minimize class
directed learning and improving the technical infrastructure absences and continue educational services to students. In
are required, to advance innovation-centric education from physical classes, all teachers lecture directly to students and
"teaching" to "learning" and to develop digital literacy. By all teachers are aware of each student's learning style,
incorporating technology into classroom instruction everyone strengths and weaknesses. With the onboarding of freshmen
can understand the concepts and realize their right to and more online learning, the faculty-student relationship
education. The recent technological advances in deep learning becomes very difficult, and internships (Lab Practices) are
are referred to as Generative Adversarial Networks (GANs). no longer result-oriented due to online learning.
The GANs used as an Assistive Technology (AT) to generate
the sequence of images of the descriptive input text. The goal of II. DIGITAL TRANSFORMATION
this review is the Visual Storytelling by utilizing the Text-to-
Image GAN which strengthens self-directed learning through A. Challenges in digital transformation during covid - 19
visualization and improve the critical thinking, and logical spread
reasoning.
Online sessions conducted by educational institutions
Keywords— COVID 19, Assistive Technology (AT), Generative during the pandemic have not achieved maximum results
Adversarial Network (GAN), The Natural Language Processing
due to traditional methodologies that are less relevant to
online teaching. It has also been shown to cause stress,
(NLP), Teaching and Learning challenges, Digital Transformation.
anxiety, and depression in students, with significant
psychological side effects due to prolonged online presence.
I. INTRODUCTION
Too much freedom will not produce the intended results of
The COVID-19 outbreak left 810 million children out of the course and will slow down the pace of student learning.
school and 1 billion people with disabilities severely This can also lead to skill deficiencies in students. Finding
impacted by the pandemic, devastating the learners with and the right balance between managing stress levels and taking
without disabilities. 65 million children with disabilities in advantage of student freedom can be tricky. “Instruction
developing countries were out of school before the outbreak Paradigm / Teaching Paradigm” dominates the education
of COVID-19, according to an analysis of the Global Action sector. The motivation of students to study on their own has
on Disability report[1]. increased. A learning personality is unique to each person.
Additionally, some students could not afford devices Therefore, various innovative teaching methods should be
such as laptops, cell phones, internet and cable services. applied in the educational process to achieve efficient
Despite the efforts of educational institutions to offer learning outcomes.
classes, getting enough distance learning for students is a B. Investment
major challenge. It can therefore be argued that online
learning offerings are not inclusive for all students, Developing and developed countries face challenges in
especially those facing financial difficulties or living in rural e-learning due to the lack of support and investment from
areas far from cities. Teachers face the challenges of educational institutions. Most of the Higher Educational
evaluating student performance and exam integrity as well. Institutions (HEIs) the facing challenge of investing in
digital skills training for teachers and students during this
In addition to that, the students with disabilities need a pandemic, in which the lecturers are unprepared for e-
more organized learning environment, peer interaction, and learning because they are unfamiliar with this teaching
personal attention from their teachers. Online learning method.
environments are troublesome for disabled students since
they need support services like speech, occupational, and

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 820


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The investment is in of providing lecturers and students In this review article, we discussed solutions to
with digital learning training and providing lecturers with students' learning challenges by visualizing textual
the appropriate hardware and software technology to deliver descriptions with pictures. Due to the dependence of
effective online content to students. For example, lecturers students with disabilities, lack of social support, and
are not equipped with sufficient knowledge to select and use difficulty accessing the internet and digital devices, special
suitable digital tools for their lectures and design lecture education schools need to focus on providing non-digital
contents that fit with e-learning. In assessing and evaluating alternative learning for their students. In order to meet the
learning outcomes, lecturers do not have the confidence in course outcome, special education schools should ensure
preparing online assessment due to the lack of certainty in that students are getting the virtual or alternative learning
its effectiveness. environment using the curriculum based instructional videos
and activities. [5] said “visualization is being read by
C. Students’ Motivation drawing and speculating what may happen in our mind, to
Students perceive e-learning to be less effective than help students develop their ability”. Visualization of text or
traditional learning methods due to the lack of effective word is a strategy to teach to all age students, especially
integration and use of technology. In some instances, those who are having reading disabilities and it makes
students do not place importance towards e-learning and reading comprehension possible and also creates an
assume it to be a 'holiday'. Because students are scattered emotional bonding between the readers and text. If the
around the world and countries, a lack of physical reader can visualize where and who they are reading, it
interaction with fellow students and lecturers affects their creates a great reading experience, motivates them to read
motivation and leads to mental health problems. Moreover, more, and infers what is happening to the people in the text,
students are concerned over their ability to 'catch up' in class which helps them to read the text.
as online lectures can sometimes be disrupted by internet
connection and interrupt the session's flow. Although e- Moreover, 20 percent of the school population have
learning has proven to be a good model of education, it is reading difficulty including 5 to 8 percent of the world
crucial to address each challenge to minimize the flaws to population has the deficit of word recognition [6]. Learning
deliver effective e-learning that is conducive for lecturers Disability will affect the self-esteem and motivation of the
and students [3]. Technology-enhanced learning offers students so first we should recognize their challenges in
solutions to the challenges of digital transformation. learning and to support them to overcome the problem using
assistive technology. Because relatively high levels of
III. INCLUSIVE EDUCATION reading and writing are required for all of us to compete in
society. Intensive training alone is not enough for these
In the COVID-19 pandemic, many societies have learners to acquire the appropriate level of reading and
marginalized people with disabilities due to the safety writing [6]. The most common strategy for getting your
measures and prevented from accessing the services reading and writing to the right level is continuous practice
provided by the private and public sectors especially in the and training. The second is trying to overcome difficulties
education sector. People with disabilities face the challenge with the help of assistive technology (AT).
of adapting to digital transformation during the pandemic.
Due to prejudice and ignorance in society, the majority of A. Generative Adversarial Network (GAN) as an AT
disable people are unable to freely express themselves. In The aims of AT are to visualize texts, improve the
order to achieve an inclusive society, it is necessary to comprehension of readers of all ages from passive to active
conduct assistive technology research projects to gain learners, assist people with learning disabilities, examine the
interdisciplinary experiences and to support the above problems in education, It is to provide solutions to
independence of person with disabilities and without these challenges in learning through transformation of text.
disabilities in learning. Society should encourage students Reading articles has become a passive activity for all groups
with disabilities and ensure equal opportunities in education, of digital natives and learning disabilities. Visualization of
employment and other activities. the text in education is useful for grasping the article. It can
A survey found that approximately 86% of students improve comprehension and encourage those who suffer
with disabilities had Internet access problems, and 64% of from reading disabilities. With regard to image synthesis and
students has no access to the digital devices they needed to natural language representation, deep learning has achieved
participate in online learning [4]. Although the styles of substantial advancements. The fact that the distribution of
providing instruction to students in physical and online images that rely on text descriptions is extremely
classes are different, providing instruction to students with multimodal, however, is a significant issue that deep learning
disabilities in online learning is difficult for special cannot address. This indicates that there are numerous logical
education teachers due to lack of internet access, lack of arrangements of pixels that render the description accurately
digital access and lack of students & parents engagement in [2].
online learning. Most special education teachers struggle to The main goal of this review paper is to investigate
provide special education services to students with multiple several techniques for visualizing specific texts utilizing
disabilities such as physical, visual, hearing, mental and well-known image synthesis models like Generative
intellectual disabilities. Students with disabilities are not Adversarial Networks (GANs).As an interactive tool for
independent and they need help to participate in online supervised and unsupervised learning tasks, GANs can help
classes. It should be easy for them if the school should have the education sector improve learning methods to compete
an organized learning environment and they are expecting to with Industry 4.0, especially from teaching to learning
have an interaction with the teachers during the online through visualization of text.
learning environment.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 821


