Advances in Data Science and Computing
Advances in Data Science and Computing
COMPUTING TECHNOLOGY
COMPUTING TECHNOLOGY
Edited by
Suman Ghosal, PhD
SERIES EDITORS:
Dr. Prasenjit Chatterjee
Department of Mechanical Engineering, MCKV Institute of Engineering,
Howrah, West Bengal, India
E-Mail: [email protected] / [email protected]
Dr. Dragan Pamucar
University of Defence, Military academy, Department of Logistics,
Belgrade, Serbia; E-Mail: [email protected]
Dr. Morteza Yazdani
Department of Business & Management, Universidad Loyola Andalucia,
Seville, Spain; E-Mail: [email protected]
Dr. Anjali Awasthi
Associate Professor and Graduate Program Director (M.Eng.), Concordia
Institute for Information Systems Engineering, Concordia, Canada
E-Mail: [email protected]
Types of volumes:
This series reports on current trends and advances in optimization and
decision-making theories in a wider range of domains for academic and
research institutes along with industrial organizations. The series will cover
the following types of volumes:
• Authored volumes
• Edited volumes
• Conference proceedings
• Short research (thesis-based) books
• Monographs
viii AAP Research Notes on Optimization and Decision-Making Theories
Contributors......................................................................................................... xvii
Enhancement Techniques.............................................................................. 3
Part II: Role and Impact of Big Data in E-Commerce and the
Retail Sector.................................................................................................. 81
Part III: Algorithm for Load Balancing in Cloud Computing ...................... 107
Payel Ray, Enakshmi Nandi, Ranjan Kumar Mondal, and Debabrata Sarddar
Enakshmi Nandi, Payel Ray, Ranjan Kumar Mondal, and Debabrata Sarddar
Payel Ray, Enakshmi Nandi, Ranjan Kumar Mondal, and Debabrata Sarddar
Rahul Kumar Singh, Rahul Kumar Prasad, Rahul Singh, Aayush Ashish,
Part VI: Technique for Improving Information and Network Security ....... 273
Bijoy Kumar Mandal, Saptarshi Roychowdhury, Payel Majumder, and Anwesa Das
CONTRIBUTORS
Ashish Agarowala
CSE Department, NIT Durgapur, West Bengal, India
Priya Anand
Department of Information Science and Engineering, AMC Engineering College, Bangalore–560083,
Karnataka, India
Aayush Ashish
Techno International New Town, Kolkata–700156, West Bengal, India
K. M. Ashitha
Department of Electrical and Electronics Engineering, Amal Jyothi College of Engineering, Kanjirappally,
Kerala–686518, India, E-mail: [email protected]
Tushar Bajaj
Department of ECE, Amity School of Engineering and Technology, New Delhi GGSIPU, Delhi, India
Minakshi Banerjee
Computer Science and Engineering Department, RCC Institute of Information Technology,
Kolkata–700015, West Bengal, India
Rahit Basak
Computer Science and Engineering Department, Pailan College of Management and Technology,
Kolkata–700104, West Bengal, India
Divyang Bhartia
Student, St. Xavier’s College (Autonomous), Kolkata, 30 Mother Teresa Sarani, Kolkata–700016,
West Bengal, India
Arindam Biswas
Kazi Nazrul University, Asansol, West Bengal, India
Vishal Biswas
Department of Bachelor in Optometry, Pailan College of Management and Technology, Joka,
Kolkata–700104, West Bengal, India
Debarka Brahma
Undergraduate Student, Department of Civil Engineering, Amity University Kolkata, Kolkata,
West Bengal–700135, India
Arpan Chatterjee
CSE Department, NIT Durgapur, West Bengal, India
Sumanta Chatterjee
Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, West Bengal,
India, E-mail: [email protected]
Prachi Chauhan
G.B. Pant University of Agriculture and Technology, Pantnagar, Uttarakhand, India,
E-mail:[email protected]
Amitava Choudhury
School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand,
India, E-mail: [email protected]
Anwesa Das
NSHM Knowledge Campus, Durgapur, West Bengal, India
Arabinda Das
Department of Electrical Engineering, Jadavpur University, Kolkata–700032, West Bengal, India
Mainak Das
Computer Science and Engineering Department, Pailan College of Management and Technology,
Kolkata–700104, West Bengal, India
Monalisa Datta
Department of Electrical Engineering, Techno International New Town, Kolkata–700156, West Bengal,
India
Tushar Kanti De
Associate Professor and Head of Department, Department of Civil Engineering,
Budge Budge Institute of Technology, Budge Budge, West Bengal–700137, India
Amit Deb
Assistant Professor, Department of Civil Engineering, Amity University Kolkata, Kolkata,
West Bengal–700135, India
Budhaditya Dutta
Undergraduate Student, Department of Civil Engineering, Amity University Kolkata, Kolkata,
West Bengal–700135, India, E-mail: bdneil3103@gmail
Suman Ghosal
Department of Electrical and Electronics Engineering, Pailan College of Management and Technology,
Kolkata, West Bengal, India
Kamalika Ghosh
Director, School of Illumination Science, Engineering and Design, Jadavpur University, Kolkata,
West Bengal, India, E-mail: [email protected]
Kaushik Ghosh
School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, India
Sanjib Halder
The Bhawanipur Education Society College, Kolkata, West Bengal, India
Satyam Jha
Department of Bachelor in Optometry, Pailan College of Management and Technology, Joka,
Kolkata–700104, West Bengal, India
Contributors xix
Arrik Khanna
Department of Electrical Engineering, Chitkara University, Punjab–140401, India,
E-mail: [email protected]
Alok Kole
Electrical Engineering Department, RCC Institute of Information Technology, Kolkata–700015,
West Bengal, India
Abhijit Kumar
School of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand,
India, E-mail: [email protected]
Rajneesh Kumar
Department of Electrical Engineering, Techno International New Town, Kolkata–700156, West Bengal,
India, E-mail: [email protected]
Payel Majumder
Department of Computer Science and Engineering, NSHM Knowledge Campus, Durgapur,
Arrah Shibtala Via Muchipara, Durgapur–713212, West Bengal, India
Tanajit Manna
Electronics and Communication Engineering Department, Pailan College of Management and
Technology, Kolkata–700104, West Bengal, India, E-mail: [email protected]
Anubrata Mondal
Research Scholar, School of Illumination Science Engineering and Design,
Sirajum Monira
Department of Bachelor in Optometry, Pailan College of Management and Technology, Joka,
Kolkata–700104, West Bengal, India, E-mail: [email protected]
Indrani Mukherjee
Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, West Bengal,
India
Enakshmi Nandi
Department of Computer Science and Engineering, University of Kalyani, West Bengal, India,
E-mail: [email protected]
Alok Negi
National Institute of Technology, Uttarakhand, India
xx Contributors
Arkajyoti Pandit
Assistant Professor, Department of Commerce, St. Xavier’s College (Autonomous), Kolkata,
West Bengal, India
Soumya Paul
Department of Computer Science and Engineering, NSHM Knowledge Campus, Durgapur,
Arrah Shibtala Via Muchipara, Durgapur–713212, West Bengal, India
Payel Ray
Department of Computer Science and Engineering, University of Kalyani, West Bengal, India,
E-mail: [email protected]
Jesmin Roy
Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, West Bengal,
India
Shuvankar Roy
Computer Science and Engineering Department, MCKV Institute of Engineering, Howrah–711204,
West Bengal, India, E-mail: [email protected]
Saptarshi Roychowdhury
NSHM Knowledge Campus, Durgapur, West Bengal, India
Dwaipayan Saha
Department of Computer Science and Engineering, JIS College of Engineering, Kalyani, West Bengal,
India
Debabrata Sarddar
Department of Computer Science and Engineering, University of Kalyani, West Bengal, India,
E-mail: [email protected]
Rishiraj Sarker
Jadavpur University, Kolkata–700032, West Bengal, India, E-mail: [email protected]
Debaparna Sengupta
Department of Electrical Engineering, Techno International New Town, Kolkata–700156, West Bengal,
India
Ayushi Shah
Undergraduate Student, Department of Civil Engineering, Amity University Kolkata, Kolkata,
West Bengal–700135, India
Nidhi Sindhwani
Department of ECE, Amity School of Engineering and Technology, New Delhi GGSIPU, Delhi, India
Contributors xxi
Rahul Singh
Techno International New Town, Kolkata–700156, West Bengal, India
D. Thomas
Amal Jyothi College of Engineering, Kanjirappally, Kottayam, Kerala–686518, India
Shekhar Verma
Department of ECE, Amity School of Engineering and Technology, New Delhi GGSIPU, Delhi, India
ABBREVIATIONS
2D two dimensional
ACC adaptive cruise control
AGC adaptive gamma correction
AHE adaptive histogram equalization
ANA agro nutrition alert
AWGN additive white gaussian noise
BER bit error rate
BS base station
BT body temperature
CDF cumulative distribution function
CDMA code division multiple access
CLAHE contrast limited adaptive histogram equalization
CNN/ConvNet convolutional neural network
COG center of gravity
Coif coiflets
CQA classification quality assessment
CSA control based pitch actuator system
CTC connectionist temporal classification
db Daubechies
DES data encryption standard
DGR directional greedy routing
DL dead load
DNA deoxyribonucleic acid
DNN deep neural network
DSSS direct sequence spread spectrum
DWT discrete wavelet transform
EBGR edge node based greedy routing
ESU energy storage unit
EVCSs electric vehicle charging stations
EVs electric vehicles
FFT fast Fourier transform
FLCs fuzzy logic controllers
FN false negative
FP false positive
xxiv Abbreviations
CHAPTER 1
2
Computer Science and Engineering Department, RCC Institute of
ABSTRACT
Advances in Data Science and Computing Technology: Methodology and Applications. Suman Ghosal,
Amitava Choudhury, Vikram Kumar Saxena, Arindam Biswas, & Prasenjit Chatterjee (Eds.)
© 2023 Apple Academic Press, Inc. Co-published with CRC Press (Taylor & Francis)
4 Advances in Data Science and Computing Technology
1.1 INTRODUCTION
entropy based image quality metric has been worked out in 2012 (Nandy
and Banerjee, 2012). Sheba and Gladston (2016) evaluated different image
enhancement techniques in the domain of mammogram images.
Almotiri et al. (2018) presented a survey on different retinal vessel
segmentation algorithms. Roychowdhury et al. (2015) iteratively thresholded
the residual retinal image to obtain higher vessel segmentation accuracy. Fu
et al. (2016); Liskowski et al. (2016); and Mo and Zhang (2017) exploited
deep learning architecture to identify vessels from retinal fundus images. Fu
et al. (2016) used convolutional neural network (CNN) which follows vessel
probability map. In this chapter, fully connected conditional random fields
are combined with probability map to segment vessels. Liskowski et al.
(2016) applied several preprocessing steps and training was conducted on a
large number of samples. Generally large volume of training data is required
for effective learning of deep architecture. These processes are extremely
computationally exhaustive and the training is also very time consuming
with requirements of expensive resources.
Ronneberger et al. (2015) proposed U-net CNN model which is efficient
in segmenting bio medical images.
The contribution is to find the effective enhancement technique quantita
tively following two diverse viewpoints. We have experimented with some
of the enhancement techniques, frequently used for retinal vessel segmenta
tion such as, CLAHE, AGC and morphological enhancement techniques. On
the basis of IQA metric values, we have established with the notion that
morphological enhancements are the best among them in an application
oriented way. To arrive at a conclusive result from a different dimension, we
experimented with the efficiency of deep vessel classification on three differ
ently enhanced image datasets also. In this phase, the better the classification
evaluation metric values the more informative the input images are. The
results obtained from deep classification experiments are decently aligned
with the observations obtained from image quality assessment (IQA) too.
The work representation is structured as follows. Section 1.3 presents
enhancement methods normally used before vessel segmentation of retinal
fundus. IQA evaluation metrics are there in Section 1.4 and deep classifica
tion based evaluation metrics. Section 1.5 presents database description.
Section 1.6 explores deep neural network (DNN) architecture, training
details and implementation requirements used to evaluate our observation.
Section 1.7 describes experimental results of IQA based evaluation and deep
CNN classification based evaluation respectively. Section 1.8 demonstrates
the experimental results found in Section 1.7. Section 1.9 is the conclusion
of the work.
6 Advances in Data Science and Computing Technology
where; k = 0, 1, …, lmax
Eqn. (4) represents histogram equalized image. Pizer et al. (1987) elabo
rated AHE application. Zuiderveld (1994) modified it to CLAHE to obtain
better enhancement result. CLAHE follows local region based approach. All
the local regions contrast enhancement takes place independently and are
combined with bilinear interpolation. Thus, boundary effects between the
region can be removed.
AGC with weighting distribution (WD) (Huang, Cheng, and Chiu, 2013) is
depicted as follows. Gamma correction formula is:
Deep Learning Supported Evaluation of Retinal Vessel 7
γ
l
T ( lmax ) = ( lmax ) (5)
lmax
where; lmax is the maximum intensity. The gamma value may be greater than
1 or may be less than 1 (Huang et al., 2013). AGC with weight distribution
is as follows (Huang et al., 2013):
1−cdf ( l )
T ( l ) =lmax ( l / lmax ) (6)
The underlined concept is that the process tries to increase lower intensity
level and at the same time tries to resist decrease of higher intensity level.
The WD function has the following formula:
pdf ( l ) − pdf min
pdf w ( l ) = pdf max ( )a (7)
pdf max − pdf min
where; a is the adjusted parameter. Thus, cdf becomes:
pdf w ( l )
cdf w ( l ) = ∑ lmax
l
(8)
=0
∑ pdf w
∑ pdf = ∑ pdf w ( l )
lmax
w l
(9)
At the end, the gamma (γ) value is obtained in the following way:
γ = 1− cdf w ( l ) (10)
We used two types of evaluation metrics for the assessment of retinal image
enhancement techniques. They are IQA metrics and classification quality
assessment (CQA) metrics.
IQA metrics are categorized in two classes: statistical error based metrics and
visual information based metrics. Ideally, a human observer only can provide
most consistent IQA metric to assess an image enhancement performance. It
is qualitative evaluation. Visual information may not be properly represented
by statistical error based metrics always instead human observer perception
can be quite aptly captured by visual information based metrics. PSNR and
AMBE are the mostly used statistical error based IQA metric and visual
information based IQA metric, respectively.
The significances of true positive (TP), false positive (FP), true negative
(TN), and false negative (FN) with respect to vessel classification are as
follows, TP is the proportion of actual vessel pixels in the whole popula
tion whereas, TN is the proportion of actual non-vessel pixels in the whole
population. Similarly, FP is the proportion of falsely identified vessel pixels
in the whole population whereas FN is the proportion of falsely recognized
non-vessel pixels in the whole population. Accuracy and sensitivity are two
important evaluation metrics in case of medical image processing.
1.4.2.1 SENSITIVITY
Sensitivity (Sn) is TP rate. The closer the value of sensitivity to 1, the better
is the identification power of vessel pixel of the method.
=Sn TP / (TP + FN ) (17)
1.4.2.2 ACCURACY
DRIVE (Digital retinal image for vessel extraction, Image Sciences Insti
tute) retinal image vessel segmentation dataset is used for method evalu
ation as it is the most frequently used dataset among researchers. Canon
10 Advances in Data Science and Computing Technology
CR5 non-mydriatic 3CCD camera with 45° field of view has been used
to capture retinal images. Each image was preserved with 8 bits per color
plane and at 565 x 584 pixels’ resolution. In this dataset ground truths are
also available.
A deep CNN model has been implemented and then tested with differently
pre-processed image datasets. CNN architecture has been formed using U-net
type connections. U-net is a CNN, efficient in the field of medical image
segmentation. The characteristic of U-net is that it utilizes the same feature
maps for contraction of the image to a feature vector and for expansion of
the vector to a reconstructed image. Thus, structural integrity of image data
is retained. U-net model is trained on DRIVE trainset for vessel identifica
tion. Application of U-net model on appropriately enhanced image dataset
leads to pixel level classification of vessel and non-vessel. Classification
efficiency measurement of the same model with differently enhanced image
dataset indicates better image enhancement method.
Deep Learning Supported Evaluation of Retinal Vessel 11
1.6.1 ARCHITECTURE
U-net architecture Ronneberger et al. (2015) is used here for CNN based
input IQA. Cross-entropy loss function and stochastic gradient descent
(SGD) optimization algorithm is used in implementation. Rectified linear
unit (ReLU) is used as activation function. A drop out of 0.2 has been
employed between two consecutive convolutional layers. The summary of
the train model is represented in Figure 1.1.
1.6.2 TRAINING
All the experiments have been implemented in Python 3.6.8. High level APIs
of Google’s deep learning library TensorFlow have been used to implement
and evaluate the work. Implementations have been executed in Google
online Colab cloud environment where Tesla K80 GPU, 12 GB VRAM, 4*
Intel(R) Xeon(R) CPU @ 2.20 GHz, 13.51 GB RAM, 358.27 GB HDD are
available as deep network execution resources.
FIGURE 1.2 (a) Retinal green channel and histogram; (b) CLAHE and stretched histogram;
(c) morphology and stretched histogram; (d) AGC and stretched histogram.
FIGURE 1.3 Average PSNR and AMBE graph for DRIVE images.
TABLE 1.1 DRIVE Test Set Images – Average IQA Metrics Value
Enhancement Avg Image Quality Assessment Metrics Value
Techniques PSNR AMBE
Morphology 24.8719 5.7424
CLAHE 14.3472 35.6176
AGC 12.6987 47.6397
TABLE 1.2 DRIVE Test Set Images – Average Deep Classification Metrics
Enhancement Avg Classification Quality Assessment Metrics Value
Techniques Train_Acc Test_Acc Sensitivity
Morphology 0.9576 0.9524 0.7573
CLAHE 0.9568 0.9525 0.7564
AGC 0.9510 0.9484 0.7349
Four images among 20 drive test images have mild early DR signs as patho
logical symptoms. Table 1.3 shows individual performance measurements
obtained by applying deep CNN classification on those pathology samples
separately. This is a reverse view point to assess the applicability of different
enhancement techniques on abnormal images also. In most of the cases
morphologically enhanced abnormal images are characterized with higher
metric values.
TABLE 1.3 Deep CNN Classification Metrics on DRIVE Test Dataset Abnormal Images
Symptoms Enhancement Deep Classification Assessment Metrics
Techniques Accuracy Sensitivity
Hard exudate Morphology 0.9420 0.6921
CLAHE 0.9420 0.6928
AGC 0.9420 0.7670
Hard exudate Morphology 0.9464 0.6580
CLAHE 0.9458 0.6489
AGC 0.9365 0.633
Hemorrhage Morphology 0.9574 0.8164
CLAHE 0.9571 0.8106
AGC 0.9535 0.7987
hard exudate Morphology 0.9493 0.6864
CLAHE 0.9515 0.7153
AGC 0.9487 0.7082
16 Advances in Data Science and Computing Technology
1.8 DISCUSSION
Statistical error based and visual perception based IQA metrics are
considered in this work for preliminary image enhancement evaluation.
Here, PSNR represents statistical error based metrics. But it is much more
important to verify evaluation with human visual perception based metric
such as AMBE. Maximum PSNR value specifies high information content
of the morphologically enhanced image. Again, minimum AMBE value of
morphologically enhanced image also identifies it as better enhanced image.
Table 1.1 data represents the fact properly. Average values are computed on
DRIVE test dataset images.
This observation is further estimated from the view point of deep CNN
classification as vessel enhancement is a very important prior sub part of
retinal vessel segmentation. So, better enhanced images tend to produce better
classification efficiency metrics. Maximum value of average segmentation
accuracy indicates the superior quality of morphologically enhanced image data
with application to retinal fundus images. In the field of vessel segmentation
use of sensitivity as performance measurement index is highly significant.
Maximum average sensitivity has also been obtained from morphologically
enhanced test images. Table 1.2 represents average values of train accuracy,
test accuracy and sensitivity on DRIVE images. Different ailment symptoms
are evident in retina at a very early phase. Table 1.3 provides individual test
accuracy and sensitivity of pathology samples of DRIVE test set separately.
In individual evaluation of pathology samples also, most of the classification
efficiency values are in favor of morphological operation.
Though morphological enhancement performed very well in both IQA
based evaluation as well as deep classification based evaluation, performing
image enhancement by combining enhancement methods in some specific
way may produce better result as well.
1.9 CONCLUSION
KEYWORDS
REFERENCES
Almotiri, J., Elleithy, K., & Elleithy, A., (2018). Retinal vessels segmentation techniques and
algorithms: A survey. Applied Sciences, 8.
Cai, J., Gu, S., & Zhang, L., (2018). Learning a deep single image contrast enhancer from
multi-exposer images. IEEE Transactions on Image Processing, 27, 2049–2062.
Fu, H., Xu, Y., Lin, S., Wong, D., & Liu, J., (2016). Deep vessel: Retinal vessel segmentation
via deep learning and conditional random field. Proceedings of Medical Image Computing
and Computer Assisted Intervention MICCAI, 132–139.
Gonzalez, R. C., & Woods, R. E. (2015). Digital Image Processing (3rd edn.). Pearson.
Hassan, G., El-Bendary, N., Hassanien, A., Fahmy, A., Shoeb, A., & Snasel, V., (2015).
Retinal blood vessel segmentation approach based on mathematical morphology. Procedia
Computer Science, 65, 612–622.
Hassanpour, H., Samadiani, N., & Mahdi, S. S. M., (2015). Using morphological transforms
to enhance the contrast of medical images. The Egyptian Journal of Radiology and Nuclear
Medicine, 46, 481–489.
Huang, S., Cheng, F., & Chiu, Y., (2013). Efficient contrast enhancement using adaptive
gamma correction with weighting distribution. IEEE Transaction on Image Processing, 22.
18 Advances in Data Science and Computing Technology
Liskowski, P., & Krawiec, K., (2016). Segmenting retinal blood vessels with deep neural
networks. IEEE Transactions on Medical Imaging, 35, 2369–2380.
Mo, J., & Zhang, L., (2017). Multi-level deep supervised networks for retinal vessel
segmentation. International Journal of Computer Assisted Radiology and Surgery, 12,
2181–2193.
Nandy, M., & Banerjee, M., (2012). Retinal vessel segmentation using Gabor filter and
artificial neural network. Proceedings of IEEE International Conference on Emerging
Applications of Information Technology – EAIT, 157–160.
Nandy, M., & Banerjee, M., (2019). Automatic diagnosis of micro aneurysm manifested
retinal images by deep learning method. Proceedings of ICETST.
Nandy, P. M., & Banerjee, M., (2017). A comparative analysis of application of niblack and
sauvola binarization to retinal vessel segmentation. Proceedings of CINE. IEEE Xplore.
Pizer, S., Amburn, E., Austin, J., Cromartie, R., Geselowitz, A., Greer, T., Ter, H. R. B., et al.,
(1987). Adaptive histogram equalization and its variations. Computer Vision, Graphics and
Image Processing, 39, 355–368.
Rafael C. Gonzalez & Richard E. Woods, (2008). Digital Retinal Images for Vessel Extraction
(DRIVE) Dataset. Image Sciences Institute, http://www.isi.uu.nl/Research/Databases/
DRIVE/ (accessed on 8 December 2021).
Rahman, S., Rahman, M., Abdullah-Al-Wadud, M., Al-Quaderi, G., & Shoyaib, M., (2016).
An adaptive gamma correction for image enhancement. EURASIP Journal on Image and
Video Processing, 35, 1–13.
Ronneberger, O., Fischer, P., & Brox, T., (2015). U-Net: Convolutional Networks for
Biomedical Image Segmentation. arXiv:1505.04597v1 [cs.CV].
Roychowdhury, S., Koozekanani, D., & Parhi, K. K., (2015). Iterative vessel segmentation of
fundus images. IEEE Transactions on Biomedical Engineering, 62, 1738–1749.
Sheba, K., & Gladston, R., (2016). Objective quality assessment of image enhancement
methods in digital mammography-a comparative study. Signal and Image Processing: An
International Journal, 7.
Singh, S., & Bovis, K., (2005). An evaluation of contrast enhancement techniques for
mammographic breast masses; Chapter VIII. 5. Graphics Gems, IV., 9, 109–119.
Staal, J., Abrano, A., Niemeijer, M., Viergever, M., & Ginneken, B., (2004). Ridge based
vessel segmentation in color images of the retina. IEEE Transactions on Medical Imaging,
23, 501–509.
Zuiderveld, K., (1994). Contrast limited adaptive histogram equalization. Chapter VIII.5,
Graphics Gems, IV, 474–485.
CHAPTER 2
ABSTRACT
2.1 INTRODUCTION
Now-a-days deep learning exploration has become the recent trend of research
in various fields. With advent of high-end architecture suitable to implement
deep learning environment, researchers try to exploit the benefit of this to a
greater extent. Among different handwritten digit or character classification
methods, Hochreiter and Schmidhuber (1997), and Voigtlaender, Doetsch,
and Ney (2016) describe applications of long short-term memory (LSTM).
Graves, Fernandez, Gomez, and Schmidhuber (2006) and Graves et al.
(2009) trained recurrent neural network (RNN) with connectionist temporal
classification (CTC). Graves and Schmidhuber (2009) also used a multidi
mensional RNN. Pham, Bluche, Kermorvant, and Louradour (2014) adjusted
neural network parameters to improve the result. Bluche and Messina (2017)
deals with multi lingual hand writing recognition. Puigcerver (2017) verifies
the applicability of different recurrent layers whereas Castro, Bezerra, and
Valena (2018) establishes the effectiveness of boosting multidimensional
An Efficient and Optimized Deep Neural Network 21
A DNN is an artificial neural network having more than one hidden layer in
between input and output layer. The neurons of the network are inter connected
with weighted connections. The advantage of using deep network is that the
network itself is capable of extracting features of the input patterns. Thus,
programmer does not require to establish efficient handpicked features to repre
sent input patterns. The DNN computes and adjusts the correct mathematical
An Efficient and Optimized Deep Neural Network 23
weights to convert the input into the output. The impulse or signal passes
through the neural network layers finding the probability of each output.
Input layer accepts initial information from outside the network. The consecu
tive nodes of the network process these inputs to draw some inference.
These are the layers in between input layer and output layer of a neural
network. The nodes of theses layers are responsible for processing the inputs
and all intermediate computations.
Output layer is responsible for producing the output of the neural network by
computing individual class probability.
Network hyper parameters are some values which are required to be decided
before starting training process of the network such as learning algorithm,
leaning rate, number of hidden layers, batch size, dropout value, etc. Deciding
the best evaluated value of hyper parameters is known as hyper parameter
tuning. Hyper parameter tuning may be done either manually or by applying
grid search over the search space.
Following are some of the network hyper parameters which have been
tried to be optimized or tuned in the following subsections for network
performance improvement.
24 Advances in Data Science and Computing Technology
2.3.4.2 OPTIMIZER
2.3.4.5 DROPOUT
Each row of the csv file represents one labeled example. As this is a
10-class classification problem, column 0 represents the label that a human
observer has assigned for it. Columns 1 through 784 represent the feature
values for each pixel of 28×28=784-pixel values. The pixel values are in
the range 0–255. 0 represents white, 255 represents black. Most of the pixel
values are 0. Numbers of training samples and test samples are 48,000 and
12,000, respectively. The ratio of train set and validation set is 80:20.
Validation accuracy and test accuracy have been used as evaluation metrics
in this process. Validation set is a part of training set, used to validate the
model during its generation. Validation phase avoids overfitting of the
model. Test set is the unknown set of data, which the already built model is
supposed to classify.
True positive (TP) is the proportion of truly positive samples in the whole
population whereas, true negative (TN) is the proportion of truly negative
samples in the whole population. Similarly, false positive (FP) is the propor
tion of falsely positive samples in the whole population whereas false negative
(FN) is the proportion of falsely negative samples in the whole population.
Accuracy can be defined as the proportion of true results, both TP and
TN, in a population. It can be defined in terms of TP, TN, FP and FN as:
Accuracy = (TN + TP)/(TN + TP + FN + FP) (1)
An Efficient and Optimized Deep Neural Network 27
All the experiments have been implemented in Python 3.6.8 using Tensor
Flowv1 at backend. Implementations have been executed in Google online
Colab cloud environment where Tesla K80 GPU, 12 GB VRAM, 4* Intel(R)
Xeon(R) CPU @ 2.20 GHz, 13.51 GB RAM, 358.27 GB HDD are available
as deep network execution resources.
High level APIs of Google’s deep learning library TensorFlow have been
used to implement and evaluate the work.
The input layer contains 784 weights corresponding to the input images
shape of 28×28 pixel. The first hidden layer will contain 784×n weights where
n represents the number of nodes in the layer. First hidden layer captures
low level features and consecutive layers capture more sophisticated features
which can be visualized for perception also.
The network architecture followed to evaluate the work consists of one input,
one output layer and 4 hidden layers. Rectified linear unit (ReLU) has been
used as nonlinear activation function in hidden layers. One dropout layer has
been inserted between 4th hidden layer and output layer with dropout value
of 0.2. Different layers, their output shape and number of parameters in each
layer have been depicted in Figure 2.2.
Performance of the model has been evaluated using three different learning
rates and the results obtained are represented in Table 2.1. Best validation
accuracy and test accuracy are secured using learning rate = 0.05. Table 2.1
represents learning rate evaluation.
their best performing values. Table 2.3 represents number of hidden layer
evaluation.
Batch size of 30, 60, 100, and 150 have been experimented for network
performance evaluation. Table 2.4 shows all the metric values. Best perfor
mance is provided if batch size considered is 60.
(a) (b)
(c) (d)
FIGURE 2.3 LogLoss curves (a) Adagrad; (b) Adam; (c) SGD; (d) Adagrad with lr = 0.05
and dropout = 0.3.
(a) (b)
FIGURE 2.4 (a) Training and validation accuracy of optimized network; (b) training and
validation loss of optimized network.
2.5 DISCUSSION
Among different DNN hyper parameters, learning rate (lr), learning algorithm,
number of hidden layers, dropout value and batch size have been addressed
to frame the optimization problem. Optimizations of these hyper parameters
are evaluated by maximization of objective function. The objective functions
used here are test and validation accuracies. The stored outcome of best
evaluation indicates optimized hyper parameter values.
The search space of the optimization problem has been defined as follows.
Four lr values (0.5, 0.1, 0.05, and 0.01) have been evaluated. Among them
best accuracy was obtained with lr = 0.05. Different learning algorithms such
as SGD, Adam, and Adagrad have been evaluated with lr = 0.05. Adagrad
algorithm performed best to the specific application of hand written digit
recognition.
This classifier has been further optimized for number of hidden layers. Five
variations (1, 2, 3, 4, and 5 hidden layers) have been considered for evaluation.
Following the experimental values obtained for objective functions, it can be
decided that the network architectures with two or four hidden layers perform
the best. Moreover, the classifier has been experimented with variations of
batch sizes (30, 60, 100, and 150). The best performing batch size is 60.
