Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768590
A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji
This paper introduces the idea of implementing digital twin for predictive maintenance under open system architecture. Predictive maintenance (PdM) is critical to machines operating under complex working conditions to prevent major and unexpected machine failures and production downtime. A cost and reliability optimized predictive maintenance framework for industry 4.0 machines key parts based on qualitative and quantitative analysis of monitoring data is proposed. Employing machine learning and advanced analytics for data fusion for PdM promises for accurate failure diagnostics and prognostics in addition to optimized maintenance decisions. Furthermore, a cost effective maintenance framework can be implemented under reliability centered maintenance strategy. The qualitative and quantitative analysis will help the decision-making process that leads to accurate predictive maintenance strategies. The proposed method is expected to provide cost-effective maintenance and improved intelligence of the predictive process and the accuracy of predictive results.
{"title":"Digital Twin Enabled Industry 4.0 Predictive Maintenance Under Reliability-Centred Strategy","authors":"A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji","doi":"10.1109/ICEEICT53079.2022.9768590","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768590","url":null,"abstract":"This paper introduces the idea of implementing digital twin for predictive maintenance under open system architecture. Predictive maintenance (PdM) is critical to machines operating under complex working conditions to prevent major and unexpected machine failures and production downtime. A cost and reliability optimized predictive maintenance framework for industry 4.0 machines key parts based on qualitative and quantitative analysis of monitoring data is proposed. Employing machine learning and advanced analytics for data fusion for PdM promises for accurate failure diagnostics and prognostics in addition to optimized maintenance decisions. Furthermore, a cost effective maintenance framework can be implemented under reliability centered maintenance strategy. The qualitative and quantitative analysis will help the decision-making process that leads to accurate predictive maintenance strategies. The proposed method is expected to provide cost-effective maintenance and improved intelligence of the predictive process and the accuracy of predictive results.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768562
M. Sankari, L. Sathyapriya, B. Barathi
Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.
基本上,人们可以捕捉图像并将其外包给移动云。图像隐私是当今面临的主要挑战。加密是最好的安全解决方案之一。在将图像数据外包给云计算的同时,云服务提供商(CSP)可能会将图像共享给未经授权的用户以获取利润。而以往的AES、DES、RSA等加密技术对图像的加密比对文本的加密效果差。由于缺乏CSP和以往的加密技术,我们提出了基于iPrivacy-Pseudo Random Permutation (PRP)的加密技术,并将其应用于图像以确保安全/隐私。所提出的方案(iPrivacy-SDS)通过拆分、分发和Scramble三个简单的步骤来处理,以实现安全快速的执行。建议的工作可能会阻止用户访问私人图像。实验结果表明,与AES和JPEG、BMP、GIFF、PNG等多种图像格式相比,该算法的时间消耗降低了50%左右。
{"title":"Proposed iPrivacy based Image Encryption in Mobile cloud","authors":"M. Sankari, L. Sathyapriya, B. Barathi","doi":"10.1109/ICEEICT53079.2022.9768562","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768562","url":null,"abstract":"Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768638
Dengke Li
For synchronous reluctance motors, there are more and more researches on position sensorless vector control. However, when starting at zero speed or low speed, some problems are often encountered. These problems often affect the overall control effect of the synchronous reluctance motor. To improve the control effect, this paper studies the starting effect of the synchronous reluctance motors. Using the salient pole characteristics of the synchronous reluctance motors, the method used in this article is the rotation high-frequency voltage signal injection method. The high-frequency sine (cosine) signal is injected into two-phase stationary coordinate system of the motor at the same time. The actual rotor position angle will be obtained from the response current. Simulation uses this method and the simulation results respectively show the zero-speed and low-speed startup effects. This method can accurately estimate the rotor angle and realize zero-speed and low-speed starting. These results verify the correctness of the method.