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

B. Generating Images from Text information generated and available to be consumed is huge.
The process of creating an image based on restrictions is Using traditional reading, it may not be possible. However,
known as synthetic image generation. The best and most we can boost and introduce equity in education by
successful deep learning models for producing textual introducing the images of the text description. The
explanatory images are generative adversarial networks conceptual understanding of complex topics can be
(GANs). improved if the texts are visualized into 2D images. Here,
we discussed the generation of "text-to-image" using GANs
This review is very focused on image synthesis, in and their applications in various fields, followed by the
addition to several other applications of Generative preprocessing of descriptive text inputs using natural
Adversarial Networks (GANs) such as: Image Captions, language processing techniques.
semantic segmentation, object detection, image in-painting.
The primary objective is to create artificial images using the
text input's patterns. There are mainly two operations such
as Generator (G) and Discriminator (D) to generate images
of text given by GAN. Generators (G) are called fakers
because they create fakes for the purpose of creating
realistic images. Discriminator (D) takes two inputs. One is
from the generator and the other is the real image. The goal
is to distinguish them so that they can be called experts.
Both are well trained to compete with each other.

Fig. 1. Basic GAN structure

A Generator (G) generates synthetic data G(z) from the


random noise vector (z). The discriminator receives an input
from a generator and an input x and attempts to differenciate
between real and artificial data for the given input. With
GANs, we have no control over what needs to be generated,
as the output depends on generated random noise (z). The
minmax objective of the GAN is
min max 𝔼 [log(𝐷(𝑥))] + 𝔼 [log(1 − 𝐷(𝐺(𝑧)))]
𝐺 𝐷 𝑥 ~ 𝑃𝑟 𝑧 ~ 𝑃𝑧

However, x is the input sample from the 𝑃𝑟 (Data


Distribution) and the input z is sampled from the 𝑃𝑧
(Uniform or Gaussion distribution). we can add another
conditional input c to the random noise z, so we can
generate the image G(c,z). The conditional input c is Fig. 2. Step by Step process of Text to Image Generation
arbitrary, so it can be an attribute of an object, an image
class, etc. [2]. To generate the sequence of images of given text
descriptions, here we have the three stages of operations.
IV. RELATED WORKS The stage 1: The Natural Language Processing of the given
text input. Stage 2: The Generative Adversarial Networks
The purpose of this review is to understand the concept (GAN), it has the Generator and Discriminator part, Stage 3:
of Generative Adversarial Networks and their application in GAN: Evaluation Metrics, this would help us to evaluate the
the field of education. However, learning is made more performance of GAN.
difficult by the fact that the time spent reading the text
requires additional time separate from the time spent to A. The Natural Language Processing(NLP)
understanding concepts. So, the term Assistive Technology The field of artificial intelligence's natural language
(AT) is used for boosting the learning process for children processing technique (NLP) is used to automate a variety of
and adults. Few examples of “AT” are Text-to-speech, requirements engineering (RE) processes. The status of our
Audio Books, Optical Character recognition and Graphic approach begins with various NLP steps, such as statement
Organizer, etc. In this survey the GAN is considered as the analysis, linguistic information extraction, and conversion to
AT, and primarily it can be inculcated in the Education embedding-based vector representations. The main goal is to
Industry to take the advantages not only for children with enable Generative Adversarial Networks (GANs) to analyze
learning disabilities but also for normal students to boost and process the given textual input to attain the "Text to
learning. In the global context, establishing equity in Image" generation. The NLP technique has three main
education among children is a challenge due to various processing levels: lexical and morphological level, syntactic
reasons, and all the institutions are trying to establish the level, and semantic level. At first the Morphological-level
same. Especially for the Digital Natives, the amount of NLP approaches analyze words into morphemes such as

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 822


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

prefixes, suffixes, and bag of words, and also perform form. They did not find compelling enough performance
common tasks such as tokenization of text description and benefits using a large BERT model. During micro tuning,
lemmatization processes. Next approach is syntax level. It here, they choose periodic masking strategy where the
analyzes the grammatical structure of sentences, including masking repeats at every mth token. Consider the masking
part-of-speech tagging, dependency analysis, chunking, and blue print (k,m). To get the input from the text, we keep the
named entity recognition. Final approach is the semantic first k tokens of the text and mask the next m tokens. Repeat
level, which focuses on making sense of the textual this to the end of the text and generate the 2 nd input by
description. The core process of the semantic approach is to shifting the pattern by 1 token, followed by shifting 2 tokens
map natural language sentences to formal representations of and so on up to k+m-1 tokens. They did not create the inputs
their meaning. There are various types of semantic from one but from various blueprints. All these inputs are
representations, including ontology-based representations, randomly shuffled and constitute datasets for the micro
topic modeling-based representations, vector space models tuning. If they do not mask the token but require the
and advanced embedding techniques. This review article has prediction for all the tokens but still, we get the acceptable
focused on techniques for embedding vector representations embeddings with low quality. The loss is defined by cross
of textual descriptions. Embedding is the one of the best entropy. While the performance of neural embedding is
methods for high-quality representation of words from vast comparable to other embedding techniques, the error differs
number of unstructured textual description. Word in more than half of the cases depending on the various
embeddings capture the words context in the corpus, datasets [9].
allowing words with similar meanings to have same vector
representations. We have various word embedding B. Generative Adversarial Networks(GANs) Review
techniques such as Word2Vec, GloVe, BERT [7]. StackGAN is for generating the photorealistic images
from textual descriptions. Breaking down the challenging
Large Language Models [LMs] have grammatical
task of generating high resolution into more tractable sub-
knowledge ranging from the local subject-verb agreement to
problems. The StackGAN generates photorealistic images
long distance filler-gap dependencies. It is not only
from text descriptions [10]. New conditioning augmentation
checking with the predicted words to infer the Language
techniques are needed to stabilitates the GAN training and
Models [LMs], LMs model called BERT captures linguistic
enhance the diversification of generated samples. The
hierarchical structures of a linear transformation of word
Qualitative and quantitative experiments demonstrate the
embeddings and increase the LM’s abilities to represent
effectivity the model design and effects of components,
meanings. The Language Model (LMs) provides
providing useful insights for the design of conditional GAN
contextualized word embeddings which naturally encode the
models.
distance between word to token in a vector space. It can be
used to test whether the trained distance in word embedding Conditional Generative Adversarial Networks and
reflects the natural way of grouping words together Stacked Conditional Variational Autoencoders aim to design
according to the lexical semantic knowledge. The BERT generative neural network architectures that generate images
model can place the words which appear in different based on textual descriptions. Feeding text-image pairs into a
contexts into distinct regions of the shared vector space and generative model causes the network to face sparsity of text
the word sense distance correlated with human judgments conditioning manifold, creating challenges in training GANs.
[8]. To provide a solution, they introduced a conditioning
augmentation method that provides smoothness to latent
First, we perform reduction of dimension using Principal
conditioning manifold. To improve the diversity of synthetic
Component Analysis (PCA). The PCA is a useful tool to
images, model allows random perturbation of the
visualizing the architecture of multidimensional word
conditioning manifold. The model is divided into two stages.
embeddings. They got correlation between each principal
It first uses a convolutional VAE to generate a 64x64 low-
component analysis from the embedding and human rating
resolution image with respect to the data set and the provided
of the Virtual Attribute Decoupling (VAD) dimension. High
text description. The low-resolution images are the input of
correlation indicates the high-dimensional information in
the encoder and decoder output, with rough sketches
that word embedding [8].
matching the basic shape of the object, distorted colors, and
The challenge in natural language processing is to text descriptions. A neural network learned to synthesize
capture the deeper meaning of a given text as a vector. Text images accurately. A second-stage of stacked conditional
embeddings are created by bundling the output of a model's GAN produces a high-resolution (256x256) images from the
layers when the model processes the text. The neural output of the first stage. Text embeddings are also used to
embedding techniques are inspired by micro-tuning. The allow models to adjust text inputs. High-resolution inputs are
neural embedding techniques of each text sample, they start sharper, brighter images accurately reflect text with
with the original language model and fine-tune only a few photorealistic images[11].
selected layers while other layers are frozen. Once the fine-
The biggest challenge in images from the text and image-
tuning process is done, they can measure the difference
to-text generation is annotated data. Most of available data
between new weights and original weights of each layer and
are unlabeled and require expensive manual annotation. The
normalize it. By concatenating the normalized vectors, they
goal [12] is to explore the cross-modal embedding space
can get the neural embedding. It’s about fine tuning the
between textual description and visual data in a self-
pretrained BERT base model, they choose three layers from
controlled environment to avoid challenges. The model they
the BERT model and each layer has 768 weights, so the
proposed for autoencoders is based on StackGAN.
resulting embedding will have the size 768x3 = 2304. So,
StackGAN-v2 receives text embedding vectors as input ,
before concatenating the normalized vectors, the weights of
generates high-resolution images at various branches of
each layer are flattened from their multidimensional tensor
network. After modification, they have an encoder-decoder