With these four network hyper parameter optimizations, the model
is further optimized in terms of time and computational complexity by
applying regularization method, i.e., introducing dropout layers in between
last hidden layer and output layer as dropout layer randomly drops out some
definite percentage of hidden neurons from the network. In this process, the
same accuracy has been obtained with 0.2 dropout value also. Maximum
32 Advances in Data Science and Computing Technology
2.6 CONCLUSION
KEYWORDS
• batch size
• deep neural network
• dropout
• handwritten digit recognition
• hidden layer
• learning rate
• optimization algorithm
REFERENCES
Baldominos, A., Saez, Y., & Isasi, P., (2019). A survey of handwritten character recognition
with MNIST and EMNIST. Applied Sciences, 9(15), 3169. doi: 10.3390/app9153169.
An Efficient and Optimized Deep Neural Network 33
Bluche, T., & Messina, R., (2017). Gated convolutional recurrent neural networks for
multilingual handwriting recognition. In: 2017 14th IAPR International Conference on
Document Analysis and Recognition (ICDAR). doi: 10.1109/icdar.2017.111.
Castro, D., Bezerra, B. L. D., & Valenca, M., (2018). Boosting the deep multidimensional
long-short-term memory network for handwritten recognition systems. In: 2018 16th
International Conference on Frontiers in Handwriting Recognition (ICFHR). doi: 10.1109/
icfhr-2018.2018.00031.
Domhan, T., Springenberg, J. T., & Hutter, F., (2015). Speeding up automatic hyperparameter
optimization of deep neural networks by extrapolation of learning curves. Twenty-Fourth
International Joint Conference on Artificial Intelligence (IJCAI).
Graves, A., & Schmidhuber, J., (2009). Offline handwriting recognition with multidimensional
recurrent neural networks. Advances in Neural Information Processing Systems, 545–552.
Graves, A., Fernández, S., Gomez, F., & Schmidhuber, J., (2006). Connectionist temporal
classification. Proceedings of the 23rd International Conference on Machine Learning –
ICML 06. doi: 10.1145/1143844.1143891.
Graves, A., Liwicki, M., Fernandez, S., Bertolami, R., Bunke, H., & Schmidhuber, J., (2009).
A novel connectionist system for unconstrained handwriting recognition. IEEE Transactions
on Pattern Analysis and Machine Intelligence, 31(5), 855–868. doi: 10.1109/tpami.2008.137.
Hochreiter, S., & Schmidhuber, J., (1997). Long short-term memory. Neural Computation,
9(8), 1735–1780. doi: 10.1162/neco.1997.9.8.1735.
Mishra, S., Malathi, D., & Senthilkumar, K., (2018). Digit recognition using deep learning.
International Journal of Pure and Applied Mathematics, 118(22), 295–302. ISSN: 1314-3395.
Pham, V., Bluche, T., Kermorvant, C., & Louradour, J., (2014). Dropout improves recurrent
neural networks for handwriting recognition. In: 2014 14th International Conference on
Frontiers in Handwriting Recognition. doi: 10.1109/icfhr.2014.55.
Puigcerver, J., (2017). Are multidimensional recurrent layers really necessary for handwritten
text recognition? In: 2017 14th IAPR International Conference on Document Analysis and
Recognition (ICDAR). doi: 10.1109/icdar.2017.20.
Shamim, S. M., Miah, M. B. A., Sarker, A., Rana, M., & Jobair, A. A., (2018). Handwritten
digit recognition using machine learning algorithms. Indonesian Journal of Science and
Technology, 3(1), 29. doi: 10.17509/ijost.v3i1.10795.
Siddique, F., Sakib, S., & Siddique, M. A. B., (2019). Handwritten Digit Recognition Using
Convolutional Neural Network in Python with Tensor Flow and Observe the Variation of
Accuracies for Various Hidden Layers. doi: 10.20944/preprints201903.0039.v1.
Vijayalaxmi, R. R., & Bhavanishankar, K., (2019). Handwritten digit recognition using CNN.
International Journal of Innovative Science and Research Technology, 4(6). ISSN: 2456-2165.
Voigtlaender, P., Doetsch, P., & Ney, H., (2016). Handwriting recognition with large
multidimensional long short-term memory recurrent neural networks. In: 2016 15th Inter
national Conference on Frontiers in Handwriting Recognition (ICFHR). doi: 10.1109/
icfhr.2016.0052.
Yann LeCun (1998). The MNIST Database. http://yann.lecun.com/exdb/mnist/ (accessed on
08 December 2021).
Zohra, M., & Rao, D. R., (2019). A comprehensive data analysis on handwritten digit recogni
tion using machine learning approach. International Journal of Innovative Technology and
Exploring Engineering (IJITEE), 8(6). ISSN: 2278–3075.
CHAPTER 3
ABSTRACT
Road conditions are one of the major cause of accidents around the world.
Distress on road and combination of human ignorance/error may be really
fatal. This chapter proposes a system that can help to prevent road accidents
caused by distress on roads and human error. The proposed system minimizes
the occurrence of road accidents through real-time monitoring of road
conditions and the driver’s activities. A robust system has been proposed
based on image processing, computer vision and deep learning. This system
employs two cameras, one fixed in front of the vehicle for capturing the input
video frames which is being processed in real time using image processing
and computer vision algorithms, this detects the potholes or any sort of
distress on the roads which will be projected on the driver’s windshield using
a heads up display (HUD). Another camera will check the driver’s attention,
whether or not driver is operating radio or checking phone, talking over
Advances in Data Science and Computing Technology: Methodology and Applications. Suman Ghosal,
Amitava Choudhury, Vikram Kumar Saxena, Arindam Biswas, & Prasenjit Chatterjee (Eds.)
© 2023 Apple Academic Press, Inc. Co-published with CRC Press (Taylor & Francis)
36 Advances in Data Science and Computing Technology
mobile, etc. These two systems works along with a decision maker algorithm
which decides the severity of the situation and generate an alert signal to the
driver, if the road conditions are poor and if, the driver is distracted. A deep
learning based architecture applied to enhance the efficiency for monitoring
driver’s attention, which used StateFarm dataset.
3.1 INTRODUCTION
alert and HUD system. The pothole detection is entirely based on Image
processing and computer rather than machine learning to reduce the latency
and make the system as real time as possible. The driver’s attention moni
toring is done using a deep learning approach implemented using Tensor
flow (an open source machine learning library), which will monitor the
gesture of the driver and will decide whether he/she is paying attention to
driving or not. The algorithms and techniques are implemented using python
3.7 as the choice of programming language and Open CV (an open source
computer vision library) and Tensor flow libraries.
The outline of this chapter consists of six sections. Section 3.1 illustrates
the introduction and motivation of the proposed work. Section 3.2 of this
chapter discusses the glimpse of state of art exists in the proposed area.
Section 3.3 discusses the proposed system, and workflow of the model.
Section 3.4 emphasis on the results and related discussions. Finally, Section
3.5 concluded the proposed work.
The model that this chapter uses for the detection of the attention of the driver
is based on the image classification implemented using tensor flow. In this, a
deep learning model is trained to classify images among various classes and
then recognize them based on the training received. The state farm dataset
(Abouelnaga, Eraqi, and Moustafa, 2017) which contains snapshots from a
video captured by a camera mounted in the car is used in this project. The
training set has ~22.4 K samples with equal distribution among the classes
and 79.7 K unlabeled test samples.
There are 10 classifications in the state farm dataset:
• Safe driving;
• Texting using right hand;
• Talking on the phone using right hand;
• Texting using left hand;
• Talking on the phone using left hand;
• Operating radio/multimedia system;
• Drinking;
• Reaching behind;
• Hair and makeup;
• Talking to passenger(s).
The driver’s attention monitor was trained using tensor flow transfer
learning (Chris, n.d.). Inception v3 (It is a widely-used image recognition
model) (Szegedy et al., 2016) which is trained on Image net dataset (Deng
40 Advances in Data Science and Computing Technology
et al., 2009) is used as a starting point and retrained using transfer learning
to recognize the above mentioned classes of images. A 2048-dimensional
vector for each image is passed to the Top layer as an input. It trains a soft
max layer on top of this layer. Suppose the soft max layer contains N labels
(10 in our case), then this corresponds to training N + 2048*N (or 1001*N)
model parameters corresponding to the learned weights and biases. The
Deep learning model that was obtained after the training process was used to
test on the 10% of the training images, that is, 10% of 20,000, which is 2,000
images. The tested model was then re-assessed over number of iterations to
increase the accuracy and performance of the model. The testing at the last
step was done on over 4,000 images.
The flowchart described in Figure 3.2 shows the technique and algorithm used.
It uses a mix of computer vision and image processing techniques to find the
potholes/distress in the input feed. Firstly, the given input frames are converted
from BGR to Gray scale to improve the performance simply because BGR
images have three channels and gray scale images have one channel. The Gray
Scale image is passed through a 3×3 Gaussian filter to remove noise before
passing it to canny edge algorithm to detect the edges in the image which
is the base of our classification (Canny, 1986). The detected edges serves 2
purposes, one is to find the lanes in the road to extract the region of interest
(ROI) from the road which helps to remove unnecessary parts from the images
which greatly improves the performance and reduces latency. The lanes are
detected using Hough Lane detection, which converts the edges into lanes
which are filtered to get the ROI. This system uses a 10 second timer to reset
the position of lanes so that it can counter changing road conditions. The ROI
is superimposed on the edges to find the contours only on the surface of the
road. These detected contours are filtered based on their shape and size to
avoid false detections. The filtered contours are then projected back.
The system has been developed using AMD A8-APU running at 2.2 Ghz
with 8 GB of RAM for testing both the systems. Testing on the video feeds
gave us a speed of 30 Frames per second making it more real-time. In our
experimentation, we have found that our method with computer vision was
Design and Development of a Driving Assistance 41
more real-time. Computer vision methods are easy to implement and manu
facture as well provide with better real-time results. The number of frames
one system can process in a second with desired accuracy was chosen to
measure the performance of both the systems. The results of the two models
are further explained in subsections.
The pothole detector, when worked on a sample video feed, works efficiently
Processing 30 Frames per second on an average. Some of the result samples
are given below Figure 3.4 describes the process of pothole detection and the
output. Figure 3.4(a) is the input frame of the road image. Figure 3.4(b) shows
the initial ROI, that is, just the road, obtained from the frame of Figure 3.4(a).
Figure 3.4(c) depicts the output of the canny edge detector that is used to detect
42 Advances in Data Science and Computing Technology
the lane in the road as shown in Figure 3.4(d). Figure 3.4(e) further reduces the
final ROI to the driving lane at the same time, detects the edges for the pothole
contours. Figure 3.4(f) shows the bounding box around the pothole contour
that are being detected. This image is also being projected to the driver.
(a) (b)
(c) (d)
FIGURE 3.3 Output of driver’s attention model: (a) depicts the user talking on phone using
his right hand; (b) depicts the user reaching behind; (c) depicts the user is drinking something;
and (d) shows that the user is careful.
3.5 CONCLUSIONS
The approach and procedure suggested in this chapter has not been tested
practically in real life scenario, hence this just acts as a prototype system.
Design and Development of a Driving Assistance 43
(a) (b)
(c) (d)
(e) (f)
FIGURE 3.4 Output of pothole detector at various stages: (a) is the input frame of the road
image; (b) shows the initial region of interest (ROI); (c) depicts the output of the canny edge
detector that is used to detect the lane in the road as shown in (d); (e) reduces the final region of
interest (ROI) to the driving lane at the same time, detects the edges for the pothole contours;
and (f) shows the bounding box around the pothole contour that will are being detected.
44 Advances in Data Science and Computing Technology
KEYWORDS
• computer vision
• deep learning
• image classification
• image processing
• object detection
• pothole detection
REFERENCES
Abouelnaga, Y., Eraqi, H. M., & Moustafa, M. N., (2017). Real-Time Distracted Driver Posture
Classification. No. Nips, [Online]. Available: http://arxiv.org/abs/1706.09498 (accessed on
08 December 2021).
Azhar, K., Murtaza, F., Yousaf, M. H., & Habib, H. A., (2016). Computer vision based
detection and localization of potholes in asphalt pavement images. In: 2016 IEEE Canadian
Conference on Electrical and Computer Engineering (CCECE) (pp. 1–5). doi: 10.1109/
CCECE.2016.7726722.
Design and Development of a Driving Assistance 45
Canny, J., (1986). A computational approach to edge detection. IEEE Trans. Pattern Anal.
Mach. Intell., PAMI-8(6), 679–698. doi: 10.1109/TPAMI.1986.4767851.
Choudhury, A., & Negi, A. (2016). A new zone based algorithm for detection of license plate
from Indian vehicle In: 2016 Fourth International Conference on Parallel, Distributed and
Grid Computing (PDGC) (pp. 370–374). IEEE.
Chris, D. (2018). Tensor flow Image Classification. https://github.com/Microcontrollers And
Deng, J., Dong, W., Socher, R., Li, L. J., Li, K., & Fei-Fei, L., (2009). ImageNet: A large-scale
2
Department of Electrical and Electronics Engineering, Pailan College
ABSTRACT
4.1 INTRODUCTION
The pandemic caused by COVID-19 virus has both shook and united the
world like never before. Never in the recent past, has any epidemic concur
rently affected governments across the globe with the same sense of urgency.
With the global casualty figures crossing over 200,000 (worldometers.info/
coronavirus, 2020)—different countries and agencies are revisiting their
warfare strategies against this virus. Originated in China (Huang et al.,
2020), the pandemic has caused havoc in other countries like Italy and USA
as well (Graselli et al., 2020). The entire Europe and North America for that
matter are yet to control the pandemic. India too is fighting her war against
this pandemic. Figures 4.1(a) and (b) have shown the number of active cases
of COVID-19, worldwide, and India respectively.
FIGURE 4.1 (a) Active cases worldwide (Worldometers, 2020); (b) active cases with in
India (Wikipedia, 2020).
The first case of Novel Corona virus (COVID-19) in India was reported
on 30th January, 2020 (PIB, 2020). WHO declared it as a global pandemic
(Wang et al., 2020) and as a result the Indian government declared an initial
lockdown of 21 days (Advisory Trade Facilitation, GoI, 2020) on 24th of
March, 2020, in order to prevent community transmission. On 14th April,
India entered into the second phase of lockdown (till 3rd May, 2020), adhering
to the advice of different agencies. Different medical and administrative
bodies in the country (and outside too) proposed social distancing as one of
the means to deal with the pandemic (Singh and Adhikari, 2020).
As the end of second phase of lockdown in India is approaching, the
country has an approximate 30,000 (mygov.in, 2020) reported cases of
COVID-19. Although this is a large number and the numbers are expected to
increase further, yet it must be said that in a country like India, with a popu
lation more than 1.35 billion (Wikipedia, 2020) and a population density
Prediction of the Positive Cases of COVID-19 49
of 464/Km2 (worldometers.info, 2020), the country has not yet entered into
the stage of community transmissions. Even if India is lucky enough to
avoid community transmissions, the total infected population is sure to be a
mammoth one due to the reasonably high population density of the country.
As a result, a prediction mechanism with an acceptable degree of accuracy is
required to estimate beforehand the number of people who might be infected
by the virus. This is required in order to keep both the government and the
health workers prepared for the upcoming months, such that they do not get
overwhelmed with the number of cases all of a sudden.
Tomar and Gupta (2020) have done predictions of the number of affected
patients countrywide, for a period of 30 days. However, a monolithic predic
tion of this type is not appropriate for a country like India where the number
of infected persons vary by a huge margin for different states. To mention,
Maharashtra has the highest number of affected persons and Sikkim has
none.
For example, till 26th April, 2020, the total number of reported cases
in Maharashtra was more than 8,000, whereas, for at least 12 states/union
territories the number of confirmed cases were yet to reach the three-figure
mark (covid19india.org, 2020). One of the reason for this is a huge variation
in population density among the states of the country. In our results, we have
shown why a countrywide prediction will give a greater margin of error as
compared to predictions done for the individual states.
In this chapter, we have predicted the number of confirmed/active cases, for
a period of next 30 days, for the entire country. For the purpose, we have used
algorithm comprising of long short-term memory (Hochreiter and Schmid
huber, 1997) and have compared the results for the major states and union
territories of India. On analyzing the results, we have found that different
states are performing differently while combating the current situation.
Our main contributions in this chapter are as follows:
• Predicting the total number of COVID-19 cases in India for coming
30 days;
• Showing that a countrywide prediction is bound to give greater margin
of error when compared to state wise prediction; and
• Identifying the best states in terms of preventive actions taken against
the outbreak of the pandemic.
We have trained our system with data ranging from 30th January, 2020 to
20th April, 2020. Thereafter, we have validated our results for the period of
21st April, 2020 to 25th April, 2020.
50 Advances in Data Science and Computing Technology
The prediction made in this chapter is for the period of one month, i.e.,
26th April, 2020 to 26th May, 2020. The rest of the chapter is organized in the
following way: Section 4.2 contains methodology of our work. Section 4.3
contains the results along with the data sets and finally we have concluded
in Section 4.4.
4.2 METHODOLOGY
The exact reason for the occurrence of COVID-19 is yet to be known and
hence it is quite difficult to categories the COVID-19 symptoms. As per
the guidelines shared by World Health Organization (WHO), COVID-19
symptoms are very similar to normal flu or influenzas. Hence, to create a
mathematical model for predicting the number of affected persons by the
virus is really difficult. In scenarios like this, recurrent neural network
(RNN) algorithm is very useful. Generally, this algorithm is used to predict
time series analysis based on large historical information. However, the
main disadvantage of such a model is the time consumed in training a large
dataset. This is due to the gradient exploding problem (Jiang and Schotten,
2020; Connor et al., 1994). As a solution, long short term memory (LSTM)
is often very useful and this model is having the capabilities to learn order
dependence in sequential prediction problems (Tomar et al., 2020; Hochre
iter and Schmidhuber, 1997).
2. Input Gate: To update the cell state, input gate is used. First, the
previous hidden state and current input are pass into a sigmoid func
tion as. That decides which values will be updated by transforming
the values between 0 and 1 which indicates not important and impor
tant measure respectively. A hidden state and current input also pass
into the tanh function to squish values between –1 and 1 to regulate
the network. It is formulated in Eqn. (3).
52 Advances in Data Science and Computing Technology
3. Cell State: Initially, the cell state is multiplied by the forget vector.
This has a possibility of dropping values in the cell state if it is multi
plied by values nearer to 0. Then we take the output from the input
gate and do a pointwise addition, which updates the cell state to new
values that the neural network finds relevant.
= (
Ct σ f i * Ct −1 + it * Ct ) (4)
FIGURE 4.3 COVID-19 confirm cases actual vs. predicted from 21st April 2020 to 25th
April 2020.
(a) (g)
(b) (h)
(c) (i)
(d) (j)
FIGURE 4.4(a–l) (Continued)
Prediction of the Positive Cases of COVID-19 55
(e) (k)
(f) (l)
FIGURE 4.4 (a–l) State wise COVID-19 cases prediction and validation between April 20th
2020 to April 25th 2020. Particularly for Gujarat we can see that the number of actual cases is
less than that of the predicted cases.
TABLE 4.2 Comparison of Reported and Predicted Best Case (West Bengal)
Date Actual Data Cited in Predicted Data Error Percentage
Government Website
21st April 2020 392 391 0.255102
22nd April 2020 423 429 –1.41844
23rd April 2020 456 466 –2.19298
24th April 2020 514 501 2.529183
25th April 2020 571 535 6.304729
56 Advances in Data Science and Computing Technology
The prediction results are based on statistical analysis. From Table 4.1,
it is also observed that from 21st April 2020 onwards the predicted cases
follows a linear pattern, which indicate a stability in number of effected
in India. It is now very crucial to decide whether to extend the lockdown
beyond 3rd May, 2020. As per our results, it can be said that as certain states
are doing better than others in terms of controlling the rate of transmission,
a phased removal of lockdown is recommendable for the country. Hence, we
can say that, within a month India can control the effect of COVID-19 and
will definitely back the normal day-to-day work.
4.4 CONCLUSION
From the results, it is clear that predicting the number of transmissions for
the entire country could give greater error percentage in the predicted data.
Therefore, it is recommended to go state wise in order to predict the number
of cases for an upcoming period of 30 days.
Analyzing the results of the individual states, we conclude that Gujarat,
West Bengal, and Andhra Pradesh have been able to keep the rate of trans
mission lower as compared to any other state.
On the other hand, in states like Haryana, Maharashtra, Tamil Nadu and
Uttar Pradesh the rate of transmission of the infection has increased than
expected. May be an extension of the lockdown period could reduce the rate
of transmission in these states.
KEYWORDS
• COVID-19
• digital India
• long short-time memory
• machine learning
• pandemic
• prediction
Prediction of the Positive Cases of COVID-19 57
REFERENCES
Uttarakhand, India
3
University of Petroleum and Energy Studies, Dehradun, India,
E-mail: [email protected]
ABSTRACT
With the rapid growth of digital object recognition in over the year, automatic
image classification and detection has become the most difficult challenge in
computer vision areas. Contrary to human experiences, automated percep
tion, and interpretation of tiny images by machine is difficult. Numerous
researches have been conducted throughout the existing identification
model to address problem, but still the performance has been restricted.
Nevertheless, those approaches lack appropriate classification method. In
this proposed work, deep learning algorithms is used to obtain the predicted
outcomes in the field, such as computer visions and features a deep learning
algorithm often used to classify the images automatically. In order to classify
tiny images, we use the image-net data set as a standard. The tiny images
need more computational power to classify images. By training the images
using deep network we get the better accuracy response with in experimental
phase it demonstrates that our approach provides the high precision in image
60 Advances in Data Science and Computing Technology
5.1 INTRODUCTION
takes the raw pixel data from the image, trains the model, and then automatically
extracts features such as margins. Rashad et al. (2011) highlighted patterns
from the image for better classification.
Antun et al. (2019) concluded that the new approach of learning recon
struction algorithm for reconstruction of images in the inverse problem
produces unstable approaches usually through deep learning. In addition,
the test shows growing anomalies of uncertainty, obstacles, and novel ideas
towards science. Specifically: minor disruptions result in a variety of different
objects. Various networks generate different artifacts and instabilities. Range
of failure to restore massive changes so there is a broad range of instabilities
as regards structural changes.
Shiddieqy et al. (2017) implemented a deep convnet raspberry pi plat
form by using TensorFlow. Larger network size can increase model accuracy
rate. This whole system is capable of classifying two cat and dog types
which have several similarities. Raspberry pi computing capacity capable
of deploying 5 layer CNN network but still not adequate for classification of
applications in real time.
Tripathi et al. (2019) presented functional execution of image identifi
cation to use a small, CNN, offering less complexity and providing better
classification precision for all sets of data analyzed. Automatic data image
processing fills the distance between image files at the human vision and the
pixel unit. Deep ConvNet are being expressively deployed for the analysis,
detection, and classification of images for a variety of tasks. Such neural
networks, analogous to the human algorithm, contain neurons with learning
set of weights that are learned to recognize and categorize various objects or
functionalities throughout the image.
The aim of proposed work is to classify tiny images among 200 classes
with less computational power using deep residual network ResNet18 and
ResNet50. Pre-trained ResNet18 and ResNet50 model are used as a feature
extractor for transfer learning and their comparative analysis is done for
finding the best solution based on Accuracy curve, Loss curve and confusion
matrix.
Images are transformed from BGR to RGB because python expects (R, G,
B) using the pre-process input function by default, and images are resized
to prevent data leakage issues because most images look identical. Data
augmentation is a technique that allows the data diversity available for training
models to be substantially expanded, without actively collecting new data.
In ANACONDA 3.0 the method was put into practice. A standard PC fitted
with 2.30 GHz Intel(R) Core(TM) i5-3567 CPU, 64-bit operating system, 8
GB RAM and 2 GB AMD Radeon R5 M330 graphics engine run on Windows
10 operating system has been configured throughout the entire training and
testing phase of the model mentioned significantly. As the activation function,
SoftMax, and ReLU are used and Adam (Adaptive Moment Estimation) is the
optimizer. Accuracy curve, loss curve, and confusion matrix based analysis
are per formed on the training and validation set of deep ResNet model.
Logarithmic loss of multiple classes also widely recognized as the
categorical cross entropy is used as a metric for this work. A perfect classifier
gets the log loss of 0 and is calculated by Eqn. (4).
logloss = 1 / N ∑ i ∑ yij log ( pij )
N M
j
(4)
The first experiment on the ImageNet dataset performed with ResNet18
for 15 epochs. The training accuracy recorded 89% with logarithm loss 0.515
and the validation accuracy was 53% with logarithm loss 1.939. Figures 5.1
and 5.2 show the accuracy and loss curve for the experiment 1.
accuracy was 63% with logarithm loss 1.645 (Figure 5.3). Figures 5.4 and
5.5 shows the accuracy and loss curve for the experiment 2.
5.4 CONCLUSION
KEYWORDS
REFERENCES
Alom, M. Z., Taha, T. M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M. S., & Asari, V.
K., (2018). The History Began from Alexnet: A Comprehensive Survey on Deep Learning
Approaches. arXiv preprint arXiv:1803.01164.
Antun, V., Renna, F., Poon, C., Adcock, B., & Hansen, A. C., (2019). On Instabilities of Deep
Learning in Image Reconstruction-Does AI Come at a Cost? arXiv preprint arXiv:1902.05300.
Barbedo, J. G. A., (2018b). Impact of dataset size and variety on the effectiveness of deep
learning and transfer learning for plant disease classification. Computers and Electronics
in Agriculture, 153, 46–53.
Barbedo, J. G., (2018a). Factors influencing the use of deep learning for plant disease
recognition. Biosystems Engineering, 172, 84–91.
Bastidas, A., (2017). Tiny ImageNet Image Classification. https://pdfs.semanticscholar.org/1b
0c/2ba54f7e2f3f5b3a2098721d36e6079d0382.pdf (accessed on 08 December 2021).
68 Advances in Data Science and Computing Technology
Chandrarathne, G., Thanikasalam, K., & Pinidiyaarachchi, A., (2020). A comprehensive study
on deep image classification with small datasets. In: Advances in Electronics Engineering
(pp. 93–106). Springer, Singapore.
Labach, A., Salehinejad, H., & Valaee, S., (2019). Survey of Dropout Methods for Deep Neural
Networks. arXiv preprint arXiv:1904.13310.
Liu, J. E., & An, F. P., (2020). Image classification algorithm based on deep learning-kernel
function. Scientific Programming, 2020.
Prabhu, (2018). CNN Architectures – LeNet, AlexNet, VGG, GoogLeNet and ResNet. https://
medium.com/@RaghavPrabhu/cnn-architectures-lenet-alexnet-vgg-googlenet-and-resnet
7c81c017b848 (accessed on 08 December 2021).
Rashad, M. Z., El-Desouky, B. S., & Khawasik, M. S., (2011). Plants images classification
based on textural features using combined classifier. International Journal of Computer
Science and Information Technology, 3(4), 93–100.
ResNet, AlexNet, VGGNet, Inception, (2020). Understanding Various Architectures of
Convolutional Networks. Retrieved from https://cv-tricks.com/cnn/understand-resnet-alexnet
vgg-inception/ (accessed on 08 December 2021).
Schmidhuber, J., (2015). Deep learning in neural networks: An overview. Neural Networks,
61, 85–117.
Shiddieqy, H. A., Hariadi, F. I., & Adiono, T., (2017). Implementation of deep-learning
based image classification on single board computer. In: 2017 International Symposium on
Electronics and Smart Devices (ISESD) (pp. 133–137). IEEE.
Srivastava, N., Hinton, G., Krizhevsky, A., Sutskever, I., & Salakhutdinov, R., (2014).
Dropout: A simple way to prevent neural networks from overfitting. The Journal of Machine
Learning Research, 15(1), 1929–1958.
Tripathi, S., & Kumar, R., (2019). Image classification using small convolutional neural
network. In: 2019 9th International Conference on Cloud Computing, Data Science &
Engineering (Confluence) (pp. 483–487). IEEE.
Xin, M., & Wang, Y., (2019). Research on image classification model based on deep convolution
neural network. EURASIP Journal on Image and Video Processing, 2019(1), 40.
CHAPTER 6
ABSTRACT
6.1 INTRODUCTION
field, through wireless links. The sensor is used to collect the data regarding
both physical and environmental parameters, such as pressure, heat, light,
etc. The output of these sensors is transmitted to the base station (BS) for
further processing (Guha and Roy, 2018). In recent years, the efficient design
of a WSN has become a leading area of research due to its significant nature
of adaptability in diverse applications. One of the challenging applications in
this field is that of node localization (Zhang et al., 2017). It is a cooperative
process where nodes with known locations are used to localize nodes at
unknown locations. These nodes with known locations as well as unknown
locations are called anchor nodes and sensor nodes respectively.
As WSNs are penetrating into the industrial domain, many research
opportunities are emerging in the area of node localization. For example,
over the past decades, the safety measures adopted by the coal industry
(Shrawankar and Mangulkar, 2018) has been an important factor in
constraining its development around the world. It is known that coal mining
accidents result in loss of life and property. In this issue, mines environment
monitoring through node localization can reduce such losses and ensure
miners safety as far as possible (Srikanth, Kumar, and Rao, 2018).
In this context, a time difference of arrival (TDOA) based node localization
method is proposed in this chapter to obtain minimized error in the prediction
of the sensor node position. The proposed approach relies on the distance
between the anchor nodes and the sensor nodes. In order to obtain such
distance, the time difference between the data transmission by sensor node
and data reception by anchor node is considered. In this work, an artificial
feed-forward neural network with three hidden layers is used. To train the
model have been introduced by different cases by varying the number of
anchor nodes and their location along with the number of sensor nodes.
The rest of this chapter is organized as follows: Section 6.2 introduces a
literature survey for completeness of the work. Next, Section 6.3 presents the
system model. The proposed approach is discussed in Section 6.4. The results
are shown in Section 6.5. Finally, we conclude our work in Section 6.6.
other hand, range free techniques are dependent on hop based information.
In 2017, Shahra et al. in 2017 compared range free and range based localiza
tion algorithms. The result of this work shows that range based algorithms
are more accurate than range free algorithms. In 2019 (Wu et al., 2019),
the authors stated that TOA and TDOA, among the range based positioning
methods achieve higher position accuracy to perform the measurement on
minimized load requirement for the single sensor node. Samanta et al. in
2018 discussed a node localization using ANN to manipulate the location
of the sensor nodes which obtains an accuracy of 98%. In order to improve
the accuracy further by minimizing RMSE and Average Range Error, a new
procedure for node localization is introduced here as discussed next.
In order to develop the proposed model and measure its efficiency, the
following definitions are introduced next:
72 Advances in Data Science and Computing Technology
where; eij is the residual of itℎ sensor node from the jtℎ anchor node.
Definition 4 (Average Accuracy): It defines how correctly the
position of the sensor node is predicted. If the position is predicted
more accurately, the error in the distance would be less and subse
quently higher average accuracy can be obtained. It is calculated in
percentage by using the following expression.
e
Accuracy ∑
Average = ×100 (6)
d actual
Definition 5 (Average Range Error): Let us assume, there lies a
group of sensor nodes within a specific range from an anchor node.
