A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji
{"title":"Digital Twin Enabled Industry 4.0 Predictive Maintenance Under Reliability-Centred Strategy","authors":"A. Mubarak, M. Asmelash, A. Azhari, Tamiru Alemu, Freselam Mulubrhan, K. Saptaji","doi":"10.1109/ICEEICT53079.2022.9768590","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768590","url":null,"abstract":"This paper introduces the idea of implementing digital twin for predictive maintenance under open system architecture. Predictive maintenance (PdM) is critical to machines operating under complex working conditions to prevent major and unexpected machine failures and production downtime. A cost and reliability optimized predictive maintenance framework for industry 4.0 machines key parts based on qualitative and quantitative analysis of monitoring data is proposed. Employing machine learning and advanced analytics for data fusion for PdM promises for accurate failure diagnostics and prognostics in addition to optimized maintenance decisions. Furthermore, a cost effective maintenance framework can be implemented under reliability centered maintenance strategy. The qualitative and quantitative analysis will help the decision-making process that leads to accurate predictive maintenance strategies. The proposed method is expected to provide cost-effective maintenance and improved intelligence of the predictive process and the accuracy of predictive results.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed iPrivacy based Image Encryption in Mobile cloud","authors":"M. Sankari, L. Sathyapriya, B. Barathi","doi":"10.1109/ICEEICT53079.2022.9768562","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768562","url":null,"abstract":"Basically, people can be capturing images and outsourced to the mobile cloud. Privacy of image is the major challenge to be facing now-a-days. Encryption is one of the greatest solutions to security. While outsourced the image data to the cloud, Cloud Service Provider (CSP) could be possible to share the image to the unauthorized users for their profit. And the past encryption techniques such as AES, DES, RSA are unsuitable to image than text. Due to the lacking of CSP and past encryption techniques, we propose the encryption technique called iPrivacy-Pseudo Random Permutation (PRP) based Encryption, which is applied to the image to ensure security/privacy. The proposed scheme(iPrivacy-SDS) handled by three simple steps such as Split, Distribute and Scramble to attain secure and fast execution. The proposed work may prevent users from accessing of private images. The experimental results show that the time consumption is efficient and around 50% reduction while compared to AES and compared with various image formats such as JPEG, BMP, GIFF and PNG.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Zero and Low Speed Startup of Synchronous Reluctance Motor Based on High Frequency Injection Method","authors":"Dengke Li","doi":"10.1109/ICEEICT53079.2022.9768638","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768638","url":null,"abstract":"For synchronous reluctance motors, there are more and more researches on position sensorless vector control. However, when starting at zero speed or low speed, some problems are often encountered. These problems often affect the overall control effect of the synchronous reluctance motor. To improve the control effect, this paper studies the starting effect of the synchronous reluctance motors. Using the salient pole characteristics of the synchronous reluctance motors, the method used in this article is the rotation high-frequency voltage signal injection method. The high-frequency sine (cosine) signal is injected into two-phase stationary coordinate system of the motor at the same time. The actual rotor position angle will be obtained from the response current. Simulation uses this method and the simulation results respectively show the zero-speed and low-speed startup effects. This method can accurately estimate the rotor angle and realize zero-speed and low-speed starting. These results verify the correctness of the method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Methodology to Ensure Data Integrity in Enterprise Information Systems Using Blockchain Technology","authors":"Palanisamy A M, N. V","doi":"10.1109/ICEEICT53079.2022.9768655","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768655","url":null,"abstract":"Data integrity is one of the most important issues in information management systems. Periodic database auditing is the only way to ensure data integrity. Blockchain is a technology that supports and employs a variety of cryptographic models. Initially, the Blockchain technology was developed as a methodology to record cryptocurrency transactions (bitcoin technology). Additionally, blockchain has the potential to transform the current data auditing practices in a decentralized manner. In this paper, we make an attempt to review the application of blockchain in an enterprise information management system and explore closely on how to incorporate blockchain technology in CampusStack, an integrated information management system, to audit the database for ensuring data integrity.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad
{"title":"Electrochemical based Gas Sensing for Ambient Air Quality Monitoring in Opencast Coal Mines","authors":"Arun K Krishnan, S. Panicker, S. Sandeep, S. Jithin, Jerry J Daniel, Tarique Sajjad","doi":"10.1109/ICEEICT53079.2022.9768541","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768541","url":null,"abstract":"Air quality monitoring is mandatory in many industries like mining, refining and semiconductor industries owing to detrimental impact of air pollutants on the health of human beings, animals and the environment. There is a growing concern regarding the health impact of air pollutants on personal working in coal mines, both opencast and underground. Toxic gases in the ambient air can rapidly become a danger if not kept within safe permissible limits. The first step in maintaining air quality in coal mining areas is continuous monitoring of the atmospheric air. Toxic gases like carbon monoxide, nitric oxide, nitrogen dioxide and sulphur dioxide produced by various mining activities contribute to polluting the air. Several techniques are being used worldwide to sense the presence of various pollutant gases. This paper explores the various techniques for sensing of toxic gases in ambient air and sheds light into their pros and cons. It showcases a simple and cost-effective way of sensing toxic gases in areas near opencast mines by using electrochemical gas sensors. The paper also sheds light on the design of an ambient air quality monitoring instrument which uses electrochemical gas sensors for sensing the concertation of SO2, NO2, NO and CO at areas near opencast coal mines","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125544178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya
{"title":"A Time-Series Based Yield Forecasting Model Using Stacked Lstm To Predict The Yield Of Paddy In Cauvery Delta Zone In Tamilnadu","authors":"M. Geetha, R. Suganthe, S Roselin Nivetha, R. Anju, R. Anuradha, J. Haripriya","doi":"10.1109/ICEEICT53079.2022.9768441","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768441","url":null,"abstract":"Cauvery delta zone in Tamilnadu is called as “Nerkazhanchiyam” (the land of Paddy) of the state, as it has the potential to produce paddy in huge quantity that can be suffice the need of the state. This zone includes the districts such as Thanjavur, Tiruvarur, Nagapattinam, Trichy and Cuddalore. These districts account for about 53% of production of paddy in the state. Increasing the production of paddy in Cauvery Delta Zone would satisfy the requirement of rice in the state on the whole. This will also have a substantial influence on both the farmer's and the nation's economy. Forecasting the production of crops beforehand could assist the farmers in improving their productivity. This necessitates the design of a precise crop yield prediction model. Crop production in agriculture is primarily determined by a variety of factors that falls under three categories: technological (agricultural techniques, managerial decisions, etc.), biological (diseases, insects, pests, etc.), and environmental (climate change, etc.). Among these factors environmental factors pose a great challenge to the decision makers in developing a precise prediction model. Hence, it is proposed to develop a suitable yield prediction model to predict the yield of paddy in Cauvery delta region considering the environmental factors along with the supplied nutrients. The proposed prediction model makes use of Long Short Term Memory (LSTM) algorithm which is a popular deep learning algorithm, to forecast the yield of paddy. LSTM is well known for its better prediction using time series data. Performance of the proposed prediction model is measured using the training loss and validation loss.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel
{"title":"Classification of Facial Expression for Emotion Recognition using Convolutional Neural Network","authors":"Nilay Ganatra, Sanskruti Patel, Rachana Patel, S. Khant, Atul Patel","doi":"10.1109/ICEEICT53079.2022.9768508","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768508","url":null,"abstract":"Automatic facial expression classification is very demanding research field because of its application in the field of health, safety and human machine interfaces. Many attempts by the researchers have been made in developing methodologies which can interpret, decode facial expression and obtain important features from the facial images to achieve better classification result. With the advancement in the data capturing techniques and various deep learning architectures it is possible to achieve higher accuracy in the computer vision task like facial expression classification. The aim of this research paper is to propose Custom-CNN architecture for the facial expression classification and performance of the model is compared with other standard pre-trained deep convolutional neural networks. Kaggle dataset comprises 35,900 is utilized to train, validate and test CNN models.