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 823


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

based network, the encoder takes the image as input and text description that corresponds to comic, next they used the
extracts various features at different levels of the deep neural AttnGAN to generate the comics from text and to apply the
network to get the image embeddings, the image embeddings pipeline to comics in the style of Dilbert. AttnGAN used the
are input of the StackGAN conditional decoder model to multiple generators and discriminators, with encoded input
Reconstruct the image of conditional StackGAN output. The text and images. It’s generating the images from the text;
ResNet-50 was used in the encoder part of the autoencoder, images have multiple corresponding text captions as training
and the updated final layer of ResNet-50 to get 1024- data. It’s used as a baseline for experimentation of generation
dimensional image embeddings. The generated images are of comics and the model was fine-tuned and augmented to
adjusted at the decoder side by image embedding vectors improve the result [15].
[12].
The “Deep Fusion Generative Adversarial Network (DF-
First, the ResNet-50 encoder encodes the generated GAN)” used a single-layer text-to-image backbone that
images into image embeddings. Conditional generate images with high-resolution. Composed of
expansion(augmentation) techniques are used in image Matching-Aware Gradient Penalty (MA-GP) and One-Way
embedding to generate a continuous latent space and Issuance, Target-Aware Discriminator significantly improves
preserve conditional variables. Kullback-Leibler (KL) the semantic consistency of text and images without
divergence loss acts as a regularizer during training to create introducing additional networks. The Deep Text Image
an even distribution of the conditioning variable. The Fusion Block (DFBlock) is used for more effective, deep and
generator produces low to high resolution images in various complete fusion of text and visual features [16].
stages by adding details. Training the discriminator
optimizes the conditional and unconditional loss. Conditional Generating a text-to-image is similar to generating the
loss measures whether the input image to the discriminator is high-resolution image representing a text descriptor.
fake or real, and also checks if the input image matches the Variational Auto Encoders (VAE) producing a wide range of
conditional variables. They used max-pooling for all hidden outputs, but the resulting images are blurry. GANs have great
vectors to preserve sentence embeddings. To regenerate the ability to generate sharper images, but lack various outputs.
textual description at the output, we initialized the decoder They proposed a stacked conditional VAE and conditional
LSTM network with latent vectors. A cross-modal GAN (CGAN) to generate images based on text descriptions.
embedding space mesh is used to map the embedding space In stage 1, the conditional UAE acts as the first generator,
of one modality to another modality embedding space. creating a rough sketch of the text descriptor. High-level
Because they didn't pair images and text, the network sketches and text descriptors are the inputs to conditional
minimizes the distance of two semantic distributions. They GAN networks. A level-2 GAN produced the high-resolution
have different architectures: Maximum Mean Discrepancy (256x256) images [17].
(MMD), GAN-based cross-modal embedding space-mapping CatGAN is used to overcome the challenges of GANs.
networks. GAN-based cross-modal embedding spatial Complex structure of model and learning processes limit the
mapping networks use generators to transform one modality performance of GANs and also increase the instability of the
into another modality embedding. A discriminator training process. Therefore, CatGAN introduced a hierarchic
determines whether two modality embeddings match. evolutionary algorithm used for model training [18]. The
Maximum Mean Discrepancy (MMD) is a distance measure CatGAN model finds the difference between real and
in the probability space when regenerating the kernel Hilbert generated examples for each category. The goal is to tell the
space (RKHS) [12]. model to produce text in a specific category with minimal
CookGAN generates photorealistic images of food based differences. They used the Gumbel Softmax function to
on a list of ingredients. The Cook GAN contribution transfer the gradient from the classifier to the generator. You
combines StackGAN with an attention-based recipe can train your model to improve its performance by using
attribution model to generate meal images from ingredient hierarchic evolutionary algorithms. When training a model,
lists. The next process was to improve the image quality by CatGAN seeks to maintain the training process and balance
changing the components and adding cycle-consistent its quality and diversity.
constraints to control the appearance of the image [13]. The Multilevel T2I requires dynamic reconstruction of text
Cycle Consistency Regularizer is used to minimize semantic features at each level in order to provide diverse and accurate
discrepancies between fake and real images and increase semantic guidance for text features according to their
image quality qualitatively and quantitatively. The process of history-level status. Multi-level T2I can gradually increase
synthesizing the image is to convert a textual description into the resolution of the image and gradually add detail through
a photorealistic image by generating a set of mask maps of a coarse-to-fine generation process. In this process, text
textual input using a mask map generator (MG). features evolved synchronously, providing semantic
In Next stage, they compute the rank and aesthetics score guidance from the coarse-grained to the fine-grained. By
of generated synthetic image through Pre-Image Aesthetic suppressing previously used semantic information and
Ranking Generator. In order to get the final photo realistic dynamically reconstructing text features at different stages,
synthetic image, the calculated aesthetics score in the new consistent information takes effect as soon as they are
previous stage can be categorized into lowest, average and activated in the generation process, and the same semantics
highest score followed by feeding it to the Image generator can be prevented from being generated repeatedly, reducing
(IG). The generated images aesthetics score calculated again repeated rendering problems. In this way, text features
to prove their model can generate the high-quality image gradually evolve with new consistent semantics, resulting in
then the state-of-art techniques [14]. more detailed and vivid generations [19]. “Dynamic
Semantic Evolution Generative Adversarial Networks”
The ComicGAN main goal was to produce a model for (DSE_GAN), reconstructed text features, are dynamically
text-to-comic generation. At first, its extract and create the based on the historical stage states within a single adversarial

