首页 > 最新文献

2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)最新文献

英文 中文
Digital Twin Enabled Industry 4.0 Predictive Maintenance Under Reliability-Centred Strategy 在以可靠性为中心的战略下,数字孪生实现工业4.0预测性维护
A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji
This paper introduces the idea of implementing digital twin for predictive maintenance under open system architecture. Predictive maintenance (PdM) is critical to machines operating under complex working conditions to prevent major and unexpected machine failures and production downtime. A cost and reliability optimized predictive maintenance framework for industry 4.0 machines key parts based on qualitative and quantitative analysis of monitoring data is proposed. Employing machine learning and advanced analytics for data fusion for PdM promises for accurate failure diagnostics and prognostics in addition to optimized maintenance decisions. Furthermore, a cost effective maintenance framework can be implemented under reliability centered maintenance strategy. The qualitative and quantitative analysis will help the decision-making process that leads to accurate predictive maintenance strategies. The proposed method is expected to provide cost-effective maintenance and improved intelligence of the predictive process and the accuracy of predictive results.
本文介绍了在开放系统架构下,实现数字孪生预测维护的思想。预测性维护(PdM)对于在复杂工作条件下运行的机器至关重要,可以防止重大和意外的机器故障和生产停机。提出了一种基于监测数据定性和定量分析的工业4.0机器关键部件成本和可靠性优化预测维护框架。采用机器学习和高级分析技术进行PdM数据融合,除了优化维护决策外,还有望实现准确的故障诊断和预测。此外,在以可靠性为中心的维护策略下,可以实现成本有效的维护框架。定性和定量分析将有助于制定准确的预测性维护策略。所提出的方法有望提供经济有效的维护,提高预测过程的智能化和预测结果的准确性。
{"title":"Digital Twin Enabled Industry 4.0 Predictive Maintenance Under Reliability-Centred Strategy","authors":"A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji","doi":"10.1109/ICEEICT53079.2022.9768590","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768590","url":null,"abstract":"This paper introduces the idea of implementing digital twin for predictive maintenance under open system architecture. Predictive maintenance (PdM) is critical to machines operating under complex working conditions to prevent major and unexpected machine failures and production downtime. A cost and reliability optimized predictive maintenance framework for industry 4.0 machines key parts based on qualitative and quantitative analysis of monitoring data is proposed. Employing machine learning and advanced analytics for data fusion for PdM promises for accurate failure diagnostics and prognostics in addition to optimized maintenance decisions. Furthermore, a cost effective maintenance framework can be implemented under reliability centered maintenance strategy. The qualitative and quantitative analysis will help the decision-making process that leads to accurate predictive maintenance strategies. The proposed method is expected to provide cost-effective maintenance and improved intelligence of the predictive process and the accuracy of predictive results.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proposed iPrivacy based Image Encryption in Mobile cloud 提出一种基于iPrivacy的移动云图像加密方法
M. Sankari, L. Sathyapriya, B. Barathi
Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.
基本上,人们可以捕捉图像并将其外包给移动云。图像隐私是当今面临的主要挑战。加密是最好的安全解决方案之一。在将图像数据外包给云计算的同时,云服务提供商(CSP)可能会将图像共享给未经授权的用户以获取利润。而以往的AES、DES、RSA等加密技术对图像的加密比对文本的加密效果差。由于缺乏CSP和以往的加密技术,我们提出了基于iPrivacy-Pseudo Random Permutation (PRP)的加密技术,并将其应用于图像以确保安全/隐私。所提出的方案(iPrivacy-SDS)通过拆分、分发和Scramble三个简单的步骤来处理,以实现安全快速的执行。建议的工作可能会阻止用户访问私人图像。实验结果表明,与AES和JPEG、BMP、GIFF、PNG等多种图像格式相比,该算法的时间消耗降低了50%左右。
{"title":"Proposed iPrivacy based Image Encryption in Mobile cloud","authors":"M. Sankari, L. Sathyapriya, B. Barathi","doi":"10.1109/ICEEICT53079.2022.9768562","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768562","url":null,"abstract":"Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Zero and Low Speed Startup of Synchronous Reluctance Motor Based on High Frequency Injection Method 基于高频注入法的同步磁阻电机零、低速启动研究
Dengke Li
For synchronous reluctance motors, there are more and more researches on position sensorless vector control. However, when starting at zero speed or low speed, some problems are often encountered. These problems often affect the overall control effect of the synchronous reluctance motor. To improve the control effect, this paper studies the starting effect of the synchronous reluctance motors. Using the salient pole characteristics of the synchronous reluctance motors, the method used in this article is the rotation high-frequency voltage signal injection method. The high-frequency sine (cosine) signal is injected into two-phase stationary coordinate system of the motor at the same time. The actual rotor position angle will be obtained from the response current. Simulation uses this method and the simulation results respectively show the zero-speed and low-speed startup effects. This method can accurately estimate the rotor angle and realize zero-speed and low-speed starting. These results verify the correctness of the method.