Then the average range error for this specific range is defined as the
average of the errors in terms of distance for all of the sensor nodes
with respect to the anchor nodes. This can be obtained as follows:
Average Range Error = ∑̅|̅ ̅ di ̅ ̅ −̅̅ dpred
̅ |̅̅ (7)
where; di∈R and R can be [(0,10), (10,20),(20,30), (30,40), (40,50),
(50,60), (60,70)] in our proposed work.
FIGURE 6.2 Feed forward neural network with one input, three hidden and two output layers.
Improved TDOA-Based Node Localization in WSN 75
There are six cases to be considered for training the model developed in the
earlier step. In each of the cases, the number of anchor nodes and sensor
nodes have been varied as listed in Table 6.1. The model has been trained and
tested separately for each of the six different cases.
of the feature vector for a particular sensor node. This test input matrix is
then fed to the trained model which in turn predicts the label (X, Y) for each
of the test sensor nodes. Hence, the output of this model can be obtained as
follows:
X
= Y relu (relu (relu (D ∗ W1 + B1 ) ∗W2 + B2 ) ∗W3 + B3 ) ∗W4 + B4 (11)
where; D is the input row vector of length m; Wi is the weight vector at ith
layer and Bi is the bias vector at the ith layer.
6.5 RESULTS
(a) (b)
(c) (d)
(e) (f)
FIGURE 6.4 Original and predicted position of test sensor nodes for: (a) case 1; (b) case 2;
(c) case 3; (d) case 4; (e) case 5; (f) case 6.
The range error of a test sensor node provides an estimate of the error in
prediction of the position of the node when its distance from the anchor node
lies within a known range. The average range error of a particular range is
obtained as per case 7. In this context, from Figure 6.5, the range in which
the least average error is obtained. This information can be used to minimize
the error in prediction during the node localization process.
78 Advances in Data Science and Computing Technology
TABLE 6.2 RMSE and Average Accuracy (in %) for Different Cases
Cases RMSE Average Accuracy (in %)
1 0.973 97.004
2 0.564 98.193
3 0.759 98.015
4 0.287 99.142
5 0.57 98.476
6 0.362 98.902
FIGURE 6.5 Average range error for different number of anchor nodes and sensor nodes.
6.6 CONCLUSIONS
KEYWORDS
REFERENCES
Guha, T. P. K., & Roy, S., (2018). A decentralized fuzzy c-means minimal clustering protocol
for energy efficient wireless sensor network. In: 2018 Fifth International Conference on
Parallel, Distributed and Grid Computing (PDGC) (pp. 24–29). Solan Himachal Pradesh,
India.
Kingma, D. P., & Ba, J., (2014). Adam: A Method for Stochastic Optimization. https://arxiv.
org/abs/1412.6980 (accessed on 08 December 2021).
Nwankpa, C., Ijomah, D., Gachagan, A., & Marshall, S., (2018). Activation Functions:
Comparison of Trends in Practice and Research for Deep Learning. https://arxiv.org/
abs/1811.03378 (accessed on 08 December 2021).
Patel, N. R., & Kumar, S., (2018). Wireless sensor networks’ challenges and future prospects.
In: 2018 International Conference on System Modeling & Advancement in Research Trends
(SMART) (pp. 60–65). Moradabad, India.
Paul, A. K., & Sato, T., (2017). Localization in wireless sensor networks: A survey on
algorithms, measurement techniques, applications and challenges. Journal of Sensor and
Actuator Networks, 6(4).
Samanta, R., Kumari, C., Deb, N., Bose, S., Cortesi, A., & Chaki, N., (2018). Node localization
for indoor tracking using artificial neural network. Third International Conference on Fog
and Mobile Edge Computing (FMEC) (pp. 229–233). Barcelona.
Shahra, E. Q., Sheltami, T. R., & Shakshuki, E., (2017). A comparative study of range-free and
range-based localization protocols for wireless sensor network: Using COOJA simulator.
International Journal of Distributed Systems and Technologies, 8(1).
80 Advances in Data Science and Computing Technology
Shrawankar, U., & Mangulkar, P., (2018). Monitoring and safety system for underground
coal mines. IEEE International Conference on Power Energy, Environment and Intelligent
Control (PEEIC2018).
Srikanth, B., Kumar, H., & Rao, K. U. M., (2018). A robust approach for WSN localization
for underground coal mine monitoring using improved RSSI technique. Mathematical
Modeling of Engineering Problems, 5, 225–231.
Tambe, K., & Krishna, M. G., (2018). An efficient localization scheme for mobile WSN.
International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(2S).
Wu, P., Su, S., Zuo, Z., Guo, X., Sun, B., & Wen, X., (2019). Time difference of arrival (TDoA)
localization combining weighted least squares and firefly algorithm. Sensors, 19, 2554.
Zhang, X., Tepedelenlioglu, C., Banavar, M., & Spanias, A., (2017). Node localization in
wireless sensor networks. In: Node Localization in Wireless Sensor Networks (Vol. 12,
pp. 1–62). (Synthesis Lectures on Communications). Morgan and Claypool Publishers.
PART II
CHAPTER 7
E-COMMERCE WEBSITES
ABSTRACT
and at high volumes that are regularly alluded to Big Data. Thus, this chapter
explains how E-Commerce firms are contributing gigantic to Big Data
Analytics to engage them to take precise and ideal choices.
7.1 INTRODUCTION
data about the socio-economics of the client just as their psychographic and
behavioristic examples. Consequently, Big Data permits advertisers to arrive
at clients at the ideal time and promote the item in a convincing manner to
understand their need and increment the deal.
The chapter is coordinated as follows: Section 7.2 details overview of
related work, Section 7.3 gives the exploratory study and Section 7.4 focuses
on the objectives of the study. Section 7.5 gives analysis and discussions
while Section 7.6 puts forward the recommendations and Section 7.7 finally
includes the references.
Walmart, with more than 20,000 stores in 28 nations is the biggest retailer on
the planet. So, it is fitting then that the organization is building the world’s
biggest private cloud, sufficiently large to adapt to 2.5 petabytes of informa
tion consistently. To understand this data, Walmart has made what it calls
its Data Café – a best in class investigation center point situated inside its
Bentonville, Arkansas central station. The Data Café permits tremendous
volumes of interior and outer information, including 40 petabytes of ongoing
value-based information, to be quickly displayed, controlled, and pictured.
Walmart has an expansive huge information biological system. The large
information environment at Walmart forms numerous Terabytes of new infor
mation and petabytes of authentic information consistently. The examination
covers a large number of items and 100’s of millions clients from various
sources. Walmart has comprehensive client information of near 145 million
Americans of which 60% of the information is of U.S. grown-ups. Walmart
accumulates data on what client’s purchase, where they live and what are the
items they like through in-store Wi-Fi. The enormous information group at
Walmart Labs examinations each interactive activity on Walmart.com-what
purchasers purchase available and, on the web, what is drifting on Twitter,
nearby occasions, for example, San Francisco goliaths winning the World
Series, how neighborhood climate deviations influence the purchasing
behaviors, and so forth. All the occasions are caught and broke down wisely
by huge information calculations to recognize important large information
bits of knowledge for a huge number of clients to appreciate a customized
shopping experience (Figure 7.1).
How Walmart is having a genuine effect to expand deals?
1. Launching New Products: Walmart is utilizing web based life
information to discover about the drifting items with the goal that
they can be acquainted with the Walmart stores over the world.
For example, Walmart dissected internet based life information to
discover the clients were distracted about “Cake Pops.” Walmart
reacted to this information investigation rapidly and Cake Pops hit
the Walmart stores.
2. Better Predictive Analytics: Walmart has as of late changed its
transportation approach for items dependent on large information
examination. Walmart utilized prescient examination and expanded
the base sum for an online request to be qualified with the expecta
tion of complimentary delivery. As indicated by the new dispatching
Impact of Big Data on E-Commerce Websites 87
Despite the fact that business development at Wal-Mart has eased back as of
late, the measurements are still head and shoulders above the greater part of
the business. Contrasted with the best 10 retailers internationally, just Home
Depot beat Wal-Mart consequently on resources or net overall revenue. In
2013, Wal-Mart recorded a net edge of 3.5% and profit for resources of
8.6%. Costco, maybe its nearest rival, had an overall revenue of just 2% and
profit for resources of 6.8% that year. On a business premise, Costco utilizes
its land all the more proficiently, creating deals of $1,100 per square foot, yet
its overall revenue is not even close to what Wal-Mart appreciates.
Then, Amazon is regularly observed as the greatest danger to the Wal-
Mart plan of action. The web based business pioneer has been developing
deals by about 20% every year, creating upper hands en route and set to top
$100 billion in income this year. Incidentally, its prosperity has come from
88 Advances in Data Science and Computing Technology
various perspectives by taking pages from the Walton playbook – putting the
client first and offering the most reduced costs.
Wal-Mart deals have eased back as of late as U.S. superstores have all the
earmarks of being arriving at an immersion point. In the course of the most
recent 12 years, the organization had the option to dramatically increase
income to its present sign of $488 billion, however, it will probably take any
longer for it to twofold by and by to about $1 trillion. Store extension has
additionally eased back altogether – all out U.S. supercenters expanded by
just 3% a year ago, and a lot of that expansion originated from changing over
rebate stores. Development was likewise delayed for global markets and
Sam’s Clubs. Conversely, the quantity of supercenters developed by 17% in
2005. Presently, the board is concentrating on two development roads: first is
its neighborhood Markets. In financial 2015, the organization included 232
of these littler configuration stores, developing the base by over half. Execu
tion at these stores has been solid with same-store deals bouncing 7.7% in
the latest quarter. The subsequent open door is online business. Wal-Mart has
unmistakably fallen behind Amazon in online retail, yet it needs to bend over
Impact of Big Data on E-Commerce Websites 89
backward to make up for lost time. The organization acquired $12 billion in
online deals a year ago and expects to significantly increase that figure to
$35 billion by 2018 with interests in circulation focuses and innovation. All
things considered, contrasted, and almost $500 billion in complete income,
that scarcely moves the needle.
Marketers analyze Big Data to match with the expectations of customers and
hence frame new product line and extend their product width. To streamline
the production and manufacturing performance, marketers require huge data.
But to assess the concept of Big Data from the customers perception is also
one of the huge factors that should be taken into account under this scenario.
Hence the objectives of the research could be categorized as under:
1. Primary Objective: The main objective of the chapter is to examine
the perception of E-Commerce websites towards big data and person
alized campaigns and analyzing its impact on buying decision.
2. Secondary Objective: The research chapter also tried to analyze the
pros and cons regarding the recent big data analytics amalgamation.
The business case for Big Data has been clear for quite a while, anyway over
the latest couple of years, we have seen critical strolls in how associations are
putting gigantic data to use to all the more probable fathom their own strategies
and how they convey and offer to customers. From a B2B standpoint, immense
data has quite recently exhibited to be a primary purpose in the movement
of online strategic policies and stages. It is prepared for associations to not
simply grasp the gigantic proportions of data they are gathering – yet likewise
how to all the more promptly understand what their customers are expecting
to get away from the modernized channels they are building.
Colossal data gets past the overall wreck of customer data that associations
are gathering, zeroing in on the critical pieces of information that notice
90 Advances in Data Science and Computing Technology
In a U.S. study done by Help Scout, it was found that most of Americans
have given up a masterminded purchase on account of helpless help. This
Impact of Big Data on E-Commerce Websites 91
7.6 RECOMMENDATIONS
The research work is based to break down the significance of Big Data
for promoting of customized items which has just been restricted with the
respondents of Kolkata. The information for this exploration work just
centered around not many of the areas, for example, video spilling applica
tions, and Amazon for instance to site the information. The territory for
customized promoting is very wide and need exceptional consideration
as large information bolsters in surrounding the legitimate prerequisites
of the clients in both on the web and disconnected markets. The part for
this research is very tremendous and can be beseeched through different
elements of focusing on and situating procedures utilized by advertisers
to investigate the customized showcases through large information. The
socioeconomics utilized right now be additionally investigated while the
locational portion could be expanded for a superior extent of research and
more extensive research space.
7.7 CONCLUSION
KEYWORDS
REFERENCES
ABSTRACT
8.1 INTRODUCTION
business opportunities and limitations of big data and how it has helped the
organizations to create successful business strategies and remain competitive
in the business market. Furthermore, this chapter also brought forth the
different applications of big data and business analytics, how the data sources
were being generated in these applications and their main features. The
reviewers portrayed the challenges for a big data project and showed a path for
future research too. Again, Berntzen, and Krumova in 2017 applied Porter’s
value chain to big data and a framework has been suggested to figure out
the possible business opportunities for the business organization. The most
frequent revenue models have been discussed with its application. Moreover,
Banica and Alina focused (2015) on how big data helps organizations to
gain a competitive advantage over others. Moreover, it highlights how big
data helps to build, organize, and perform analysis from huge datasets by
providing a three-layered architecture. Furthermore, Pugna et al. in their
chapter (2019), outlined that there are some organizational challenges due to
the use of Big Data, but its impact on the business environment is enormous,
especially on performance management. Managers’ views and understanding
have been analyzed in terms of their performance in the company and also
on the decision-making process. After adopting the grounded theory, it has
been found that the key areas need special attention and understanding.
Gao, Chunli, and Chuanqi (2016) have discussed the validation and quality
assurance of big data, including the main concepts. Furthermore, the chapter
presented a comparison among big data validation tools and several major
market players were considered and discussed. Moreover, the primary
issues, challenges, and needs of big data have been discussed immensely. On
the other hand, Furht, and Flavio explained in the chapter (Furht and Flavio,
2016) the term big data and its role. It also highlights the main technological
aspects in a big data environment. Alsghaier et al. in their research (2017)
focused on some aspects of Big Data and its effect on organizations’ business
performance and how firms use the famous open source platform Hadoop to
process the huge amount of data. Alam et al. in their chapter (2014) focused
on the role of big data in the business and its various challenges. Why these
challenges are not dealt in the planning stage by the organizations have also
been discussed in details. Here, Alsghaier et al. (2017) illustrated on some
important points on Big data and its need on business performance and how
Hadoop can be used to process the data to win over others in this competitive
market. Again, Kubina, Michal, and Irena (2015) showed the path as to
how to reach a competitive advantage by using big data. Several research
techniques like content analysis, documents study, comparative analysis,
process analysis, statistical analysis, empirical research were used.
98 Advances in Data Science and Computing Technology
The objective of this study is to explore the ways in which big data has played
a pivotal role in business. this study focuses on finding out the revolutionary
contribution of big data in retail sector. It is based on secondary data.
Various use cases of retails sector has been studied to understand the business
model of traditional retail sector and the retail sector where big data concept
has been implemented. The observations made are then analyzed to find out
the significant contributions of the technique adopted.
channels, etc. Also, companies need to make strategies so that market capture
can be wide spread along with high profit.
Big data analytics is now being used in all retail business to identify
trends of existing scenario, forecast future demand, and determine pricing
strategies (https://www.forbes.com/sites/bernardmarr/2015/11/10/big-data
a-game-changer-in-the-retail-sector/#356bf9099f37). The benefits of Big
data in the retail industry is huge which is illustrated by Figure 8.2.
Modern retail business can be highly benefitted with the utilities big data
can bring into. Retail business has always been working with lot of data
to understand customer scenario and accordingly designing the strategies
to tap the market. However, big data analytics helps them to get hold of
unstructured data also so that better understanding of customers can be
gained. This ultimately helps in managerial as well as operational efficiency
in retail sector.
As compared to the traditional retail model, big data help companies
aim at offering improved customer services, better product, and pricing
services, which thereby can help to quantify their profit. As retail sector
focuses primarily on customers, big data enables the companies to retain
their old customers and extend their customer base too. Other facts include
better target marketing, cost reduction, and improved efficiency of existing
processes which leads to better performance and helps them to sustain in this
competitive market.
Thus, Big data help business organizations to analyze information and
improve on taking better and effecting strategic decisions. Moreover, the retail
sector collects a large amount of data through RFID, POS scanners (https://
indatalabs.com/blog/impact-of-big-data-on-business), various customer loyalty
programs, etc. Application of big data enables in detecting and reducing frauds
and enables the timely analysis of inventory. Earlier, big data was mainly
implemented by large business houses that could afford the technologies but,
recently, both large and small business enterprises are highly relying on this
game changing concept of big data for intelligent business purposes. Hence,
the demand for big data proliferates in the market domain and specifically in
the retail segment. Enterprises from across different industries consider ways of
how big data can be used in business. Therefore, the benefit of big data are to
improve productivity, identify customer needs and demands, offer a competitive
advantage, and chalks out ways for sustainable economic development. Even
business owners are increasingly investing in big data solutions to optimize
their operations and manage data traffic. Vendors are adopting big data solu
tions for better procurement methods, hassle-free supply chain management,
etc., to work on data efficiently and effectively. The integration of the different
business processes has enabled the strategic managers to take decisions accu
rately and timely. The benefits and its impact is so huge in the retail industry,
that companies who had not implemented this concept are thinking of shifting
to this technological advancement (Figures 8.3 and 8.4).
104 Advances in Data Science and Computing Technology
Source: https://indatalabs.com/blog/impact-of-big-data-on-business.
From Figure 8.4, it is seen that the big data market is expected to witness
remarkable growth by the year 2025. An important reason is an exponential
growth in the volume of both structured and unstructured data. Apart from
other factors increased technological penetration in the market and the
A Review of the Revolutionizing Role of Big Data 105
wide usage of smart phones has led to the generation of larger amounts
of data. The escalating need for analyzing data will lead to the rise of
demand for big data over the forecast period. Furthermore, the number of
online businesses in the industry is also growing, owing to enhanced profit
margins. Other industries, such as healthcare, utilities, oil, and gas, logistics,
manufacturing, and banking, will widely use online platforms to provide
customized d services to customers. These have led to the rise of global big
data market growth. Even, socio-economic benefits are also associated with
big data. Therefore, several government agencies have laid down policies
for promoting the development of big data. But, usage of big data in several
industries, such as healthcare, oil, and gas, and so on, has been growing in a
snail’s speed. Adopting new technology, implementing certain sophisticated
algorithms based on data analytics, AI, and quantum computing has been a
challenging task. Moreover, it is expensive to adopt and integrating different
operational units is cumbersome. Furthermore, there should be strong and
efficient security measures to combat the data breaches if it occurs.
KEYWORDS
• big data
• machine learning tool
• retail industry
• strategic decision-making
REFERENCES
Ajah, I. A., & Henry, F. N., (2019). Big data and business analytics: Trends, platforms, success
factors and applications. Big Data and Cognitive Computing, 3(2), 32.
Alam, J. R., Asma, S., Ramzan, T., & Muneeb, N., (2014). A review on the role of big data in
business. International Journal of Computer Science and Mobile Computing, 3(4), 446–453.
Alsghaier, H., Mohammed, A., Issa, S., & Samah, A., (2017). The impact of big data analytics on
business competitiveness. Proceedings of the New Trends in Information Technology (NTIT).
Alsghaier, H., Mohammed, A., Issa, S., & Samah, A., (2017). The importance of Big Data
Analytics in business: A Case study. American Journal of Software Engineering and
Applications, 6(4), 111–115.
Banica, L., & Alina, H., (2015). Big data in business environment. Scientific Bulletin-Economic
Sciences, 14(1), 79–86.
106 Advances in Data Science and Computing Technology
Berntzen, L., & Krumova, M., (2017). Big Data from a Business Perspective, Conference
Paper. doi: 10.1007/978-3-319-65930-5_10.
Furht, B., & Flavio, V., (2016). Introduction to big data. In: Big Data Technologies and
Applications (pp. 3–11). Springer, Cham.
Gao, J., Chunli, X., & Chuanqi, T., (2016). Big data validation and quality assurance--issuses,
challenges, and needs. In: 2016 IEEE Symposium on Service-Oriented System Engineering
(SOSE) (pp. 433–441). IEEE.
https://indatalabs.com/blog/impact-of-big-data-on-business (accessed on 08 December 2021).
https://www.digimarc.com/resources/retail-tech-spendingreport?utm_source=google&utm_
campaign=planet%20retail&utm_medium=ppc&gclid=EAIaIQobChMIosXP88Pz5wIVS
A4rCh3TxAP-EAAYASAAEgLsRPD_BwE (accessed on 08 December 2021).
https://www.forbes.com/sites/bernardmarr/2015/11/10/big-data-a-game-changer-in-the
retail-sector/#356bf9099f37 (accessed on 08 December 2021).
https://www.simplilearn.com/big-data-transforming-retail-industry-article (accessed on 08
December 2021).
Kubina, M., Michal, V., & Irena, K., (2015). Use of big data for competitive advantage of
company. Procedia Economics and Finance, 26, 561–565.
Pugna, I. B., Adriana, D., & Oana, G. S., (2019). Corporate attitudes towards Big Data and its
impact on performance management: A qualitative study. Sustainability, 11(3), 684.
PART III
in Cloud Computing
CHAPTER 9
LOAD-BALANCING IMPLEMENTATION
WITH AN ALGORITHM OF MATRIX
BASED ON THE ENTIRE JOBS
PAYEL RAY, ENAKSHMI NANDI, RANJAN KUMAR MONDAL, and
DEBABRATA SARDDAR
Department of Computer Science and Engineering, University of
Kalyani, West Bengal, India, E-mails: [email protected] (P. Ray),
[email protected] (E. Nandi), [email protected]
(R. K. Mondal), [email protected] (D. Sarddar)
ABSTRACT
perform the jobs here. The jobs are higher than the machines and balance all
machines to exploit the quality of services in cloud computing.
9.1 INTRODUCTION
i.e., the corresponding value(s) maximum to the next maximum to form the
last sub-problem. Save the results in the new array that shall be the array for
the last sub-problem.
Consider a problem in which a set of 5 machines M={M1, M2, M3, M4, M5},
and a set of 8 jobs J={J1, J2, J3, J4, J5, J6, J7, J8}. The assignment matrix
contains the execution costs of every job to each machine.
Step 3: To obtain the sum of a column of the matrix, i.e., the sum of each
column is as follows:
Jn/Mm M1 M2 M3 M4 M5
J1 151 277 185 276 321
J2 245 286 256 264 402
J3 246 245 412 423 257
J4 269 175 145 125 156
J5 421 178 185 425 235
J6 257 257 125 325 362
J7 159 268 412 256 286
J8 365 286 236 314 279
Column-Sum 2,113 1,972 1,956 2,408 2,298
Jn/Mm M1 M2 M3 M4 M5
J1 151 277 185 276 321
J2 245 286 256 264 402
J3 246 245 412 423 257
J4 269 175 145 125 156
J5 421 178 185 425 235
J6 257 257 125 325 362
J7 159 268 412 256 286
J8 365 286 236 314 279
Column-Sum 2,113 1,972 1,956 2,408 2,298
Step 5: This corresponds to the following optimal cost in the original cost
matrix using Hungarian method.
Jn/Mm M1 M2 M3 M4 M5
J1 151 277 185 276 321
J2 245 286 256 264 402
J3 246 245 412 423 257
J4 269 175 145 125 156
J5 421 178 185 425 235
J6 257 257 125 325 362
J7 159 268 412 256 286
J8 365 286 236 314 279
Final Result
M1 → J1*J7 → 151 + 159 = 310
M2 → J3*J5 → 245 + 178 = 423
M3 → J6*J8 → 125 + 236 = 361
M4 → J2 → 264
M5 → J4 → 156
116 Advances in Data Science and Computing Technology
Figure 9.1 shows our proposed work result. Figure 9.1 explains the execution
time for each task at each node. To analyze the performance of our approach
is judged by other methods shown in Figure 9.1. Figure 9.1 displays the
comparison of the execution time of each computing node among our
approach. The total completion time for completing each task by using the
proposed work, LBMM, and MM, are 17, 27, and 42 ms, respectively. Our
approach attains the least completion time with enhanced load balancing
than available other algorithms.
FIGURE 9.1 Execution time (ms) of each task at each computing node.
9.9 CONCLUSION
The result of this problem, the matrix, can be solved with the support of
the Hungarian method. It gives each task or subtask with minimal comple
tion time to its corresponding machine so that our result is excellent for
the system. Though some machines execute more than one task or subtask
completion time is excellent, and loads are being balanced with our proposed
work. Without some alternative consideration, our approach has continu
ously been satisfied in various cases and prospects; we figure out a further
way of dealing with our difficulties sometimes.
Load-Balancing Implementation with an Algorithm 117
KEYWORDS
• load balancing
• minimum completion time
• unbalanced matrix
REFERENCES
Braun, T. D., Siegel, H. J., Beck, N., Bölöni, L. L., Maheswaran, M., Reuther, A. I.,
Robertson, J. P., et al., (2001). A comparison of eleven static heuristics for mapping a
class of independent tasks onto heterogeneous distributed computing systems. Journal of
Parallel and Distributed Computing, 61, 810–837.
Chan, M. C., Jiang, J. R., & Huang, S. T., (2012). Fault-tolerant and secure networked storage.
In: Digital Information Management (ICDIM), 2012 Seventh International Conference on
(pp. 186–191). IEEE.
Chaudhari, A., & Kapadia, A., (2013). Load balancing algorithm for azure virtualization with
specialized VM. Algorithms, 1, 2.
Che-Lun, H., Hsiao-His, W., & Yu-Chen, H., (2012). Efficient load balancing algorithm for
the cloud computing network. In: International Conference on Information Science and
Technology (IST 2012) (pp. 28–30).
Chen, C. H., Lin, H. F., Chang, H. C., Ho, P. H., & Lo, C. C., (2013). An analytical framework
of a deployment strategy for cloud computing services: A case study of academic websites.
Mathematical Problems in Engineering, 2013.
Dinh, H. T., Lee, C., Niyato, D., & Wang, P., (2013). A survey of mobile cloud computing:
Architecture, applications, and approaches. Wireless Communications and Mobile Computing,
13(18), 1587–1611.
Jeevitha, M., Chandrasekar, A., & Karthik, S., (2015). Survey on verification of storage
correctness in cloud computing. International Journal of Engineering and Computer Science,
4(09).
Kabakus, A. T., & Kara, R., (2017). A performance evaluation of drop box in the light of
personal cloud storage systems. International Journal of Computer Applications, 163(5).
Kaur, R., & Luthra, P., (2012). Load balancing in cloud computing. In: Proceedings of Inter
national Conference on Recent Trends in Information, Telecommunication and Computing,
ITC.
Kokilavani, T., & George, A. D. I., (2011). Load balanced min-min algorithm for static meta
task scheduling in grid computing. International Journal of Computer Applications, 20(2),
43–49.
Krakowiak, S., (2009). Distributed under a Creative Commons license. Middleware Architecture
with Patterns and Frameworks. http://creativecommons.org/licenses/by-nc-nd/3.0/ (accessed
on 10 January 2022).
118 Advances in Data Science and Computing Technology
Kuhn, H. W., (1955). The Hungarian method for the assignment problem. Naval Research
Logistics Quarterly, 2(1, 2), 83–97.
Mansouri, Y., & Buyya, R., (2016). To move or not to move: Cost optimization in dual cloud-
based storage architecture. Journal of Network and Computer Applications, 75, 223–235.
Min-You, W., Wei, S., & Hong, Z., (2000). Segmented min-min: A static mapping algorithm
for meta-tasks on heterogeneous computing systems. In: Heterogeneous Computing
Workshop, 2000, (HCW 2000) Proceedings, 9th (pp. 375–385). IEEE.
Pareek, P., (2013). Cloud computing security from single to multi clouds using secret sharing
algorithm. International Journal of Advanced Research in Computer Engineering &
Technology, 2(12), 3261–3264.
Ranjan, K. M., Payel, R., Enakshmi, N., Biswajit, B., Manas, K. S., & Debabrata, S., (2017).
Load balancing of unbalanced matrix with Hungarian method. In: International Conference
on Computational Intelligence, Communications, and Business Analytics (pp. 256–270).
Springer, Singapore.
Ranjan, K. M., Payel, R., Enakshmi, N., Priyajit, S., & Debabrata, S., (2017). Load balancing
of the unbalanced cost matrix in a cloud computing network. In: Computer, Communication
and Electrical Technology: Proceedings of the International Conference on Advancement of
Computer Communication and Electrical Technology (ACCET 2016) (p. 81). West Bengal,
India. CRC Press.
Ray, P., & Sarddar, D., (2018). Load balancing with inadequate machines in cloud computing
networks. In: Mandal, J., & Sinha, D., (eds.), Social Transformation – Digital Way. CSI 2018,
Communications in Computer and Information Science (Vol. 836). Springer, Singapore.
Ritchie, G., & Levine, J. A., (2005). Fast, effective local search for scheduling independent
jobs in heterogeneous computing environments. Journal of Computer Applications, 25,
1190–1192.
Sibiya, G., Venter, H. S., & Fogwill, T., (2015). Digital forensics in the Cloud: The state of the
art. In: IST-Africa Conference, 2015 (pp. 1–9). IEEE.
Wang, S. C., Yan, K. Q., Liao, W. P., & Wang, S. S., (2010). Towards a Load Balancing in a
three-level cloud computing network. In: CSIT (pp. 108–113).
CHAPTER 10
LOAD-BALANCING ALGORITHM
WITH OVERALL TASKS
ENAKSHMI NANDI, PAYEL RAY, RANJAN KUMAR MONDAL, and
DEBABRATA SARDDAR
Department of Computer Science and Engineering,
ABSTRACT
10.1 INTRODUCTION
Load balancing technique have been divided based on the present state of the
system and who instigated the process (Gupta and Deshpande, 2014).
1. Depending on which Client Initiates the Method:
i. Sender-Initiated: Sender or client begins the completion of the
load balancing technique helps to identify necessitate for load
balancing (Eager, Lazowska, and Zahorjan, 1985).
ii. Receiver-Initiated: Workstation initiates the completion of
the load balancing process to detect the requirement for load
balancing (Adhikari and Patil, 2012).
iii. Symmetric: This category of the algorithm is a blend of the
sender-beginner category and receiver-start up category methods
(Eager, Lazowska, and Zahorjan, 1985).
2. Depending on the Existing Static System Algorithm: In the
static algorithm, there is a uniform distribution of traffic among
the workstations (Vakkalanka, 2012). This algorithm needs a prior
understanding of system entities such as the judgment of shifting the
load does not rely on the running state of the system (Mani, Suresh,
and Kim, 2005). The static method is perfect in the system, which
has fewer inequalities in load (Kumar et al., 2001).
3. Dynamic Algorithm: In case of dynamic method for balancing
heavy load, the lightest workstation in the whole system is looked
122 Advances in Data Science and Computing Technology
upon and preferred (Patil and Shedge, 2013). For statement with the
set of connections is essential, which is able to enlarge the traffic in
the system (Akyildiz et al., 1999).
10.6 ILLUSTRATION
Step 2: Then locate the schedule that has the greatest execution time.
Schedule Entity N11 N12 N13 N14 Total
Schedule
T1 13 14 11 15 53
T2 17 25 14 26 82
T3 27 32 13 34 106
T4 18 25 19 32 94
Step 3: Next to locate the unallocated entity which has the least execu
tion time for the schedule preferred in Step 2. Then, this schedule is
stimulated to the elected entity for computation.
