Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209504
Muhammad Musadiq Ahmed, Muhammad Amjad, M. A. Qureshi
The Phasor Measurement Unit PMU is a fast monitoring device that deals with the time-stamped phasors, current, and voltage values. The high device and installation cost of PMUs inspire optimal placement of PMUs in the power network. An integer linear programming algorithm finds an optimal solution to ensure complete network observability. The concept of Zero Injection Buses (ZIB) is included to obtain better results. For the reliability of the power network, the N – 1 contingency of the PMU device is also solved. The suggested technique is implemented on 39 New England bus networks, IEEE 14, 30, 57, and 118 bus systems.
{"title":"Optimising PMU Placement using Integer Linear Programming for Complete Network Observability with Zero Injection Bus and N-1 Contingency","authors":"Muhammad Musadiq Ahmed, Muhammad Amjad, M. A. Qureshi","doi":"10.1109/ICEPECC57281.2023.10209504","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209504","url":null,"abstract":"The Phasor Measurement Unit PMU is a fast monitoring device that deals with the time-stamped phasors, current, and voltage values. The high device and installation cost of PMUs inspire optimal placement of PMUs in the power network. An integer linear programming algorithm finds an optimal solution to ensure complete network observability. The concept of Zero Injection Buses (ZIB) is included to obtain better results. For the reliability of the power network, the N – 1 contingency of the PMU device is also solved. The suggested technique is implemented on 39 New England bus networks, IEEE 14, 30, 57, and 118 bus systems.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"272 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121445522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209541
Fan Boon Lee, Bee Ee Khoo
Cryptography is a tool to protect messages confidentiality through codes keys. Random numbers are crucial in the process of making the cryptography keys in which these keys should be unpredictable. EEG, with its chaotic properties, could be selected as one type of noise source for a random number generator where it is unique to an individual and its characteristics are impossible to be faked or compromised hence unpredictable. A raw EEG signal is random but not uniform because it is contaminated with artefacts which tends to produce spikes in the raw signal causing non-uniformity hence potential to be predicted. Therefore, Hilbert Transform is proposed to be added into the randomness extraction algorithm in this paper. There are a total of 112 random number sequences resulting a total of 113,770,496 bits being generated in this paper. These sequences successfully scored 99.40% of success rate through the NIST SP 800-22 statistical test suite which is proven to be random and cryptographically secured.
{"title":"Biometric Electroencephalogram Based Random Number Generator","authors":"Fan Boon Lee, Bee Ee Khoo","doi":"10.1109/ICEPECC57281.2023.10209541","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209541","url":null,"abstract":"Cryptography is a tool to protect messages confidentiality through codes keys. Random numbers are crucial in the process of making the cryptography keys in which these keys should be unpredictable. EEG, with its chaotic properties, could be selected as one type of noise source for a random number generator where it is unique to an individual and its characteristics are impossible to be faked or compromised hence unpredictable. A raw EEG signal is random but not uniform because it is contaminated with artefacts which tends to produce spikes in the raw signal causing non-uniformity hence potential to be predicted. Therefore, Hilbert Transform is proposed to be added into the randomness extraction algorithm in this paper. There are a total of 112 random number sequences resulting a total of 113,770,496 bits being generated in this paper. These sequences successfully scored 99.40% of success rate through the NIST SP 800-22 statistical test suite which is proven to be random and cryptographically secured.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"40 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115638839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209442
Talha Shahid Alvi, Muhammad Ali, Zubair Mehmood, M. Q. Mehmood
This research presents and simulates a novel ultra-wideband fractal antenna with defected ground structure covering W-band and millimeter wave frequencies for wireless communication applications. Copper is used as a conductor, with a thickness of 0.035 mm, on a Rogers RT5880 substrate with a dielectric constant of 2.2. A 50 Ω input impedance characterizes the proposed antenna. This antenna has a total bandwidth of 49.5 GHz ranging from 79.29 GHz to 128.29 GHz, with the highest gain measured at 114 GHz, which is 5.04 dBi and has a compact size of $3.5times5.25times0.25 mm3$. It emits a broad spectrum of radiation, making it useful for radar front-end and object-tracking applications.