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 824


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

multistage architecture. The DSE module just not synthesize high-resolution images without tangling
dynamically selects the words that need to be reconstructed visual features. This improves the consistency of
semantic text images without introducing
at each stage, but also dynamically reconstructs them by additional networks [16].
improving the semantics of various granularity subspaces. To CatGAN A category Aware model directly measures the gap
facilitate DSE modules, a single adversarial multi-stage between the actual and generated samples in each
architecture (SAMA) enables more stages of text-image category, and reducing this gap guides the model to
interaction by eliminating complex multiple adversarial produce high-quality category samples [18].
training requirements. , simplifies the process [19].
C. Evaluation Metrics Each GAN has a specific architecture and
hyperparameters to achieve expected results.
Evaluation of generating the images from the text using
generative models should focus on image-to-text
consistency and image quality. There are several techniques
to generate high-resolution photorealistic images using TABLE II. LIST OF TECHNIQUES AND TECHNOLOGIES
GANs. The performance of GAN evaluated using the Items Descriptions
following metrics, such as Inception Score (IS) and Frechet MS-COCO 328000 Samples
Inception Distance (FID). IS and FID are used to assess Dataset(s) CUB-Bird 11788 Samples
image quality, and R accuracy is used to assess image-text Oxford-102 8189 Samples
consistency [20]. The Inception score calculates the Machine Learning Library TensorFlow
Kullback-Leibler (KL) divergence between the conditional Neural Network Library Keras
Embedding GloVe, BERT
and marginal distributions. A higher IS score means that the
GANs Discussed StackGAN, AttnGAN , CVAES,
image produced is of higher quality and belongs to a CookGAN, ComicGAN, DF-GAN,
particular class. Frechet Inception Distance (FID) calculates CGAN, CatGAN, DSE-GAN
the distance between the actual image and generated images. Image Diversity Inception Score (IS)
The more realistic the image produced, the lower the FID. It Distribution Consistency Frechet Inception ´ Distance (FID)
also has a Cross-Model Distance (CMD) method to assess Semantic Consistency R-precision & Human Perceptual Score
quality of images and image-text coherence by mapping Dimension Reduction Principal Component Analysis (PCA)
image and text description to a multimodal semantic
distribution [20]. Understanding the meaning of the text description is a
challenge for GANs. GANs can generate photorealistic
V. DISCUSSION images with consistent semantic meaning of text. Each
The result of this review states that the suspension of the image in the dataset has multiple captions annotated by the
classes during the pandemic makes the significance human, which are subjective and worded differently. The
challenge for the students and teachers who are not ready for text description(captions) does not contain enough
the online learning. Due to the various reasons such as information to guide image generation. An image has a
technology requirement, Students motivations and background, various visual information, and non-essential
investment, the educational institutions, students, and visual information as well. Image distributions are more
teachers face challenges in adapting to the new era of complex and cannot be learned directly and explicitly from
learning. Children with learning disabilities may have textual descriptions. Inadequacies between captions and
difficulty in learning at some point during the pandemic, so language discrepancies produce synthetic images that
we hope these findings will stimulate additional research to deviate from the ground truth. The resulting images are
provide adequate support for dyslexics. semantically inconsistent because incorrect semantics lead
to ineffective image generation. Therefore, there is a need to
Encouraging students to study online as a physical class improve the quality and semantic consistency of the
requires the innovation-centric education that enhances generated images.
visualization and critical thinking skills. According to
findings from [21], the COVID-19 relies heavily on VI. CONCLUSION
artificial intelligence (AI). Generative Adversarial Networks
(GANs) are the latest advances in deep learning. GANs help Visualizing the text can be helpful for readers of all
us to visualize text description so that students do not face ages. By addressing the challenges in teaching and learning,
the challenge of understanding complex concepts. The main we reviewed the most recent methods for generating images
purpose of the GANs is to generate the sequence of high- from the text using Generative Adversarial Networks
resolution images of the input text description. Here are the (GANs). The results shows that we can create a potent GAN
objectives of the recent GANS. to assist students in visualizing textual descriptions of
complex concepts. This research will bridge the educational
TABLE I. GAN TYPES AND OBJECTIVES gap between children with and without disabilities. The
future work will focus on generating image sequences for
GANs Objective(s)
visual storytelling activities with semantic consistency
CVAES A low resolution (64x64) image generated by
extracting the shape and color of an object [11]. between generated images.
CGANs It takes input from CVAES and produces high REFERENCES
resolution images (n 256×256) [11].
AttnGAN It is fine-grained text-to-image synthesis that [1]. Disability and Health, “Disability and health (who.int)”, Nov 24, 2021.
allows the generative network to draw different [2]. Reed, S., Akata, Z., Yan, X., Logeswaran, L., Schiele, B., & Lee, H.
sub-regions of the image depending on the words “Generative Adversarial Text to Image Synthesis” ,33rd International
most relevant to those sub-regions [15]. Conference on Machine Learning, 1681– 1690, ICML 2016.
DF-GAN A text-to-image backbone that can directly