对于同步磁阻电机,无位置传感器矢量控制的研究越来越多。但在零速或低速起动时,往往会遇到一些问题。这些问题往往会影响同步磁阻电动机的整体控制效果。为了提高同步磁阻电动机的控制效果,本文对同步磁阻电动机的起动效果进行了研究。利用同步磁阻电动机的凸极特性,本文采用的方法是旋转高频电压信号注入法。同时将高频正弦(余弦)信号注入电机的两相静止坐标系。实际转子位置角由响应电流得到。采用该方法进行了仿真,仿真结果分别显示了零速和低速启动效果。该方法可以准确估计转子角度,实现零速和低速起动。这些结果验证了该方法的正确性。
{"title":"Research on Zero and Low Speed Startup of Synchronous Reluctance Motor Based on High Frequency Injection Method","authors":"Dengke Li","doi":"10.1109/ICEEICT53079.2022.9768638","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768638","url":null,"abstract":"For synchronous reluctance motors, there are more and more researches on position sensorless vector control. However, when starting at zero speed or low speed, some problems are often encountered. These problems often affect the overall control effect of the synchronous reluctance motor. To improve the control effect, this paper studies the starting effect of the synchronous reluctance motors. Using the salient pole characteristics of the synchronous reluctance motors, the method used in this article is the rotation high-frequency voltage signal injection method. The high-frequency sine (cosine) signal is injected into two-phase stationary coordinate system of the motor at the same time. The actual rotor position angle will be obtained from the response current. Simulation uses this method and the simulation results respectively show the zero-speed and low-speed startup effects. This method can accurately estimate the rotor angle and realize zero-speed and low-speed starting. These results verify the correctness of the method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Methodology to Ensure Data Integrity in Enterprise Information Systems Using Blockchain Technology 利用区块链技术确保企业信息系统数据完整性的新方法
Palanisamy A M, N. V
Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.
数据完整性是信息管理系统中最重要的问题之一。定期数据库审计是确保数据完整性的唯一方法。区块链是一种支持并采用多种加密模型的技术。最初,区块链技术是作为一种记录加密货币交易(比特币技术)的方法而开发的。此外,区块链有可能以分散的方式改变当前的数据审计实践。本文试图回顾区块链在企业信息管理系统中的应用,并深入探讨如何将区块链技术融入到综合信息管理系统CampusStack中,对数据库进行审计,保证数据的完整性。
{"title":"A Novel Methodology to Ensure Data Integrity in Enterprise Information Systems Using Blockchain Technology","authors":"Palanisamy A M, N. V","doi":"10.1109/ICEEICT53079.2022.9768655","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768655","url":null,"abstract":"Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electrochemical based Gas Sensing for Ambient Air Quality Monitoring in Opencast Coal Mines 基于电化学气体传感的露天矿环境空气质量监测
Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad
Air quality monitoring is mandatory in many industries like mining, refining and semiconductor industries owing to detrimental impact of air pollutants on the health of human beings, animals and the environment. There is a growing concern regarding the health impact of air pollutants on personal working in coal mines, both opencast and underground. Toxic gases in the ambient air can rapidly become a danger if not kept within safe permissible limits. The first step in maintaining air quality in coal mining areas is continuous monitoring of the atmospheric air. Toxic gases like carbon monoxide, nitric oxide, nitrogen dioxide and sulphur dioxide produced by various mining activities contribute to polluting the air. Several techniques are being used worldwide to sense the presence of various pollutant gases. This paper explores the various techniques for sensing of toxic gases in ambient air and sheds light into their pros and cons. It showcases a simple and cost-effective way of sensing toxic gases in areas near opencast mines by using electrochemical gas sensors. The paper also sheds light on the design of an ambient air quality monitoring instrument which uses electrochemical gas sensors for sensing the concertation of SO2, NO2, NO and CO at areas near opencast coal mines