{"title":"A Novel Ultra-wideband Fractal Antenna with Defected Ground Structure for W-band Applications","authors":"Talha Shahid Alvi, Muhammad Ali, Zubair Mehmood, M. Q. Mehmood","doi":"10.1109/ICEPECC57281.2023.10209442","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209442","url":null,"abstract":"This research presents and simulates a novel ultra-wideband fractal antenna with defected ground structure covering W-band and millimeter wave frequencies for wireless communication applications. Copper is used as a conductor, with a thickness of 0.035 mm, on a Rogers RT5880 substrate with a dielectric constant of 2.2. A 50 Ω input impedance characterizes the proposed antenna. This antenna has a total bandwidth of 49.5 GHz ranging from 79.29 GHz to 128.29 GHz, with the highest gain measured at 114 GHz, which is 5.04 dBi and has a compact size of $3.5times5.25times0.25 mm3$. It emits a broad spectrum of radiation, making it useful for radar front-end and object-tracking applications.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121968325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209405
Abdul Kashif Janjua, M. S. Younis, Muhammad Zaid Masood Khan, Muhammad Musadiq Ahmed
The study investigates the effect of PV sizing design and financial variables effect on PV system. An extensive sensitivity analysis on both design and financial variable was performed in the study. The results indicate that increasing the design variables such as tilt angle, azimuth angle and number of inverters have a positive gain up till a tip off point. Moreover, the financial variables such as inflation, debt fraction, loan rate and loan term have a direct influence on the LCOE and NPV. An optimal choice is to have a higher debt fraction and loan term along with low loan rate.
{"title":"Effect Of PV System Design And Financial Variables On Systems Perfomance And Financial Feasibility","authors":"Abdul Kashif Janjua, M. S. Younis, Muhammad Zaid Masood Khan, Muhammad Musadiq Ahmed","doi":"10.1109/ICEPECC57281.2023.10209405","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209405","url":null,"abstract":"The study investigates the effect of PV sizing design and financial variables effect on PV system. An extensive sensitivity analysis on both design and financial variable was performed in the study. The results indicate that increasing the design variables such as tilt angle, azimuth angle and number of inverters have a positive gain up till a tip off point. Moreover, the financial variables such as inflation, debt fraction, loan rate and loan term have a direct influence on the LCOE and NPV. An optimal choice is to have a higher debt fraction and loan term along with low loan rate.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130508378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209509
Majid Ali, J. Vasquez, J. Guerrero, Y. Guan, Jorge De La Cruz, Muhammad Javaid Aslam
To increase the effectiveness of the electrical system and lessen dependency on fossil-fuel-based electricity, microgrids (MG) enable the seamless coordination and integration of numerous Distributed energy resources (DERs). Natural disasters present new issues in terms of sophisticated control strategy, operation, operation natural reliability. Most natural disasters (ND) have a direct impact on the overall power system as well as system communication. Once the disaster occurs, the main grid may result in power blackouts, and generator units are turned off for security purposes. Low-power moveable ad-hoc MG can offer an immediate solution in this case so that electricity for potable water pumps can be given for two or three days to relieve the devastated area. In this study, a hospital load on the Indonesian island of Lombok was chosen as the critical load because it required greater resilience than other loads do in the face of extreme weather. HOMER Grid runs the simulation with a 72-hour outage.
{"title":"Ad-Hoc Microgrids Planning for Rural Communities under Natural Disasters","authors":"Majid Ali, J. Vasquez, J. Guerrero, Y. Guan, Jorge De La Cruz, Muhammad Javaid Aslam","doi":"10.1109/ICEPECC57281.2023.10209509","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209509","url":null,"abstract":"To increase the effectiveness of the electrical system and lessen dependency on fossil-fuel-based electricity, microgrids (MG) enable the seamless coordination and integration of numerous Distributed energy resources (DERs). Natural disasters present new issues in terms of sophisticated control strategy, operation, operation natural reliability. Most natural disasters (ND) have a direct impact on the overall power system as well as system communication. Once the disaster occurs, the main grid may result in power blackouts, and generator units are turned off for security purposes. Low-power moveable ad-hoc MG can offer an immediate solution in this case so that electricity for potable water pumps can be given for two or three days to relieve the devastated area. In this study, a hospital load on the Indonesian island of Lombok was chosen as the critical load because it required greater resilience than other loads do in the face of extreme weather. HOMER Grid runs the simulation with a 72-hour outage.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116443486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209496
Javaria Khalil, M. Saleem
A dual-band microstrip filter design and size reduction method for C-band application are presented in this research. To produce the desired dual-band response, the concepts and design technique are based on quarter wavelength resonators and three alternative configurations. The use of quarter wavelength resonators allows for a more straightforward filter design. Two simulators—Advanced Keysight Advanced Digital System (ADS) and ANSYS High Frequency Structure Simulator (HFSS) are used for simulations. Taconic RF-35, which has a height of 0.762mm and a dielectric constant of 3.55, is utilized as a substrate material. The filter insertion loss is less than 0.4 dB. The overall size of the filter is reduced by 38% by utilizing the Kotch Fractal curve.