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 825


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

[3]. Nur Salina Ismail, Nor Mazlina Abu Bakar, Sharifah Wajihah Wafa [13]. Han, Fangda, Guerrero, Ricardo, Pavlovic, Vladimir, “CookGAN:
Syed Saadun Tarek Wafa , "Online Learning Challenges During Meal Image Synthesis from Ingredients”, [2002.11493] CookGAN:
Pandemic COVID-19 in Malaysian Higher Learning Institution", Meal Image Synthesis from Ingredients (arxiv.org)-2020.
Universal Journal of Educational Research, Vol. 8, No. 12, pp. 7151 -
7159, 2020. [14]. Baraheem, Samah Saeed, Nguyen, Tam V, “Aesthetic-Aware Text to
Image Synthesis”, 2020 54th Annual Conference on Information
[4]. Smith, C. “Brief Peer Reviewed Essay Multidisciplinary Perspectives Sciences and Systems, CISS 2020(2020).
in Higher Education”, 2020, ISSN : 2474-2546 Print / ISSN : 2474-
2554. [15]. Proven-Bessel, Ben, Zhao, Zilong, Chen, Lydia, “ComicGAN: Text-
to-Comic Generative Adversarial Network”, https://bit.ly/3R1kZ3i.
[5]. Musdizal, M. “The Influence of Visualization Strategy on Reading
Comprehension Ability”. Jurnal Dimensi, 2019, 8(2), 317–328. [16]. Tao Ming, Tang Hao, Wu Fei, Jing Xiao-Yuan, Bao Bing-Kun, Xu
Changsheng, “DF-GAN: A Simple and Effective Baseline for Text-
[6]. Svensson, I., Nordström, T., Lindeblad, E., Gustafson, S., Björn, M., to-Image Synthesis”, http://arxiv.org/abs/2008.05865, 2022.
Sand, C., Almgren, G., Bäck, /, Nilsson, S., Nordstr€, T., Bj€ Orn C,
M., & Ack, B. “Disability and Rehabilitation: Assistive Technology [17]. Haileleol Tibebu, Aadil Malik, Varuna De Silva, “Text to Image
Effects of assistive technology for students with reading and writing Synthesis using Stacked Conditional Variational Autoencoders and
disabilities Effects of assistive technology for students with reading Conditional Generative Adversarial Networks”, INTELLIGENT
and writing disabilities”, 2019. COMPUTING: PROCEEDINGS OF THE 2022 COMPUTING
CONFERENCE, 2022.
[7]. R. Sonbol, G. Rebdawi and N. Ghneim, "The Use of NLP-Based Text
Representation Techniques to Support Requirement Engineering [18]. Liu, Zhiyue, Wang, Jiahai, Liang, Zhiwei, “CatGAN: Category-aware
Tasks: A Systematic Mapping Review," in IEEE Access, vol. 10, pp. Generative Adversarial Networks with Hierarchical Evolutionary
62811-62830, 2022. Learning for Category Text Generation”, , Association for the
Advancement of Artificial Intelligence (www.aaai.org) 2020,
[8]. Yuhan Zhang, Wenqi Chen, RuihanZhang, Xiajie Zhang,“Representing [https://bit.ly/3QMwFaI.
Affect Information in Word Embeddings”, [2209.10583]
Representing Affect Information in Word Embeddings (arxiv.org), [19]. Mengqi Huang, Zhendong Mao, Penghui Wang,”DSE_GAN:
September 2022. Dynamic Semantic Evolution Generative Adversarial Network for
Text-to-Image Generation”, 2022, *DSE-GAN: Dynamic Semantic
[9]. Vasilyev Oleg, Bohannon John, “Neural Embeddings for Text”, Evolution Generative Adversarial Network for Text-to-Image
http://arxiv.org/abs/2208.08386, 2022. Generation (arxiv.org).
[10]. Han Zhang , Tao Xu , Hongsheng Li , Shaoting Zhang , Xiaolei [20]. Bo Yang, Fangxiang Feng, Xiaojie Wang, “GR-GAN: Gradual
Huang , Xiaogang Wang , Dimitris Metaxas, “StackGAN: Text to Refinement Text-to-image Generation”, ICME 2022, Jun 2022 ,
Photo-realistic Image Synthesis with Stacked Generative Adversarial [2205.11273] GR-GAN: Gradual Refinement Text-to-image
Networks”, Dec 2016. 1612.03242v1.pdf (arxiv.org). Generation (arxiv.org).
[11]. Tibebu, H., Malik, A., De Silva, V, ”Text to Image Synthesis Using [21]. Saravanan, B., Kalaiyarasi Shanmugam, and N. Jeevarathinam. "Role
Stacked Conditional Variational Autoencoders and Conditional of Artificial Intelligence in Remote Learning during COVID-19
Generative Adversarial Networks”, In: Arai, K. (eds) Intelligent Pandemic." Journal of Information Technology 3, no. 4 (2021): 307-
Computing. SAI 2022. Lecture Notes in Networks and Systems, vol 319.
506. Springer, Cham.
[12]. Das, A.S., Saha, S, “Self-supervised Image-to-Text and Text-to-Image
Synthesis”, ICONIP 2021,Springer, 05-Dec-2021.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 826


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

A Survey on Quantization Methods for


Optimization of Deep Neural Networks

Uday Kulkarni Abhishek S Hosamani Abhishek S Masur


KLE Technological University KLE Technological University KLE Technological University
Hubballi,India Hubballi,India Hubballi,India
uday kulkarni@kletech.ac.in abhihosamani17@gmail.com abhishekmasur@gmail.com

Shashank Hegde Ganesh R Vernekar K Siri Chandana


KLE Technological University KLE Technological University KLE Technological University
Hubballi,India Hubballi,Karnataka,India Hubballi,Karnataka,India
shashankhegde420@gmail.com ganeshsantosh19@gmail.com Kakarlasirichandana1@gmail.com

Abstract—The Deep Neural Network (DNN) model has been should be optimized which can be accomplished using four
used in a number of commercial applications and we benefit from methods discussed below:
its accuracy in numerous applications like virtual assistants and Low-rank factorization technique aids in model size re-
chatbots. Due to the high computational demands and significant
memory requirements of those models, quantization approaches duction when it is necessary by breaking up a huge matrix
have been employed to minimise accuracy loss while reducing into smaller matrices. In knowledge distillation, a sizable,
model size to address those problems. DNN’s has a number intricate model is trained on a sizable dataset. This model’s
of problems, including a large model size and a high accuracy capabilities are transferred to a smaller network when it can
model, which have come at the cost of substantially increased generalize and function effectively on untested data. Pruning
computation and model storage resources, which consume more
power. The study addresses these issues and focuses on enhancing is the method of removal of features which contribute least to
model speed, reducing computational cost, compressing the size the decision-making of the model. The main types are filter
of the model, and making the model energy efficient by using pruning (least contributing filters are removed) and weight
some of the methods outlined below. We can use quantization pruning (weights which do not contribute much to the output
techniques to accomplish our desired goals. These techniques are are removed). Quantization is an optimization technique [9]
broadly categorised as quantification-aware training and post-
training quantification. The former technique discusses full quan- where the weights and activations of a floating point (32-bit)
tization and batch normalization, whereas the latter technique model are quantized to lower n-bit precision with negligible
also discusses the weights, activations, weights and activations loss in accuracy. In this paper, quantization is the topic of
together for quantization. discussion. One of the most successful methods for decreasing
Index Terms—Deep Neural Network, Optimization, Quantiza- the memory and computational costs and enabling the use
tion, Pre Training, Post Training, Analytical Clipping, Activation,
weight tuning. of the DNN model on a fixed-point pipeline is known as
quantization.
Paper discusses various Quantizer designs which are gen-
I. I NTRODUCTION
erally categorized as Uniform and Non-Uniform implying
A deep neural network is a network made up of numerous constant and variable step size. Various quantization methods
layers that can be thought of as stacked neural networks. The which can be done in one of two ways. Quantization-aware
core role of a neural network is to accept a set of inputs, training in which weights and activations are quantized during
analyse them using increasingly complicated computations training and Post training quantization is to quantize the
and output results to handle real-world problems such as activations and weights of a trained model.
classification, annotation and detection. Deep learning models
outperform traditional Machine learning networks in terms of II. O BJECTIVES
results. This neural network is trained on a large number of The neural network is trained on a large number of im-
images with labels while adjusting the parameters to improve ages with labels while adjusting the parameters to improve
performance which results in the usage of high computational performance. The usage of more parameters in conventional
power, large model size and memory. The problem arises when algorithms is a disadvantage. However, the power, memory,
we want to deploy these DNN models on edge devices which and computational capabilities of edge devices are constrained.
have constrained resources and memory. Thus the model This implies that a DNN model needs to be prepared for