Schedule Entity N11 N12 N13 N14 Total
Schedule
T1
13 14 11 15 53
T2 17 25 14 26 82
T3 27 32
13 34 106
T4 18 25 19 32 94
Step 5: Perform over again Step 2 to Step 4 up to all schedules have been
executed totally.
Schedule Entity C11 C12 C13 C14 Total
Schedule
T1 13 14 11 15 53
T2 17 25 14 26 82
T3 27 32 13 34 106
T4 18 25 19 32 94
126 Advances in Data Science and Computing Technology
Final Result
Schedule Entity C11 C12 C13 C14
T1 13 14 11 15
T2 17 25 14 26
T3 27 32 13 34
T4 18 25 19 32
10.7 COMPARISON
Figure 10.1 illustrates the execution time for distinct schedule at several
computing entities. To analyze the performance of our projected method is
evaluated with a new method by the case shown in Figure 10.1. Figure 10.1
demonstrates the assessment of the execution time of distinct computing
entity among our method. Respective completion times for ultimate all
schedules by means of the proposed technique, LBMM, and MM, are 24, 33,
and 35 ms, respectively. Our technique attains the MCT and enhanced load
balancing than AK algorithms.
FIGURE 10.1 The assessment of the completion time of distinct schedule at the several
entities.
Load-Balancing Algorithm with Overall Tasks 127
10.8 CONCLUSION
KEYWORDS
• cloud computing
• distributed system
• load balancing
REFERENCES
Adhikari, J., & Patil, S., (2012). Load balancing the essential factor in cloud computing.
International Journal of Engineering Research & Technology (IJERT).
Akyildiz, I. F., Janise, M., Loren, C. M., Ramon, P., & Yelena, Y., (1999). Medium access
control protocols for multimedia traffic in wireless networks. IEEE Network, 13(4), 39–47.
Alakeel, A. M., (2010). A fuzzy dynamic load balancing algorithm for homogenous distributed
systems. International Journal of Computer Science and Network Security, 10(6), 153–160.
Alnusairi, T. S., Shahin, A. A., & Daadaa, Y., (2018). Binary PSOGSA for Load Balancing
Task Scheduling in Cloud Environment. arXiv preprint arXiv:1806.00329.
Ansari, M. B., & Sachin, P., (2015). Load balancing and issue monitoring of cloud nodes.
International Journal, 5(7).
Begum, S., & Prashanth, C. S. R., (2013). Review of load balancing in cloud computing.
International Journal of Computer Science Issues (IJCSI), 10(1), 343.
Bhargava, S., & Goyal, S., (2013). Dynamic load balancing in cloud using live migration of
virtual machines. Computing, 3(7), 8.
Bittencourt, L. F., Miyazawa, F. K., & Vignatti, A. L., (2012). Distributed load balancing
algorithms for heterogeneous players in asynchronous networks. Journal of Universal
Computer Science.
Chan, M. C., Jiang, J. R., & Huang, S. T., (2012). Fault-tolerant and secure networked storage.
In: Digital Information Management (ICDIM), 2012 Seventh International Conference (pp.
186–191). IEEE.
Chen, C. H., Lin, H. F., Chang, H. C., Ho, P. H., & Lo, C. C., (2013). An analytical framework
of a deployment strategy for cloud computing services: A case study of academic websites.
Mathematical Problems in Engineering, 2013.
128 Advances in Data Science and Computing Technology
Dinh, H. T., Lee, C., Niyato, D., & Wang, P., (2013). A survey of mobile cloud computing:
Architecture, applications, and approaches. Wireless Communications and Mobile Computing,
13(18), 1587–1611.
Eager, D. L., Lazowska, E. D., & Zahorjan, J., (1985). A comparison of receiver-initiated
and sender-initiated adaptive load sharing. ACM SIGMETRICS Performance Evaluation
Review, 13(2), 1–3.
Gupta, E., & Deshpande, V., (2014). A technique based on ant colony optimization for load
balancing in cloud data center. In: Information Technology (ICIT), 2014 International
Conference on (pp. 12–17). IEEE.
Haryani, N., & Jagli, D., (2014). A dynamic method for load balancing in cloud computing.
IOSR Journal of Computer Engineering (IOSR-JCE), 16(4), 23–28.
Jain, R., & Paul, S., (2013). Network Virtualization and Software Defined Networking for
Cloud Computing: A Survey (Vol. 51, No. 11, pp. 24–31). IEEE Communications Magazine.
Jeevitha, M., Chandrasekar, A., & Karthik, S., (2015). Survey on verification of storage
correctness in cloud computing. International Journal of Engineering and Computer
Science, 4(09).
Kabakus, A. T., & Kara, R., (2017). A Performance evaluation of drop box in the light of
personal cloud storage systems. International Journal of Computer Applications, 163(5).
Kaur, D., & Singh, S., (2014). An efficient job scheduling algorithm using min-min and ant
colony concept for grid computing. International Journal of Engineering and Computer
Science, 3(07).
Kaur, R., & Patra, P. K., (2013). Resource allocation with improved min-min algorithm.
International Journal of Computer Applications, 76(15).
Krakowiak, S., (2009). Distributed under a Creative Commons license. Middleware Architecture
with Patterns and Frameworks. http://creativecommons.org/licenses/by-nc-nd/3.0/ (accessed
on 10 January 2022).
Kumar, K., & Lu, Y. H., (2010). Cloud computing for mobile users: Can offloading computation
save energy?. Computer, 43(4), 51–56.
Kumar, R., Agrawal, G., Theobald, K., Zoppetti, G. M., & Gao, G. R., (2001). Compiling
several classes of reductions on a multithreaded architecture. In: Proceedings of Mid-Atlantic
Student Workshop on Programming Languages and Systems.
Mangla, P., & Goyal, S. K., (2017). Study of various heuristic approaches in cloud computing.
International Journal of Advanced Research in Computer Science, 8(3).
Mani, V., Suresh, S., & Kim, H. J., (2005). Real-coded genetic algorithms for optimal
static load balancing in distributed computing systems with communication delays. In:
International Conference on Computational Science and its Applications (pp. 269–279).
Springer, Berlin, Heidelberg.
Mansouri, Y., & Buyya, R., (2016). To move or not to move: Cost optimization in a dual cloud-
based storage architecture. Journal of Network and Computer Applications, 75, 223–235.
Mishra, N. K., & Mishra, N., (2015). Load balancing techniques: Need, objectives, and major
challenges in cloud computing-a systematic review. International Journal of Computer
Applications, 131(18).
Moharana, S. S., Ramesh, R. D., & Powar, D., (2013). Analysis of load balancers in cloud
computing. International Journal of Computer Science and Engineering, 2(2), 101–108.
Moharana, S. S., Ramesh, R. D., & Powar, D., (2013). Analysis of load balancers in cloud
computing. International Journal of Computer Science and Engineering, 2(2), 101–108.
Load-Balancing Algorithm with Overall Tasks 129
Moura, J., & Hutchison, D., (2016). Review and analysis of networking challenges in cloud
computing. Journal of Network and Computer Applications, 60, 113–129.
Padhy, R. P., (2012). Virtualization techniques & technologies: State-of-the-art. International
Journal of Global Research in Computer Science (UGC Approved Journal), 2(12), 29–43.
Pareek, P., (2013). Cloud computing security from single to multi clouds using secret sharing
algorithm. International Journal of Advanced Research in Computer Engineering &
Technology, 2(12), 3261–3264.
Patel, G., Mehta, R., & Bhoi, U., (2015). Enhanced load balanced min-min algorithm for
static meta task scheduling in cloud computing. Procedia Computer Science, 57, 545–553.
Patil, U., & Shedge, R., (2013). Improved hybrid dynamic load balancing algorithm for
distributed environment. International Journal of Scientific and Research Publications,
3(3), 1.
Pearce, M., Zeadally, S., & Hunt, R., (2013). Virtualization: Issues, security, threats, and
solutions. ACM Computing Surveys (CSUR), 45(2), 17.
Rahm, E., (1996). Dynamic load balancing in parallel database systems. In: European
Conference on Parallel Processing (pp. 37–52), Springer, Berlin, Heidelberg.
Rastogi, D., Bansal, A., & Hasteer, N., (2013). Techniques of load balancing in cloud
computing: A survey, In: International Conference on Computer Science and Engineering
(CSE) (pp. 140–143).
Sabahi, F., (2011). Security of virtualization level in cloud computing. In: Proc. 4th Intl. Conf.
on Computer Science and Information Technology (pp. 197–201). Chengdu, China.
Saranya, D., & Maheswari, L. S., (2015). Load balancing algorithms in cloud computing: A
review. International Journal of Advanced Research in Computer Science and Software
Engineering Research Paper.
Shidik, G. F., Azhari, M. K., & Mustofa, K., (2015). Evaluation of selection policy with
various virtual machine instances in dynamic VM consolidation for energy efficient at
cloud data centers. JNW, 10(7), 397–406.
Shilpa, S., Kulkarni, S., & Kulkarni, S., (2014). Analysis of load balancing algorithms in
cloud computing and study of game theory [J]. Analysis, 3(4), 1818–1823.
Sibiya, G., Venter, H. S., & Fogwill, T., (2015). Digital forensics in the cloud: The state of the
art. In: IST-Africa Conference, 2015 (pp. 1–9). IEEE.
Sran, N., & Navdeep, K., (2013). Comparative Analysis of Existing Load balancing techniques
in cloud computing. International Journal of Engineering Science Invention, 2(1), 60–63.
Vakkalanka, S., (2012). Classification of job scheduling algorithms for balancing load on web
servers. International Journal of Modern Engineering Research (IJMER), 2(5), 3679–3683.
Wang, L., Gregor, V. L., Andre, Y., Xi, H., Marcel, K., Jie, T., & Cheng, F., (2010). Cloud
computing: A perspective study. New Generation Computing, 28(2), 137–146.
Willebeek-LeMair, M. H., & Reeves, A. P., (1993). Strategies for dynamic load balancing on
highly parallel computers. IEEE Transactions on Parallel and Distributed Systems, 4(9),
979–993.
Youseff, L., Butrico, M., & Da Silva, D., (2008). Toward a unified ontology of cloud
computing. In: Grid Computing Environments Workshop, 2008, GCE’08 (pp. 1–10). IEEE.
Zhang, F., Chen, J., Chen, H., & Zang, B., (2011). CloudVisor: Retrofitting protection of
virtual machines in multi-tenant cloud with nested virtualization. In: Proceedings of the
Twenty-Third ACM Symposium on Operating Systems Principles (pp. 203–216). ACM.
CHAPTER 11
IMPLEMENTATION OF LOAD
BALANCING OF MATRIX PROBLEM
WITH THE ROW SUM METHOD
PAYEL RAY, ENAKSHMI NANDI, RANJAN KUMAR MONDAL, and
DEBABRATA SARDDAR
Computer Science and Engineering, University of Kalyani,
West Bengal, India, E-mail: [email protected] (P. Ray)
ABSTRACT
11.1 INTRODUCTION
It has divided the load balancing algorithms based on the recent state of a
system and who started the process:
1. Depending on which client initiates the process (Eager, Lazowska,
and Zahorjan, 1985):
i. Sender-Initiated: Sender or client starts the completion of the
load balancing algorithm on analyzing the need for load balancing.
ii. Receiver-Initiated: Receiver or workstation starts the finaliza
tion of a load balancing algorithm on diagnosing the demand for
load balancing.
iii. Symmetric: This category of the algorithm is a merging of
the sender-initiated category and receiver-initiated category
algorithms.
2. Depending on the present state of the static system algorithm: In
the static algorithm, there is a uniform distribution of traffic among
the workstations. This algorithm requires a prior recognition of the
resources of the system so that the judgment of moving the loads not
depend on the presented situation of the system.
3. Dynamic Algorithm: In the dynamic algorithm, for balancing the
load, the lightest workstation in the entire process is considered and
selected. For this, real-time connection with the Internet is required
that can expand the data transfer in the system. Here to determine to
manage the load, it capitalizes on the living shape of the system.
row-sum, i.e., starting with smallest to next smallest to the array row-sum
and deleting rows related to the remaining (r) jobs. Store the results in
the new array that should be the array for the first sub-problem. Do this
process again until remaining jobs become less than a machine when
remaining jobs are less than n, then, deleting (c) columns by column-sum,
i.e., corresponding to the value(s) most higher to next higher to form the
last sub-problem. Accumulate the results in the new array that will be the
array for the last sub-problem. Apply the Hungarian method (Dive, Ingale,
and Shahade, 2013) to get the best possible solution of all sub-problems,
which is now becoming a balanced problem. Lastly, rearrange all the sub
problems to acquire the best possible cost.
11.6.1 ALGORITHM
Let us a set that has 5 machines M = {M1, M2, M3, M4, M5}, and 8 jobs J =
{J1 , J2, J3, J4, J5, J6, J7, J8}. The set contains the execution costs of every job
to each machine.
Step 3: We split the matrix into two parts. The first part will be the n×n
matrix based on the maximum row-sum, and the remaining parts would
be the n×m format. Easy to calculate, we follow this rule. First, the part
will be followed by one machine with one job with executes minimum
execution time based on maximum row-sum, and the second part will be
followed by a device that performs minimum execution time based on
maximum row-sum.
138 Advances in Data Science and Computing Technology
Jn/Mm M1 M2 M3 M4 M5 Row-Sum
J2 245 286 256 264 402 1,453
J3 246 245 412 423 257 1,583
J5 421 178 185 425 235 1,444
J7 159 268 412 256 286 1,381
J8 365 286 236 314 279 1,480
Jn/Mm M1 M2 M3 M4 M5 Row-Sum
J1 151 277 185 276 321 1,210
J4 269 175 145 125 156 870
J6 257 257 125 3255 362 1,326
Step 5: So, all jobs assigned at least to its corresponding machine, and
more the two jobs are not allocated to any device.
Jn/Mm M1 M2 M3 M4 M5
J1 151 277 185 276 321
J2 245 286 256 264 402
J3 246 245 412 423 257
J4 269 175 145 125 156
J5 421 178 185 425 235
J6 257 257 125 325 362
J7 159 268 412 256 286
J8 365 286 236 314 279
Final Result
M1 → J1*J2 → 151 + 245 = 396
M2 → J3 → 245
Implementation of Load Balancing of Matrix Problem 139
Mm M1 M2 M3 M4 M5
Costs 396 245 361 381 235
11.9 CONCLUSION
It assigns None of the works to dummy machines. The result of the unbal
anced matrix problem, the matrix obtained with the back of the Hungarian
method, is pointed out. It appoints all subtasks with makespan to its related
system so that the result is farthest desirable for the system. Although some
devices perform over one job, makespan is most convenient, and loads are
adjusting with our proposed work.
The technique is presented in an algorithmic shape and implemented on
the many sets of input data to test the act and usefulness of the algorithm.
Applying to load balancing is straightforward.
140 Advances in Data Science and Computing Technology
FIGURE 11.1 Execution time (ms) of each task at different computing nodes.
KEYWORDS
• cloud computing
• load balancing
• minimum completion time
REFERENCES
Chan, M. C., Jiang, J. R., & Huang, S. T., (2012). Fault-tolerant and secure networked storage.
In: 2012 Seventh International Conference on Digital Information Management (ICDIM)
(pp. 186–191). IEEE.
Dive, S. R., Ingale,A. D., & Shahade, M. R., (2013). Virtual machine and network-performance,
study, advantages, and virtualization option. International Journal of Advanced Research in
Computer Science, 4(6).
Eager, D. L., Lazowska, E. D., & Zahorjan, J., (1985). A comparison of receiver-initiated
and sender-initiated adaptive load sharing. ACM SIGMETRICS Performance Evaluation
Review, 13(2), 1–3.
Jeevitha, M., Chandrasekar, A., & Karthik, S., (2015). Survey on verification of storage
correctness in cloud computing. International Journal of Engineering and Computer Science,
4(9).
Implementation of Load Balancing of Matrix Problem 141
Kokilavani, T., & Amalarethinam, D. G., (2011). Load balanced min-min algorithm for static
meta-task scheduling in grid computing. International Journal of Computer Applications,
20(2), 43–49.
Madni, S. H. H., Latiff, M. S. A., Abdullahi, M., & Usman, M. J., (2017). Performance
comparison of heuristic algorithms for task scheduling in the IaaS cloud computing
environment. PloS One, 12(5), e0176321.
Mishra, S. K., Sahoo, B., & Parida, P. P., (2018). Load balancing in cloud computing: A big
picture. Journal of King Saud University-Computer and Information Sciences.
Moura, J., & Hutchison, D., (2016). Review and analysis of networking challenges in cloud
computing. Journal of Network and Computer Applications, 60, 113–129.
Ray, P., & Sarddar, D., (2018). Load balancing with inadequate machines in cloud computing
networks. In: Mandal, J., & Sinha, D., (eds.), Social Transformation – Digital Way (Vol.
836). CSI 2018. Communications in computer and information science. Springer, Singapore.
Sarddar, D., & Ray, P., (2017). A new effort for distributed load balancing. International
Journal of Grid and Distributed Computing, 10(8), 1–9.
Shaw, S. B., & Singh, A. K., (2014). A survey on scheduling and load balancing techniques in
a cloud computing environment. In: Computer and Communication Technology (ICCCT),
2014 International Conference (pp. 87–95). IEEE.
PART IV
Applications
CHAPTER 12
MICROCONTROLLER-BASED
WEARABLE LOCATION TRACKER
SYSTEM WITH IMMEDIATE SUPPORT
FACILITY
SUMANTA CHATTERJEE, DWAIPAYAN SAHA,
INDRANI MUKHERJEE, and JESMIN ROY
Department of Computer Science and Engineering,
ABSTRACT
The work commitments are commendable but along with this security also
comes together and as much dedications are there; their lives are also at risk
and so it is our responsibilities to take care of them. So, a location tracker
device is proposed which is named as “wearable location tracker” and it
is basically a device in any form such as pins, wearable watches or even
customized shirts which gives the real time location of the person and there
are some special features also added to it such as the pulse rate count and
the body temperature (BT) of the people. This chapter is mainly based on
how one can save people from danger and provide them immediate help to
evacuate them from danger. This device not only gives location but it has
the facility of SOS system for sending message to near one’s and emergency
contact to provide immediate help.
146 Advances in Data Science and Computing Technology
12.1 INTRODUCTION
Security is one of the most important and highly concerned aspects of every
one’s life. As the overall circumstances are not in a good scenario along with
security, safety for women and children are also gaining concern as the days
are passing. Along with safety, tracking is also as major concern as more
number of crimes on children and women are reported nowadays.
So, every near and dear one is of them want to monitor their activities
and want to keep track of their loved ones and over the phone is not always
possible. Taking precautions and preventions is always better than meeting
with an accident. So, our proposed idea will serve the best for this purpose
which is built using microcontroller. A system in a form of a chip that does
a job can simply be called a microcontroller. It contains a small amount of
RAM, an integrated processor, which are very useful while interacting with
things connected to the microprocessor. And so, as our product too have.
Various parameters are used along with the microcontroller for making this
wearable tracker and advanced technologies are used to their uttermost to
serve the best to the mankind.
Our proposed idea mainly focuses on making a wearable tracker device
when people will be facing any danger, they can take help by using our
proposed device just by tapping the SOS button to request for immediate
help and in case of people working in any fields the device will monitor their
pulse rate and their vital body parameters and accordingly if anything goes
wrong the device will send signals for immediate arrangements for rescue.
This proposed device can be of great help for the safety measurements of
women and kids as well. This device will be of great help for people to
provide them immediate help. Thus, the device is of great importance for
every aspect people.
There are various existing plans regarding location tracker device. Some of
them are as in subsections.
This chapter deals with proposal of system or device which will track
children’s activity and will update constantly with the help of internet
Microcontroller-Based Wearable Location Tracker System 147
of things (IoT). IoT devices are smart and advanced devices, which are
able to take decisions by sensing the environment surrounding the device.
IoT connects billions of devices together with the help of the internet
connections and it has the ability to transfer large number of data over
a network without requiring human-to-human or human-to-computer
interaction. IoT is an emerging field now and it is gaining a lot of
popularity also.
The proposed system has the facility of camera, GPS system, hear beat
sensor and touch sensor which can monitor and track their children’s activity
and they can keep a record of them (Figure 12.1).
Rechargeable
Battery
Temperature
sensor
Serial camera
Heart Beat
Sensor Mobile
1
Mobile Mobile
2 3
GSM GPS
Antenna Antenna
MMS
and SMS
to Mobile
FIGURE 12.1 The workflow diagram of the IoT device for child safety and tracking.
This chapter mainly focusses on safety of child. The authors have here
proposed a solution based on Android which will help them to track the real
time location of their wards. Recently, the smart phones are well equipped
148 Advances in Data Science and Computing Technology
with sensors that are capable in doing this task of giving the location of the
user.
Since the services are provided by smart phones, so the solution presented,
takes the advantage of that to provide the required services. Hence real time
location is obtained using the sensors like GPS and GSM. The system has to
parts parents’ part and children part. The parent’s side will send a request to
the child’s device to send the location of the child, and the child device will
acknowledge the same and send a reply.
In this chapter, device is proposed for individuals with heart disease. Heart
rate variability (HRV), heart rate (HR), and BT values are considered as
a vital signs that must be measured regularly in case heart patients. The
proposed solution is an android-based application, which is developed to
monitor HR, HRV, and CT parameters for patients.
The proposed measuring system consists of wearable sensors which
constantly measures patient signs. Then immediately send the measured
signals to android interface via wireless connection. If the earlier recorded
critical values for the patient have exceeded, the HR, HRV, CT values and
along the real time location of patient is sent both to family members and
doctor as e-mail and twitter notification. This particular wearable system
helps the users to move around without any fear. It also ensures that e very
citizen feels safe wherever they go.
Microcontroller-Based Wearable Location Tracker System 149
This chapter worked with body parameters to track people in need. This
device uses BT sensor to record the vital body parameters and provide
immediate help to the victim.
And lots of other tracking devices are available which used GPS and
GSM module to track the person who needs help in their workplace or in
personal area of interest. And with the help of GSM module, they can send
help message to the contacts registered to the GSM module and easily imme
diate help can be given to them.
her home safely, at 10.30 p.m. Despite living in a metropolitan city, her
parents are praying so that their daughter reaches home safely. This concern
pinpoints and tells us that her daughter is not safe in her own city.
FIGURE 12.2 Proposed diagram of the pedestrian tracking with shoe-mounted inertial sensors.
Shivu comes home alone from his school. As long as he does not come
back, there are a lot of tension and negative thoughts regarding his safety
that come across the mind of his mom. An innocent child is not safe either.
In today’s world, security, and safety are the biggest concerns for an indi
vidual, especially for women and children. They are kidnapped, trafficked,
physically abused, harassed, and what not. There are a lot of instances when
our near and dear ones want keep a track of our location so that they can
monitor us and feel assured about our safety. But is it only enough to get a
location of an individual? How will someone get to know whether an indi
vidual is in a danger or need any help?
For this, a product has been devised which is the solution to all these
problems. The product is a wearable device which can be in any form of
a wearable device, pins, or even custom shirts. The system will not only
monitor the real time location but also will have the facilities to send
alert at the time of emergency and need. This system will also help in
mitigating tracking problem even if a fisherman loses his boat in the sea
(Figure 12.4).
POWER SUPPLY
GSM MODULE
ARDUINO SERVER
MICRO-
GPS MODULE CONTROLLER
In order to make the proposed idea feasible and make such a device which
has been proposed above, a few necessary components are needed which will
give life to the proposed device in reality. Below a list of required hardware
has been given along with their specification and utility:
152 Advances in Data Science and Computing Technology
The NEO-6M GPS module is a well-known name while considering any GPS
receiver which is built with 25 × 25 × 4 mm ceramic antenna, providing a very
strong satellite search capability. The power and signal indicators are very
Microcontroller-Based Wearable Location Tracker System 153
useful, which can monitor the status of the module. It also has the efficient
facility of data backup, in case accidental power failure (Figure 12.6).
Jumper wires are simply different colored wires that are used to connect
components without soldering with the help of the pins that are present
at the end of the wires. They are very useful in forming the circuit. And
their different color codes make it easy to differentiate one from the other,
thus easily distinguishable. These are usually used along with breadboards
in order to connect the circuit and change the circuit as and when needed
(Figure 12.9).
12.4.5 BREADBOARD
A tiny holed rectangular box usually made using plastic is generally referred
to as a breadboard. These holes being very useful help one to insert any
electronic components with ease, in the process of making a prototype or a
product. It is a base solemnly used in the procedure of the very basic construc
tion for making realistic and miniature prototype of an electronic model.
Nowadays, we have breadboards that need no soldering and has perforated
plastic blocks with a number of tin or alloy made clips, and sockets for better
insertion of the electronic components. The clips are many a times referred to
as contact points or tie points. A breadboard can be specified and segregated
with the help of tie points (Figure 12.10).
156 Advances in Data Science and Computing Technology
12.4.6 SWITCHES
Switch is used to turn the circuit on. The switches that are used in bread
boards are mostly called, push-button switches. They have four legs to fit
well with the perforations of the breadboard (Figure 12.11).
A 9volt battery source is used a source of power in the circuit. The 9V battery
format is often accessible in its basic carbon-zinc and alkaline chemistry, in
basic lithium iron di-sulfide, and also present in the form of nickel-cadmium,
nickel-metal hydride and lithium-ion, which is rechargeable (Figure 12.12).
12.5 METHODOLOGY
The system will be in a form of a wearable device. And each device will
be having a registration key. With each key two mobile numbers will be
registered, in which regular updates of the location of the user will be sent.
The user can change these registered numbers if needed. For changing the
registered numbers, the user will have to log in to a website and make the
necessary changes. Since all the devices have a unique registration key, all
the record of a particular device will be maintained. The information won’t
be disclosed, and will be kept under proper secured supervision.
The user will be able to turn the device on. Once the device is turned
on, the real time location and the time of the user will get logged in the
158 Advances in Data Science and Computing Technology
local database. This information then will be periodically get logged into the
cloud. Similarly, location of the user will be sent to the two registered mobile
number. The location of the user will be sent to the two registered mobile
numbers after a fixed interval of time.
There are many other systems, in the market which gives the location
of the user but there is a specialty of this device. But only tracking of the
location isn’t enough, is it? We are getting the location of the user, but what
if the person is danger? What if the user is unable to make a call, and ask for
help? In that case what is the need of this location tracker? There has to be
something which can give an edge over these simple trackers.
The specialty of this system gives this device an edge over all the existing
devices. It has an exclusive feature of SOS facility. Well, this SOS facility is
not the only specialty. This device can send alerts to the alert center, when
the SOS button is pressed. As soon the alert center receives the alert message
it checks the immediate locality of the distressed user and alerts the nearest
helps available at that point of time, so that the victim, the distressed can be
rescued from that danger. And this unique system makes this system more
special, and the only one of its kind. This system has a lot of battery backup
(Figure 12.13).
For instance, when a person wearing the device, is in danger, at that time
he/she can press the SOS button, and immediately an alert message will go to
the registered mobile numbers. As this system is unique, as soon as the SOS
button is hit, the recent last location is sent to the immediate local supports
available like fire brigade, police, and ambulance.
Microcontroller-Based Wearable Location Tracker System 159
The system is smart. As the local area changes, the local supports change
too and accordingly this system works. The working of will be clearer with
the next few instances.
For example, a woman wearing the device is walking on the street, and
she is in danger. There are a group of eve teasers following her, or harassing
her. She immediately when presses the SOS button, so an alert message goes
to the alert center. Once the alert center receives this alert message it checks
the present location of the user, and checks for the immediate help available.
The immediate help available locally is the police station, hospitals, so these
places will get an alert message along with the location of the user, and a
rescue operation can be arranged for. Also, another alert message is sent to
the two registered mobile number.
Similarly, when a fisherman loses his boat in the mid sea, and he presses
the SOS button. The SOS message reaches the alert center. The alert center
checks the locality of the user, checking he is the mid sea, the local support
available will be the coast guards; police ambulance in this case will not be
the effective help. Thus, the SOS button on being pressed, the alert message
along with the location of the user is sent to the coast guards, who are the
immediate support avail then (Figures 12.14 and 12.15).
When the question of application arises, this device has a diverse area of its
significant impact and application:
brave officers have got stuck somewhere inside or have been lying under the
debris. But how will the others know the location of their brave colleague?
This device will help them. This device will be worn by the fire fighters. As
soon as they will enter particular premises, their location will be sent to the
database, and each fire fighter’s location will be tracked. When the fire fighters
face such a situation like the above, they can press the SOS button, and the
alert message will help to locate the victims. Thus, if a fire fighter faces such
a situation like both of them had then with the help of this device, they will be
able to survive. The brave fighters who give fight the fire to save our lives, will
not lose their precious lives due to lack of proper information.
FIGURE 12.16 This device is very beneficial for the fire fighters.
While we all are in our resting time, at the time fishermen gets ready for their
daily routine. For them only we people are able to have fishes as our meal
but we do not have any idea through how much hard work fishermen goes
for catching those fishes. Every day at the dawn, they prepare themselves for
going at the middle of the sea for fulfilling their duty.
Suddenly, a storm breaks out at the mid shore and the weather condition
around the sea or any other water body drastically changed within a minute and
respectively high tides occurred and the waves are irregular and on tenterhooks
and the fisherman is in the midst of the sea. Can you imagine the condition of
162 Advances in Data Science and Computing Technology
the fisherman? Their life is under threat but we need to assure them a danger
free life. So, our proposed device is a life savior for them. Our proposed device
is of wearable type and fisherman can wear the device and then they can carry
out their work. As soon as they move towards the midst of the sea or any other
water bodies their locations will be recorded and sent to the database and the
each and every fishermen’s location will be tracked.
When fishermen face situation like tempest, they can press the SOS
button and immediately an alert message will be generated and will be sent
to the registered contacts so that immediate rescue operations are arranged.
And if they are not in the condition to press the SOS button, their location
can be tracked and immediate supports could be sent to rescue them. They
risk their lives for us and it is our duty to save and provide them security.
Nowadays, child safety is a big concern for the urban parents, who mostly
stays away from their children due to work for the entire day almost. At this
situation, the wearable location tracker can be designed and implemented to
be used in their lifestyle. It will definitely prove very effective in ensuring
the safety to their children, even kids. This device will also prove efficient
when the children are out of home, i.e., in schools, coaching classes or in
any other place. The parents are always in a worry of the safety of their
children, where our proposed product can be a boon for them. It is very
easy to monitor for the parents and keep a track of their most loved ones.
It is also very user-friendly and thus, children wearing it, will not face any
sort of problem. It can be used for age group 3 years and above.
As for example, when a child goes to school by a pool car or school
bus, there may be such situations of child trafficking, in that case, the child
just needs to press the SOS button. Immediately, emergency support of
police will be gathered and an alert message will also be sent to the parents’
mobile number which had been registered initially in the device. Thus, it
will take care of the children, even when they are away from their parents.
Women are another important part of our society. They are often heard of
becoming victims of bullying and harassment in public. In recent times, the
security of women is a high point of concern for all, even the governing
Microcontroller-Based Wearable Location Tracker System 163
bodies. In this situation, this wearable location tracker can mitigate the
problem up to a certain stage. Nowadays, rape has become a common issue,
which is the call of the hour for us and needs to be put an end to this, as
early as possible. Thus, the women get victimized the most in the society.
