Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981695
Syed Rizwan, M. Zubair
With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.
{"title":"Basic Security Challenges in Cloud Computing","authors":"Syed Rizwan, M. Zubair","doi":"10.1109/ICEEST48626.2019.8981695","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981695","url":null,"abstract":"With the advancement in information technology, everyone moves towards pleasure, ease, and luxury. From which the most advanced and usable field is Cloud Computing which uses the internet and gives access to storing the data to the user. It has many characteristics like elasticity, extensibility, smartness and lower cost, which causes companies to address the clients’ requirements. In spite of this, associations are delayed in accommodating it because of security issues and difficulties related with it. The development of cloud is affected by the security. This paper gives ongoing advances in cloud computing and highlights on some challenges, security issues, and solutions. It also incorporates the basics of cloud computing to make itself contained so that pursuers can have a reasonable comprehension of the subject and cloud computing security.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133834757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981675
Taimur Bakhshi
The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.
{"title":"Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things","authors":"Taimur Bakhshi","doi":"10.1109/ICEEST48626.2019.8981675","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981675","url":null,"abstract":"The emerging paradigm of Internet of Things (IoT) promises automation, real-time monitoring and management of critical infrastructure(s) allowing optimized productivity in consumer and commercial concerns. Diversity in IoT devices, communication protocols, and the extensive data generated by IoT-ware requires robust incident response primitives to counter IoT related cyber-attacks and deter cybercrimes. Although substantial work is underway in improving IoT security, there is a fundamental requirement to address the forensic requisites that may aid forensic investigators and law enforcement agencies (LEAs) in prosecuting IoT related cybercrimes. IoT presents substantial forensic challenges in terms of evidence source identification, artefact acquisition, insufficiency of IoT-specific forensic tools and techniques, and issues in multijurisdictional litigation. To this effect, the present papers comprehensively reviews the applicability of traditional, cloud and network forensics in the IoT domain. State-of-the-art IoT forensic models are critically discussed to highlight their practical applicability. Furthermore, employment of recent enabling technologies including software defined networking and blockchaining is examined in a forensic of things context. The study also discusses and makes recommendations towards the multi-faceted challenges faced by IoT forensic investigators due to non-validated methodologies, leading to deficiencies in operational readiness.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131962056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981706
Zia Uddin Siddiqui, I. Ali
This paper presents an integral comparison related to epidemiological data for the most commonly occurring disease among women, the breast cancer. It compares different techniques of linear Classification by using the collected dataset and give the finding regarding the efficiency of one technique over the other. It will help the doctors and experts to take accurate decisions and predict the right stage of the disease. The examination made in the proposal between various procedures to discover which methods will perform all the more precisely then the other to distinguish and give more data with respect to the malignant growth. It can also help to find about the reoccurrence of breast cancer and what treatment must be suggested to the potential patient.
{"title":"Comparative Study Of Classification Techniques On Occurrence Of Breast Cancer Disease","authors":"Zia Uddin Siddiqui, I. Ali","doi":"10.1109/ICEEST48626.2019.8981706","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981706","url":null,"abstract":"This paper presents an integral comparison related to epidemiological data for the most commonly occurring disease among women, the breast cancer. It compares different techniques of linear Classification by using the collected dataset and give the finding regarding the efficiency of one technique over the other. It will help the doctors and experts to take accurate decisions and predict the right stage of the disease. The examination made in the proposal between various procedures to discover which methods will perform all the more precisely then the other to distinguish and give more data with respect to the malignant growth. It can also help to find about the reoccurrence of breast cancer and what treatment must be suggested to the potential patient.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981705
B. Hasan, S. S. Mohani, Syed Saiq Hussain, Sajid Yasin, Waqar Ahmed Alvi, Osama Saeed
This paper outlines the design and implementation of SCADA based digital mixer using the Siemens PLC S7-1200 CPU 1214C DC/DC/RLY as the system controller with provision of the algorithm and the equipment needed. This work will give wireless controlling and monitoring [1] of volume, flow rate of liquid tanks and mixer impeller’s frequency in real time. The volume of input liquid given by the user is in litres and the system ensures the flow of same volume as per process requirement. For this purpose a plant is designed consists of a mixing tank and two supply tanks along with flow sensors. The process is controlled by ladder logic diagram and a wireless node i.e. SCADA PC designed on TIA Portal.