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 827


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Train DNN
model
Quantizer design Quantization techniques

Objective
Goal
selection

Parameterized clipping
Full Quantization
activation
Symmetric Quantization
Different objective
aware training
Uniform Batch Training with
Normalization simulated quantization
Computational

Model Speed

Model size

Asymmetric
Efficient
Power
cost

Analytical clipping for


Weight Only
INT quantization
Power of 2
Adaptive rounding
Non border
Uniform Post training
Activation only
Convolution
Convolution
Depth Wise

scheduling
Point wise

Rounding

quantization
Process

scheme

Logarithmic QDrop activation


quantization

Per channel bit


allocation
Activation and
weights
Adaptive floating point
quantization

Fig. 1. Overview of Quantization.

deployment in embedded systems. This can be done by Rounding scheme [2] is effective way to greatly minimize the
quantizing DNN models which significantly lowers the amount size of the model.
of memory and processing cost needed to use neural net- 1) Rounding scheme [2]: This technique reduces 32-bit
works. There are several key objectives that are achieved with floating point values to lower precision quantization bins. 32
quantization techniques. The user selects the algorithms in bit floating point weights are divided into W = w1, w2,..., wn.
accordance with his needs in order to concentrate more on The within-cluster sum of squares is minimized for k clusters
a specific objective. [2] C = c1, c2,..., ck. This is combined with pruning and Huffman
coding to achieve model compression, which reduces the size
Rounding of model with negligible loss in accuracy.
Model size
scheme
Different objectives

B. Computation Cost
Power Training Numerous activation nodes and number of connection be-
Efficient scheduling
tween those nodes with weight parameters associated with it
Point wise comprises a neural network. These parameters are quantized
Model Speed
Convolution
to lower bit. In order to put things into perspective, operating
Computational Depth Wise a neural network on hardware can easily lead to huge number
cost Convolution of arithemetic operations, mainly addition and multiplication.
Large computational gains and improved performance are
Fig. 2. Methods to achieve the given objective are represented.
obtained when a neural network’s intermediate calculations are
quantized and lower-bit mathematical procedures with quan-
tized parameters are used. The use of Depthwise Convolution
A. Model Size [2] can significantly reduce the cost of computing.
Quantization technique reduces 32-bit floating point model 1) Depth Wise Convolution [2]: In group convolutions,
to lower n-bit integer model. For instance, reducing the 32-bit G is a programmable tuning parameter. Less calculation is
to an 8-bit model would reduce the model size by a factor required and there are fewer parameters with a higher G. G
of 4, so one obvious benefit of quantization is a significant equaling the number of input channels is an extreme example.
reduction in memory. Quantization significantly reduces model In that situation, the group convolution layer is referred to as
size which makes it more feasible to run DNN models on a a depthwise convolution. Compared to a standard convolution,
memory-constrained device like a micro-controllers, mobile a depthwise convolution is less expensive to compute but has
phones, smart watches. less modelling potential.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 828


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

C. Power Efficiency between uniform and non-uniform quantization using this step
Reduced memory access costs and improved compute effi- size.
ciency are two ways that quantized neural networks improve A. Uniform Quantization
power efficiency. Due to this quantized data, less power is
In uniform quantization [5] the step size(the amount of
required to move the data from one chip to another as data
space between layers of quantization) is constant. A function
size is less which reduces the memory bandwidth. Arithmetic
must be built in order to reduce the activations and weights
operations with lower precision, use less power and improve
of neural networks to a narrow range of values.
hardware efficiency which lowers power consumption. The
model can be made more power efficient by training schedul-
ing which lowers the power consumption of the ML model. Symmetric
1) Training Scheduling [2]: It can be done by using an
API that handles scheduling. The API framework will strive
Uniform
to batch and delay jobs as much as it can and will be intelligent
about when it executes them. If a job doesn’t have deadline,
it will typically run whenever it is ready, depending on the Asymmetric
internal queue of API Scheduler. You can enqueue work for
a new or existing job using the API enqueue command. Any Fig. 3. The figure depicts two methods of uniform quantization, Symmetric
previously enqueued work will remain and be dispatched the and Asymmetric, along with the algorithms that use those methods.
next time the task runs, even if a job with the same ID is
already planned. If there is currently a job running with the
same ID, the new work will be queued for it without stopping Q = Int(x/s) − Z (1)
it. This allows us to schedule the training of the model and
use the API for that purpose. The above mentioned in eq 1 converts real values (x) in
floating point (32 bits) to a lower bit range, Q is the quantized
D. Model Speed value , S is a scaling factor and Zero-point(Z) which ensures
It is evident that float arithmetic requires a little bit more that zero is quantized accurately. Additionally, this Int function
work than integer arithmetic when you add and multiply two uses a rounding procedure to convert a real number to the
values together in scientific notation. The real hardware has a nearest integer value. Real values(x) are mapped to certain
significant impact on how quickly calculations are performed integer values via same function.
in practice. For instance, a contemporary desktop computer’s 1) Symmetric Quantization: The primary consideration in
CPU can perform integer calculations more quickly than float uniform quantization is determining the optimal scaling fac-
calculations. On the other hand, single precision float calcu- tor(S) in eq 1 The real values(x) are segregated into bins on
lations are well suited to GPU optimization (Since computer the basis of scaling factor which is calculated using
graphics tend to use this type the most). Without being exact, β−α
it may be argued that int8 is frequently quicker than float32. s= (2)
2b − 1
The model can be significantly sped up using point wise From the equation 2 , [ α , β ] denotes the clipping range,
convolution [2] and effective hybrid convolution [8]. which is used to clip real values within a bounded range
1) Point Wise Convolution [2]: Unlike other types of con- and b is the quantization bit width. The α, β range must be
volution layers, point wise convolution uses a kernel size K calibrated in order to determine the scaling factor this can
of 1. Params and MacS are decreased by K2 times when a be done symmetrically where α = −β and more precisely
KxK conventional convolution layer is swapped out for a 1x1 by utilizing the minimum and maximum values of the signal.
convolution layer. In reality, since the 1x1 convolution by itself where x is the real value. This symmetric method of selecting
cannot aggregate spatial information, CNN designs are created alpha and beta to quantize the model is known as symmetric
by combining it with additional convolution layers. No matter quantization [17]. This method replaces zero point(z) with 0
how many channels the input image has, the kernel has a depth in equation which simplifies the equation
of that many. It can be used with depthwise convolutions to
create depth wise-separable convolutions, an effective class of Q(r) = Int(x/s) (3)
convolutions.
As a result, the computational cost is reduced, resources are
III. Q UANTIZER D ESIGN used more efficiently, and the implementation is simplified.
Design templates known as Quantizer designs are used to 2) Asymmetric Quantization: In asymmetric quantization
quantize the model by choosing a particular design template [5] the real values are mapped in an asymmetric range of
based on an objective decision. Two of the most popular quantized values as shown in figure 4.
quantizer designs are Uniform and Non uniform quantization. The real values are mapped in this case to a range of
By altering the step size, the distribution of quantization levels [0,255] for 8 bit quantization, which is not mirrored along
can be changed. It is further investigated how to distinguish the origin. This type of quantization is known as asymmetric