由于空气污染物对人类、动物和环境的健康产生有害影响,采矿、炼油和半导体等许多行业都必须进行空气质量监测。人们越来越关注空气污染物对露天和地下煤矿工作人员健康的影响。周围空气中的有毒气体如果不控制在安全的允许范围内,就会迅速成为危险。维持矿区空气质量的第一步是持续监测大气空气。各种采矿活动产生的一氧化碳、一氧化氮、二氧化氮和二氧化硫等有毒气体污染了空气。世界各地正在使用几种技术来探测各种污染气体的存在。本文探讨了环境空气中有毒气体的各种传感技术,并阐述了它们的优缺点,展示了一种简单而经济的方法,即利用电化学气体传感器来传感露天矿区附近的有毒气体。本文还设计了一种利用电化学气体传感器监测露天煤矿附近SO2、NO2、NO和CO浓度的环境空气质量监测仪
{"title":"Electrochemical based Gas Sensing for Ambient Air Quality Monitoring in Opencast Coal Mines","authors":"Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad","doi":"10.1109/ICEEICT53079.2022.9768541","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768541","url":null,"abstract":"Air quality monitoring is mandatory in many industries like mining, refining and semiconductor industries owing to detrimental impact of air pollutants on the health of human beings, animals and the environment. There is a growing concern regarding the health impact of air pollutants on personal working in coal mines, both opencast and underground. Toxic gases in the ambient air can rapidly become a danger if not kept within safe permissible limits. The first step in maintaining air quality in coal mining areas is continuous monitoring of the atmospheric air. Toxic gases like carbon monoxide, nitric oxide, nitrogen dioxide and sulphur dioxide produced by various mining activities contribute to polluting the air. Several techniques are being used worldwide to sense the presence of various pollutant gases. This paper explores the various techniques for sensing of toxic gases in ambient air and sheds light into their pros and cons. It showcases a simple and cost-effective way of sensing toxic gases in areas near opencast mines by using electrochemical gas sensors. The paper also sheds light on the design of an ambient air quality monitoring instrument which uses electrochemical gas sensors for sensing the concertation of SO2, NO2, NO and CO at areas near opencast coal mines","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Time-Series Based Yield Forecasting Model Using Stacked Lstm To Predict The Yield Of Paddy In Cauvery Delta Zone In Tamilnadu 基于时间序列的层叠Lstm水稻产量预测模型在泰米尔纳德邦Cauvery三角洲地区的应用
M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya
Cauvery delta zone in Tamilnadu is called as “Nerkazhanchiyam” (the land of Paddy) of the state, as it has the potential to produce paddy in huge quantity that can be suffice the need of the state. This zone includes the districts such as Thanjavur, Tiruvarur, Nagapattinam, Trichy and Cuddalore. These districts account for about 53% of production of paddy in the state. Increasing the production of paddy in Cauvery Delta Zone would satisfy the requirement of rice in the state on the whole. This will also have a substantial influence on both the farmer's and the nation's economy. Forecasting the production of crops beforehand could assist the farmers in improving their productivity. This necessitates the design of a precise crop yield prediction model. Crop production in agriculture is primarily determined by a variety of factors that falls under three categories: technological (agricultural techniques, managerial decisions, etc.), biological (diseases, insects, pests, etc.), and environmental (climate change, etc.). Among these factors environmental factors pose a great challenge to the decision makers in developing a precise prediction model. Hence, it is proposed to develop a suitable yield prediction model to predict the yield of paddy in Cauvery delta region considering the environmental factors along with the supplied nutrients. The proposed prediction model makes use of Long Short Term Memory (LSTM) algorithm which is a popular deep learning algorithm, to forecast the yield of paddy. LSTM is well known for its better prediction using time series data. Performance of the proposed prediction model is measured using the training loss and validation loss.