本文概述了采用西门子PLC S7-1200 CPU 1214C DC/DC/RLY作为系统控制器的基于SCADA的数字混频器的设计与实现,并给出了算法和所需设备。本工作将实现对液槽容积、流量和混合器叶轮频率的实时无线控制和监测[1]。用户提供的输入液体的体积以升为单位,系统确保按工艺要求的相同体积的流量。为此目的,设计了一个装置,由一个混合罐和两个供应罐以及流量传感器组成。该过程由梯形逻辑图控制,并在TIA Portal上设计了无线节点SCADA PC。
{"title":"Implementation of Supervisory Control and Data Acquisition - SCADA on a PLC and VFD Controlled Digital Mixing Plant Using TIA Portal","authors":"B. Hasan, S. S. Mohani, Syed Saiq Hussain, Sajid Yasin, Waqar Ahmed Alvi, Osama Saeed","doi":"10.1109/ICEEST48626.2019.8981705","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981705","url":null,"abstract":"This paper outlines the design and implementation of SCADA based digital mixer using the Siemens PLC S7-1200 CPU 1214C DC/DC/RLY as the system controller with provision of the algorithm and the equipment needed. This work will give wireless controlling and monitoring [1] of volume, flow rate of liquid tanks and mixer impeller’s frequency in real time. The volume of input liquid given by the user is in litres and the system ensures the flow of same volume as per process requirement. For this purpose a plant is designed consists of a mixing tank and two supply tanks along with flow sensors. The process is controlled by ladder logic diagram and a wireless node i.e. SCADA PC designed on TIA Portal.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981707
Iftikhar ul Samee, Muhammad Taha Jilani, Husna Gul A. Wahab
Exhale and breathe with polluted air causes serious health implications. The effect of air pollution can be minimized by continuous monitoring and track a record of it. Also, timely prediction of pollutants level can help government agencies to take proactive measures to protect the environment. In this paper we have proposed the application of Internet of Things and Machine learning so that air pollution can be monitored within future smart cities. A high correlation between pollutants and weather parameters is determined by using Pearson correlation. In contrary to traditional sensor network, this work utilizes cloud-centric IoT middleware architecture that not only receives data from air pollution sensors but also from existing weather sensors. Thus provides two-fold reliability and reduce the cost substantially. The Artificial Neural Network has been used to predict the level of Sulfur Dioxide (SO2) and Particular Matter (PM2.5). Promising results suggest that ANN is a reliable candidate that can be used in air pollution monitoring and prediction system. Our models have achieved Root Mean Squared Error of 0.0128 and 0.0001 for SO2 and PM2.5, respectively.
{"title":"An Application of IoT and Machine Learning to Air Pollution Monitoring in Smart Cities","authors":"Iftikhar ul Samee, Muhammad Taha Jilani, Husna Gul A. Wahab","doi":"10.1109/ICEEST48626.2019.8981707","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981707","url":null,"abstract":"Exhale and breathe with polluted air causes serious health implications. The effect of air pollution can be minimized by continuous monitoring and track a record of it. Also, timely prediction of pollutants level can help government agencies to take proactive measures to protect the environment. In this paper we have proposed the application of Internet of Things and Machine learning so that air pollution can be monitored within future smart cities. A high correlation between pollutants and weather parameters is determined by using Pearson correlation. In contrary to traditional sensor network, this work utilizes cloud-centric IoT middleware architecture that not only receives data from air pollution sensors but also from existing weather sensors. Thus provides two-fold reliability and reduce the cost substantially. The Artificial Neural Network has been used to predict the level of Sulfur Dioxide (SO2) and Particular Matter (PM2.5). Promising results suggest that ANN is a reliable candidate that can be used in air pollution monitoring and prediction system. Our models have achieved Root Mean Squared Error of 0.0128 and 0.0001 for SO2 and PM2.5, respectively.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125240349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981709
E. Ahmed, Huma Ali Ahmed
Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.