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 829


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

Min(x) 0 Max(x)
2) Logarithmic Distribution: In a logarithmic distribution
[13], real values are quantized using the log scale within a
specific range, which causes the quantization levels to change
exponentially.
0 255
IV. Q UANTIZATION TECHNIQUES
Fig. 4. Asymmetric Quantization. Some quantization techniques are chosen for certain appli-
cations, and this is necessary if there is a need to run or train
the model on low precision hardware that does not support
quantizationṪhis can be done by selecting the clipping [α,β] floating point due to a variety of restrictions, such as those
range asymmetrical,which is used to determine the scaling imposed by mobile or IOT devices. The capability of training
factor(s) in eq 2. The tighter clipping range produced by this the model with lower bit precision weights and activation
asymmetric quantization is difficult to obtain with symmetric values which allows to have potential advantages.
quantization. When the weights or activations are not balanced, In practice, there are two main ways to go about quantiza-
this tight clipping is more useful [11]. tion, Quantization aware training (also known as Pre training)
B. Non-Uniform Quantization and Post training quantization.
In non-uniform quantization [5], the space between quanti-
zation levels (step size) can vary and is not constant. Because Full Parameterized clipping
Quantization activation
of the varying step size, the quantization error (difference
between input value and quantized value) is reduced which Quantization aware
is more in case of uniform quantization. This can be done training
using eq 4.
Batch Training with simulated
Normalization quantization
Q(r) = Xt , if r ∈ [∆t , ∆t+1 ] (4)
Where ∆t i denotes steps and Xt denotes various quan- Fig. 6. Classification of Quantization aware training.
tization levels. The real value(r) is projected to the equiv-
alent Xt value when it lies between the quantization step Quantization aware training(QAT) also called pre training
∆t and ∆t+1 . The bell-shaped (symmetric) distributions quantization imitates inference-time quantization, generating
of the parameters, which frequently have lengthy tails, are the model in such a way that the conveniently quantized mod-
the main target audience for these non-uniform quantization els may be provided by the downstream tools. The quantized
techniques. When using a logarithmic distribution and power models will use lower-bit representation (e.g. 4-bit instead
of two scales for non-uniform quantization, the quantization of full precision), eventually leading to an advantage while
levels and steps rise exponentially rather than linearly. Fig 5 deployment. During the QAT the quantization happens while
represents the different ways that non-uniform quantization training the model itself. There are several methods regarding
can be accomplished. at what stage of training to perform weights and activation
quantization. The goal of this technique is to achieve the
desired objective without sacrificing accuracy. To this end,
Power of 2
parameterized clipping activation (PACT), which consistently
degrades accuracy less than other techniques and another sim-
Non
ilar technique is training with simulated quantization, which
Uniform
only quantizes weights during forward passes and suffers
minimal accuracy loss.
Logarithmic
A. PACT: Parameterized clipping activation function
Fig. 5. The figure depicts two methods of non-uniform quantization, Power of Employing ReLU (the activation function most frequently
2 scales and Logarthmic Distribution, along with its method and Asymmetric, employed in CNNs) as the activation function for each layer
along with the algorithms that use those methods, which will be discussed
further. would make activation quantization more difficult. ReLU
delivers greater accuracy compared to previous activation
1) Power of 2 scales: This is an systematic non uniform functions by allowing gradient of activations to flow down
quantization method for the bell-shaped distribution of param- deep into layers. Although the ReLu funciton provides output
eters(weights, activations) in neural networks. Here all quan- which is boundless, a high dynamic range is needed for
tization levels are constrained to the summation of Powers-of- quantization after ReLU (i.e., more bit-precision) with primary
Two [14](2x ) values. This requires less computational powers goal to keep down the accuracy degradation which is product
and has good match with distribution of weights. of quantization, PACT [4] is new approach for quantizing the
activations by generating a parameterized clipping level which

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 830


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

is adjusted dynamically by gradient descent based training. graph rather than being present as a different block of
The standard ReLU activation function in CNNs is changed operations in the training graph and the method is as follows:
in PACT [3] to the following.
γω
y = P ACT (x) = 0.5(|x|−|x − α|+α) wf old = p 2)+ϵ
(9)
 EM A(σB
 0, x ∈ (−∞, 0) (5)
= x, x ∈ (0, α) From equation 9 γ is the batch normalization’s scale param-
α, x ∈ (α, +α) 2

eter, EMA(σB ) is the moving average estimate of the variance
of convolution results across the batch, and is just a small
where α bounds the activation range to [0, α] and for dot constant for numerical stability.
product computations the generated activation output is then As we’ve seen, the Quantization aware training strategy
linearly quantized to lower bit representation say b bits, where offers results that are nearly as accurate as those of the original
model, with a few losses. These massive models are being
 b 
2 −1 α
q = round y. . b (6) trained, and with training comes quantization. We will now
α 2 −1
talk about the quantization technique for quantizing model
Certainly this new activation function bears a variable α in parameters which is already trained.
the loss function, which can be fine tuned during training.
V. P OST Q UANTIZATION
Gradient ∂yq /∂α can be calculated for back-propagation using
the method called Straight-Through Estimator (STE), which Post-training quantization is an approach that quantizes pre-
will estimate ∂yq / ∂y as 1. trained model while also imporving CPU latency and reduction
 in model size with little deterioration in accuracy of model.
∂yq ∂yq ∂y 0, x ∈ (−∞, α) For faster inference without having to retrain the model, it
= = (7)
∂α ∂y ∂α 1, x ∈ (α, ∞) is preferable to compress weights or quantize both weights
and activations. Applying post-training quantization typically
results in little accuracy loss. In terms of weight quantization
B. Training with simulated quantization
ACIQ (Analytical Clipping for Int Quantization) limit value
It is usual practice to train quantized networks in floating of weights in such a way not to interfere in accuracy, Adap-
point first and then to quantize the weights that follow (can tive Rounding and Qdrop method provides better results by
be fine-tuned with post training quantization) [6]. This method rounding of important activation and dropping activation with
produces acceptable results for large models with high data minimal influence, Per Channel bit allocation and Adaptive
representational capacity, but it significantly reduces accuracy Floating Point Quantization provides almost same accuracy
for tiny models. Prior to convolving the weights with the input, as full precision model by limiting bit representation of
they are quantized. Before quantization of weights the batch parameters.
normalization parameters are folded into the weights if the
layer uses batch normalization. Analytical clipping for
Weight Only
Application of the quantization function q described as INT quantization
follows is used to execute quantization for each layer, which
is parameterized by the various numbers of quantization levels Adaptive rounding
and clamping range. border
Post training
Activation only
quantization
val = S(q − Z) QDrop activation
quantization
clamp(val; m, n) := min(max(x, m), n)
n−m Per channel bit
s(m, n, N ) := Activation and
allocation
N −1
$ ' weights
clamp(val; m; n) − m Adaptive floating
q(val; m, n, N ) := s(m, n, N ) + m point quantization
s(m, n, N )
(8) Fig. 7. Classification of Post training Quantization.