For them, the above mentioned device will rescue them, if caught in such
horrendous incidents.
Now, for example, if a woman is traveling alone late night, she defi
nitely needs security. At this situation, she can wear this device and make
sure that the power button is ON. Thus, in any chance if she faces some
weird or unnatural circumstances, or if she senses danger, can simply hit
the SOS button. As soon as possible, a nearby help, like police can be
provided; and also, an alert message will be delivered to the closed ones
of the victim, and she can be rescued. Thus, it will reduce the cases of
women harassment and will also help in building a better place for them
to live.
Thus, we can see that this device is not only for the fishermen, but also for
the fire fighters, women, children, for each and every section of the society.
This device is for the benefit, for the betterment for the good and security of
the entire society at large.
12.7 RESULTS
The wearable location tracker during disaster, will not only be able to detect
the location of the user, but also will provide support with nearest assistance
in case of any danger suspected. The device will also be helpful to the user
to get rescued by the local supports available. For example, if a person in a
building, caught in dangerous fire breakout, then the assisting body will be
the fire-brigade and police. But, if a fisherman loses his boat in mid water
body or falls in any type of danger, then in this case the rescuing body will be
the coast-guards and not the police. Thus, it is clear from the above instance
that the support or the help that will be generated, entirely depends on the last
tracked location of the user, i.e., the last updated location of the user stored in
the cloud. The person wearing this device will not feel any extra weight, as
it is extremely light in weight, which is one of the key features of the device.
Another striking feature is that, it has an exclusive SOS facility inbuilt in
the device itself, so that at times of any emergency, whenever the button is
hit, local support will be arranged automatically by determining the recent
location of the user. Our device is facilitated with two buttons, first one is the
164 Advances in Data Science and Computing Technology
power button, having the power symbol and green in color and second one is
the most important, the SOS button. Since, it will sense the danger; it has a
vibrant red color to make it more noticeable at times of emergency.
It also has an extra and highlighting facility which proves beneficial
in terms of power saving and also accounts for being more user friendly.
Suppose, the user instead of pressing the power button hit the SOS button or
vice-versa; then in that case, it has the technology that unless and until the
power had not been turned ON, the SOS button will not work and similarly,
if the user hit the SOS button mistakenly instead of power button; then no
alert message will be generated because the device will not start operating
before turning ON the power button. The device is also made water-proof
and even heat-resistant, thus making it fit for use even underwater to assist
the fishermen, whenever he senses danger or loses his boat in sea.
12.8 CONCLUSION
In future, this location tracker can be given a new shape with some added
features, which will make this more efficient. We are continuously working
to increase the efficiency of our product by applying various available latest
Microcontroller-Based Wearable Location Tracker System 165
This device will not only secure a lot of safety, but also has a potential to
give a way of living to a lot of people and secure their lives. This device will
be manufactured by a particular company and the business setup will ensure
monopoly regarding the selling, maintenance of the service. This company
will also deal with the other aspects related to the device such as security of
information and the data hiding part. This company will also have provisions
for the emergency alert systems, which will be very active and quick to
response when there is a time of emergency.
As mentioned earlier each device will be registered one, so the entire
data will be logged into the company’s log, where with each device corre
sponding details of the user will be maintained. Since the company will
have the policy of monopoly, there will a lesser threat of duplicate products.
Moreover, there will be no compromise with the quality of the device and
especially the safety and security of our users.
As mentioned above, the information will not be disclosed, and will be
kept under proper secured supervision, for that special and efficient team
will be present, who will look into the matter of safety and security of the
data, and will be supervising the entire event.
All these work will need a lot of people to work together. There will be
offices of this company in various parts of the world. Thus, this company
will be a home to thousands of employees. This company will bring smiles in
166 Advances in Data Science and Computing Technology
the faces of millions of people by offering them jobs, and ensuring the safety
and security of the users.
Each device will cost approximately Rs. 2,250/-. And as the number of
production increases, and the production is done on a large scale, there will
be a considerable drop in the price of each device.
KEYWORDS
• Arduino microcontroller
• cloud
• global positioning system (GPS) module
• global system for mobile communications (GSM) module
• SOS button
REFERENCES
An end-to-end location and regression tracker with attention-based fused features. In: 2019
International Joint Conference on Neural Networks (IJCNN)Date of Conference: 14–19
July 2019. Date Added to IEEE Xplore: 30 September 2019 INSPEC Accession Number:
19028209. doi: 10.1109/IJCNN.2019.8852288Publisher: IEEE.
Debajyoti Pal, Anuchart Tassanaviboon, Chonlameth Arpnikanondt, & Borworn Papasratorn
(2020). Quality of Experience of Smart-Wearables: From Fitness-Bands to Smartwatches
(Vol. 9, No. 1, pp. 49–53). In: IEEE Consumer Electronics Magazine Date of Publication: 04
December 2019 INSPEC Accession Number: 19194203. doi: 10.1109/MCE.2019.2941462.
Publisher: IEEE.
Design and development of wearable GPS tracking device by applying the design for wearability
approach. In: 2018 4th International Conference on Science and Technology (ICST), Date
of Conference: 7–8 Aug. 2018. Date Added to IEEE Xplore: 12 November 2018 INSPEC
Accession Number: 18233756. doi: 10.1109/ICSTC.2018.8528636 Publisher: IEEE.
Design of handheld positioning tracker based on GPS/GSM. In: 2017 IEEE 3rd Information
Technology and Mechatronics Engineering Conference (ITOEC), Date of Conference: 3–5
Oct. 2017. Date Added to IEEE Xplore: 01 December 2017INSPEC Accession Number:
17411810. doi: 10.1109/ITOEC.2017.8122477 Publisher: IEEE.
Development of real time life secure and tracking system for swimmers. In: 2019 3rd
International Conference on Computing Methodologies and Communication (ICCMC), Date
of Conference: 27–29 March 2019. Date Added to IEEE Xplore: 29 August 2019INSPEC
Accession Number: 18958280. doi: 10.1109/ICCMC.2019.8819859 Publisher: IEEE.
Development of real time life secure and tracking system for swimmers. In: 2019 3rd
International Conference on Computing Methodologies and Communication (ICCMC), Date
Microcontroller-Based Wearable Location Tracker System 167
of Conference: 27–29 March 2019. Date Added to IEEE Xplore: 29 August 2019INSPEC
Accession Number: 18958280. doi: 10.1109/ICCMC.2019.8819859 Publisher: IEEE.
Energy efficient assisted GPS measurement and path reconstruction for people tracking.
In: 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, Date of
Conference: 6–10 Dec. 2010. Date added to IEEE Xplore: 10 January 2011INSPEC
Accession Number: 11743331. doi: 10.1109/GLOCOM.2010.5684306 Publisher: IEEE.
Foxlin, E. (2005). Pedestrian tracking with shoe-mounted inertial sensors. In: IEEE Computer
Graphics and Applications (Vol. 25, No. 6, pp. 38–46). Date of Publication: 07 November
2005. INSPEC Accession Number: 8662444. doi: 10.1109/MCG.2005.140. Publisher: IEEE.
Instantaneous feedback pedometer with emergency GPS tracker. In: 2018 2nd International
Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) I-SMAC (IoT
in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on
Date of Conference: 30–31 Aug. 2018. Date Added to IEEE Xplore: 28 February 2019INSPEC
Accession Number: 18490586. doi: 10.1109/I-SMAC.2018.8653718 Publisher: IEEE.
Internet of Things: Solar array tracker. In: 2017 IEEE 60th International Midwest Symposium
on Circuits and Systems (MWSCAS), Date of Conference: 6–9 Aug. 2017. Date Added to
IEEE Xplore: 02 October 2017Electronic ISSN: 1558–3899INSPEC Accession Number:
17214744. doi: 10.1109/MWSCAS.2017.8053109Publisher: IEEE.
Optimization of laser trackers locations for position measurement. In: 2018 IEEE International
Instrumentation and Measurement Technology Conference (I2MTC), Date of Conference:
14–17 May 2018. Date Added to IEEE Xplore: 12 July 2018 INSPEC Accession Number:
17917295. doi: 10.1109/I2MTC.2018.8409835 Publisher: IEEE.
User localization using wearable electromagnetic tracker and orientation sensor. In: 2006 10th
IEEE International Symposium on Wearable Computers Date of Conference: 11–14 Oct.
2006. Date Added to IEEE Xplore: 22 January 2007Print ISBN: 1–4244–0597–1 INSPEC
Accession Number: 10236845. doi: 10.1109/ISWC.2006.286343Publisher: IEEE.
CHAPTER 13
ABSTRACT
To design a simple eye, drop bottle holder device that can be used to put
ocular drugs independently even the patients with severe visual impairment.
We have worked in three phases; in Phase 1, designing of the non-electronic
device (eye dropper) it is a non-electronic device and we are calling it “Easy
eye dropper.” It involves less effort for the patient. The leverage which is
present, it is specially designed with extended arms, so that it can deliver eye
drops using with the lightest finger press and drop will be fallen inside the
eyes. The eyepiece and locks position is constructed in such way that is ideal
for the user. Now as the size of the drops varies from length to diameter (5
ml to 10 ml), all the diameter and length of all the drops are not same which
are available in the market, to get rid of it we a have a way out here (as we
used the screw tightened mechanism of a compass and a pencil). Like the
same way, here we have placed a screw system, where you can put the eye
drop inside the device and then according to the diameter you just tighten the
screw. Hence it will be fit inside, then place the device on the eye, by the help
170 Advances in Data Science and Computing Technology
of leverage press it automatically, with one gentle press a drop will come out
and will go directly inside the eye.
In Phase 2, designing of the electronic device (electronic eye dropper).
We have designed another electronic model with some additional features
which can be considered as the upgraded version of the non-electronic
model. It includes an eye detector sensor and some audio output along with a
micro vibrator. This technology will reduce the effort of the patients in terms
of his/her attentiveness as with this electronic technology a sensor will detect
that whether the tip of the bottle is placed on its proper place or not. A beep
electrical sound will confirm the number of drops fallen in the eye. Also, we
have incorporated a micro vibrator in it keeping the deaf and mute patients
who may not detect the sound sensor.
One press = one beep sound = one drop will get out
13.1 INTRODUCTION
There are a majority of ocular diseases where the mainstay of treatment of the
patients includes topical therapy. If we overview the various ocular conditions,
starting from a very minor ocular disturbance to a severe chronic problem is
treated with the help of topical therapy along with its other additional treat
ment. As there are many kinds of eye drops, it is hard to generalize about
their usage area, but the more commonly the areas we are always dependent
on topical drugs mostly: Dilating drops during eye examinations, lubricating
drops for dry eye symptoms, redness-relieving drops, anti-allergy drops for
itchiness-relieving, pre-operative, and post-operative drugs, commonly, and
frequently used antibiotic drugs and the pressure-lowering drugs used for
Design and Modifications of Eyedrop Bottle Holder Device 171
long term treatment like glaucoma. Consider a disease like glaucoma where
we have to make sure to put in the right amount of eye drops at the right time.
This way the drug will help to keep the eye pressure at the correct level for the
patients, which decrease the risk of their eyesight becoming poor in future.
Many people find it difficult to put eye drops in initially, also many of the
patients cannot even put drugs independently and it is easy to miss the regular
prescribed doses. Glaucoma is a slow progressive ocular condition that can
ultimately result in impaired vision or even person may reach to the condition
of blindness, so it is important to take all the drops as prescribed. Also, for
glaucoma sufferers, most of them have to use drops even for their lifetime.
There are various ways to install eye drops in the eye and many people
take many ways for this task. Some patients try to put independently but
some people take others’ assistance. Before to start putting a drop one has
to make sure that the hands are properly cleaned. Few drops need to be
shaken. Remember. One of the simplest ways of installing drops in is to sit
comfortably in front of a mirror or can be instilled drops whilst lying down,
need to gently pull down the lower eyelid with a finger of any hand, with
the other hand which is free, need to press the bottle according to the proper
instructions and allow the drop fall into the space between eye and the lower
lid. After putting the drop in the eye, the patient needs to close the eye lid
gently and press on the inside corner of the eye, near the nasal area, with a
finger for one minutes. This will help to reduce the rate at which the drop
drains out through the tear duct into the throat cavity, rather than staying
in the eye where it is essential. A little amount may still drain through the
tear duct and be swallowed in our throat, that is why it felt bitter taste in
throat. This small amount which we are swallowing is not harmful but, the
amount of eye drops entering body through the tear duct is minimized. This
is why there is a higher chance of unnecessary wastage of drugs and also the
absorption of drug through the ocular surface reduced. Many times, patients
also get suspected whether the right quantity of drugs has gone inside the eye
or not, hence they put another drop of the drug from this suspicion which
may lead to get the bottle finishes early. For this reason, most of the topical
drug user takes someone’s help always. To be dependent always for this task
on family members, friends or other people may reduce the wastage of drugs
but it leads to untimely putting of drugs due to the unavailability of helping
hands on time always. If it is a glaucoma patients or post-operative cases
then there is always a need for frequent eye drop installation to preserve the
eyesight. There are some other situations also where one has to install eye
drops independently. Mainly, the time when people are there in their work
field or traveling alone in outdoors.
172 Advances in Data Science and Computing Technology
Keeping all those points in mind we have made “Easy Eye Dropper”
which may help to get rid of both the problems in terms of drug wastage and
also a dependency on drug installation. There are few aids already commer
cially available for this task but they have a few disadvantages which are
leading to its non-popularity among the ocular drug users. Mostly all these
aids are manual or non-electronics. Few designs are not suitable for all sizes
of bottles, few aids not proper for gripping in hands and some are creating
problem in positioning proper places.
New modified eye drop bottle holder “Easy Eye Dropper” will be an
effective device and useful invention in terms of the longevity of drug quan
tity, wastage of drug quantity and will create independence of putting the
drug into eyes and will overcome all the limitations of previously made aids.
13.2 OBJECTIVES
The main aim of our work is to design a better technology eye drop bottle
holder device. Our goal is to help all the ocular drug users including the
severely visually impaired people, hand tremors, arthritis, and old-aged who
cannot put eye drops without any ones help and always missed the drug
schedule due to lack of helping hands on time. Also, this technology may
reduce the wastage of drugs which may indirectly save the health budget of
any drug user. The specific features of lightweight, easy usage technique and
low cost gives ocular drug user a new lease of life, a new dimension of inde
pendence and enables him to save some budget on ocular drugs purchasing.
users for the application of eye drops and the residual eye drops which were
not used in the returned bottles were measured for quantitative assessment as
planned in the objective of their study.
They concluded that the number of attempts of instillation which was
made with the help of eye drop applicator was reduced significantly. This
device also reduced the wastage of drugs.
But they found few limitations also like severe arthritis patients and low
vision patients cannot use this. The mirror which is placed in the applicator
can break easily (Mukesh, Chappidi, and Naga, 2016).
Jungueira et al. made a study on the efficacy of drugs and also to check
the safety of a new device (eye drop R), which had been designed for eye
drop instillation in patients having or not having glaucoma.
They have done this study on both types of patients (on glaucoma
patients and healthy participants) on applying the eye drop. This study
included patients with glaucoma and normal healthy participants after doing
all comprehensive eye examination and measurement of the baseline intra
ocular pressure, the topical hypotensive medication had been given in both
eyes and the Eye drop delivery device was made available to all subjects
(with video and written instructions in them for proper evaluation) for use
in one eye, which was randomly chosen by the participants. In the second
phase, all the participants were evaluated by an examiner for IOP, inves
tigation of possible related side effects, and the ease of putting eye drops.
Conclusion made was that Eye drop gained a better subjective response
regarding the ease of installation as compared to traditional instillation.
But this device also has some limitations like it is an invasive technique:
which can cause harm to the ocular surface. It does not give a proper idea that
how much amount of drop got instill (Junqueira, Lopes, and Souza, 2015).
George C. Bauer invented a device in the year 1992 by which eye drop
applications became easy. The Eye drop applicator comes for an eye dropper
vial comprising of a cup with a lip portion to get fitted well around the eyeball
and helps in letting the eye lid remain opened. A sleeve has an internally
threaded passage extending from the top of the cup. The internally threaded
passageway can be removed and it is connected to an externally threaded
neck of the eye dropper vial. The one who uses it will have to squeeze the
eye dropper vial for directing an eye drop from the nozzle of the eye dropper
vial onto the eyeball center.
This applicator also has some disadvantages like this was just a theory
no working model was produced according to this theory. If it would have
produced then this device would have been an invasive device which could
174 Advances in Data Science and Computing Technology
OptiAid is another type of device which looks more high-tech than the
other available devices, it can hold up to five drops in its five chambers.
Unlike the other devices, this one is positioned in front of the eye and
allows the drop to fall onto the eye, theoretically preventing the device from
touching the cornea. However, it needs moving the eyelids and eye lashes
out of its way to avoid the touch. Negative factors are: Not available in the
Indian market. It is a complete invasive technique to install drug. No studies
have still done on this innovation regarding its effictiveness (Efron, 2013).
Another aid created by Jonathan Cress an ophthalmologist. This dropper
is an arched tube. It marks the users nose as a reference point so the tip can be
steadily placed in the medial canthi area and the area will be properly identified.
Once the tip is properly placed in its position, the bottle is squeezed; the
drop leaves the aperture, slides down properly and off the little ramp onto the
delivery tip and into the user eye. The user releases the bottle when they feel the
drop fallen into the eye. The current version of the device is with no measuring
component, but mostly the patients gain an understanding of squeezing the bottle
to release just one drop of medicine and extra drops will not be wasted. Still this
device also has some limitations. Patients who have weak hands find it difficult
or impossible to press the bottle by squeezing accurately (Kahook, 2007).
13.4 METHODOLOGY
The study was carried out into three phases. But in this chapter, we have
described only two phases and the third phase will be done in our next work.
Broadly, phase I involved in the design and implementation of the eye drop
bottle holders which will be working manually. We called the aids “Easy Eye
Dropper”(non-electronic model).
In phase II, we used Arduino and Ultrasonic based sensor techniques.
This is an electronic model of “Easy Eye Dropper.”
In phase III we have to assess the practical and functional approach of
the newly made “Easy Eye Dropper” aids with both the electronic and non
electronic models.
This model is beneficial particularly for those who have severe arthritis,
spondylitis (mainly cervical and for that they cannot move back their neck
to the backside) or difficulty in lifting their hand up and reach close to the
176 Advances in Data Science and Computing Technology
eye due to any type of systemic illness. This type of people mainly faces
a lot of challenges while they are trying to install eye drops in their eyes
independently. Hence, they have to be always dependable on others. The
leverage that one can get from this specially designed eye dropper holder–
two extended arms (14 cms) which to deliver eye drops just by using even
the gentle finger touch. The eye piece arrangements and locks in the position
that is perfect for you during the drug installation procedure.
Here we have implemented a screw in the dropper – now as the size of the
eye drop bottles varies from length to diameter based on its commercial compa
nies, along with the quantity of drugs also varies from company to company
and brand to brand, e.g., 2.5 ml–10 ml, diameter varies from 3 cm–3.5 cm. The
shape of the eye drop bottle also varies from round to oval (Table 13.1).
TABLE 13.1 Explaining the Procedure of Fitting of Bottle Into “Easy Eye Dropper” and a
Simple Instructions for the Users
Fitting of Bottle Into “Easy Eyedropper” Instructions for the Users
If the bottle is new remove the protective seal Open eyepiece and remove the bottle cap.
(Figure 13.1(a)) Tight the screw or lose the screw according
to the size of the bottle (Figure 13.2(a))
Open eye piece towards arms/leverage of the Close the eyepiece. Rotate the eye piece
dropper (Figure 13.1(b)) towards left or right as per in which eye
you are using for the most comfortable
administration of the drug (Figure 13.2(b))
Place the dispenser on the flat surface and While sitting back or lying down, the user
spread the two arms of the dispenser open, has to tilt his head back and place eye piece
push eye drop bottle inside dispenser until the securely over the eye.
base of the eye drop is fully depressed. Eye piece has finger space for pulling down
Tight/lose the screw according to the size/ lower eyelid with free hand (Figure 13.2(b))
diameter of the eye drop bottle (Figure 13.1(c))
Then close the eyepiece Gently press the arms of device to install
eye drops one per squeeze (Figure 13.2(c))
So, to get rid of these we have a way out here (as we use the compass
during geometry in mathematics, we tightened the pencil in the compass in
the other arms of the compass for drawing) like the same way we have a
screw system in this device. The user needs to put the eye drop bottle inside
the dropper and then according to the diameter one can tighten the screw, this
way the bottle will be fit inside. After that the device needs to be placed over
the eye, by the help of the leverage the extended arms need to be pressed and
automatically by this gentle pressure a drop will come out and will be fallen
inside the eye.
Design and Modifications of Eyedrop Bottle Holder Device 177
The electronic “Easy eye dropper” consists of five main major compo
nents. They are as in subsections.
FIGURE 13.3 (a) IR sensor which we have used in our study; (b) diagram of the IR sensor.
Specifications:
• Operating Voltage Range: 3.0 V–5.5 V;
• Device Detection Range: 2 cm–35 cm;
• Electricity Consumption: At 3.0 V: ~23 mA, at 5.0 V: ~43 mA;
• Output Level: Output level will reduce /stop on detection of location;
• Location Detection: LED indicator.
For the connection of IR obstacle sensor to Arduino Nano, the hardware
and software needed are:
• IR obstacle sensor module;
• Arduino nano;
• Arduino IDE (1.0.6 V).
Design and Modifications of Eyedrop Bottle Holder Device 179
intIRsenseor = 7;
int buzzer = 8;
int lever=4;
void setup()
pinMode(IRsenseor, INPUT);
pinMode(lever, OUTPUT);
pinMode(buzzer, OUTPUT);
Serial.begin(9600);
void loop()
int a =digitalRead(IRsensor);
serial.print(a);
if(a==0)
digitalwrite(lever,HIGH);
digitalWrite(buzzer,HIGH);
delay(500);
else
digitalWrite(lever,LOW);
digitalWrite(buzzer,LOW);
delay(500);
13.4.2.2 ARDUINO
Arduino nano board is used as the main part of the electronic eye dropper.
The Arduino can control the levers by receiving input signals from the IR
sensor. The Arduino boards are arranged with sets of digital and analog
input/output (I/O) pins that are connected one with the IR sensor, one with
the buzzer and one with the lever (Figure 13.4).
The input voltage to the Arduino board has been used with 9 volts battery
regulated power source (Figure 13.6).
Design and Modifications of Eyedrop Bottle Holder Device 181
13.4.2.5 DC MOTOR
result a force will be created and hence a drop from the bottle will come out.
The DC motor will rotate and a small clip will rotate with it which will go
and hit a string which is attached with a spring by which the lever will get
activate. It will follow the mechanism of cam follower in Creo elements with
compression spring with motion (Figure 13.7).
This phase has not been explained in this chapter as this phase will be carried
out later. But we have done the planning for this phase. Phase III will be
carried out at Pailan Eye Clinic, Kolkata.
We are going to include 30 subjects of various categories (10=glaucoma,
10=Post-Op cataract and 10= Normal Individuals or volunteer). Those
subjects will be asked to do an exercise for a period of two months. In the
first month they will be asked to use a bottle of approx. 5 ml drug in one eye
without the help of any kind of device in the right eye and in left eye to put
the drug with the help of non-electronic “Easy Eye dropper” model. Next
month they will be given both the non-electronic and electronic model of
“Easy Eye dropper” devices and they will be instructed again to put the eye
drop with the help of the non-electronic model in right eye and electronic
Design and Modifications of Eyedrop Bottle Holder Device 183
model in left eye. Both the time they have to be use two different bottle for
two eyes. After each month’s trial or when the drops in one of the bottle
finished, the users will be asked to return the used bottle. The amount of
the residual drugs which is not been used in the returned bottles will be
measured with the help of a measurement syringe.
Also, we are going to ask few general questions to get the feedback on
this newly made aid. All procedures and protocols will be standardized. This
will be ensured by proper instructional and handy training to the subjects
before to hand over the devices. Examiners also will be instructed properly
about the assessment procedure for those who will be involved in this study.
A Single blinded technique has to be followed during the assessment of feed
back round. This part of this study is approved by the institutional review
board (IRB) and informed written consent will be taken from all the included
participants.
Three parameters which will be mainly observing are: (i) total times of
applications without any device and with both non-electronic and electronic
devices; (ii) total number of attempts; (iii) wastage of drugs.
It is worth mentioning that at this point the aim of our study fulfilled as per
our objectives. We started our work with three objectives; the first one is to
design and implementation of a non-electronic eye dropper aids. We have
designed this model with all the possible features of lightweight, handy, easy
to use and cheaper cost. These features made this device more unique as
compared to all other existing aids which are commercially available in the
market. Most of the existing devices are not suitable for patients with severe
arthritis or those who have weaker hand grip so that it is very difficult for
them to hold those devices properly and to locate exactly over the eye where
exactly they need to put the drop. But our design has the advantage of placing
it exactly over the eye because of the design of the holder of this device. For
the same reason other devices are not equally helpful for the patients with
severe visual impairment. Some of the existing devices are fitted with mirror
and users have to locate the tip of the bottle on the eye by looking in the
fitted mirror, but again this would create some difficulties for the users who
have very severe visual impairment. Another disadvantage is the mirror may
break easily. In our non-electronic design, we do not have any such kind of
mirror arrangement which enhances the durability of this aid.
184 Advances in Data Science and Computing Technology
Few devices designed in such a way that the tip of the bottle needs
to touch the ocular surface. This is very harmful in terms of the invasive
procedure as well as it can be the source of infections. Another way, the
invasive technique may damage the ocular surface also if the user get a little
of bit distraction of mind or handshake while installing the drugs. Another
disadvantage of the invasive technique is that the user needs to keep the
device clean as it may contaminate because of the multiple touches. In our
non-electronic device, there is no chance of touching the ocular surfaces
because of the design of its holder.
Though most of the devices are commercially available but still very few
designs are available in the Indian market. So, most ocular drug user are still
unaware of these small technique, hence they are either dependent on others
or wasting eye drops while they are trying to put independently.
The phase two design is completely a newer invention. There are no such
electronic aids for this task. Our main aim of making this electron design was
to remodeling or modifies few features which may add few extra benefits for
the users. In non-electronic device the tip of the device has to put manually
over the proper location so there is a still chance of missing the proper eye
location where exactly one needs to put the drug. The electronic design can
detect the exact location with the help of IR sensor which is connected with
an Arduino sensor. The sensor will detect the eye position and once detected
it will confirm through a sound that will be coming from a buzzer.
Also, the buzzer will create a sound to make the patient aware of that
how much drop they have to install on their eye. It helps the patient /the
user to get to know that how much amount of drop went off from the drop
bottle. These unique features will definitely reduce the number of trials while
putting eye drop and equally will reduce the wastage of drugs as compared
to any existing non-electronic aids.
We are going to do few additional things in the phase III part of our study.
This is completely a new approach that has never been done in most of the
previous works. The previous researches show only the constructions and
implementations of a non-electronic eye dropper aid with multiple features
but most of the studies have not shown the results in real-world situations.
So, there will be a bit doubt for the user about the effectiveness of these kinds
of aids in a real world situations and how it is operated by the actual needy
patients mainly glaucoma, post-operative cases or a severe visual impairment
who are the frequent ocular drug users. The results from phase III must be a
positive indicator to differentiate among the without device, non-electronic,
and electronic one. However, still in this chapter, we have shown only the
Design and Modifications of Eyedrop Bottle Holder Device 185
design and construction phases. Once we will complete the phase III, we
will be adding extra information to prove the effectiveness of our invention.
13.6 CONCLUSION
The non-electronic and electronic “Easy Eye dropper” design will definitely
add an extra platform for the frequent ocular drug users who are hindering
the barriers of putting drugs in day-to-day basis. It leads to good results for
all kinds of users including glaucoma, post-operative cases, or nay general
drug user. This is reliable, light weight, portable, low power consumption,
and low cost. The effectiveness and affordability will make it more accept
able to the users. This new improvisation in this technique will surely add
an extra benefit in terms of time saving, eye drop installing effort and cost
effective in the process of independent-installation the eye drops.
KEYWORDS
REFERENCES
Mukesh, T., Chappidi, K., & Naga, S., (2016). Innovative Bulls Eye Drop Applicator for Self-
Instillation of Eye Drops, 43(3), 11.
Sharma, R., Singhal, D., Shashni, A., Agarwal, E., Wadhwani, M., & Dada, T., (2016).
Comparison Of Eye Drop Instillation Before and After Use of Drop Application Strips in
Glaucoma Patients on Chronic Topical Therapy, 25(4), e438–440.
www.maddak.com/autodrop-eye-drop-guide-pr-28115.html?page=2 (accessed on 08 December
2021).
https://magic-touch-eye.myshopify.com/ (accessed on 08 December 2021).
https://www.contactlenskit.com/optiaide/ (accessed on 08 December 2021).
CHAPTER 14
2
Department of Information Science and Engineering, AMC
ABSTRACT
14.1 INTRODUCTION
We experience a day-by-day reality with the end goal that everything can
be controlled and worked. Therefore, yet there are relatively few huge parts
in our country where computerization has not been gotten or not been put
to an undeniable use on account of a few reasons like cost, achievability,
and so on. One such field is that of cultivating. Horticulture has been one
of the essential occupations of people since early developments and even
today manual intercessions in cultivating are unavoidable. Agro nutrition
alert (ANA) is an affordable tool for farmers which guides them to use only
required amount of chemical fertilizers, adequate irrigation and sometimes
luminosity and temperature (in case of greenhouse farming). Being small
in size, it is portable and easy to assemble. Whenever used, it simply sends
an SMS to the farmer mentioning the amount of water, fertilizers (urea,
potassium, and phosphate) required in the crop-field. In case of greenhouse
farming, according to temperature and luminosity recorded and required,
farmers can decide air exposure and light exposure inside the house.
ANA has already been fed some general crop data (all parameters for
Kharif, Rabi, and some specific commercial crops). For some specific crop
(Quitain, 1987), data can easily be fed by introducing new variables in
program (can be done by anyone with a little programming skills). ANA is
using 4G connectivity for communication, so in case of technology avail
ability, farmers can go for GPRS/LTE communication too.
14.2.1 COST
In traditional method, farmers have to visit nearby labs (within 100 km area)
and pay a sum of almost Rs. 500 for the test. This test needs to be carried
twice a year. ANA costs Rs. 2,000 (one time investment) and can help a
190 Advances in Data Science and Computing Technology
group of farmers. So, if a group of four farmers have ANA, it costs only the
price of one sample/farmer.
While visiting the soil testing lab, minimum two days are required to carry
out the process and generating the report. ANA requires a maximum of 15
minutes to setup and getting the digital report (via SMS).
14.2.3 ACCURACY
14.2.4 LIFETIME
We cannot compare the life of a laboratory with that of a tool. ANA has an
approx. lifetime of 7–8 years (must be handled with care).
• Arduino IDE;
• Windows 10 (Operating system/64-bit).