泰米尔纳德邦的Cauvery三角洲地区被称为“Nerkazhanchiyam”(水稻之乡),因为它有潜力生产大量的水稻,可以满足该邦的需求。该地区包括Thanjavur、Tiruvarur、Nagapattinam、Trichy和Cuddalore等地区。这些地区的水稻产量约占该邦总产量的53%。在高韦里三角洲地区增加水稻产量,总体上可以满足国家对水稻的需求。这也将对农民和国家的经济产生重大影响。提前预测作物产量可以帮助农民提高生产力。这就需要设计一种精确的作物产量预测模型。农业作物生产主要由各种因素决定,这些因素可分为三类:技术(农业技术、管理决策等)、生物(疾病、昆虫、害虫等)和环境(气候变化等)。在这些因素中,环境因素对决策者如何建立精确的预测模型提出了很大的挑战。因此,建议建立一种适合高韦里三角洲地区的水稻产量预测模型,考虑环境因素和供给养分。该预测模型利用一种流行的深度学习算法——长短期记忆(LSTM)算法对水稻产量进行预测。LSTM以使用时间序列数据进行更好的预测而闻名。利用训练损失和验证损失来衡量所提出的预测模型的性能。
{"title":"A Time-Series Based Yield Forecasting Model Using Stacked Lstm To Predict The Yield Of Paddy In Cauvery Delta Zone In Tamilnadu","authors":"M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya","doi":"10.1109/ICEEICT53079.2022.9768441","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768441","url":null,"abstract":"Cauvery delta zone in Tamilnadu is called as “Nerkazhanchiyam” (the land of Paddy) of the state, as it has the potential to produce paddy in huge quantity that can be suffice the need of the state. This zone includes the districts such as Thanjavur, Tiruvarur, Nagapattinam, Trichy and Cuddalore. These districts account for about 53% of production of paddy in the state. Increasing the production of paddy in Cauvery Delta Zone would satisfy the requirement of rice in the state on the whole. This will also have a substantial influence on both the farmer's and the nation's economy. Forecasting the production of crops beforehand could assist the farmers in improving their productivity. This necessitates the design of a precise crop yield prediction model. Crop production in agriculture is primarily determined by a variety of factors that falls under three categories: technological (agricultural techniques, managerial decisions, etc.), biological (diseases, insects, pests, etc.), and environmental (climate change, etc.). Among these factors environmental factors pose a great challenge to the decision makers in developing a precise prediction model. Hence, it is proposed to develop a suitable yield prediction model to predict the yield of paddy in Cauvery delta region considering the environmental factors along with the supplied nutrients. The proposed prediction model makes use of Long Short Term Memory (LSTM) algorithm which is a popular deep learning algorithm, to forecast the yield of paddy. LSTM is well known for its better prediction using time series data. Performance of the proposed prediction model is measured using the training loss and validation loss.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of Facial Expression for Emotion Recognition using Convolutional Neural Network 基于卷积神经网络的面部表情分类及其情感识别
Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel
Automatic facial expression classification is very demanding research field because of its application in the field of health, safety and human machine interfaces. Many attempts by the researchers have been made in developing methodologies which can interpret, decode facial expression and obtain important features from the facial images to achieve better classification result. With the advancement in the data capturing techniques and various deep learning architectures it is possible to achieve higher accuracy in the computer vision task like facial expression classification. The aim of this research paper is to propose Custom-CNN architecture for the facial expression classification and performance of the model is compared with other standard pre-trained deep convolutional neural networks. Kaggle dataset comprises 35,900 is utilized to train, validate and test CNN models.