{"title":"A Proposed Model for Controlling Distributed Denial of Service Attack on Cloud Computing","authors":"E. Ahmed, Huma Ali Ahmed","doi":"10.1109/ICEEST48626.2019.8981709","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981709","url":null,"abstract":"Cloud computing is another innovation among many other latest technologies that enables the customers to get access to the services as per their demand. Cloud computing is getting success due to its self service nature and on demand services. It provides great flexibility to its customers as they have to pay only for those services which they are in need to use without getting worried to pay the cost of hardware and software maintenance. This characteristic of cloud computing makes it affordable for those organizations that are not ready to spend heavy amounts to get the licensed software and also on the deployment of hardware in their premises. Instead of many advantages of using cloud computing, security is still a major concern which creates an obstruction in the rapid development of cloud computing. Most of the users share their data by using cloud services so the major concern in cloud computing is the availability of data but it is observed that due to certain attacks data is not readily available when it is needed by the users. We are basically focusing on denial of service (DOS) in this research paper which is one of the popular attacks. It is a major reason of the inaccessibility of services and resources to the users by flooding the network and generating a lot of requests with invalid return addresses. We are going to propose a model to control DOS attack so the users will get an environment where their data is available over the cloud.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981673
M. Afzaal, Aniqa Rehman, Saba Latif, N. Zafar
Blockchain technology is being implemented in security systems because of its decentralization and security assurances attributes. In this work, blockchain based smart parking system is presented to overcome the data security and vehicle safety issues. We integrate blockchain technology with Internet of Things (IoT) to make the system reliable. The blockchain-based smart parking system behavior is described using Unified Modeling Language (UML). We automate our system using Non-Deterministic Finite Automata (NFA) to show the system working in the form of states and transactions. The NFA is used in this paper because of its abstract power of modelling using the systems. Formal method-based technique, i.e., Vienna Development Method-Specification Language (VDM-SL) is used to formally verify the system. The system correctness is verified using VDM-SL toolbox through its various available facilities.
{"title":"Blockchain based Automated Formal Model for Safety and Security in Smart Parking System","authors":"M. Afzaal, Aniqa Rehman, Saba Latif, N. Zafar","doi":"10.1109/ICEEST48626.2019.8981673","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981673","url":null,"abstract":"Blockchain technology is being implemented in security systems because of its decentralization and security assurances attributes. In this work, blockchain based smart parking system is presented to overcome the data security and vehicle safety issues. We integrate blockchain technology with Internet of Things (IoT) to make the system reliable. The blockchain-based smart parking system behavior is described using Unified Modeling Language (UML). We automate our system using Non-Deterministic Finite Automata (NFA) to show the system working in the form of states and transactions. The NFA is used in this paper because of its abstract power of modelling using the systems. Formal method-based technique, i.e., Vienna Development Method-Specification Language (VDM-SL) is used to formally verify the system. The system correctness is verified using VDM-SL toolbox through its various available facilities.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123565652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981698
M. Faheem, Shun'an Zhong, Xinghua Wang, Sadique Ahmad, Muhammad Basit Azeem, Ilyas Younus Essani
RF transceiver has been achieved notable technological advancement since the last couple of decades. However, it’s not accurate in terms of size, energy, and time consumption. The number of designs has been proposed to make it energy-efficient and time-efficient, but still, an error-free and 5G application compatible RF transceiver module are required. In which we have the accurate conversion form analog-to-digital and digital-to-analog. To this end, we are proposing an improved time-efficient RF transceiver module which includes the 11-bit SAR ADC, DAC, and RF transceiver. The operating voltage of RF transceiver and SAR-ADC is 1.2V. Where the operating frequency is 5.8GHz. 90nm CMOS technology used for the implementation of the proposed solution. The Error Vector Magnitude (EVM) of transmitting and receiving mode is around 3.31% and 2.8%, respectively.
{"title":"Ultra-low power small size RF Transceiver module for 5G/LTE applications","authors":"M. Faheem, Shun'an Zhong, Xinghua Wang, Sadique Ahmad, Muhammad Basit Azeem, Ilyas Younus Essani","doi":"10.1109/ICEEST48626.2019.8981698","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981698","url":null,"abstract":"RF transceiver has been achieved notable technological advancement since the last couple of decades. However, it’s not accurate in terms of size, energy, and time consumption. The number of designs has been proposed to make it energy-efficient and time-efficient, but still, an error-free and 5G application compatible RF transceiver module are required. In which we have the accurate conversion form analog-to-digital and digital-to-analog. To this end, we are proposing an improved time-efficient RF transceiver module which includes the 11-bit SAR ADC, DAC, and RF transceiver. The operating voltage of RF transceiver and SAR-ADC is 1.2V. Where the operating frequency is 5.8GHz. 90nm CMOS technology used for the implementation of the proposed solution. The Error Vector Magnitude (EVM) of transmitting and receiving mode is around 3.31% and 2.8%, respectively.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122234061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981686
Syed Saiq Hussain, Muhammad Kashif Majeedy, M. A. Abbasi, M. H. S. Siddiqui, Zaheer Abbas Baloch, Muhammad Ahmed Khan
An improved normalized fractional least mean square (iNFLMS) has been proposed in this study. Least mean square (LMS) and fractional LMS (FLMS) are both prone to the problem of sensitivity to the input. In the proposed algorithm, the sensitivity of the FLMS to the input is reduced by normalization. The summation of the fractional and conventional gradients is made convex to obtain better convergence rate and keeping minimum error in steady state. To make the algorithm less computationally expensive, the gamma function is now absorbed into the fractional learning rate. Through the experiment it is quite clear that the efficacy of the proposed method is promising considering the parameters of steady-state error and convergence rate when compared to that of LMS, FLMS, MFLMS and NFLMS algorithm.