Agro-Nutrition Alert (ANA) 191
FIGURE 14.2 Diagram showing different sensor connection to collect chemical parameters
like nitrogen, phosphorous, and potassium content (primary).
192 Advances in Data Science and Computing Technology
FIGURE 14.3 Diagram showing different sensor connection to collect atmospheric and soil
parameters like ambient light, temperature, and soil moisture (secondary).
14.4 RESULTS
FIGURE 14.6 Diagram showing output message screenshot in recipients’ mobile phone.
194 Advances in Data Science and Computing Technology
14.5 CONCLUSION
Using the proposed solution, farmers can get their soil report within minutes.
They can test the soil at different positions and hence increase the accuracy
significantly. With its low cost and less time consumption, it makes the
process smooth and easy to carry. With the easy-to-understand SMS format
(in English + regional language), it satisfies the user up to a far better extent.
We can conclude with a hope that in near future, chemical laboratories could
be replaced through the instruments like ANA.
KEYWORDS
• agro nutrition
• agro nutrition alert (ANN)
• Arduino
• nitrogen
• phosphorous
• potassium
REFERENCES
Chang, C. Y., & Reid, J. F., (1996). RGB Calibration for color image analysis in machine vision
Image analysis in machine vision. IEEE Transactions on Image Processing, 5, 1414–1422.
Chavan, S., Badhe, A., Kharadkar, S., Ware, R., & Kamble, P., (2018). IOT based smart
agriculture and soil nutrient detection system. International Journal on Future Revolution in
Computer Science & Communication Engineering, 4(4).
Kumar, V., Vimal, B. K., Kumar, R., Kumar, R., & Kumar, M., (2014). Determination of soil
pH by using digital image processing technique. Journal of Applied and Natural Science,
6(1), 14–18.
Quitain, B. M., David, R. M. (1987). Reability of soil test kit (Philippines). Bureau of Soils,
Manila (Philippines). Philippine Journal of Crop Science, 12(1), 21.
Regalado, R. G., & DelaCruz, J. C., (2016). Soil pH and Nutrient (Nitrogen Phosphorous
and potassium) analyzer using colorimetry. Proceedings of IEEE Region 10 International
Conference – TENCON.
Yoshitsugu Kimura, Kyosuke Yamamoto, Togami, T., Hashimoto, A., Kameoka, T., &
Yoshioka, Y. (2010). Construction of the Prototype System for the Chromatic Image
Analysis Using Color Distribution Entropy, 2438–2442.
PART V
Optimization Technique
CHAPTER 15
E-mail: [email protected]
2
Department of Electrical Engineering, Jadavpur University,
ABSTRACT
are called the wavelet coefficients of the signals. The decomposed signals
are assembled back using reconstruction program and square root of mean
square error (RMSE) are found for every mother wavelet. The correlation
coefficients are also calculated for each mother waveform individually from
the original signal and the coefficients of different mother wavelets. The
optimal mother wavelet are selected comparing the values of RMSE and
correlation coefficients of different mother wavelet. The optimal mother
wavelet are found among the 19 mother wavelets which has smallest RMSE
value and largest value of correlation coefficient for all faulty conditions and
for all phases.
15.1 INTRODUCTION
FFT and STFT the wavelet transform is used for accuracy in fault analysis
and it has gained widespread acceptance in signal processing (Yan, Gao,
and Chen, 2014). It has been shown that wavelet analysis can improve the
fault diagnosis (Ye, Wu, and Sadeghian, 2003; Poshtan and Zarei, 2007).
Discrete wavelet transform (DWT) decomposes the signal into several
wavelet coefficients (‘approximation’ and ‘detail’) and the decomposed
coefficients can be implemented by using a filter (Ponci, et al., 2007; Burrus,
Gopinath, and Guo, 1998; Bhola et al., 2013). Monique (1997) compared
between non-orthogonal and orthogonal wavelet and he has shown that
usually orthogonal wavelet have better de-noising performances than
the non-orthogonal. Orthogonal wavelet decomposition is useful for the
non-stationary signal, meaning that its variance depends on the window of
the data under consideration. Its decomposition provides information on the
variability of wave height at the various timescales with time (Daviu et al.,
2006). The improvement of de-noising performances with the increase of
data length has been shown for all thresholding schemes and transforms.
There are different orthogonal wavelets (Haar, Daubechies (db), Symlets,
Coiflets (Coif)) which are normally used for machine fault analysis. Despite
the satisfactory performance of DWT, the selection of optimal mother
wavelet is challenging task for different mechanical and electrical faults in the
machines. Researchers are applied different techniques previously to select
the optimal mother wavelet for detect of one particular fault in the machines
using vibration signals (Rafiee et al., 2009; Wang and McFadden, 1995) but
they are not selected optimal mother wavelet for analysis of more than one
type of fault using current signals. Optimal mother wavelet is selected in this
work among 19 mother wavelet functions for the thee phase current signals
of six different faulty induction motors. Haar (db1) wavelet is not used
here because the wavelet family is formed by sequence of rescaled ‘square-
shaped’ functions together and it is not continuous and hence it cannot be
used for distorted continuous signal analysis. Distorted stator currents are
decomposed using MATLAB program applying different mother wavelets
functions (db(3–10), sym(3–8), coif(1–5)) for different faulty conditions and
the decomposed signals are assembled back using reconstruction program.
The square root of mean square error (RMSE) are found from actual and
reconstructed signals and the coefficients of correlation are also calculated
using the actual signal and denoised signal of different mother wavelets
for each phase of each faulty motor. The optimal mother wavelet has been
selected based on the lowest RMSE and highest correlation coefficient value
of each phase of each faulty I.M.
200 Advances in Data Science and Computing Technology
15.2 METHOD
ψ t,T ( t )=
1
S
( )
ψ t-T
S (1)
where; ‘S’ and ‘t’ are the scaling and shifting parameter, respectively.
Wavelet transform is separately computed for different time-domain signal
segments at different frequencies. Wavelet coefficients are obtained, at a first
level of signal decomposition by applying a mother wavelet. The repetition
of this process depends on the scaling and translation of mother wavelet.
The mother is named due to formation the basis for various processes of
transformation. A mother wavelet can be imagined as a windowed function
which moves/shifts along the signal of time-series from the time t = 0 to
t =T. In the window the portion of the signal is multiplied by the mother
wavelet and then it is integrated over all times to get the coefficients of
wavelet. Wavelet family can represent that signal in as few coefficients as
possible is generally considered to be best suited for a particular application.
Every application would have one mother wavelet that would be most suited
to it. In wavelet theory it is tried to decompose the spectra into high and
low frequency content in some peculiar way for making some information
extraction process simpler. DWT decomposes the signal into a set of mutu
ally orthogonal wavelet basis functions.
The functions of wavelet are dilated, translated, and scaled versions of
a common function Ψ which is known as the mother wavelet. There are
different mother wavelet functions (db), Coiflets (Coif), Symlets (Sym))
which are used for different fault detection in the machines. In DWT based
Selection of Optimal Mother Wavelet for Fault Analysis 201
The decomposition analysis is described in DWT and the other half of the
story is how the actual signal comes back into original form by assembling
the decomposed components of the signal without losing any information.
This name of the process is called synthesis of reconstruction. The math
ematical manipulation of the process of reconstruction is called the inverse
discrete wavelet transform (IDWT). The process of wavelet reconstruction
consists of filtering and upsampling. Upsampling (or interpolation) is done
by zero padding between every two coefficients. The filters design for
decomposition and reconstruction is based on the well-known technique
called ‘Quadrature Mirror Filters.’ The reconstructed approximations and
202 Advances in Data Science and Computing Technology
The signals of current and vibration from the rotating machine carry lot
of information about different fault conditions. Statistical parameters for
different fault conditions can be found by statistical analysis of the acquired
current signals. The parameters are called statistical features carry informa
tion of time domain signals about the different fault conditions. The features
are also used to detect faults and some of the features can be used individu
ally to distinguish between healthy and faulty components. One statistical
tool called correlation analysis, which can be used to select optimal mother
wavelet for fault analysis of the induction motor. The word ‘correlation’
denotes the degree of association between the variables. The two variables q
and r are called to be correlated if the variations of magnitude of a variable
tend to be accompanied by magnitude variations of the other variable. The
two variables are called positively correlated if r increases when q trends to
increase. The two variables are called negatively correlated if r increases as
q tends to decrease. The two variables are called uncorrelated if the values
of q are not affected by changes in the values of r. R is the matrix of correla
tion coefficients calculated from an input matrix P as input whose rows and
columns are observations and variable respectively. R matrix is related to the
covariance matrix CV = cov (P) by:
CV ( q,r )
R( q,r ) = (2)
CV ( q,q )CV ( r,r )
FIGURE 15.2 The correlation block diagram between the noisy and de-noised signals using
mother wavelet families.
M
1
Root mean square error =
M ∑[x( p) − x( p)]
n=1
2
(4)
where; x̃ (p) is the p-th sample data of current signature for a given type of
fault and x̃ (p) is the p-th sample data wavelet filtered current signature for
the above type of fault.
The correlation coefficient (R) measures the strength of association
between the two variables. In the first step it studies the relationship between
two continuous variables and it draws a scatter plot of the two variables to
check linearity. The calculation of correlation coefficient depends on the
linear relationship. It really does not matter for correlation about the plotting
of variables in the axes. However, on the x-axis the independent (explanatory)
variable is plotted and, on the y-axis, the dependent (response) variable is
plotted conventionally. The higher strength of association between the
variables depends on how nearer the scatter points are to a straight line. It does
not matter about the units are used for measurement. Computed correlation
coefficients and computed RMSE using decomposition by wavelet transform
and reconstructed by inverse wavelet transform are compared for selecting
optimum mother wavelet. The coefficients of different mother wavelets
(Daubechies(db3-db10), Coiflets(Coif1-Coif-5), Symlets(Sym3-Sym8)) are
used for correlation analysis. Correlation coefficients are computed using
noisy and denoised signal. The mother wavelet is optimal which has minimum
RMSE value and largest correlation coefficient. The steps for optimal mother
wavelet selection have been described in flowchart as shown in Figure 15.3.
are stored into pc. The current wave of each phase of each faulty induction
motor is converted to 1,002 numerical data sample and stored as CSV file.
FIGURE 15.3 (i) Computation of correlation coefficients and RMSE using decomposition
by wavelet transform and reconstruction by inverse wavelet transform; (ii) selection of
optimum mother wavelet function.
waves are essential for the analysis. Therefore, the WT viewer software is
used in the PC to convert the current waveforms to numerical value and the
data samples are stored into.’CSV’ file format.
The data samples (amplitude vs. time) of three phase currents are collected
from six induction motors with different types of fault (bearing fault, broken
rotor bar, misaligned rotor, unbalanced rotor, stator winding fault, single phase
voltage unbalance) for the analysis. The wavelet coefficients are computed
using different mother wavelet functions (db(3–10), coif(1–5), sym(3–8)) from
the data samples of phase currents of each faulty induction motor by MATLAB
routine. The signals are reconstructed from different ‘approximate’ coefficients.
Root mean square error (RMSE) has been computed from original and recon
structed signal for different mother wavelets in different faulty conditions.
Correlation coefficients are also computed for original signal and denoised
signal using MATLAB routine. The histograms (Figures 15.6–15.23) are plotted
Selection of Optimal Mother Wavelet for Fault Analysis 207
FIGURE 15.6 (i), (ii) and (iii) shows the correlation coefficients and RMSE between original
and reconstructed current waveform on the basis of Sym(3–8) mother wavelet functions under
fault condition as broken rotor bar for R, Y, and B phase.
FIGURE 15.7 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as broken rotor bar for R, Y, and B phase.
FIGURE 15.8 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as broken rotor bar for R, Y, and B phase.
208 Advances in Data Science and Computing Technology
FIGURE 15.9 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of sym(3–8) mother wavelet functions
current under fault condition as faulted bearing for R, Y, and B phase.
FIGURE 15.10 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as faulted bearing for R, Y, and B phase.
FIGURE 15.11 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as faulted bearing for R, Y, and B phase.
Selection of Optimal Mother Wavelet for Fault Analysis 209
FIGURE 15.12 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of sym(3–8) mother wavelet functions
current under fault condition as rotor misalignment for R, Y, and B phase.
FIGURE 15.13 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as rotor misalignment for R, Y, and B phase.
FIGURE 15.14 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as rotor misalignment for R, Y, and B phase.
210 Advances in Data Science and Computing Technology
FIGURE 15.15 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of sym(3–8) mother wavelet functions
current under fault condition as rotor unbalance for R, Y, and B phase.
FIGURE 15.16 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as rotor unbalance for R, Y, and B phase.
FIGURE 15.17 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as rotor unbalance for R, Y, and B phase.
Selection of Optimal Mother Wavelet for Fault Analysis 211
FIGURE 15.18 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of sym(3–8) mother wavelet functions
current under fault condition as stator winding fault for R, Y, and B-phase.
FIGURE 15.19 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as stator winding fault for (a) R, Y, and B-phase.
FIGURE 15.20 (i), (ii), and (iii) shows the correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as stator winding fault for R, Y, and B phase.
212 Advances in Data Science and Computing Technology
FIGURE 15.21 (i), (ii), and (iii) shows that correlation coefficients and RMSE between
original and reconstructed waveform on the basis of sym(3–8) mother wavelet functions
current under fault condition as single phase voltage unbalance for R, Y, and B phase.
FIGURE 15.22 (i), (ii) and (iii) shows that correlation coefficients and RMSE between
original and reconstructed waveform on the basis of db(3–10) mother wavelet functions
current under fault condition as single phase voltage unbalance for R, Y, and B phase.
FIGURE 15.23 (i), (ii), and (iii) shows that correlation coefficients and RMSE between
original and reconstructed waveform on the basis of coif(1–5) mother wavelet functions
current under fault condition as single phase voltage unbalance for R, Y, and B phase.
Selection of Optimal Mother Wavelet for Fault Analysis
TABLE 15.1 Correlation Coefficients between Original and Reconstructed Waveform Using Mother Wavelet Sym5 Under Different Faulty
Conditions for R-Y and B Phases
Mother Wavelet BRF BRB RML RTU SWF FVU
R 0.996827021 0.998806583 0.996141276 0.996788131 0.996660663 0.996883995
Y 0.996944169 0.999697144 0.996869577 0.996625068 0.996039162 0.996844161
B 0.996806649 0.999756636 0.997383615 0.997378658 0.99723101 0.997124796
213
214
TABLE 15.2 Root Mean Square Error between Original and Reconstructed Waveform Using Mother Wavelet Sym5 Under Different Faulty
Conditions for R-Y and B Phases
KEYWORDS
• correlation coefficient
• discrete wavelet transform (DWT)
• mother wavelet selection
• root of mean square error (RMSE)
REFERENCES
Aktas, M., & Turkmenoglu, V., (2010). Wavelet based switching fault detection in direct torque
control induction motor drives. IET Science, Measurement, and Technology, 4(6), 303–310.
Al-Qazzaz, N. K., Ali, S. H. B., Ahmad, M. S. A., Islam, M. S., & Escudero, J., (2007). Selection
of mother wavelet function for multi-channel EEG signal analysis during a working memory
task. Sensors, 15(11), 497–507.
Amel, B., Laatra, Y., Sami, S., & Nourreddine, D., (2013). Classification and diagnosis
of broken rotor bar faults in induction motor using spectral analysis and SVM. In: 8th
International Conference and Exhibition on Ecological Vehicles and Renewable Energies
(EVER) (pp. 1–5).
Benbouzid, M. E. H., (2000). A review of induction motors signature analysis as a medium for
faults detection. IEEE Transactions on Industrial Electronics, 47(5), 983–993.
216 Advances in Data Science and Computing Technology
Benbouzid, M. E. H., Vieira, M., & Theys, C., (1999). Induction motors fault detection and
localization using stator current advanced signal processing techniques. IEEE Transactions
on Power Electronics, 14(1), 14–22.
Bhavsar, R. C., & Patel, R. A., (2013). Various techniques for condition monitoring of three
phase induction motor: A review. International Journal of Engineering Inventions, 3(4),
22–26.
Bhola, J., Yadav, R. B., Rao, K. R. M., & Yadav, H. L., (2013). Selection of optimal mother
wavelet for fault detection using discrete wavelet transform. International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering, 2(6), 2338–2343.
Blödt, M., & Rostaing, G., (2008). Models for bearing damage detection in induction motors using
stator current monitoring. IEEE Transactions on Industrial Electronics, 55(4), 1813–1822.
Burrus, C. S., Gopinath, R. A., & Guo, H., (1998). Introduction to Wavelets and Wavelet
Transforms. A Primer, Englewood Cliffs, NJ: Prentice-Hall.
Daviu, A. J., et al., (2006). Validation of a new method for the diagnosis of rotor bar failures
via wavelet transformation in industrial induction machines. IEEE Transactions on Industry
Applications, 42(4), 990–996.
Fargues, M. P., Barsanti, R. J., & Hippenstiel, R., (1997). Wavelet-based denoising:
Comparisons between orthogonal and non-orthogonal decompositions. Proceedings of 40th
Midwest Symposium on Circuits and Systems (pp. 929–932). Dedicated to the Memory of
Professor Mac Van Valkenburg.
Gómez, A. J. F., & Sobczyk, T. J., (2013). Motor current signature analysis apply for external
mechanical fault and cage asymmetry in induction motors. In: 9th International Symposium
on Diagnostics for Electric Machines, Power Electronics and Drives (SDEMPED) (pp.
136–141).
Henao, H., Razik, H., & Capolino, G. A., (2005). Analytical approach of the stator current
frequency harmonics computation for detection of induction machine rotor faults. IEEE
Transactions on Industry Applications, 41(3), 801–807.
Kalaskar, C. S., & Gond, V. J., (2014). motor current signature analysis to detect the fault in
induction motor. International Journal of Engineering Research and Applications, 4(6),
58–61.
Mehala, N., & Dahiya, R., (2007). An approach of condition monitoring of induction motor
using MCSA. International Journal of Systems Applications, Engineering & Development,
1(1), 13–17.
Ponci, F., et al., (2007). Diagnostic of a faulty induction motor drive via wavelet decomposition.
IEEE Transactions on Instrumentation and Measurement, 56(6), 2606–2615.
Poshtan, J., & Zarei, J., (2007). Bearing fault detection using wavelet packet transform of
induction motor stator current. Tribology International, 40(5), 763–769.
Rafiee, J., Tse, P. W., Harif, A., & Sadeghi, M. H., (2009). A novel technique for selecting
mother wavelet function using an intelligent fault diagnosis system. Expert Systems with
Applications, 36(3), 4862–4875.
Sangheeta, P., & Hemamalini, S., (2017). Dyadic wavelet transform-based acoustic signal
analysis for torque prediction of a three phase induction motor. IET Signal Processing,
11(5), 604–612.
Singh, G. K., & Sa’ad, A. S. A. K., (2003). Induction machine drive condition monitoring
and diagnostic research—A survey. Electrical Power Systems Research, 64(2), 145–158.
Singh, S., Kumar, A., & Kumar, N., (2014). Motor current signature analysis for bearing fault
detection in mechanical system. Procedia Materials Science, 6, 171–177.
Selection of Optimal Mother Wavelet for Fault Analysis 217
Tavner, P. J., (2008). Review of condition monitoring of rotating electrical machines. IET
Electric Power Applications, 2(4), 215–247.
Wang, W. J., & Mc Fadden, P. D., (1995). Application of orthogonal wavelets to early gear
damage detection. Mechanical Systems and Signal Processing, 9(5), 497–507.
Yan, R., Gao, R. X., & Chen, X., (2014). Wavelets for fault diagnosis of rotary machines: A
review with applications. Signal Processing, 96(Part A), 1–15.
Ye, Z., Wu, B., & Sadeghian, A., (2003). Current signature analysis of induction motor
mechanical faults by wavelet packet decomposition. IEEE Trans on Industrial Electronics,
50(6), 1217–1227.
CHAPTER 16
ABSTRACT
Renewable energy sources like solar power may be employed for water
pumping applications where Solar irradiation availability is plenty and
where requirement of pumped water is frequent. BLDC motor drives are
preferably employed for pumping, owing to their better power delivery,
dynamic response, and efficiency, when compared to Induction motor
and other dc drives. In this chapter, studied the performance of a DC-DC
converter to reduce overall power consumption in a Solar powered BLDC
motor drive-based water pumping system. analyze and design the converter
so as to enhance the efficiency of the system. A high efficiency, derived non-
isolated SEPIC-based converter is designed for use in between the SPV and
voltage switching inverter systems. The converter mentioned in this chapter
is derived from SEPIC based buck boost converter. P&O methods have been
220 Advances in Data Science and Computing Technology
16.1 INTRODUCTION
much more flagrant subject. Some converters are capable to providing higher
and lower output voltage levels, but it may be inverting or negative. “Voltage
gain of the fly back converter can be adjusted by its turn’s ratio” (Hwu and
Yau, 2012). But leakage inductance leads to power losses and reduces the
efficiency. “Another peculiarity of dc-dc converter is reduced voltage stress
across switches. In the absence of input side inductors this may become
large” (Miao and Gao, 2019).
Solar powered BLDC motor drive for water pumping system is presented
in this chapter. MATLAB implementation of system model with electronic
commutation is also established. This chapter is divided in to five sections.
Introduction is in Section 16.1. System configuration and system design
are discussed in Sections 16.2 and 16.3. Section 16.4 deals with the control
parameters of the system. Further results and findings are included in Section
16.5. Finally, we conclude the chapter in Section 16.6.
Figure 16.1 shows schematic diagram of the proposed system. High effi
ciency SEPIC based buck boost converter is an intermediate of SPV panel
and VSI.
converter is fed into voltage switching inverter and also the BLDC motor is
driven by controlling the switching pattern of voltage switching inverter. The
switching pulses for VSI is generated by Hall Effect signal position sensors.
The system consists of PV panel, high efficiency SEPIC based buck boost
converter, voltage switching inverter, BLDC motor and centrifugal pump. A
2.2 kW centrifugal pump and 2.5 kW PV array were selected for the design
and simulation.
A 2.5 kW PV array is selected, to feed sufficient power for the 2.2 kW pump.
The output of the PV array is fed into the high gain converter. Details of PV
panel per string is given in Table 16.1. Three such panels in series make up a
string. Four such strings are connected in parallel to complete the SPV array.
The high gain, derived SEPIC based converter utilized in between solar
array and also the three-phase voltage switching inverter is shown in Figure
16.2. The converter consists of two diodes D1, D2, inductors L1, L2, L3 and
capacitors C1, C2, C01, C02. Figures 16.3(a) and (b) show the 2 modes of
High Efficiency High Gain SEPIC-Buck Boost Converter 223
FIGURE 16.3 (a) Mode 1 operation of proposed converter; (b) mode 2 operation of proposed
converter.
High Efficiency High Gain SEPIC-Buck Boost Converter 225
of 0.5. Voltage ripple across the capacitor is mainly due to current flowing
through the capacitor’s equivalent series resistor, and charging-discharging
of capacitor. Voltage ripple is assumed to be present at standardized value of
0.3%.
Voltage ripple through capacitor C1:
2DI
∆VC = 0 (17)
f S C1
DI
∆VC = 0 (18)
f S C2.01.02
A 3 hp (approx. 2.2 kW) water pump is chosen as the system load. Its output
power is given as:
P = K w N m3 (23)
BLDC motor requires three hall sensors to detect the rotor position. Hall
sensor signal values and VSI switching pattern are given in Table 16.3.
Figure 16.3 shows the MATLAB model of the proposed system. P&O algo
rithm generated as a sub system is shown in Figure 16.3(a). In P&O method,
instantaneous power of PV array is compared to the previous sample and
duty for the converter is generated. Gate signals for VSI is generated as
another sub system which is shown in Figure 16.3(b). Electronic commu
tation method is used to produce these gate signals. We measure the hall
signals generated by the motor and determine the rotor positions or rotation
by controlling the switching pattern of VSI. Motor with rated speed of 2,800
rpm and output power of 2.2 kW is simulated in this model.
High gain SEPIC based buck boost converter operates in continuous conduc
tion mode. Current through inductor L1 is continuous in nature which is
shown in Figure 16.3(b). The output power of the conductor varies with
respect to the change in irradiation level. However, converter gives maximum
output power of 2.2 kW at 1,000 W/m2 solar irradiation.
Figure 16.4(c) shows the steady state performance of BLDC motor at 1,000
W/m2. Along with the DC link voltage, back EMF, and stature current
increases from zero to a steady state value it indicates, the soft starting of
motor. Electromagnetic torque produced by the BLDC motor is same as that
of load torque in steady state condition which is nearly 7.5 Nm. Also, the rotor
speed reaches its rated value in standard conditions which is approximately
2,800 rpm.
FIGURE 16.4 Simulation diagram: (a) P&O MPPT; (b) electronic commutation method.
High gain SEPIC based buck boost converter operates in continuous conduc
tion mode at all different irradiation level. Current through inductor L1 is
continuous in nature which is shown in Figure 16.5(b). The output power
of the conductor varies with respect to the change in irradiation level. The
converter gives 120 V output at 200 W/m2 solar irradiation level. As we can
see from the figures the converter performs well dynamically to adjust to the
varying irradiation levels.
232 Advances in Data Science and Computing Technology
FIGURE 16.5 Steady state analysis at 1,000 W/m2: (a) PV outputs; (b) converter output;
(c) motor output.
High Efficiency High Gain SEPIC-Buck Boost Converter 233
FIGURE 16.6 Dynamic state analysis: (a) PV outputs; (b) motor output; (c) converter output.
234 Advances in Data Science and Computing Technology
16.6 CONCLUSION
at different irradiation levels. From the studies it is clear that the BLDC motor
is suitable for all environmental conditions. The efficiency, speed, and torque
outputs of the motor is dependent upon the irradiation level.
KEYWORDS
• BLDC motor
• converter
• MATLAB
• SEPIC
REFERENCES
Aleena, P. K., Siny, P., & Babu, P., (2017). “Transformer less buck-boost converter with
positive output voltage and feedback.” International Journal of Engineering Research,
6(06). Available: 10.17577/ijertv6is060337.
Banaei, M., & Bonab, H., (2017). “A novel structure for single-switch nonisolated transformer
less buck-boost DC–DC Converter.” IEEE Transactions on Industrial Electronics, 64(1),
198–205. Available: 10.1109/tie.2016.2608321.
236 Advances in Data Science and Computing Technology
Banaei, M., & Sani, S., (2018). “Analysis and Implementation of a new SEPIC-based single-
switch buck-boost DC–DC converter with continuous input current.” IEEE Transactions on
Power Electronics, 33(12), 10317–10325. Available: 10.1109/tpel.2018.2799876.
Bendib, B., Belmili, H., & Krim, F., (2015). “A survey of the most used MPPT methods:
Conventional and advanced algorithms applied for photovoltaic systems.” Renewable and
Sustainable Energy Reviews, 45, 637–648.
Gomes De, A. B., Pacheco, C. B. E., Bitencourt, N. C., & Agostini, Jr. E., (2019). “High
voltage-gain integrated boost-SEPIC DC-DC converter for renewable energy applications.”
Eletrônica de Potência, 24(3), 336–344. Available: 10.18618/rep.2019.3.0025.
Hwu, K. I., & Yau, Y. T., (2012). “High step-up converter based on charge pump and boost
converter.” IEEE Transactions on Power Electronics, 27(5), 2484–2494.
Kumar, R., & Singh, B., (2017). “Solar PV powered BLDC motor drive for water pumping
using Cuk converter.” IET Electric Power Applications, 11(2), 222–232. Available: 10.1049/
iet-epa.2016.0328.
Kuthsiyat, J. S., Chandru, K., Dhanapriyan, B., Kishore, K. R., & Vinothraj, G., (2017). “SEPIC
converter based water driven pumping system by using BLDC motor.” Bonfring International
Journal of Power Systems and Integrated Circuits, 7(1), 07–12. Available: 10.9756/bijpsic.8317.
Liao, H., Liang, T., Yang, L., & Chen, J., (2012). “Non-inverting buck-boost converter with
interleaved technique for fuel-cell system.” IET Power Electronics, 5(8), 1379. Available:
10.1049/iet-pel.2011.0102.
Miao, S., & Gao, J., (2019).“A family of inverting buck-boost converters with extended conversion
ratios.” IEEE Access, 7, 130197–130205. Available: 10.1109/access.2019.2940235.
Mohamed, A. E., & Zhengming, Z., (2013). “MPPT Techniques for Photovoltaic Applications.”
Renewable and Sustainable Energy Reviews, 25, 793–813.
Roberto, F. C., Walbermark, M. D. S., & Denizar, C. M., (2012). “Influence of power
converters on PV maximum power point tracking efficiency.” In: 10th IEEE/IAS Inter. Conf.
on Industry Applications (INDUSCON) (pp. 1–8).
Sarikhani, A., Allahverdinejad, B., Hamzeh, M., & Afjei, E., (2019). “A continuous input and
output current quadratic buck-boost converter with positive output voltage for photovoltaic
applications.” Solar Energy, 188, 19–27. Available: 10.1016/j.solener.2019.05.025.
Selva, K. R., Vignesh, C. J., Gayathri, D. V. P., & Naveena, P., (2016). “Design and comparison
of quadratic boost converter with boost converter.” International Journal of Engineering
Research, 5(01). Available: 10.17577/ijertv5is010650.
Singh, B., & Kumar, R., (2016). “Solar photovoltaic array fed water pump driven by brushless
DC motor using Landsman converter.” IET Renewable Power Generation, 10(4), 474–484.
Available: 10.1049/iet-rpg.2015.0295.
Siva, T., & Sampathkumar, A., (2015). “Sensor less control of brushless DC motor using
modified back-EMF detection.” Indian Journal of Science and Technology, 8(32). Available:
10.17485/ijst/2015/v8i32/87320.
Thrishna Jayaraj, & Justin Sunil Dhas, G. (2020). [Online]. Available: https://www.
researchgate.net/publication/333352436_KY_Based_C_DC_Converter_for_Standalone_
Photovoltaic_Water_Pumping_System_Employing_Four_Switch_BLDC_Drive (accessed
on 08 December 2021).
Zhang, N., Zhang, G., See, K., & Zhang, B., (2018). “A single-switch quadratic buck-boost
converter with continuous input port current and continuous output port current.” IEEE Trans
actions on Power Electronics, 33(5), 4157–4166. Available: 10.1109/tpel.2017.2717462.
CHAPTER 17
ABSTRACT
17.1 INTRODUCTION
Casacca, and Lynch (1992); Nafeh (2011); Coelho, Concer, and Martins
(20100; Hua and Shen (1997), the different components of the system like
PV array, Battery characteristics, DC-DC converters are discussed, study on
which are necessary to acquire knowledge about the system for execution of
the proposed work.