面部表情自动分类在健康、安全、人机界面等领域有着广泛的应用,是一个要求很高的研究领域。为了获得更好的分类效果,研究者们已经尝试了很多方法来解释和解码面部表情,并从面部图像中获取重要的特征。随着数据捕获技术和各种深度学习架构的进步,可以在面部表情分类等计算机视觉任务中实现更高的精度。本研究的目的是提出自定义cnn的面部表情分类架构,并将该模型的性能与其他标准的预训练深度卷积神经网络进行比较。Kaggle数据集包含35900个数据集,用于训练、验证和测试CNN模型。
{"title":"Classification of Facial Expression for Emotion Recognition using Convolutional Neural Network","authors":"Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel","doi":"10.1109/ICEEICT53079.2022.9768508","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768508","url":null,"abstract":"Automatic facial expression classification is very demanding research field because of its application in the field of health, safety and human machine interfaces. Many attempts by the researchers have been made in developing methodologies which can interpret, decode facial expression and obtain important features from the facial images to achieve better classification result. With the advancement in the data capturing techniques and various deep learning architectures it is possible to achieve higher accuracy in the computer vision task like facial expression classification. The aim of this research paper is to propose Custom-CNN architecture for the facial expression classification and performance of the model is compared with other standard pre-trained deep convolutional neural networks. Kaggle dataset comprises 35,900 is utilized to train, validate and test CNN models.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Conserve Inventory from One Outturn Gizmos to Two Intake Gizmos When Inter-Arrival Breakdown is a Random Variable 当到达间故障是一个随机变量时,从一个输出装置到两个输入装置的最优保存库存
M. Paul, S. Tamilselvan, T. Venkatesan
In inventory control theory the one of the important model is to estimate the conserve inventory when the stations are in series. In this model a system with two nodes are suggested. In the first phase it is assumed that there is only machine A1 and the second phase as two machines say $B_{2}^{1}$ and $B_{2}^{11}$. The machines in the second stage may have same or different process types. During the breakdown time of the machine in the first stage a reserve inventory is maintained to ensure uninterrupted production in the next stage. This conserve inventory is needed as otherwise; the machines in the second stage may become idle which will impact not only the profits but also bring loss due to non-functioning of machines. Mathematical models has been derived for obtaining conserve inventory by treating repair time and inter arrival time as random variables
在库存控制理论中,一个重要的模型是对库存的估计。在该模型中,提出了一个具有两个节点的系统。在第一阶段,假设只有机器A1,第二阶段有两台机器,分别是$B_{2}^{1}$和$B_{2}^{11}$。第二阶段的机器可能具有相同或不同的工艺类型。在第一阶段的机器故障期间,保持储备库存,以确保下一阶段的生产不间断。这样节约库存是必要的;第二阶段的机器可能会闲置,这不仅会影响利润,还会因为机器不能运行而带来损失。将维修时间和间隔到达时间作为随机变量,建立了库存守恒的数学模型
{"title":"Optimal Conserve Inventory from One Outturn Gizmos to Two Intake Gizmos When Inter-Arrival Breakdown is a Random Variable","authors":"M. Paul, S. Tamilselvan, T. Venkatesan","doi":"10.1109/ICEEICT53079.2022.9768409","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768409","url":null,"abstract":"In inventory control theory the one of the important model is to estimate the conserve inventory when the stations are in series. In this model a system with two nodes are suggested. In the first phase it is assumed that there is only machine A1 and the second phase as two machines say $B_{2}^{1}$ and $B_{2}^{11}$. The machines in the second stage may have same or different process types. During the breakdown time of the machine in the first stage a reserve inventory is maintained to ensure uninterrupted production in the next stage. This conserve inventory is needed as otherwise; the machines in the second stage may become idle which will impact not only the profits but also bring loss due to non-functioning of machines. Mathematical models has been derived for obtaining conserve inventory by treating repair time and inter arrival time as random variables","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis on the Development of Cloud Security using Privacy Attribute Data Sharing 基于隐私属性数据共享的云安全发展分析
R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad
The data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.