{"title":"Research on Zero and Low Speed Startup of Synchronous Reluctance Motor Based on High Frequency Injection Method","authors":"Dengke Li","doi":"10.1109/ICEEICT53079.2022.9768638","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768638","url":null,"abstract":"For synchronous reluctance motors, there are more and more researches on position sensorless vector control. However, when starting at zero speed or low speed, some problems are often encountered. These problems often affect the overall control effect of the synchronous reluctance motor. To improve the control effect, this paper studies the starting effect of the synchronous reluctance motors. Using the salient pole characteristics of the synchronous reluctance motors, the method used in this article is the rotation high-frequency voltage signal injection method. The high-frequency sine (cosine) signal is injected into two-phase stationary coordinate system of the motor at the same time. The actual rotor position angle will be obtained from the response current. Simulation uses this method and the simulation results respectively show the zero-speed and low-speed startup effects. This method can accurately estimate the rotor angle and realize zero-speed and low-speed starting. These results verify the correctness of the method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768655
Palanisamy A M, N. V
Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.
{"title":"A Novel Methodology to Ensure Data Integrity in Enterprise Information Systems Using Blockchain Technology","authors":"Palanisamy A M, N. V","doi":"10.1109/ICEEICT53079.2022.9768655","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768655","url":null,"abstract":"Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768541
Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad
Air quality monitoring is mandatory in many industries like mining, refining and semiconductor industries owing to detrimental impact of air pollutants on the health of human beings, animals and the environment. There is a growing concern regarding the health impact of air pollutants on personal working in coal mines, both opencast and underground. Toxic gases in the ambient air can rapidly become a danger if not kept within safe permissible limits. The first step in maintaining air quality in coal mining areas is continuous monitoring of the atmospheric air. Toxic gases like carbon monoxide, nitric oxide, nitrogen dioxide and sulphur dioxide produced by various mining activities contribute to polluting the air. Several techniques are being used worldwide to sense the presence of various pollutant gases. This paper explores the various techniques for sensing of toxic gases in ambient air and sheds light into their pros and cons. It showcases a simple and cost-effective way of sensing toxic gases in areas near opencast mines by using electrochemical gas sensors. The paper also sheds light on the design of an ambient air quality monitoring instrument which uses electrochemical gas sensors for sensing the concertation of SO2, NO2, NO and CO at areas near opencast coal mines
{"title":"Electrochemical based Gas Sensing for Ambient Air Quality Monitoring in Opencast Coal Mines","authors":"Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad","doi":"10.1109/ICEEICT53079.2022.9768541","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768541","url":null,"abstract":"Air quality monitoring is mandatory in many industries like mining, refining and semiconductor industries owing to detrimental impact of air pollutants on the health of human beings, animals and the environment. There is a growing concern regarding the health impact of air pollutants on personal working in coal mines, both opencast and underground. Toxic gases in the ambient air can rapidly become a danger if not kept within safe permissible limits. The first step in maintaining air quality in coal mining areas is continuous monitoring of the atmospheric air. Toxic gases like carbon monoxide, nitric oxide, nitrogen dioxide and sulphur dioxide produced by various mining activities contribute to polluting the air. Several techniques are being used worldwide to sense the presence of various pollutant gases. This paper explores the various techniques for sensing of toxic gases in ambient air and sheds light into their pros and cons. It showcases a simple and cost-effective way of sensing toxic gases in areas near opencast mines by using electrochemical gas sensors. The paper also sheds light on the design of an ambient air quality monitoring instrument which uses electrochemical gas sensors for sensing the concertation of SO2, NO2, NO and CO at areas near opencast coal mines","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768441
M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya
Cauvery delta zone in Tamilnadu is called as “Nerkazhanchiyam” (the land of Paddy) of the state, as it has the potential to produce paddy in huge quantity that can be suffice the need of the state. This zone includes the districts such as Thanjavur, Tiruvarur, Nagapattinam, Trichy and Cuddalore. These districts account for about 53% of production of paddy in the state. Increasing the production of paddy in Cauvery Delta Zone would satisfy the requirement of rice in the state on the whole. This will also have a substantial influence on both the farmer's and the nation's economy. Forecasting the production of crops beforehand could assist the farmers in improving their productivity. This necessitates the design of a precise crop yield prediction model. Crop production in agriculture is primarily determined by a variety of factors that falls under three categories: technological (agricultural techniques, managerial decisions, etc.), biological (diseases, insects, pests, etc.), and environmental (climate change, etc.). Among these factors environmental factors pose a great challenge to the decision makers in developing a precise prediction model. Hence, it is proposed to develop a suitable yield prediction model to predict the yield of paddy in Cauvery delta region considering the environmental factors along with the supplied nutrients. The proposed prediction model makes use of Long Short Term Memory (LSTM) algorithm which is a popular deep learning algorithm, to forecast the yield of paddy. LSTM is well known for its better prediction using time series data. Performance of the proposed prediction model is measured using the training loss and validation loss.
