{"title":"Reduction of Frequency Disruption During Cyber-Attack in the Power System","authors":"Muhammad Musleh Uddin, M. Kabir","doi":"10.1109/STI50764.2020.9350518","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350518","url":null,"abstract":"This paper proposes an effective stable system model, called as ESSM for providing stable frequency in power system during cyber-attack. The proposed ESSM is formulated by four different controllers, such as, LFC, AGC, AGC-PID and LQR that are implemented in a common system model individually. The focusing issue of this work is that a new numerical problem is solved by the implementation of the proposed model that has been run by incorporating the above four different controllers. The purpose of considering the new problem solution in our proposed ESSM is to achieve an effective stable system model. According to our knowledge, nobody has solved such problem before that has been solved in this paper. In this work, to achieve the proposed ESSM, the individual system models with four different controllers have been simulated in MATLAB using SIMULINK tool and the results are compared in terms of frequency deviation and settling time. The simulation results exhibit that, all the system models work well to minimize the frequency disturbance within very short time. The comparisons among the four models show that, LQR performs better compared to the other models in terms of reducing settling time as well as reducing frequency deviation.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126227396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Rakib Hasan, Partha Chakraborty, M. Khatun, Aditi Sarker, Kawshik Banerjee, T. Choudhury, Mohammad Abu Yousuf, Mohammad Zahidur Rahman
{"title":"Reliable Identity Management System Using Raspberry Pi","authors":"Md. Rakib Hasan, Partha Chakraborty, M. Khatun, Aditi Sarker, Kawshik Banerjee, T. Choudhury, Mohammad Abu Yousuf, Mohammad Zahidur Rahman","doi":"10.1109/STI50764.2020.9350462","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350462","url":null,"abstract":"Biometric authentication, the process of verification using unique biological characteristics, is considered one of the most accurate technologies for authentication. It compares two or more biometric data to identify the differences among them properly. Based on the comparison between individual’s biometric features and stored authorized features, it makes the decision of matched or mismatched. If the given sample of the biometric data matches with the stored one, authorization is confirmed. Nowadays, many real-time applications use biometric authentication to meet security purposes fully. However, it is difficult to implement fingerprint recognition system specially on Linux based computer. A well-known, less costly embedded computer called Raspberry Pi is used to build the entire system. Fingerprint enrollment, fingerprint recognition, photo capture, QR code generation as well as QR code reading were entirely done using python and python associated libraries. For storage management, we have used MySQL as it is convenient and open-source. This paper discusses about a quality authentication model which is highly capable and cost- effective. The authentication process consists of extracting the biometric features with ORB algorithm, matching those features using FLANN matcher, generating and validating QR code based on encrypted personal information accurately. Here, AES algorithm is used for encrypting personal data which is then converted and stored in form of QR code. Final authentication process involves both fingerprint and QR code validation. Performing two factor authentication affixes more reliability to the system.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114007635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security Threat Modeling of A Telesurgery System","authors":"Md. Rashid Al Asif, R. Khondoker","doi":"10.1109/STI50764.2020.9350452","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350452","url":null,"abstract":"Telesurgery allows surgeons to perform surgery on patients remotely with the advancement of surgical robots and network communication technologies. But there are potential issues such as communication latency and cyber security. Researchers found that the use of fifth generation of mobile communication technologies (5G) is a radical change in reducing latency. However, cyber security to protect the telesurgery system from the attackers is still an open issue. In this paper, we have derived a telesurgery system consisting of components, their workflows, and interactions. After that, the Microsoft threat modeling method called STRIDE has been applied to identify and enumerate threats. The resultant threats detail may help to apply appropriate safeguards for the improvement of cyber security in the telesurgery system. Moreover, several defense mechanisms are provided at the end.