Where val is a real number to be quantized, [m:n] is the


range of quantization, N denotes the number of quantization
levels, and ⌊ . ⌉ denotes rounding to the nearest integer. N is A. Types within the post training quantization:
constant for all layers in our survey analysis, eg. N = 28 = 256 1) Weight Only quantization: It is a simple method which
for 8-bit quantization. For models using batch-normalization changes the weights of neural network having float precision to
there is an additional complexity for efficiency, the parameters n bits. It doesn’t requries validation data because only weights
of batch-normalization are folded into the weights and biases are quantized after training using a straightforward command
of the convolutional or fully connected layer in the inference line tool.

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 831


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

a) Analytical clipping for INT quantization: The method both the simulation and analytical results converges. Uniform
limits the activation values inside a tensor with an optimised density function f(x) = 1/2α is substituted into equation 13.
limiting value. The original tensor will be distorted if this
clipping is applied, hence it is important to minimise rounding M −1
2X Z −α+(i+1)·∆
errors in parts of distribution that contain the most important 2
f (x) · (x − qi ) dx
information [1]. Statistics of varied tensors derive expres- i=0 −α+i·∆
sions for the mean-square-error degradation. This quantization M
(14)
2X −1
method has shown noticable improvements over benchmark 2 · α3 1 α2
≈ 3M
· =
quantization schemes that normally avoid clipping. 3·2 i=0
2α 3 · 22M
A suboptimal approach has been opted to get tensor max
and min values to quantize the Integer tensors, clipping of the with method called symmetrical argument, equation 14 can
tensor values is done in range of [-α,α] in order to minimize be made more comprehensible for any symmetrical distribu-
the quantization noise aiming to reduces the quantization tions as follows:
Z ∞
noise. For any r ∈ R, clipping function is defined as α2
E (X − Q(X))2 = f (x)·(x−α)2 dx (15)
 
+2·
3 · 22M
(
x if |x| ≤ α α
clip(x, α) = sign(x, ) = (10)
sign(x)α if |x| > α The objective is to quantize as many activation layers to 4-bit
precision as possible without noticeably degrading accuracy.
With clipping value α, once the range is determined it is Performed tests to determine the maximum number of acti-
split into 2M regions called quantization regions. With this del vation layers that could be quantized from 8 bit paramaters
(quantization step) is found between two quantization levels to 4 bit parameter with negligible accuracy loss. These tests
which are beside each other. used VGG-16 with batch normalisation, ResNet-101, ResNet-
2α 50, ResNet-18, and Inception-v3 on the ImageNet dataset and
del = (11) paper have surveyed the results further in the paper.
2M
the mean squared error is derived from quantized version Q(x)
B. Activation Only Post Training Quantization:
and X as shown in equation 12.
In this case only only activation is quantized using certain
Z −∞
methods:
E (X − Q(X))2 = f (x) · (x + α)2 dx
 
1) QDrop activation quantization: In this scheme, author
−∞ has discussed about the impact of activation quantization
nx
2xX −1 Z −α+(i+1)∆
2 on post training and stated that the limited implication of
+ f (x) · (x − qi ) dx activation quantization provides better results than the schemes
−α+i∆
Z i=0
∞ using whole implication [16].
+ f (x) · (x − α)2 dx A framework is proposed to understand the incorporation
α of activation in tuning of weights and achieve the flatness of
(12)
quantized model on train and test data in order to achieve good
The density function f is estimated by a construction of accuracy. It is easy to implement on various neural networks
a piecewise linear function considering the segment break- and achieve normality (flatness) in all directions in distribution
points which are points in f (density function). Considering of model.
smooth probability density functions, for any given sufficient The Qdrop algorithm drops activation quantization ran-
resolution it would lead to an small approximation error. domly during each forward pass. It switches between disability
Quantization noise can be found using f (density function) and enability of quantization function during passes. Survey
as shown in equation 13. results are summarized in Table 1.
M
(
2X −1 Z −α+i·△
0 if with probability p
f (x) · (x − qi )2 QDrop = q = â (16)
i=0 α+i·△ a − 1 with probability 1-p
M
(13)
2X−1
2 · α3
≈ · f (qi ) For ImageNet dataset the default probability p is set as 0.5
3 · 23M i=0 and 1024 images are sampled as calibration set which is used
The equation 13 represents the rounding error (as opposed for data aggression and model learning.
to clipping error) which is a product of rounding value strategy 2) Adaptive Rounding for Post training Quantization: This
from bin i to qi . For sufficient resolution and a smooth technique is mainly used to reduce the loss in performance
density function, it is found that with the range [−α, α] being due to the quantization of models, and it is applied to pre-
distributed uniformly making path for simple analysis showing trained neural networks. Here [12], the weights of models are
little impact on the accuracy, with the assumption of the same, quantized as follows

978-1-6654-6084-2/22/$31.00 ©2022 IEEE 832


Proceedings of the International Conference on Automation, Computing and Renewable Systems (ICACRS 2022)
DVD Part Number: CFP22CB5-DVD: ISBN: 978-1-6654-6083-5

The derivative of the Lagrangian function L(·) with respect


W̃il = Wi
(l,f loor) ((l),ceil)
, Wi , to λ is set to zero. It is taken into consideration for the
(17) limitations on the number of buckets.
(l,f loor) Wl
Wi = s(l) · clip([ (l)i ], n, p)
s ∂L(M0 , M1 , ..., Mn λ) X Mi
= 2 −B =0 (22)
where, W˜il is the quantized weight ∂Mi i

∆Wil = W l - Wil refers to the agita due to the quantization. Analysing the equatin 21 and equation 22, there is a distinct
Here i denote the fluctuations due to the quantization, here S l equation for every i that lies ∈ [0, n 1] and an supplementary
is kept constant to attain the optimized rounding operation. To equation for the multiplier λ.
find optimized rounding operation following equation is used. This solution results in bit allocation for every channel i
Second order Taylor degree approximation is used in this
2
case to reduce the excess computations due to repeated for- α3
ward passes. However, the interaction between the weights of Bi⋆ =2 Mi
= Pi 2· (23)
i αi
3
distinct layer are ignored, which inferred a non-zero block
which assumes to be H (w) refers to the particular layer. the equation 23 is transalated by using log on both the sides
into allocation bit-width Mi for every channel i. As Mi is
(l) 1 (l) integer it includes a rounding scheme.
arg min E[g w T
△w(l) + △w(l)T · H w △w(l) ] (18)
∆w 2 $ 2 !'
As seen above, the second order term is used to leverage αi3
Mi = log2 P 2 · B (24)
the simultaneous interactions of the weights. This is known α
i i
3

(l)
as QUBO problem and ∆Wi refers to binary variables. 2) Adaptive floating-point precision: A data format, variant
The gradient term’s contribution to optimization can be safely of standard float value representation called as AFP [15] is
neglected for a converged pretrained model.

You might also like