{"title":"A Time-Series Based Yield Forecasting Model Using Stacked Lstm To Predict The Yield Of Paddy In Cauvery Delta Zone In Tamilnadu","authors":"M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya","doi":"10.1109/ICEEICT53079.2022.9768441","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768441","url":null,"abstract":"Cauvery delta zone in Tamilnadu is called as “Nerkazhanchiyam” (the land of Paddy) of the state, as it has the potential to produce paddy in huge quantity that can be suffice the need of the state. This zone includes the districts such as Thanjavur, Tiruvarur, Nagapattinam, Trichy and Cuddalore. These districts account for about 53% of production of paddy in the state. Increasing the production of paddy in Cauvery Delta Zone would satisfy the requirement of rice in the state on the whole. This will also have a substantial influence on both the farmer's and the nation's economy. Forecasting the production of crops beforehand could assist the farmers in improving their productivity. This necessitates the design of a precise crop yield prediction model. Crop production in agriculture is primarily determined by a variety of factors that falls under three categories: technological (agricultural techniques, managerial decisions, etc.), biological (diseases, insects, pests, etc.), and environmental (climate change, etc.). Among these factors environmental factors pose a great challenge to the decision makers in developing a precise prediction model. Hence, it is proposed to develop a suitable yield prediction model to predict the yield of paddy in Cauvery delta region considering the environmental factors along with the supplied nutrients. The proposed prediction model makes use of Long Short Term Memory (LSTM) algorithm which is a popular deep learning algorithm, to forecast the yield of paddy. LSTM is well known for its better prediction using time series data. Performance of the proposed prediction model is measured using the training loss and validation loss.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768508
Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel
Automatic facial expression classification is very demanding research field because of its application in the field of health, safety and human machine interfaces. Many attempts by the researchers have been made in developing methodologies which can interpret, decode facial expression and obtain important features from the facial images to achieve better classification result. With the advancement in the data capturing techniques and various deep learning architectures it is possible to achieve higher accuracy in the computer vision task like facial expression classification. The aim of this research paper is to propose Custom-CNN architecture for the facial expression classification and performance of the model is compared with other standard pre-trained deep convolutional neural networks. Kaggle dataset comprises 35,900 is utilized to train, validate and test CNN models.