{"title":"Design and Miniaturization of Dual Band Filter based on Quarter Wavelength Resonators","authors":"Javaria Khalil, M. Saleem","doi":"10.1109/ICEPECC57281.2023.10209496","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209496","url":null,"abstract":"A dual-band microstrip filter design and size reduction method for C-band application are presented in this research. To produce the desired dual-band response, the concepts and design technique are based on quarter wavelength resonators and three alternative configurations. The use of quarter wavelength resonators allows for a more straightforward filter design. Two simulators—Advanced Keysight Advanced Digital System (ADS) and ANSYS High Frequency Structure Simulator (HFSS) are used for simulations. Taconic RF-35, which has a height of 0.762mm and a dielectric constant of 3.55, is utilized as a substrate material. The filter insertion loss is less than 0.4 dB. The overall size of the filter is reduced by 38% by utilizing the Kotch Fractal curve.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127715583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209484
A. Loganathan, N. S. Ahmad
Path planning is the task of finding a safe and efficient path for a mobile robot to navigate through an environment while taking into account factors such as energy efficiency and time constraints. This study compares the performance of the Harris Hawks optimization (HHO)-based method with other competing swarm intelligence algorithms such as Whale optimization Algorithm, Sine Cosine Algorithm, and Multi-Verse optimizer Algorithm. By including safety and path length in the cost function, and imposing a constraint on the processing time, simulation results demonstrate that the HHO-based path planning method is able to drive the robot towards the target with the lowest path cost compared to the rest.
{"title":"Robot Path Planning via Harris Hawks Optimization: A Comparative Assessment","authors":"A. Loganathan, N. S. Ahmad","doi":"10.1109/ICEPECC57281.2023.10209484","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209484","url":null,"abstract":"Path planning is the task of finding a safe and efficient path for a mobile robot to navigate through an environment while taking into account factors such as energy efficiency and time constraints. This study compares the performance of the Harris Hawks optimization (HHO)-based method with other competing swarm intelligence algorithms such as Whale optimization Algorithm, Sine Cosine Algorithm, and Multi-Verse optimizer Algorithm. By including safety and path length in the cost function, and imposing a constraint on the processing time, simulation results demonstrate that the HHO-based path planning method is able to drive the robot towards the target with the lowest path cost compared to the rest.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130888793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209406
Muhammad Shahzeb Khan, S. Bazai, Muhammad Imran Ghafoor, Shahabzade Marjan, Mohammad Ameen, Syed Ali Asghar Shah
This paper investigates the potential of using a gated recurrent unit (GRU) neural network (NN) for forecasting the prices of three popular cryptocurrencies: Bitcoin (BTC), Ethereum (ETH), and Litecoin (LTC). A dataset spanning from October 2021 to October 2022 was collected and used to train and evaluate the performance of the proposed model. The proposed GRU model was evaluated using the root mean squared error (RMSE) and the mean absolute percentage error (MAPE) as evaluation metrics. The results of the study show that the GRU model achieved an RMSE of 366.0601 and a MAPE of 1.7268% for BTC, an RMSE of 37.6678 and a MAPE of 2.3342% for ETH, and an RMSE of 1.0902 and a MAPE of 1.7278% for LTC. The results indicate that the GRU model performed well in forecasting cryptocurrency prices and holds promise as an approach for further research in this field.
{"title":"Forecasting Cryptocurrency Prices Using a Gated Recurrent Unit Neural Network","authors":"Muhammad Shahzeb Khan, S. Bazai, Muhammad Imran Ghafoor, Shahabzade Marjan, Mohammad Ameen, Syed Ali Asghar Shah","doi":"10.1109/ICEPECC57281.2023.10209406","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209406","url":null,"abstract":"This paper investigates the potential of using a gated recurrent unit (GRU) neural network (NN) for forecasting the prices of three popular cryptocurrencies: Bitcoin (BTC), Ethereum (ETH), and Litecoin (LTC). A dataset spanning from October 2021 to October 2022 was collected and used to train and evaluate the performance of the proposed model. The proposed GRU model was evaluated using the root mean squared error (RMSE) and the mean absolute percentage error (MAPE) as evaluation metrics. The results of the study show that the GRU model achieved an RMSE of 366.0601 and a MAPE of 1.7268% for BTC, an RMSE of 37.6678 and a MAPE of 2.3342% for ETH, and an RMSE of 1.0902 and a MAPE of 1.7278% for LTC. The results indicate that the GRU model performed well in forecasting cryptocurrency prices and holds promise as an approach for further research in this field.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131092685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-08DOI: 10.1109/ICEPECC57281.2023.10209516
Umair Shafique, F. Majeed, S. Naz, Mah Amara, I. Mustafa, Hafiz Usman Zia
The branch of image processing has been playing a critical role in various domains, including medical imaging. The challenge with medical images is the introduction of periodic noise during acquisition or transmission, degrading image quality. In medical, noisy images might affect the physician’s interpretation. We have proposed a dynamic denoising technique for 2-D medical image restoration from periodic noise to overcome this problem. In our proposed solution, we have applied the automatic detection and recovery procedure to locate the spikes to minimize the influence of degradation from the entire Fourier domain image. In this process, only the half-image band is cleaned to save time and space. A 2D Discrete Fourier Transformation (DFT) procedure is carried out to re-obtain the inferior band of the image, where deleted locations are replaced or reallocated with new bands using the mirroring or conjugate symmetry method. The algorithm is validated with visual and well-known quantitative measures on different noise strengths. The results show that, in general, our solution performs well on the highest level of noise strength.