{"title":"Improved Varient for FOC-based Adaptive Filter for Chaotic Time Series Prediction","authors":"Syed Saiq Hussain, Muhammad Kashif Majeedy, M. A. Abbasi, M. H. S. Siddiqui, Zaheer Abbas Baloch, Muhammad Ahmed Khan","doi":"10.1109/ICEEST48626.2019.8981686","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981686","url":null,"abstract":"An improved normalized fractional least mean square (iNFLMS) has been proposed in this study. Least mean square (LMS) and fractional LMS (FLMS) are both prone to the problem of sensitivity to the input. In the proposed algorithm, the sensitivity of the FLMS to the input is reduced by normalization. The summation of the fractional and conventional gradients is made convex to obtain better convergence rate and keeping minimum error in steady state. To make the algorithm less computationally expensive, the gamma function is now absorbed into the fractional learning rate. Through the experiment it is quite clear that the efficacy of the proposed method is promising considering the parameters of steady-state error and convergence rate when compared to that of LMS, FLMS, MFLMS and NFLMS algorithm.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-01DOI: 10.1109/ICEEST48626.2019.8981691
U. Zia, M. Zulfiqar, Usama Azram, M. Haris, Mudassar Khan, M. Zahoor
Energy assessment and scenario based modeling needs a large quantitative information for providing an accurate analysis. This requires a need of computer model to analyze them. These models (financial, economic, or etc.) often employ scenario analysis to investigate different assumptions about the technical and economical conditions at play. Hence, a large number of software tools, techniques and modeling approaches are used, some better than the other. A wide range of techniques are employed, ranging from broadly economic to broadly engineering. Mathematical optimization is often used to determine the least-cost in some sense. Models can be international, regional, national, municipal, or stand-alone in scope. However, the choice of a suitable model is highly complex since a wrong choice will cost industry a significant amount of time and money only to end up with some inaccurate or wrong results. The initial part of this study analyze different approaches for energy modeling and which software tool will be most feasible to use under those conditions. The outputs from these models may include the system feasibility, greenhouse gas emissions, cumulative financial costs, natural resource use, and energy efficiency of the system under investigation. Hence, even after careful selection of a modeling tool, the interpretation of output data is still a complex task since it requires handling a large amount of data. Thus, the second part of this study deals with business intelligence tools that can be used to handle and properly interpret that data. Especially in the context of scenario based modeling, these tools can provide graphical representation of different dynamics just by using simple clicks once the model is ready. This analysis will help industries and R&D departments through performing better assessments and ease of data handling.
{"title":"Use of Macro/Micro Models and Business Intelligence tools for Energy Assessment and Scenario based Modeling","authors":"U. Zia, M. Zulfiqar, Usama Azram, M. Haris, Mudassar Khan, M. Zahoor","doi":"10.1109/ICEEST48626.2019.8981691","DOIUrl":"https://doi.org/10.1109/ICEEST48626.2019.8981691","url":null,"abstract":"Energy assessment and scenario based modeling needs a large quantitative information for providing an accurate analysis. This requires a need of computer model to analyze them. These models (financial, economic, or etc.) often employ scenario analysis to investigate different assumptions about the technical and economical conditions at play. Hence, a large number of software tools, techniques and modeling approaches are used, some better than the other. A wide range of techniques are employed, ranging from broadly economic to broadly engineering. Mathematical optimization is often used to determine the least-cost in some sense. Models can be international, regional, national, municipal, or stand-alone in scope. However, the choice of a suitable model is highly complex since a wrong choice will cost industry a significant amount of time and money only to end up with some inaccurate or wrong results. The initial part of this study analyze different approaches for energy modeling and which software tool will be most feasible to use under those conditions. The outputs from these models may include the system feasibility, greenhouse gas emissions, cumulative financial costs, natural resource use, and energy efficiency of the system under investigation. Hence, even after careful selection of a modeling tool, the interpretation of output data is still a complex task since it requires handling a large amount of data. Thus, the second part of this study deals with business intelligence tools that can be used to handle and properly interpret that data. Especially in the context of scenario based modeling, these tools can provide graphical representation of different dynamics just by using simple clicks once the model is ready. This analysis will help industries and R&D departments through performing better assessments and ease of data handling.","PeriodicalId":201513,"journal":{"name":"2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}