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121965735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand Gesture Recognition for Bangla Sign Language Using Deep Convolution Neural Network","authors":"Dardina Tasmere, Boshir Ahmed","doi":"10.1109/STI50764.2020.9350484","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350484","url":null,"abstract":"Around the world, deaf and dumb people are sufferers of all kinds of activities due to a lack of proper sign language interpreters. Our research paper proposes a new hand gesture recognition framework toward Bangla sign language to eliminate the significant communication gap between deaf and non-sign language users. The hand was detected practicing HSV and YCbCr color space. In total thirty-seven (37) characters (8 vowels and 29 consonants) are recognized by deep convolution neural networks. We take 37 classes for 37 alphabets from Bangla sign language. Our framework also aided to gesture recognition system by a new dataset for the Bangla sign language. Our dataset consists of 3219 images from six different people. This new dataset facilitates us to gain an accuracy of 99.22%.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131718026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NAVIX: A Wearable Navigation System for Visually Impaired Persons","authors":"Debasish Bal, Md. Munirul Islam Tusher, Mizanur Rahman, Md. Salmanur Rahman Saymon","doi":"10.1109/STI50764.2020.9350480","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350480","url":null,"abstract":"Visually impaired people meet several difficulties such as freedom of navigation inability, informing location, obstacle or sudden danger, and many more. None can erase this worst feeling. However, our fundamental aim of this project is to introduce a wearable system for blinds under indoor conditions, which can be mounted on a jacket, portable, lightweight, and user friendly as well as the optimum solution. Such behaviours engender a new prototype and a part of nascent technological improvement. The system comprises Raspberry Pi, three ultrasonic sensors, camera module, vibration motor, gyroscope, emergency button, and mobile application for android, namely ‘Blynk’. Raspberry Pi acts as a ‘Central Processing Unit (CPU)’, connected with each part. Among them, ultrasonic sensors detect any blockage within 400 cm and send an alert through the headpiece when it appears within 30 cm. Camera module read frame by frame, identify the person standing in front and recognize pre-trained faces using ‘Haar feature’ algorithm. The gyroscope provides information about the 3D axis of the patient, which acts instantly during an unusual activity such as fall detection. The software has been installed in the cellphone of the guardian to receive an alert automatically. It may occur in the event of an accident or, pushing the ‘Emergency Button’. A wearable blind assistive system-based project installed upon the jacket obviates the needs for a pair of eyes or a helping hand in an oblique manner, which in turn reduces the misery more than a modicum.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mayesha Mukarrama, Abul Kalam al Azad, Khan Raqib Mahmud
{"title":"Neural Network Compression by Filter Similarity Detection and Visualization","authors":"Mayesha Mukarrama, Abul Kalam al Azad, Khan Raqib Mahmud","doi":"10.1109/STI50764.2020.9350412","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350412","url":null,"abstract":"This paper presents an Automated Filter Similarity Detecting and Pruning System with deep visualization technique. During vision tasks, neural networks are found to converge to similar filters leading to significant increase in redundancy in parametric space resulting in high consumption of time and processing power. Moreover, the inner-working of neural networks are not transparent, so it is not tractable which features are extracted in which layer, how they are extracted and how much viable those extracted features are for final output. In order to mitigate the parametric redundancy, we introduce a technique to visualize and detect the similar filters based on similarity metric. And also we implemented the compressed and efficient architecture following pruning, and we observe no decline in learning performance when applied on standard image dataset.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127105304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Utsha Das, Azmain Yakin Srizon, Md. Ansarul Islam, Dhiman Sikder Tonmoy, Md. Al Mehedi Hasan