{"title":"Dynamic Denoising Mirroring Filter for Periodic Noise Removal from 2D Medical Images","authors":"Umair Shafique, F. Majeed, S. Naz, Mah Amara, I. Mustafa, Hafiz Usman Zia","doi":"10.1109/ICEPECC57281.2023.10209516","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209516","url":null,"abstract":"The branch of image processing has been playing a critical role in various domains, including medical imaging. The challenge with medical images is the introduction of periodic noise during acquisition or transmission, degrading image quality. In medical, noisy images might affect the physician’s interpretation. We have proposed a dynamic denoising technique for 2-D medical image restoration from periodic noise to overcome this problem. In our proposed solution, we have applied the automatic detection and recovery procedure to locate the spikes to minimize the influence of degradation from the entire Fourier domain image. In this process, only the half-image band is cleaned to save time and space. A 2D Discrete Fourier Transformation (DFT) procedure is carried out to re-obtain the inferior band of the image, where deleted locations are replaced or reallocated with new bands using the mirroring or conjugate symmetry method. The algorithm is validated with visual and well-known quantitative measures on different noise strengths. The results show that, in general, our solution performs well on the highest level of noise strength.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121439259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recognition of facial patterns has grown in popularity among the various biometric systems in recent years. As a result, there has been a significant advancement in this field. The security of such systems, however, may be of paramount concern given that numerous studies have shown that face recognition systems are susceptible to a number of threats, including spoofing attacks. When a biometric system is used to identify unauthorized users, spoofing refers to the capacity to trick the system into thinking the unauthorized user is the real deal by using a variety of methods to show a fake version of the original biometric attribute to sensing objects. A number of anti-spoofing techniques that do exist protects face spoofing. This study presents a simple and efficient Resnet18 Convolutional Neural Network (CNN) model architecture, which is more beneficial and produces greater accuracy than other handcrafted, machine learning and pre trained Models. This proposed system has three steps such as analyzing possible enhancements to features, loading photographs and their predictions, and face verification of real or spoofs in an image. We have proposed the model using publicly available challenging CASIA dataset. Wrap photo, cut photo, and electronic screen are three numerous varieties of images that capture real people’s faces. The input video split into picture frames in this step. Experimental results demonstrated that proposed approached outperforms similar approaches by showed a 99.12 percentage of real detection accuracy and a 98.20 percentage of spoof detection accuracy. The results of the experiments demonstrate that our proposed detection system indicates a higher results of detection rate rather than earlier used techniques.
{"title":"Design Face Spoof Detection using Deep Learning","authors":"Pranavi Thiruchelvam, Sayanthan Sathiyarasah, Thushaliny Paranthaman, Rajeetha Thaneeshan","doi":"10.1109/ICEPECC57281.2023.10209524","DOIUrl":"https://doi.org/10.1109/ICEPECC57281.2023.10209524","url":null,"abstract":"The recognition of facial patterns has grown in popularity among the various biometric systems in recent years. As a result, there has been a significant advancement in this field. The security of such systems, however, may be of paramount concern given that numerous studies have shown that face recognition systems are susceptible to a number of threats, including spoofing attacks. When a biometric system is used to identify unauthorized users, spoofing refers to the capacity to trick the system into thinking the unauthorized user is the real deal by using a variety of methods to show a fake version of the original biometric attribute to sensing objects. A number of anti-spoofing techniques that do exist protects face spoofing. This study presents a simple and efficient Resnet18 Convolutional Neural Network (CNN) model architecture, which is more beneficial and produces greater accuracy than other handcrafted, machine learning and pre trained Models. This proposed system has three steps such as analyzing possible enhancements to features, loading photographs and their predictions, and face verification of real or spoofs in an image. We have proposed the model using publicly available challenging CASIA dataset. Wrap photo, cut photo, and electronic screen are three numerous varieties of images that capture real people’s faces. The input video split into picture frames in this step. Experimental results demonstrated that proposed approached outperforms similar approaches by showed a 99.12 percentage of real detection accuracy and a 98.20 percentage of spoof detection accuracy. The results of the experiments demonstrate that our proposed detection system indicates a higher results of detection rate rather than earlier used techniques.","PeriodicalId":102289,"journal":{"name":"2023 International Conference on Energy, Power, Environment, Control, and Computing (ICEPECC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121464913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}