数据共享是CC提供的一种有益的经济援助,信息实质安全也由此产生,因为信息被转移到一些云工作者手中。确保敏感和重要的数据;使用不同的程序来改进对集体信息的访问管理。在这里,基于密码文本-策略属性的加密(CP-ABE)可能会使它非常有用和安全。传统的cp - abe只关注信息隐私;鉴于客户的人身安全保护目前是一个重大问题。CP-ABE通过隐藏访问(HA)策略确保了信息的隐私性,也确保了客户端的保护不被暴露。然而,由于通信开销和计算成本的原因,目前绝大多数的方案都是无效的。此外,该机制的绝大部分都没有考虑能力验证或能力验证阶段的安全溢出问题。为了解决上述问题,本文提出了一种安全保护scp - abe的方法,该方法采用熟练影响认证。此外,它的私钥实现了一致的大小。同时,建议方案完成了具体的安全决策中的n-BDHE问题和决策直接推定。计算结果证实了所引入方法的有效性。
{"title":"Analysis on the Development of Cloud Security using Privacy Attribute Data Sharing","authors":"R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad","doi":"10.1109/ICEEICT53079.2022.9768608","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768608","url":null,"abstract":"The data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Capacity and Outage Probability for NOMA based Cellular Communication over Rician Fading Channel 基于NOMA的蜂窝式衰落信道通信容量和中断概率分析
Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai
Non-Orthogonal multiple access (NOMA) scheme serves as a favorable technology for 5G and beyond cellular networks as compared to orthogonal multiple access (OMA) scheme. Multipath fading also affects the performance of wireless communication system. So as to exploit the features of NOMA technique, it is vital to identify and analyze its performance over various fading channels. This paper provides the performance analysis of NOMA based cellular system over two key parameters named as channel capacity and outage probability. Rician fading distribution has been considered for multipath fading. Rician fading channel is much suitable when at least one communication link fallow a line-of-sight (LoS) path and the signal strength is much stronger than other paths. An analytical expression for channel capacity and outage probability has been derived for considered system model. Mante Carlo simulation has been performed to obtain the simulation results for channel capacity and outage probability using the Rician fading channel. Comparison of simulation results for near and far users have been provided for channel capacity and outage probability.
与正交多址(OMA)方案相比,非正交多址(NOMA)方案是5G及以上蜂窝网络的有利技术。多径衰落也影响着无线通信系统的性能。为了充分利用NOMA技术的特点,对其在各种衰落信道下的性能进行识别和分析至关重要。本文通过信道容量和中断概率两个关键参数对基于NOMA的蜂窝系统进行了性能分析。在多径衰落中考虑了梯度衰落分布。当至少有一条通信链路处于视距路径下,且信号强度比其他路径强得多时,采用线性衰落信道是非常合适的。针对所考虑的系统模型,导出了信道容量和中断概率的解析表达式。通过曼特卡罗仿真,得到了使用该衰落信道的信道容量和中断概率的仿真结果。给出了近端和远端用户信道容量和中断概率的仿真结果比较。
{"title":"Analysis of Capacity and Outage Probability for NOMA based Cellular Communication over Rician Fading Channel","authors":"Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai","doi":"10.1109/ICEEICT53079.2022.9768575","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768575","url":null,"abstract":"Non-Orthogonal multiple access (NOMA) scheme serves as a favorable technology for 5G and beyond cellular networks as compared to orthogonal multiple access (OMA) scheme. Multipath fading also affects the performance of wireless communication system. So as to exploit the features of NOMA technique, it is vital to identify and analyze its performance over various fading channels. This paper provides the performance analysis of NOMA based cellular system over two key parameters named as channel capacity and outage probability. Rician fading distribution has been considered for multipath fading. Rician fading channel is much suitable when at least one communication link fallow a line-of-sight (LoS) path and the signal strength is much stronger than other paths. An analytical expression for channel capacity and outage probability has been derived for considered system model. Mante Carlo simulation has been performed to obtain the simulation results for channel capacity and outage probability using the Rician fading channel. Comparison of simulation results for near and far users have been provided for channel capacity and outage probability.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1