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Conserve Inventory from One Outturn Gizmos to Two Intake Gizmos When Inter-Arrival Breakdown is a Random Variable","authors":"M. Paul, S. Tamilselvan, T. Venkatesan","doi":"10.1109/ICEEICT53079.2022.9768409","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768409","url":null,"abstract":"In inventory control theory the one of the important model is to estimate the conserve inventory when the stations are in series. In this model a system with two nodes are suggested. In the first phase it is assumed that there is only machine A1 and the second phase as two machines say $B_{2}^{1}$ and $B_{2}^{11}$. The machines in the second stage may have same or different process types. During the breakdown time of the machine in the first stage a reserve inventory is maintained to ensure uninterrupted production in the next stage. This conserve inventory is needed as otherwise; the machines in the second stage may become idle which will impact not only the profits but also bring loss due to non-functioning of machines. Mathematical models has been derived for obtaining conserve inventory by treating repair time and inter arrival time as random variables","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128228399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad
{"title":"Analysis on the Development of Cloud Security using Privacy Attribute Data Sharing","authors":"R. Yarava, G. Rao, Yugandhar Garapati, G. Babu, S. D. V. Prasad","doi":"10.1109/ICEEICT53079.2022.9768608","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768608","url":null,"abstract":"The data sharing is a helpful and financial assistance provided by CC. Information substance security also rises out of it since the information is moved to some cloud workers. To ensure the sensitive and important data; different procedures are utilized to improve access manage on collective information. Here strategies, Cipher text-policyattribute based encryption (CP-ABE) might create it very helpful and safe. The conventionalCP-ABE concentrates on information privacy only; whereas client's personal security protection is a significant problem as of now. CP-ABE byhidden access (HA) strategy makes sure information privacy and ensures that client's protection isn't exposed also. Nevertheless, the vast majority of the current plans are ineffectivein correspondence overhead and calculation cost. In addition, the vast majority of thismechanism takes no thought regardingabilityauthenticationor issue of security spillescapein abilityverificationstage. To handle the issues referenced over, a security protectsCP-ABE methodby proficient influenceauthenticationis presented in this manuscript. Furthermore, its privacy keys accomplish consistent size. In the meantime, the suggestedplan accomplishes the specific safetyin decisional n-BDHE issue and decisional direct presumption. The computational outcomes affirm the benefits of introduced method.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124604782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai
{"title":"Analysis of Capacity and Outage Probability for NOMA based Cellular Communication over Rician Fading Channel","authors":"Veeraiyah Thangasamy, I. Singh, Karishma, Yaswanth, Jathin Sai","doi":"10.1109/ICEEICT53079.2022.9768575","DOIUrl":"https://doi.org/10.1109/ICEEICT53079.2022.9768575","url":null,"abstract":"Non-Orthogonal multiple access (NOMA) scheme serves as a favorable technology for 5G and beyond cellular networks as compared to orthogonal multiple access (OMA) scheme. Multipath fading also affects the performance of wireless communication system. So as to exploit the features of NOMA technique, it is vital to identify and analyze its performance over various fading channels. This paper provides the performance analysis of NOMA based cellular system over two key parameters named as channel capacity and outage probability. Rician fading distribution has been considered for multipath fading. Rician fading channel is much suitable when at least one communication link fallow a line-of-sight (LoS) path and the signal strength is much stronger than other paths. An analytical expression for channel capacity and outage probability has been derived for considered system model. Mante Carlo simulation has been performed to obtain the simulation results for channel capacity and outage probability using the Rician fading channel. Comparison of simulation results for near and far users have been provided for channel capacity and outage probability.","PeriodicalId":201910,"journal":{"name":"2022 First International Conference on Electrical, Electronics, Information and Communication Technologies (ICEEICT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}