{"title":"Prognostic Biomarkers Identification for Diabetes Prediction by Utilizing Machine Learning Classifiers","authors":"Utsha Das, Azmain Yakin Srizon, Md. Ansarul Islam, Dhiman Sikder Tonmoy, Md. Al Mehedi Hasan","doi":"10.1109/STI50764.2020.9350498","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350498","url":null,"abstract":"Diabetes caused 4.2 million deaths in 2019 alone which makes it the seventh leading cause of death worldwide. Although diabetes can be treated, late treatment can be fatal and may result in early death. Moreover, diabetes is a costly disease to maintain, hence, early detection of diabetes can facilitate the patients by indicating the time to seek treatment and to get prepared mentally and financially. Previously, various studies suggested and proposed different approaches for achieving near-perfect accuracy but not many works focused on finding the appropriate attributes which can predict the disease at the early stage. In this study, we focused on finding those significant features and our experimental analysis showed the findings of 10 significant features that can achieve a near-perfect recognition of 98.08%. The feature selection approaches used in this research are the Chi-Square test, the Minimum Redundancy Maximum Relevance (mRMR) test, and the Recursive Feature Elimination test based on Random Forest (RFE-RF). Also, the seven classifiers utilized in this research are Decision Tree (DT), K-Nearest Neighbors (KNN), Logistic Regression (LR), Naïve Bayes (NB), Random Forest (RF), Neural Network (NN), and Support Vector Machine (SVM).","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126977840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative cost analysis of VSC-HVDC and HVAC as transmission system for a 50 MW offshore wind farm in Hatiya Island","authors":"Md. Sarower Jahan, S. Hamim, Md. Tasrif Imran Bhuiyan, Md. Jaynal Abeadin, Md. Nabid Chowdhury","doi":"10.1109/STI50764.2020.9350463","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350463","url":null,"abstract":"Hatiya is an off-grid island located in the southern coastal area of Bangladesh. Though the island has potential renewable energy resources, it lacks the connection to the national grid. In this paper, the analysis of wind energy resources with the design of an offshore wind farm for this island is presented. This paper explores the opportunities of transmitting the power generated from the wind farm to the national grid by High Voltage Alternating Current (HVAC) and High Voltage Direct Current (HVDC) transmission. In this case, a cost comparison is made for both transmission systems. Break-even distance analysis is performed to determine which transmission system will be a more suitable and cost-effective technology for this project.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128176922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. M. Shahriar Sazzad, A. Anwar, Sabrin Islam, Sumaiya Afroz Mila, Sahrima Jannat Oishwee, Afia Anjum
{"title":"A Computer Based Image Processing Approach to Identify Rice Blast","authors":"T. M. Shahriar Sazzad, A. Anwar, Sabrin Islam, Sumaiya Afroz Mila, Sahrima Jannat Oishwee, Afia Anjum","doi":"10.1109/STI50764.2020.9350507","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350507","url":null,"abstract":"Fungus and bacteria are the main cause of rice plant diseases. Among all fungal diseases rice blast is considered as one of the most common and fatal rice plant disease. Without proper care and use of pesticides this deadly plant disease can cause huge damage for rice crops. Detection of rice blast disease at the early stage can help farmers to use proper pesticides and can save their crops and hence a computerized approach is necessary. Currently a good number of approaches available but none of them seems to provide a suitable solution in terms of identification accuracy. A suitable approach has been presented in this study where both input and output images are color images. Various image processing steps were considered in this study which includes enhancement, noise reduction, color image segmentation, and color features for identification. CNN classifier was applied for validation purpose. In compare to existing available approaches this study proposed approach is capable of providing better results in terms of accuracy which is 97.50%.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amena Zahan Prithibi, Syeda Kanij Faria, Palash Roy, M. Razzaque
{"title":"Network Lifetime Aware Routing Algorithm for Energy Harvesting Wireless Sensor Networks","authors":"Amena Zahan Prithibi, Syeda Kanij Faria, Palash Roy, M. Razzaque","doi":"10.1109/STI50764.2020.9350422","DOIUrl":"https://doi.org/10.1109/STI50764.2020.9350422","url":null,"abstract":"Energy Harvesting Wireless Sensor Network (EHWSN) technology has arrived for the extensive urgency of preventing the sensor nodes’ battery limitation to develop a sustainable network system. Therefore, prolonging network lifetime through distributing the data transmission burden on sensor nodes is a significant challenge in WSNs. In this paper, we have proposed a hierarchical system framework and a lifetime aware data routing algorithm. The proposed algorithm distributes the data routing loads to the relay nodes across the network with a high energy harvesting rate. Extensive simulation experiments have been carried out in MATLAB to study the performances of the proposed algorithm compared to the existing works in terms of network lifetime and data packet delivery ratio.","PeriodicalId":242439,"journal":{"name":"2020 2nd International Conference on Sustainable Technologies for Industry 4.0 (STI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}