The entire system configuration with the Fuzzy MPPT controller is presented
by Figure 17.1. The PV module is cascaded with a DC-DC boost converter
for charging an energy storage unit (ESU) to be used for charging electric
vehicles (EVs). After the boost converter, comes the DC link, which relates
to the ESU for charging it. The fuzzy MPPT controller is the sub system
designed for controlling the action of the boost converter by controlling
its duty cycle. Error and derivative of error are the two input signals fed
to the fuzzy MPPT controller. They are generated utilizing the voltage and
current signals coming out from the PV panel. The voltage and current
outputs are constantly varying with corresponding variations in irradiance
and temperature. Accordingly, the inputs to the fuzzy MPPT controller
are also varying. The controller has been designed in such a way that it
can generate appropriate control signal according to the variations in the
inputs. The control signal produced by the controller is fed into the gate
of the IGBT used inside the DC-DC boost converter. Thus, converter duty
cycle is being controlled very smoothly and precisely for getting desired
voltage and current signals at the boost converter output, which corresponds
to maximum power delivered to the ESU. The objective of this project is to
charge the ESU in the most efficient manner so that it can be used efficiently
for EV charging purpose. ESU will be installed in electric vehicle charging
stations (EVCSs). This is the preliminary work on a part of a huge system
to be designed further. The future scope of this work will be discussed in the
future scope section.
Figure 17.2(a) presents the equivalent circuit for solar (PV) cell. It consists
of a current source connected in parallel with a diode. RS and RSh are the
series and parallel resistances connected with the circuit. RSh is infinite and
RS is zero for an ideal PV cell.
240 Advances in Data Science and Computing Technology
FIGURE 17.2 (a) Equivalent circuit of a PV cell; and (b) equivalent circuit of a PV array.
where; Iph is the photo current; Io is the diode’s reverse saturation current; α is
the diode ideality factor; V is the PV array output voltage of, I is the PV array
output current; Rs is the PV cell’s series resistance; Rsh is the PV cell’s shunt
resistance; NP is the parallel path counts of the PV array; NS is the PV cell
numbers connected in series in each parallel path; VT is the thermal voltage
of the PV cell.
K .T
VT = (2)
q
where; K is the Boltzmann constant (1.3805 × 10–23 J/K); T is the operational
temperature (in Kelvin); q is the electron charge (1.6 × 10–19 C).
Photo current is given by:
where; Iph-STC is the short circuit photo current generated at STC, TSTC, and
GSTC imply the temperature and irradiance at STC. Ki is the short circuit
current coefficient of PV cell; T is the operating temperature in Kelvin; G
is the irradiance (W/m2); Ki is the short circuit current coefficient of the cell
usually provided by manufacturer.
The saturation current of a cell varies with cell temperature, which is
presented by:
Io =
( Iph −STC + Ki ( T − TSTC ) )
(V + KV ( T − TSTC ) ) (4)
exp OC _ STC −1
.á .V T
where; VOC_STC is the cell open circuit voltage at STC; Kv is the open circuit
voltage coefficient.
In this proposed work, the standard test condition parameter values, TSTC,
and GSTC, are taken as 25°C and 1,000 W/m2 respectively. A PV array of
47 parallel strings with each string consisting of 15 series connected PV
modules are taken. Number of cells per module is chosen as 60. PV module
is used for study using Simulink MATLAB. The P-V and I-V characteristics
of the PV panel at STC are detected after setting the required parameters as
per the values mentioned in Table 17.1.
From the P-V characteristics, it is clearly seen that there is a specific
voltage of the PV array, where the maximum power is achieved (Figure 17.3).
That voltage is the Vmp. From the I-V curve, the corresponding current value
242 Advances in Data Science and Computing Technology
Imp can be noted down. As the PV array output voltage and current depends
on the irradiance and temperature directly, henceforth, with variations in
irradiance or temperature, the maximum power point varies. Figures 17.4(a)
and (b) present the I-V, P-V characteristics of the PV array for different
irradiances at TSTC (25°C) and different temperatures at GSTC (1,000 W/m2).
From the graphs of Figures 17.4(a) and (b), it can be observed that the current
and power changes abruptly keeping the output voltage V almost constant
with variations in irradiance. On the contrary, current value remains constant
with a great variation in voltage in case of temperature change keeping the
irradiance fixed.
FIGURE 17.4(a) I–V and P–V characteristics of a PV module for different irradiances at
TSTC (25°C).
FIGURE 17.4(b) I–V and P–V characteristics of a PV module for different temperatures at
GSTC (1,000 W/m2).
DC-DC converters are generally used for boosting up the voltage level
for high voltage applications. It is mainly used in PV integrated system
for proper regulation of the PV array output voltage. DC-DC boost
converters are used to step up the output voltage of the PV array, if the
load voltage requirement is higher than the voltage produced by the PV
panel. It is situated in between the PV array and the load (here the energy
storage unit (ESU)). The main purpose for installing the boost converter
is to facilitate the provision of MPPT by varying the duty cycle of the
boost converter. DC-DC boost converter’s circuit diagram is presented in
Figure 17.5.
244 Advances in Data Science and Computing Technology
D= T_ON/T (6)
T= 1/f_sw (7)
where; D denotes the duty cycle. Vi(or VS) and V0 are the input and output
voltages of the converter. TON is the on time and T is the total time period of
the IGBT. fsw is the switching frequency (Table 17.2).
Among the various techniques articulated for tracking the maximum power
point of the PV integrated system, the modest and prevalent technique is
the perturb and observe (P&O) technique. This method facilitates good
results under steady state condition where there are no such considerable
variations in irradiation and temperature. But if there are huge variations in
these parameters at a frequent and faster rate, this method fails to track the
maximum power point precisely and quickly.
Fuzzy control is a newly developed heuristic method that facilitates the
construction of nonlinear controllers from vague information collected by
the expert. Moreover, the controller design does not require to know the
system model to be controlled accurately. The knowledge and expertise of
the designer play vital role in the successful implementation of these types of
controllers. FLC is more robust than conventional controller (Figure 17.6).
FLC can be classified three steps:
• fuzzification;
• inference engine with proper rule base; and
• defuzzification.
17.5.1 FUZZIFICATION
taken namely error (E) and change in error (CE). The membership functions
are assigned to both inputs with the help of linguistic variables using five
fuzzy subsets called negative big (NB), negative small (NS), zero (ZE), posi
tive small (PS) and positive big (PB). The voltage (V) and current (I) outputs
from the PV array is constantly monitored by the Fuzzy MPPT controller and
instantaneous power is calculated. The governing equations of the inputs E
and CE to the controller are:
{ }
E ( k ) = P ( k ) − P ( k −1) ] / [ I ( k ) − I ( k −1) =
∆P / ∆I (8)
CE ( k ) =E ( k ) − E ( k −1) =
∆E (9)
where; E denotes the slope of P-I characteristics curve and CE presents the
change of this error; k is the sampling instant; E(k) indicates whether the
operating point at any instant k is situated on the left or right side of MPP
on the P-I characteristics; CE(k) gives the direction of displacement of this
point. The control output from the fuzzy MPPT controller is the change in
duty ratio (∆D) of the DC-DC boost converter. Henceforth, the control action
by the controller is materialized by controlling the change in duty ratio in an
efficient, robust, and smooth manner. The membership functions assigned to
the output variable (∆D) are NB, NS, zero (ZE), PS and PB. The variation
ranges of the inputs are taken from –0.07 to +0.07; whereas the variation
range of the output is –100 to +100 (Figure 17.7).
FIGURE 17.7 Membership functions for: (a) input E; (b) input CE; (c) output ∆D.
Fuzzy inference engine is the tool used for relating the various fuzzified
inputs and outputs with the help of fuzzy rules. This mapping provides a
set of rules by which decisions are taken about the output values of the
controller based on the controller input values. The procedure of fuzzy
A Classy Fuzzy MPPT Controller for Standalone PV System 247
inference encompasses all the linguistic variables used for the inputs and
output mentioned in the fuzzification section along with logical operations in
between the different inputs and if-then rules. Table 17.3 presents the fuzzy
rules used for this proposed work. There are 25 rules altogether involving E,
CE, and ∆D.
17.5.3 DE-FUZZIFICATION
D ( k=
) D ( k − 1) + S ∆D .∆D ( k ) (11)
248 Advances in Data Science and Computing Technology
The simulation results are tabulated in table IV for different irradiance values
keeping temperature fixed at 25°C. Table 17.4 presents the voltage, current,
and maximum power values from the Fuzzy MPPT controller integrated
system for different temperatures, keeping the irradiance fixed at 1,000 W/
m2 (Figures 17.8 and 17.9).
FIGURE 17.8 Simulink model of (a) the entire system; (b) the DC-DC boost converter.
TABLE 17.4 The Voltage, Current, and Power Outputs from the Boost Converter for
Different Irradiances Under Standard Temperature 25°C
Temperature Irradiance Boost Converter Boost Converter Power Delivered by
(°C) (W/m2) Output Voltage Output Current the Boost Converter to
(V) (A) the ESU (kW)
25 1,000 442.9 336.7 149.124
35 1,000 441.6 310 136.896
45 1,000 439.7 267.8 117.751
Comparing the simulation results tabulated in Tables 17.4 and 17.5 with
the maximum power point values Vmp, Imp, and Pmp obtained from the PV
module characteristics for different input parameter conditions (irradiance
and temperature) mentioned in Figures 17.4(a) and 17.4(b), it is observed
that the fuzzy MPPT controller is capable of tracking the maximum power
point very closely. The results obtained in this proposed work, is compared
with the results of Hua and Shen (1997) and found to be far better in terms
of transient response of the boost converter’s output voltage and current. The
steady state for voltage is achieved in 0.005 seconds and the currents settle
down in 0.009 seconds. In Oulad-Abbou et al., (2018), P&O method is used.
The voltage settlement is achieved in 0.05 seconds. So, the proposed fuzzy
MPPT controller can track the maximum power point accurately as well as
very rapidly with a sudden change in parameters (Figure 17.10).
TABLE 17.5 The Voltage, Current, and Power Outputs from the Boost Converter for
Different Temperatures Under Standard Irradiance 100 W/m2
Irradiance Temperature Boost Converter Boost Converter Power Delivered by
(W/m2) (°C) Output Voltage Output Current the Boost Converter
(V) (A) to the ESU (kW)
1,000 25 442.9 336.7 149.124
500 25 435.3 174.4 75.916
250 25 431.3 87.11 37.57
17.7 CONCLUSION
FIGURE 17.10 Transient response of boost converter output voltage and current.
KEYWORDS
REFERENCES
Bendib, B., Krim, F., Belmili, H., Almi, M. F., & Boulouma, S., (2014). Advanced Fuzzy
MPPT Controller for a stand-alone PV system. Energy Procedia, 50(2014), 383–392.
Bhatnagar, P., & Nema, R. K., (2013). Maximum power point tracking control techniques:
State-of-the-art in photovoltaic applications. Renewable and Sustainable Energy Reviews,
23, 224–241.
Coelho, R. F., Concer, F. M., & Martins, D. C., (2010). A simplified analysis of DC-DC converters
applied as maximum power point tracker in photovoltaic systems. In: The 2nd International
Symposium on Power Electronics for Distributed Generation Systems (pp. 29–34). IEEE.
Esram, T., & Chapman, P. L., (2007). Comparison of photovoltaic array maximum power
point tracking techniques. IEEE Transactions on Energy Conversion, 22(2), 439–449.
Hua, C., & Shen, C., (1997). Control of DC/DC converters for solar energy system with
maximum power tracking. In: Proceedings of the IECON’97 23rd International Conference
on Industrial Electronics, Control, and Instrumentation (Cat. No. 97CH36066) (Vol. 2, pp.
827–832). IEEE.
Mirbagheri, S. Z., Mekhilef, S., & Mirhassani, S. M., (2013). MPPT with Inc. Cond method
using conventional interleaved boost converter. Energy Procedia, 42, 24–32.
Nafeh, A. E. S. A., (2011). An effective and safe charging algorithm for lead-acid batteries in
PV systems. International Journal of Energy Research, 35(8), 733–740.
Oulad-Abbou, D., Doubabi, S., Rachid, A., García-Triviño, P., Fernández-Ramírez, L. M.,
Fernández-Ramírez, C. A., & Sarrias-Mena, R., (2018). Combined control of MPPT, output
voltage regulation and capacitors voltage balance for three-level DC/DC boost converter
in PV-EV charging stations. In: 2018 International Symposium on Power Electronics,
Electrical Drives, Automation and Motion (SPEEDAM) (pp. 372–376). IEEE.
Rekioua, D., Achour, A. Y., & Rekioua, T., (2013). Tracking power photovoltaic system with
sliding mode control strategy. Energy Procedia, 36, 219–230.
Salameh, Z. M., Casacca, M. A., & Lynch, W. A., (1992). A mathematical model for lead-acid
batteries. IEEE Transactions on Energy Conversion, 7(1), 93–98.
Salas, V., Olias, E., Barrado, A., & Lazaro, A., (2006). Review of the maximum power point
tracking algorithms for stand-alone photovoltaic systems. Solar Energy Materials and Solar
Cells, 90(11), 1555–1578.
Seddik, M., Zouggar, S., Ouchbel, T., Oukili, M., Rabhi, A., Aziz, A., & Elhafyani, M. L.,
(2010). A stand-alone system energy hybrid combining wind and photovoltaic with voltage
control (feedback loop voltage). International Renewable Energy Congress (pp. 227–232).
Tunisia.
Villalva, M. G., Gazoli, J. R., & Ruppert, F. E., (2009). Comprehensive approach to modeling
and simulation of photovoltaic arrays. IEEE Transactions on Power Electronics, 24(5),
1198–1208.
Zegaoui, A., Aillerie, M., Petit, P., Sawicki, J. P., Jaafar, A., Salame, C., & Charles, J. P.,
(2011). Comparison of two common maximum power point trackers by simulating of PV
generators. Energy Procedia, 6, 678–687.
CHAPTER 18
Haryana–122001, India
3
Department of Electrical Electronics and Engineering, Pailan College
of Management and Technology, West Bengal–700102, India
ABSTRACT
The energy need is ever attention requiring issue for the under developed and
developing countries. These countries are in the figurative of the shortfall
of hydrocarbons or fossils energy. Wind farms connected to existing power
system poses credible challenges to economic operation of power system.
Wind power is undergoing through a very expeditious development. The
assimilation of wind energy in the existing power system is a concern to
revamp the vitalization of the ability and to maintain the increasing rate of
wind generation installation capacity, this is utmost important in achieving
254 Advances in Data Science and Computing Technology
18.1 INTRODUCTION
The evolution in wind energy technology has been exceptional. The cost of
electricity generation from wind energy has decayed to about one seventh
from the early 1980s. In United States, a substantial growth has been seen
in wind power generation capacity, with growth averaging nearly 24% every
year during the past 5 years. In India, as on 31st December 2018, the total
installed wind power capacity was 34,046 MW with generation of 52,666
GWh. But as on 31st December 2019 in India the installed capacity of wind
power has raised to 36,625 MW with generation reaching 62,036 GWh, a
subsequent rise of 7.57% in 12 months. In order to expedite the application
of new wind power projects, numerous computer algorithms using MATLAB
and Homer Pro have been developed for designing and optimization of solar,
wind power, microgrids, and other renewable energy sources. But the major
three challenges to adoption to wind power’s future remains’ the problems
of grid reliability, voltage stability and wind intermittency (Eisa, 2019).
Electrical power generated from wind power has increased exponentially
in global market wind turbines are being equipped with a variable pitch
technology from speed control and static compensator (STATCOM). This
technology is adopted to extract the maximal energy potential and STATCOM
provides stable generation at the grid frequency when generators in wind
turbines operate on the basis of variable rotation speed (Awad et al., 2014;
Fu et al., 2017). As world electricity consumption is on rise steadily, there
is an everlasting onus on society to flourish and adopt the renewable source
of energy for decreasing world carbon footprint and have positive impact on
global environment. In direction of expanding energy intake, wind power
along with solar/ PV generation is the one the swiftly growing sector. As
Active and Reactive Power Control in Variable Wind 255
per data released by Global Wind Energy Council (GWEC) for year 2019
approximately 651 GW of total wind energy has been installed worldwide
with 10% increase from year 2018. China and United States continues to
be largest on shore wind energy market and accounting almost 60% of new
capacity added in year 2019. The potential impact of COVID-19 globally has
nosedived economy and demand for energy for year 2020 was expected to
be a record year for wind generation and as per GWEC with a forecast of 76
GW to be added as new capacity.
The installed capacity worldwide for wind power has reached 651 GW by
the end of 2019. World’s top five markets for new wind installations were
China, United States, United Kingdom, India, and Spain (Awad et al., 2014).
The expansion of wind power in India started in last decade of 1990s and has
unquestionably expanded in the last half a decade. In spite of being a relative
novice to the wind business correlated with United Kingdom or Spain, India
lies fourth biggest equipped country with wind power size in the world. As
on 31st December 2019 wind power stands at 3,665 MW in India, mainly
spanning crosswise Tamil Nadu (9231.77 MW), Gujarat (7203.77 MW),
Maharashtra (4794.13 MW), Karnataka (4753.40 MW), Rajasthan (4299.73
MW), Madhya Pradesh (2519.89 MW), Andhra Pradesh (4077.37 MW),
Kerala (62.50 MW), Telangana (128 MW) and other states (30 MW). It is
predicted that 60 GW of further wind power capacity will be added in India
by 2022. Figure 18.1 show wind map of India for the year 2019.
In order to obtain better flexibility and generate more energy to be injected
in system, wind generators of order of MW range are normally interconnected
simultaneously to form a wind farm. Since past 2 decades the size of wind
turbines has increased now, we have turbines ranging from 8–10 MW with
blade span of 160 m (Mahvash, Taher, and Rahimi, 2017). However, integra
tion of such large variable speed wind generators with existing power grid,
will increase the energy seepage to an equilibrium above which a compelling
brunt effect will be seen on grids operation (Rashad, Kamel, and Jurado,
2018). Previously many tasks are being laid down by regulatory task force
for system stability (Rashad, Kamel, and Jurado, 2018) and consistently
expanding of this renewable power, transmission system handling operators
(TSO) are compelled to lay down new stipulations on the wind farms for the
well-operation of the power grid network.
256 Advances in Data Science and Computing Technology
FIGURE 18.1 Energy MAPS of India: Installed generation capacity (Central Electricity
Authority, 2019).
Integration of wind turbine with existing electric grid network has an effect
on the power quality of power being delivered to the grid or end users. The
Active and Reactive Power Control in Variable Wind 257
A MATLAB based Simulink model (Oh et al., 2014) is proposed for the CSA
system is shown in Figure 18.2. Wr1 is taken as input which is run through a
congestion filter. The purpose of the congestion filter is to cap the pitch input
in the range of 0 to 90° the normal range of valid pitch angle. Second model
shown below is the gain block which is used to define the proportional gain
of the system, denoted by K-Block 0-pitch_max is also a congestion filter
which is used to define the values of pitching speed. The range of maximum
and minimum permissible values of pitching speed in this system are set at
3.5° per unit time and –3.5° per unit time.
The feedback of this model was realized and noted at three changes
values variable speed matrix. In entire cases pitch angle remained constant
at 75° irrespective of speed and the same is shown in Figure 18.3.
258 Advances in Data Science and Computing Technology
FIGURE 18.2 Block diagram of proportional control based pitch actuator system.
FIGURE 18.3 Pitch angle response of proportional control-based pitch actuator system.
The effect of Pitch angle control on rotor speed, Electrical torque Te and
Mechanical Torque Tm as shown in Figures 18.4 and 18.5.
FIGURE 18.4 Depicting effect of using constant pitch control on Te and Tm.
FIGURE 18.5 Pitch angle response of pitch control on Vab, Iline, Vab_rms, Iline_rms, Pac, and rotor
speed Wm w.r.t time on x axis.
260 Advances in Data Science and Computing Technology
Here Twt is wind turbine torque, Jwtr is wind turbine moment of inertia,
ῳwtr is spring constant Tgen is generator torque, Jgen is generator moment of
inertia, and ῳgen is spring constant indicating the stiffness of the shaft on
generator part. The torque and is transmitted via the gearbox with a gear ratio
of Ng and angular speed is given as:
′
dθ wt
′ =
Rotor speed ,ωwt (3)
dt
dθ gen
Generator speed ,ω gen = (4)
dt
Figure 18.6 depicts the block diagram of turbine and shaft 2 mass model,
in which the mechanical stress on turbine blades are reduced (Li et al., 2018;
Vidal et al., 2012) with change in speed and the result for which is shown in
Figure 18.7. But with reduction in stress on blades the output shaft torque in
pu is kept almost constant as shown in Figure 18.8.
The effect of Electrical Torque Te, Mechanical Torque Tm and rotor speed
Wm using constant pitch control actuator is shown in Figure 18.8. The results
show that after using pitch control technique Te, Tm, Wm remains constant
irrespective of the variable speed and hence providing a Smooth power
generation at variable speed.
Figure 18.9 represents block diagram for AC-DC-AC conversion being used
in wind power generation.
Active and Reactive Power Control in Variable Wind 261
FIGURE 18.7 (a) Reduction of mechanical stresses on turbine blades w.r.t time in sec on x
axis; and (b) constant output shaft torque w.r.t time in sec on x axis.
FIGURE 18.8 Effect of pitch control (x axis) on Te, Tm, Wm. on Y axis.
262 Advances in Data Science and Computing Technology
FIGURE 18.11 Active and reactive power control without using STATCOM.
FIGURE 18.14 Three phase power being fed to grid after using STATCOM.
The problem with using only Pitch control is that as the stress on turbine
blades is reduced considerably along with smooth operation of Turbine
Generator set. But Pitch control has no effect on power quality issues.
Similarly, by using only STATCOM we do obtain a near sinusoidal wave
form which can be fed to grid at varying speed having constant frequency
266
FIGURE 18.16 Effect of active reactive power of turbine using pitch control and STATCOM.
In Figure 18.17 we get the result which depicts the three phase power before
being fed with Pitch Control without load and similarly Figure 18.21 shows
the power being fed to grid after using both Pitch Control and STATCOM
under 50 KW parallel RLC mask link load (Figures 18.17–18.22).
The power generated without using STATCOM and PITCH CONTROL
is 5,816 KW and the power generated using PITCH CONTROL and
STATCOM is 5340.41 KW.
Now ἠ (efficiency) = Output/Input
Hence ἠ in comparison with STATCOM and Pitch control are not being
used
= 5340.41 / 5816 = 91.81%
Which clearly shows that by simultaneous usage of STATCOM and
PITCH CONTROL has very less impact over power loss and has a high
efficiency of 91.81%.
268 Advances in Data Science and Computing Technology
FIGURE 18.17 Three phase power with pitch control without load.
FIGURE 18.18 Three phase power after using STATCOM and pitch control on load.
18.5 CONCLUSION
As the issues that arise due to voltage disturbances, THD, and transients
does not allow power generated by variable speed wind turbine to be directly
Active and Reactive Power Control in Variable Wind 269
FIGURE 18.19 Vdc, firing angle, Vab_inv, and Vab_load waveforms after using both
STATCOM and pitch control technique.
FIGURE 18.20 Active and reactive power being fed to STATCOM using PITCH control.
270 Advances in Data Science and Computing Technology
FIGURE 18.21 Compares the waveform of three phase active and reactive power using
both pitch control and STATCOM.
FIGURE 18.22 (a) Power generated without STATCOM; (b) power generated using
STATCOM and PITCH control.
KEYWORDS
• pitch control
• STATCOM
• variable speed
REFERENCES
Al-Jowder, F., (2007). “Improvement of synchronizing power and damping power by means
of SSSC and STATCOM.” Electric Power Systems Research, 77, 1112–1117.
Awad, A. S. A., Shatshat, R. E., Salama, M. M. A., & El-Fouly, T. H. M., (2014). “Low voltage
ride through capability enhancement of wind farms’ generators: DVR versus STATCOM.”
Presented at the 2014 IEEE PES General Meeting | Conference & Exposition.
Central Electricity Authority, (2019). Available: http://cea.nic.in/ (accessed on 08 December
2021).
Eisa, S. A., (2019). “Modeling dynamics and control of type-3 DFIG wind turbines: Stability,
Q Droop function, control limits and extreme scenarios simulation.” Electric Power Systems
Research, 166, 29–42.
Fu, Y., Zhang, X., Hei, Y., & Wang, H., (2017). “Active participation of variable speed wind
turbine in inertial and primary frequency regulations.” Electric Power Systems Research,
147, 174–184.
272 Advances in Data Science and Computing Technology
Habibi, H., Rahimi, N. H., & Howard, I., (2017). “Power maximization of variable-speed
variable-pitch wind turbines using passive adaptive neural fault tolerant control.” Frontiers
of Mechanical Engineering, 12, 377–388.
Li, C., Xiao, Y., Xu, Y. L., Peng, Y. X., Hu, G., & Zhu, S., (2018). “Optimization of blade pitch
in H-rotor vertical axis wind turbines through computational fluid dynamics simulations.”
Applied Energy, 212, 1107–1125.
Lin, Z., Chen, Z., Liu, J., & Wu, Q., (2019). “Coordinated mechanical loads and power
optimization of wind energy conversion systems with variable-weight model predictive
control strategy.” Applied Energy, 236, 307–317.
Liu, Z. J., Zhao, Z. Q., & Li, B., (2014). “Study on application of STATCOM in dynamic
reactive power compensation of wind farm integration.” Applied Mechanics and Materials,
672–674, 255–261.
Mahvash, H., Taher, S. A., & Rahimi, M., (2017). “A new approach for power quality
improvement of DFIG based wind farms connected to weak utility grid.” Ain Shams
Engineering Journal, 8, 415–430.
Oh, K. Y., Lee, J. K., Bang, H. J., Park, J. Y., Lee, J. S., & Epureanu, B. I., (2014). “Development
of a 20-kW wind turbine simulator with similarities to a 3 MW wind turbine.” Renewable
Energy, 62, 379–387.
Rashad, A., Kamel, S., & Jurado, F., (2018). “Stability improvement of power systems
connected with developed wind farms using SSSC controller.” Ain Shams Engineering
Journal, 9, 2767–2779.
Vidal, Y., Acho, L., Luo, N., Zapateiro, M., & Pozo, F., (2012). “Power Control Design for
Variable-Speed Wind Turbines.” Energies, 5, 3033–3050.
PART VI
Network Security
CHAPTER 19
ABSTRACT
To exchange secret messages between two users, while using the processes
of encryption and decryption on the message with the help of a secret key.
We will see briefly how the key is being generated. Key will be generated
by the process of Diffie-Hellman key exchange algorithm, which does not
follow the rules of sharing secret key instead two parties will develop the
secret key together while exchanging partial information for key generation.
After the generation of secret key, we will use DES (data encryption stan
dard) algorithm for sending the message, while using the public media, i.e.,
Internet as communication channel and in receiver’s side show that message
is well received without any third party alteration and can be decrypted
perfectly into originally sent plain text.
Advances in Data Science and Computing Technology: Methodology and Applications. Suman Ghosal,
Amitava Choudhury, Vikram Kumar Saxena, Arindam Biswas, & Prasenjit Chatterjee (Eds.)
© 2023 Apple Academic Press, Inc. Co-published with CRC Press (Taylor & Francis)
276 Advances in Data Science and Computing Technology
19.1 INTRODUCTION
We human beings always tend to keep privacy among us, whether it is about
precious treasure or day to day life chores, or our intensions (Hellman and
Diffie, 1976; Lin and Wang, 2013). To keep it secret we tend to use means
of secrecy, some secret signs that will prevent unwanted public unaware of
what’s going on. Here comes the use of cryptography (Eric and Chachati,
2014). Around 1900 B.C. Egyptians used non-standard hieroglyphs to
inscribe some documents that is the first documented use of cryptography.
Cryptography is nothing but an art of hiding secret in plain-site, so that even
if it’s visible deciphering the meaning behind is impossible (Pervaiz, Cardei,
and Wu, 2010). Scientifically saying it conveys the message from sender to
receiver, while restricting threat data theft or unauthorized access. To keep
the information safe cryptography involves generating codes, it may be in
written form or generated by machine. Data is converted into a format that is
unreadable for unauthorized user, only allowing it to be transmitted without
compromising the data, means restricting decoding it back into a readable
format by unauthorized entities (Ballardin, 2011; Carmen, 2012). Modern
cryptology exists at a junction of subjects that include the use of various
types of rules and discipline like physics, mathematics, communication
science, computer science, electrical science. In addition, its application is
spread across several fields like military communications, business commu
nications, digital currencies/ transactions, electronic commerce, chip-based
payment cards, etc. Cryptography is used on several levels for Information
security to fulfill distinct tasks (Chen, 2013; He and Lee, 2008).
There are five primary functions of cryptography nowadays:
1. Confidentiality: It ensures that except for intended and authorized
user no other person can access the data or read the message.
2. Key Exchange: The process, which involves the exchange of keys
between sender and receiver.
3. Integrity: It assures the receiver that no kind of alteration or changes
have occurred in the message, and the message has reached in its
original form.
4. Authentication: It is the process of proving one’s identity, i.e., the
message is sent by an intended sender also intended receiver receives
it. No third party has accessed the message.
5. Non-Repudiation: It is a mechanism to prove that the sender’s
involvement. When a message is sent and reaches the receiver,
during cross checking sender may deny the report of having sent the
Information Security Using Key Management 277
The first invention got the root of key exchange was in the hand of Ralph
Merkle who developed the ‘public key agreement’ technique in 1974. Later,
it became popular as ‘Merkle’s Puzzles’ and got published in 1978. Before
then, in 1977, Ron Rwest, AdiShamia, and Leonardo Adleman from MIT,
discovered a Cock’s Scheme autonomously. The well-known protocol was
proposed by Bailey Whitfield Diffie, an American cryptographer, with
collaboration of Martin Hellman and Ralph Merkle, who became a spearhead
in development of public-key cryptography. The concept of Diffie-Hellman
was published in the journal ‘New Directions in Cryptography’ in 1976
which had set a new field in distribution of cryptographic keys over an in
secured communication channel. The problem for this key distribution was
solved using this public key cryptography algorithm and communication
became more secured then before. This also initiated the root of another
advanced encryption algorithm, which is asymmetric key algorithm.
Since, Merkle the key exchanging phenomenon, Hellman suggested
that the algorithm should be called Diffie-Hellman-Merkle’s algorithm in
2002 set the first footmark. The AKE protocol is also called STS protocol
developed by Diffie in 1992. This is an advancement of raw Diffie-
Hellman Key exchange protocol because it authenticates the two parties in
communication. The mechanism follows as, the two parties can calculate a
secret key using Diffie-Hellman algorithm and then they get authenticated
by the exchange of digital signatures between them. The STS protocols
prevents the man-in-middle attack due to authentication. It provides the
forward secrecy with the help of Diffie-Hellman algorithm to compute the
Information Security Using Key Management 279
session key that is short termed. It also provides the facility of unaffected
session of previous communications using the long term keys. It shortens the
process of communication, as the central authority need not be interfered due
to authentication and prevents redundant exchange of elements.
• Alice selects a random secret number that is her private key as c and
Bob selects the same as d.
• With the help of the private key and the other two parameters Alice
and Bob compute their public values
A. AliceX = (M^ c)mod P
X = (9^4) mod 23
Y = (9^3) mod 23
• After that, Alice, and Bob exchange their public numbers between
each other, i.e., X is sent to Bob and Y is sent to Alice.