{"title":"Classification of Facial Expression for Emotion Recognition using Convolutional Neural Network","authors":"Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel","doi":"10.1109/ICEEICT53079.2022.9768508","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768508","url":null,"abstract":"Automatic facial expression classification is very demanding research field because of its application in the field of health, safety and human machine interfaces. Many attempts by the researchers have been made in developing methodologies which can interpret, decode facial expression and obtain important features from the facial images to achieve better classification result. With the advancement in the data capturing techniques and various deep learning architectures it is possible to achieve higher accuracy in the computer vision task like facial expression classification. The aim of this research paper is to propose Custom-CNN architecture for the facial expression classification and performance of the model is compared with other standard pre-trained deep convolutional neural networks. Kaggle dataset comprises 35,900 is utilized to train, validate and test CNN models.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768409
M. Paul, S. Tamilselvan, T. Venkatesan
In inventory control theory the one of the important model is to estimate the conserve inventory when the stations are in series. In this model a system with two nodes are suggested. In the first phase it is assumed that there is only machine A1 and the second phase as two machines say $B_{2}^{1}$ and $B_{2}^{11}$. The machines in the second stage may have same or different process types. During the breakdown time of the machine in the first stage a reserve inventory is maintained to ensure uninterrupted production in the next stage. This conserve inventory is needed as otherwise; the machines in the second stage may become idle which will impact not only the profits but also bring loss due to non-functioning of machines. Mathematical models has been derived for obtaining conserve inventory by treating repair time and inter arrival time as random variables
{"title":"Optimal Conserve Inventory from One Outturn Gizmos to Two Intake Gizmos When Inter-Arrival Breakdown is a Random Variable","authors":"M. Paul, S. Tamilselvan, T. Venkatesan","doi":"10.1109/ICEEICT53079.2022.9768409","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768409","url":null,"abstract":"In inventory control theory the one of the important model is to estimate the conserve inventory when the stations are in series. In this model a system with two nodes are suggested. In the first phase it is assumed that there is only machine A1 and the second phase as two machines say $B_{2}^{1}$ and $B_{2}^{11}$. The machines in the second stage may have same or different process types. During the breakdown time of the machine in the first stage a reserve inventory is maintained to ensure uninterrupted production in the next stage. This conserve inventory is needed as otherwise; the machines in the second stage may become idle which will impact not only the profits but also bring loss due to non-functioning of machines. Mathematical models has been derived for obtaining conserve inventory by treating repair time and inter arrival time as random variables","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768608
R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad
The data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.
{"title":"Analysis on the Development of Cloud Security using Privacy Attribute Data Sharing","authors":"R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad","doi":"10.1109/ICEEICT53079.2022.9768608","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768608","url":null,"abstract":"The data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-16DOI: 10.1109/ICEEICT53079.2022.9768575
Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai
Non-Orthogonal multiple access (NOMA) scheme serves as a favorable technology for 5G and beyond cellular networks as compared to orthogonal multiple access (OMA) scheme. Multipath fading also affects the performance of wireless communication system. So as to exploit the features of NOMA technique, it is vital to identify and analyze its performance over various fading channels. This paper provides the performance analysis of NOMA based cellular system over two key parameters named as channel capacity and outage probability. Rician fading distribution has been considered for multipath fading. Rician fading channel is much suitable when at least one communication link fallow a line-of-sight (LoS) path and the signal strength is much stronger than other paths. An analytical expression for channel capacity and outage probability has been derived for considered system model. Mante Carlo simulation has been performed to obtain the simulation results for channel capacity and outage probability using the Rician fading channel. Comparison of simulation results for near and far users have been provided for channel capacity and outage probability.
{"title":"Analysis of Capacity and Outage Probability for NOMA based Cellular Communication over Rician Fading Channel","authors":"Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai","doi":"10.1109/ICEEICT53079.2022.9768575","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768575","url":null,"abstract":"Non-Orthogonal multiple access (NOMA) scheme serves as a favorable technology for 5G and beyond cellular networks as compared to orthogonal multiple access (OMA) scheme. Multipath fading also affects the performance of wireless communication system. So as to exploit the features of NOMA technique, it is vital to identify and analyze its performance over various fading channels. This paper provides the performance analysis of NOMA based cellular system over two key parameters named as channel capacity and outage probability. Rician fading distribution has been considered for multipath fading. Rician fading channel is much suitable when at least one communication link fallow a line-of-sight (LoS) path and the signal strength is much stronger than other paths. An analytical expression for channel capacity and outage probability has been derived for considered system model. Mante Carlo simulation has been performed to obtain the simulation results for channel capacity and outage probability using the Rician fading channel. Comparison of simulation results for near and far users have been provided for channel capacity and outage probability.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}