280 Advances in Data Science and Computing Technology
• Alice receives public key of Bob as Y, and Bob receives public key
of Alice as X
• Alice and Bob compute symmetric keys to trick the third party.
o Aliceka = (Y^ c) mod Pka=(((9^3)mod23)^4) mod 23
o Bobkb = (X^ d)mod P kb=(((9^4)mod 23)^3) mod 23
• If K = ka = kb, then K is the shared key generated. K=9
• The shared secret key K is transformed to 64 bits and with the plain
text (64 bits) it is given as input to the DES algorithm.
Initial Permutation: This step produces two equal halves of permuted
block, i.e., LPT, and RPT with each having 32 bits and 16 rounds of encryp
tion process is being carried out on each LPT and RPT.
1. Transformation of Key
i. For the removal of 1 bit from each byte of block for parity
checking, 56 bits are actually available which is the actual key
length to be used for encryption. Here we get this key from
previously calculated Diffie-Hellman key exchange algorithm.
ii. For each round of permutation, a different set of key of 48 bits is
derived from the above length.
iii. 56-bit key is divided into two equal halves, which has 28 bits of
length in each.
iv. Depending on the rounds, the bits are circularly shifted to the
left by one or two positions.
v. After appropriate shift, 48 bits from 56 bits are selected. This is
called Compression Permutation as it compresses the number of
bits.
2. Expansion Permutation
i. The right hand side block RPT is expanded from 32 bits to 48
bits and also, they are permutated.
ii. RPT having 32 bits is divided into 8 blocks of bits each.
iii. The above 4 bits of each block is expanded to a corresponding
6-bit block, i.e., 2 more bits are added which is the repetition of
1st and 4th bit (48 bit, 8 blocks each of 6 bits),
iv. The compressed key of 48 bit from key transformation part is
XORed with 4 RPT of 48 bits from the previous step and the
output is fed to the S-Box subset.
3. S-Box Substitution
i. Substitution that is performed is in 8 substitution boxes.
ii. Each 8 S-boxes have input of 6 bits and output of 4 bits.
Information Security Using Key Management 281
iii. The 48 bit input block is divided into 8 sub blocks and each
block is given an S-box.
iv. The output produced from all the S-Boxes are combined to form
32-bit block which is given to the P-Box permutation as input.
4. P-Box Permutation
i. Simple permutation takes place. Each of the bits are swapped
with each other.
5. XOR and Swap
i. LPT is XORed with output of P-Box.
ii. Result produced in the above step is the new right half.
iii. The old right half now forms the new left half.
a. Final LPT and RPT are recombined to form a single block
and final permutation is performed on the rejoined block
where there is a simple transposition of each bit. This is
performed at the end of all the 16 rounds.
b. Four results that are produced is a 64 bits encrypted cipher
text.
c. To reverse or decrypt from the cipher text to the plain text
or the original text, the reverse of all the above steps are
performed along with the key that is generated in Diffie-
Hellmen key exchanging algorithm.
19.4 WORKFLOW
The above workflow gives a clear view of the combination of the Diffie-
Hellmen key Exchanging Algorithm with DES algorithm. Alice and Bob
agree to a prime number and a generator that is much smaller than the
prime number and has to be co-prime with it. They both has a private
key with which they can calculate their public keys and exchange them
with each other. After the exchange, they calculate their shared key from
the parameters present with them. If both the key matches then only they
can have a communication with each other, otherwise, not. If the keys are
matched, then it is given as an input along with the plaintext to the DES
encryption algorithm where it generates the cipher text after going through
several phases of transformations. The cipher is decrypted using the same
key by DES decryption algorithm (Figure 19.1).
A proper analysis of the above proposed design is being done. The time
taken by both combination algorithm is much larger and hence it prevents a
third party from interrupting.
282 Advances in Data Science and Computing Technology
bits. Each byte of the key is sent with an odd parity. In each byte.one of
the bit is used for checking the error while generating and distributing the
key. Generally, the 8th, 16th, …, 64th are used for checking the parity. Several
permutations are performed in the plain text with the key to produce the
cipher text. To convert the cipher text to the plain text again the reverse order
is performed.
Hence, this makes the algorithm efficient in comparison to the individual
Diffie-Hellmen and DES algorithms.
19.7 CONCLUSION
When the DES algorithm is used for encryption, the key used in it is
provided by some inbuilt function or algorithm within it. This may raise a
question to the security because it can be attacked by an outsider while the
communication is going on. This is the reason DES algorithm is not used
presently in practical life. But when we have combined the Diffie-Hellman
Key Exchanging algorithm with the DES, the key generated is instant. This
means the key was unknown to both the sender and receiver before the
communication link was established. When it is prior unknown to both of
them, it does not permit the intruders to know the keys and identify any of
the two parties, which would allow them to attack the information. Hence,
using the Diffie-Hellman we can create an instant session key and exchange
the keys between the sender and receiver. Once the keys are exchanged, the
messages are sent by the sender, which is encrypted by the DES algorithm
using the key from Diffie-Hellman key exchanging algorithm, i.e., exchanged
between the two communicators. The receiver receives the message and
decrypts the same with the help of the key that is already present with him/
her. Hence, the communication ends here. It is noted that for every time a
link is created between them again, a new key is interchanged which means
even if the interloper tries to know the key it would be useless since for the
next time, he/she has to compute another key for knowing the information.
The session key exchange also signifies that the time taken would be more
Information Security Using Key Management 287
than the normal encryption algorithms. Hence, it would take quite a long
time to break the key because of larger computation. The time the intruder
would break the key the communication would be completed between the
two people. Hence, the combination of the two algorithms would provide a
better security then the other symmetric key encryption algorithms.
KEYWORDS
REFERENCES
Ali, S. T., Sivaraman, V., & Ostry, D., (2013). Eliminating reconciliation cost in secret key
generation for body-worn health monitoring devices. IEEE Transactions on Mobile
Computing, 13(12), 2763–2776.
Ballardin, F., (2011). A calculus for the analysis of wireless network security protocols.
Formal Aspects of Security and Trust (pp. 206–222). Springer: Berlin Heidelberg.
Carmen, R., (2012). Wireless Network Security. Ovidius University; Annals Economic Science
Series.
Chen, L., (2013). Applications, technologies, and standards in secure wireless networks and
communications. Wireless Network Security (pp. 1–8). Springer: Berlin Heidelberg.
Eric, G., & Chachati, M., (2014). Analyzing routing protocol performance with NCTUns for
vehicular networks. Indian Journal of Science and Technology, 7(9), 3191–1402.
Fan, Y. J., Wen, Q., & Zhang, H., (2010). Smart card-based authenticated key exchange
protocol with CAPTCHA for wireless mobile network. In: 2nd International Conference on
Future Computer and Communication (ICFCC) (pp. 119–123).
He, X., Niedermeier, M., & De Meer, H., (2013). Dynamic key management in wireless sensor
networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.
He, Y. H., & Lee, M. C., (2008). Towards a secure mutual authentication and key exchange
protocol for mobile communications; In: 6th International Symposium on Modeling and
Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops (pp. 225–231). Berlin.
Hellman, M. E., & Diffie, W., (1976). New directions in cryptography. IEEE Transactions on
Information Theory, 22(6), 644–654.
Liaw, S. H., Su, P. C., Chang, H. C., Lu, E. H., & Pon, S. F., (2005). Secured key exchange
protocol in wireless mobile ad hoc networks. In: 39th Annual 2005 International Carnahan
Conference on Security Technology (pp. 171–173).
288 Advances in Data Science and Computing Technology
Lin, Q., & Wang, Y., (2013). Novel three-party password-based authenticated key exchange
protocol for wireless sensor networks. Advances in Wireless Sensor Networks, 334, 263–270.
Pervaiz, M. O., Cardei, M., & Wu, J., (2010). Routing security in ad hoc wireless networks.
Network Security (pp. 117–142). Springer, US.
Saeed, M., & Shahriar, S. H., (2011). security analysis and improvement of smart card-based
authenticated key exchange protocol with CAPTCHAs for wireless mobile network. IEEE
Symposium on Computers and Communications (ISCC) (pp. 652–657). Kerkyra.
Xu, J., Zhu, W. T., & Feng, D. G., (2011). An efficient mutual authentication and key agreement
protocol preserving user anonymity in mobile networks. Computer Communications, 34(3),
319–325.
CHAPTER 20
STRENGTH-BASED NOVEL
TECHNIQUE FOR MALICIOUS NODES
ISOLATION
PRACHI CHAUHAN1 and ALOK NEGI2
G.B. Pant University of Agriculture and Technology, Pantnagar,
1
ABSTRACT
20.1 INTRODUCTION
back to another point at another location where rests of the packets present
within the network. Inside VANET, there are different routing protocols. In
DGR (directional greedy routing), Via choosing the nodes that heads nearer
target destination, the hop count reduced (Iqbal et al., 2009). A-STAR stands
for Anchor-based-street and traffic aware routing. It is a position-based
routing mechanism which uses city bus routes for the purpose of identifying
an anchor path for packet delivery along with the high connectivity. GyTAR
(Greedy Traffic-Aware Routing) is the proposed technique which used in
city environments where the intersection kept as the base. The geographical
routing protocol is used for this technique. E-GyTAR is the modified version
of GyTAR routing protocol. The junction is selected dynamically because
it based on vehicular traffic density. The AODV is an on-demand routing
protocol, which described as a reactive routing protocol (Ahmad et al., 2010).
Sometimes throughout the network, the source node needs to be routed to a
particular destination then the routing establishment initialized by the route
discovery process. Every neighbor relay the RREQ packet on their own to
the neighbors of the source node.
Rajamani et al. (2002) have proposed the spacing policies which help in the
highway vehicle automation. Here, a spacing policy (a nonlinear function of
speed) is discussed. The autonomously present information is utilized by the
spacing policy. The guarantee of proving string stability by the spacing policy
seen after the analytical calculations. Also, it ensures the traffic flow stability
by keeping the smaller steady state spacing. Larger traffic flow capacities
which in range of 20–65 m/h are provided through this mechanism. The
adaptive cruise control (ACC) vehicles present on the highways of today can
readily use the spacing policy.
Peel et al. (2001) have developed a design framework of intelligent trans
port systems which related to the aspects of road sweeping vehicle automa
tion. The exchange of information from car to car as well as car to road is the
main aim for the road condition information transferring module. The security
issues of VANETs are discussed and their solutions to be derived. This is been
made sure that solutions implemented under certain security patterns.
Camp et al. (2002) have reviewed mobility models for ad-hoc network.
In this chapter, the researchers recommended security infrastructure for
vehicular communication. The main aim of proposed structural design
holds organization of identities. Further there should be the involvement of
292 Advances in Data Science and Computing Technology
The attack occurs when a single node keeps sending multiple messages to
other nodes which are pretended to be from varying identities. In certain
instances, Sybil attack is possible. It can only be exempted from either the
extreme conditions as well as possibilities of resource parity and entity
coordination. A type of confusion occurs in the whole network when a single
node starts sending multiple copies of its selves. There is a chance that all the
fake, illegal ID’s and the authority are claimed (Figure 20.1).
The collision within the network starts which causing Sybil attack in the
network. Both internal and external attacks can be triggered by this type of
attack. That being said, by establishing metrics of authentication, external
attacks can indeed be prevented. For internal attacks, it is not feasible.
There are one to one mapping of the identity and role inside a network.
The Sybil points represented as A, B, C, D nodes in Figure 20.1, generate
a false identity inside the network. Sybil attack has become such a crucial
attack whereby multiple messages are sent from the attacker and then sent to
various vehicles with multiple IDs every time. This leads all other nodes to
Strength-Based Novel Technique for Malicious Nodes Isolation 293
get distracted in such a manner that the nodes think the messages are coming
from certain nodes. Because of this, there is indeed a jam inside the network.
This causes the vehicle to take another route and leave that path to something
like the advantage for attacker. There are two types of Sybil attacks namely,
sensitive, and throughput sensitive attacks.
In this work, technique has been discussed which detect and isolate malicious
nodes that accountable to trigger Sybil attack from network. The suggested
approach involves node strength methodology in monitor mode. In this
technique, the RSUs flood ICMP messages in network. The vehicle nodes
when obtain the ICMP messages will begin Trying to send towards nearest
roadside units (rsus) its transmission strength rate All details will be obtained
by the roadside infrastructure and the info will be shared with one another.
The node of vehicle with multiple signal strength values will be detect as the
node which Trigger an intrusion into the networks. The RSUs transmit the
controlling information packets in the network to validate which node would
be the fraudulent node and then once the control packets are received, nodes
go out to monitor mode and continue monitoring their neighboring nodes.
The node that’s suspicious be detected and multiple path routing technique
applied which isolate malicious nodes from the network.
• Firstly, road side unit (RSU) save the information regarding deploy
vehicles;
294 Advances in Data Science and Computing Technology
• If any new vehicle joins the network, then all information (network id,
route, etc.), send to RSU;
• Identity changed by any vehicle send important message to all nearest
RSU;
• RSU check the adjacent vehicles information based on signal strength;
• Finally, if the signal strength matched then communication start in the
network. Otherwise, vehicle nodes go into monitor mode and detect
the illegal nodes.
In this work, at first finds the signal strength of each node, i.e., signal
strength of every node and their neighbors. Figure 20.2 demonstrates the
initialization of network.
In Figure 20.3, vehicular ad hoc network is installed with static number
of road side sensor nodes and vehicles which travels freely on roads and V2V
communication and vehicle to road side communication is also accessible.
In Figure 20.4, the smart cars are moving on roads and communicating
with one another, i.e., car with identification number 1 communicating with
car that registration number is 4.
In Figure 20.5, new car gets its registration identity and this information
flooded in the network.
Throughput can be defined as the number of packet data received per unit
time and it is represented in bps.
298 Advances in Data Science and Computing Technology
T = RP / TT (1)
where; T is the throughput; RP is the received packets; TT is the data trans
mission time (bps).
Strength-Based Novel Technique for Malicious Nodes Isolation 299
Figure 20.11 exhibits, the throughput of the proposed and existing tech
nique comparison and analyzed that the network throughput is increased at
the steady rate after the malicious node isolation.
300 Advances in Data Science and Computing Technology
Proposed Technique
Existing technique
Figure 20.12 exhibits, the delay of the proposed and existing algorithm
comparison and analyzed that network delay is reduced when the attack gets
isolated from the network.
Figure 20.13 describe the packet loss of the proposed and existing tech
nique comparison and analyzed that the network packet loss is reduced when
Sybil attack gets isolated from the network. If the packet loss is less then
number of packets drops also less.
Strength-Based Novel Technique for Malicious Nodes Isolation 301
Figure 20.14 shows, the routing overhead are the parameter which
measures the extra packets that transmitted in network. The routing overhead
in network is reduced on detection and isolation of attack from the network.
It means fuel emission decreased (Table 20.1).
TABLE 20.1 Performance Parameters Comparison between Existing and Proposed Technique
Time Existing Technique (In respect of Proposed Technique (In respect of
(seconds) number of packets) number of packets)
Through E2E Packet Routing Through- E2E Packet Routing
put Delay Loss Overhead put Delay Loss Overhead
4.5 20 46 45 30 25 6 16 16
6 35 70 70 32 55 25 45 17
7 47 75 85 34 90 58 65 18
20.7 CONCLUSION
In this study, it was observed that malicious nodes often enter the network
due to its decentralized existence of network, which really is responsible for
causing different forms of active and passive attacks. This analysis provides
a justification for the identification of malicious nodes that responsible for
triggering a Sybil attack on the network. The simulation of implemented
technique has been done on NS2 and the result shows that overall performance
increased of the network. Future work will include a further improvement
of our technique by removing the chances of information spoofing in the
network.
KEYWORDS
• broadcasting
• decentralized
• path establishment
• self-configuring
• Sybil
REFERENCES
Ahmad, A., Doughan, M., Gauthier, V., Mougharbel, I., & Marot, M., (2010). Hybrid multi-
channel multi-hop MAC in VANETs. In: Proceedings of the 8th International Conference
on Advances in Mobile Computing and Multimedia (pp. 353–357).
Strength-Based Novel Technique for Malicious Nodes Isolation 303
Balamaha, L. D., & Shankar, M. K. V., (2014). Sybil attack detection with reduced bandwidth
overhead in urban vehicular networks. International Journal of Engine ring Trends and
Technology (IJETT), 12, 578–584.
Camp, T., Boleng, J., & Davies, V., (2002). A survey of mobility models for ad hoc network
research. Wireless Communications and Mobile Computing, 2(5), 483–502.
Chang, S., Qi, Y., Zhu, H., Zhao, J., & Shen, X., (2011). Footprint: Detecting Sybil attacks in urban
vehicular networks. IEEE Transactions on Parallel and Distributed Systems, 23(6), 1103–1114.
Chauhan, P., & Mandoria, H. L., (2017). An empirical study of vehicles communication in
vehicular ad-hoc network. In: International Journal of Innovative Research in Science,
Engineering and Technology (Vol. 6, pp. 3763–3769).
Haas, J. J., Hu, Y. C., & Laberteaux, K. P., (2009). Real-world VANET security protocol
performance. In: GLOBECOM 2009–2009 IEEE Global Telecommunications Conference
(pp. 1–7). IEEE.
Hao, Y., Tang, J., & Cheng, Y., (2011). Cooperative sybil attack detection for position-based
applications in privacy preserved VANETs. In: 2011 IEEE Global Telecommunications
Conference- GLOBECOM 2011 (pp. 1–5). IEEE.
Iqbal, S., Chowdhury, S. R., Hyder, C. S., Vasilakos, A. V., & Wang, C. X., (2009). Vehicular
communication: Protocol design, testbed implementation and performance analysis. In:
Proceedings of the 2009 International Conference on Wireless Communications and Mobile
Computing: Connecting the World Wirelessly (pp. 410–415).
Kwag, S. J., & Lee, S. S., (2006). Performance evaluation of IEEE 802.11 ad-hoc network in
vehicle to vehicle communication. In: Proceedings of the 3rd International Conference on
Mobile Technology, Applications and Systems (pp. 47-es).
Malla, A. M., & Sahu, R. K., (2013). Security attacks with an effective solution for dos attacks
in VANET. International Journal of Computer Applications, 66(22).
Mustafa, B., & Raja, U. W., (2010). Issues of Routing in VANET. School of computing at
Blekinge Institute of Technology.
Peel, G., Michielen, M., & Parker, G., (2001). Some aspects of road sweeping vehicle
automation. In: 2001 IEEE/ASME International Conference on Advanced Intelligent
Mechatronics. Proceedings (Cat. No. 01TH8556) (Vol. 1, pp. 337–342). IEEE.
Rabieh, K. M., & Azer, M. A., (2011). Combating sybil attacks in vehicular ad hoc networks. In:
Recent Trends in Wireless and Mobile Networks (pp. 65–72). Springer, Berlin, Heidelberg.
Rajamani, R., (2000). On spacing policies for highway vehicle automation. In: American
Control Conference. Chicago, Illinois.
Rawat, A., Sharma, S., & Sushil, R., (2012). VANET: Security attacks and its possible
solutions. Journal of Information and Operations Management, 3(1), 301.
Raya, M., & Hubaux, J. P., (2007). Securing vehicular ad hoc networks. Journal of Computer
Security, 15(1), 39–68.
Uchhula, V., & Bhatt, B., (2010). Comparison of different ant colony-based routing algorithms.
IJCA Special Issue on MANETs, (2), 97–101.
Wu, H., Palekar, M., Fujimoto, R., Guensler, R., Hunter, M., Lee, J., & Ko, J., (2005). An
empirical study of short-range communications for vehicles. In: Proceedings of the 2nd
ACM International Workshop on Vehicular ad Hoc Networks (pp. 83, 84).
Xiao, B., Yu, B., & Gao, C., (2006). Detection and localization of sybil nodes in VANETs. In:
Proceedings of the 2006 Workshop on Dependability Issues in Wireless Ad Hoc Networks
and Sensor Networks (pp. 1–8).
CHAPTER 21
ABSTRACT
21.1 INTRODUCTION
21.1.2 ENCRYPTION
The process where the plain text is transformed into unreadable format. This
is done by using an algorithm for unauthorized users. Here the message or
the data is encoded for which unauthorized user cannot access. The types of
encryption are:
1. Symmetric Encryption: In this encryption, the key that is used for
encryption and decryption is same. Therefore, this use the same key
for the message need to send.
2. Public Key Encryption: In this, the algorithm use both the keys,
i.e., one for public that is called public key and other for authorized
user, which is called secret key. In addition, these two keys are linked
with each other.
21.1.3 DECRYPTION
21.2 STEGANOGRAPHY
Steganography has vast effect on nowadays world and introduced few new
technologies. It also provides the security during messaging in mobile. This
Steganography word came from two Greek words, one is steganos and
other is graptos. The first steganos means Covered whereas graptos means
writing, which makes the meaning “cover writing.” Steganography means
hiding of message in specific medium like audio, video, and many more.
It uses multimedia as cover image as we know in steganography, we use
one message which in kept inside an image (known as cover image) and
the encrypted image is called stego image (Junod, 2001). People send lots
of private and legal message through internet or the other communication
network and security is key term for them, for those purpose; steganography
is used where actual purpose is to protect the content or the information from
the attack of unauthorized user (hacker) without altering the actual message.
308 Advances in Data Science and Computing Technology
21.3 CRYPTOGRAPHY
21.3.3 HASHING
21.4 ALGORITHM
1. Input Image: Here the secret message is hidden in selected file. The
message can be in text form also.
2. Image Quality Selection: The quality of output image is selected.
The more quality of image the less data can be hidden.
3. AES Encryption: The secret image is encrypted through the AES
Algorithm. It provides the security id by mistake if unauthorized
user decodes the image file it can’t access or encrypt the information
encrypted by AES.
4. LSB Algorithm: LSB can hide a huge amount of information to the
lower bits of data/information.
5. Encoded and Encrypted Image: Here, the message which is hidden
in image is ready to send to the user. But the user must have that
secret key to decrypt or to open the algorithm (AES).
Step 1: At first, take the inputs the message and any image as image1.
and another image as image2.
Step 2: Message and image1 need to be broken into n number of
equal parts.
Step 3: Message or information are encrypted using AES (keys 512)
Algorithm.
310 Advances in Data Science and Computing Technology
21.5 RESULTS
Sender side.
FIGURE 21.4
Securing the Information Using Combined Method 313
Encrypted image.
FIGURE 21.5
314 Advances in Data Science and Computing Technology
21.6 CONCLUSION
Nowadays, security is major aspect so we have done this project. In this project
we used steganography technique which is called image steganography. The
data is hidden inside the image which is called stego image. The main aim of
this project to enhance security. In future, to provide greater security to the
data we can use different keys for encryption and decryption. Audio can also
embed in carrier media. Size of images and message can be different. It will
provide an effective way to select an image to hide a message. A secret key is
needed to decode the secret message. Steganography has much use in future.
This is double checker security for transfer of message through internet. Its
application is in use of protection of data alteration and storing confidential
data. Accessing of digital media/data that is stored for authorized user can
also be control by steganography.
KEYWORDS
• AES
• cipher text
• data encryption standard (DES)
• LSB
• steganography
REFERENCES
Bijoy, K. M., Debnath, B., & Xiao-Zhi, G., (2019). “Data security using 512 bits symmetric
key based cryptography in cloud computing system.” In: International Journal of Advanced
Science and Technology (Vol. 129, pp. 1–10).
Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P., (2009). “A skin tone detection algorithm
for an adaptive approach to steganography.” In: Signal Processing (Vol. 89, No. 12, pp.
2465–2478).
Cheddad, A., Condell, J., Curran, K., &. Mc Kevitt, P., (2010). “Digital image steganography:
Survey and analyses of current methods.” In: Signal Processing (Vol. 90, No. 3, pp. 727–752).
Fridrich, J., Goljan, M., & Soukal, D., (2014). “Searching for the stego key.” Proc. SPIE,
Electronic Imaging, Security, Steganography, and Watermarking of Multimedia Contents,
70–82.
Securing the Information Using Combined Method 317
Girling, C. G., (1987). “Covert channels in LAN’s.” IEEE Transactions on Software Engineering,
13(2), 292–296.
Junod, P., (2001). “On the complexity of Matsui’s attack.” Selected Areas in Cryptography
(Vol. 2259, pp. 199–211). Lecture Notes in Computer Science.
Krzysztof, S., (2010). “HICCUPS: Hidden communication system for corrupted networks.”
In: Proc. of the Tenth International Multi-Conference on Advanced Computer Systems
ACS’2003 (pp. 31–40).
Liu, T. Y., & Tsai, W. H., (2007). “A new steganographic method for data hiding in Microsoft
word documents by a change tracking technique.” In: IEEE Transactions on Information
Forensics and Security (Vol. 2, No. 1, pp. 24–30).
Manfred, W., (1989). “Covert channels in LAN protocols.” Local area network security.
Lecture Notes in Computer Science, 396, 89–101.
Petitcolas, F. A. P., Anderson, R. J., & Kuhn, M. G., (2008). “Information hiding: A survey.”
Proceedings of the IEEE (special Issue), 87(7), 1062–1078.
Rivest, R. L., Shamir, A., & Adleman, L., (1978). “A method for obtaining digital signatures
and public-key cryptosystems.” Communications of the ACM, 21(2), 120–126.
Wendzel, S., & Keller, J., (2016). Low-attention forwarding for mobile network covert
channels. 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia
Security (CMS) (Vol. 7025, pp. 122–133). Lecture Notes in Computer Science.
CHAPTER 22
IMPLEMENTATION OF DNA
CRYPTOGRAPHY IN IoT USING
CHINESE REMAINDER THEOREM,
ARITHMETIC ENCODING, AND
ASYMMETRIC KEY CRYPTOGRAPHY
ANANYA SATPATI (DAS), SOUMYA PAUL, and PAYEL MAJUMDER
Department of Computer Science and Engineering, NSHM Knowledge
Campus, Durgapur, Arrah Shibtala Via Muchipara, Durgapur–713212,
West Bengal, India, E-mail: [email protected] (A. Satpati)
ABSTRACT
22.1 INTRODUCTION
22.2 PRELIMINARIES
t P
FIGURE 22.1 Simple DNA structure (Paul et al., 2017; Naskar et al., 2019).
TABLE 22.1 Encryption and Decryption Map Rules for DNA Sequences (Paul et al., 2017;
Naskar et al., 2019)
A T C G
Rule 1 00 11 10 01
Rule 2 00 11 01 10
Rule 3 11 00 10 01
Rule 4 11 00 01 10
Rule 5 10 01 00 11
Rule 6 01 10 00 11
Rule 7 10 01 11 00
Rule 8 01 10 11 00
TABLE 22.2 XOR Operation for DNA Sequences (Paul et al., 2017; Naskar et al., 2019)
⊕ A T C G
A A T C G
T T A G C
C C G A T
G G C T A
In Asymmetric key cryptography two different keys are used, one for
encryption another for decryption (Kahate, 2003). There are public key
and private key, hence asymmetric key cryptosystem also called public key
cryptography. The general idea of asymmetric key cryptosystem shown in
FIGURE 2. The recipient public key use for encryption purpose and recipient
private key use for decryption purpose.
Advantages [Asymmetric Cryptography (Public Key Cryptog
raphy), n.d.]:
• In asymmetric key no key exchange is required, no key distribution
problem arise here.
• Strength of security is higher than symmetric, as private key never
disclose among to all.
• In asymmetric key cryptography sender has no scope to gainsay
regarding sending message, as non-repudiation characteristics
supported by asymmetric key cryptography.
Disadvantages [Asymmetric Cryptography (Public Key Cryptog
raphy), n.d.]:
• In long size massage decryption, generally asymmetric key algo
rithm is not used, because asymmetric key process is compara
tively slower than symmetric key algorithm.
• If receiver loses his/her private key then message decryption
never possible.
• If private key of a person is revealed by an unauthorized person,
then unauthorized person can also read all secret message’s owner.
324 Advances in Data Science and Computing Technology
Plain text to cipher text transmission have two technique, one is substitution
and another is transposition technique (Kahate, 2003). Rail Fence technique
is one of the popular transposition techniques, it also called “zigzag cipher.”
The Rail Fence technique algorithm (Kahate, 2003) is:
• Write down the plain text as a diagonal order;
• After writing diagonal order, read the plain text in row wise.
The pictorial representation of Rail Fence Technique shown in bellow:
In our scheme system takes plan text and encrypt it using asymmetric key
cryptographic scheme. At first in the sender uses a public key of receiver
which is created by Chinese Remainder Theorem and Knapsack algorithm.
Similarly, Knapsack algorithm again use at the last step of decryption. The
Knapsack algorithm is described in bellow:
• We have used key pair of public key and private key in the knapsack
algorithm.
• The public key is used only for encryption process and will be known
to everyone and whereas the private key is used during decryption
process (Asymmetric Cryptography (Public Key Cryptography, n.d.)).
• The elements which are from a predefined set of numbers are in
knapsack are provided, if the sum is Known then we can find out the
sum of the numbers quickly of the knapsack, rather it is not an easy
job to find those elements which has participated in the knapsack to
generate the sum.
Following steps are to followed for knapsack algorithm:
Let N = {N_1, N_2…………, N_n} be a predefined set and
I = (I_1, I_2…………., I_n) be a solution set in which I_i is either 0 or 1.
Algorithm:
Example: Let us consider N = [3, 7, 12, 30, 60, 115] and S = 82. To
find the vector I?
i Ni S S ≥ Ni Ii S,S – Ni × Ii
6 115 82 No 0 S←82 – 115 × 0 = 82
5 60 82 Yes 1 S←82 – 60 × 1 = 22
4 30 22 S 0 S←22 – 30 × 0 = 22
3 12 22 Yes 1 S←22 – 12 × 1 = 10
2 7 10 Yes 1 S←10 – 7 × 1 = 3
1 3 3 Yes 1 S← 3 – 3 × 1 = 0
Ciphertext-5 18 25
Plaintext: 100101111
2. Plaintext: 111100101
Cipher text: 23 5 16
Ciphertext-23 5 16
Plaintext: 111100101
3. Plaintext: 101111100
Cipher text: 58 69 7
Ciphertext-58 69 7
Plaintext: 101111100
22.5 CONCLUSIONS
Following conclusions can be drawn from the analysis and obtained result
of our project is:
• Our proposed algorithm using Knapsack clubbed with DNA cryptog
raphy will give new class of cryptography where the two phases of
cryptography will contribute more towards the secure transmission of
data and will be less prone to different types of attacks.
330 Advances in Data Science and Computing Technology
KEYWORDS
• arithmetic coding
• asymmetric key
• Chinese remainder theorem
• cryptosystem by using knapsack
• data encryption
• DNA encoding
• rail fence technique
REFERENCES
Biswas, M. R., Alam, K. M. R., Tamura, S., & Morimoto, Y., (2019). A technique for
DNA cryptography based on dynamic mechanisms. Journal of Information Security and
Application, 48, 102363.
Forouzan, B. A., & Mukhopadhyay, D., (2003). Cryptography and Network Security (3rd
edn.). McGraw-Hill; Chennai.
Jia, X., Wang, D., Nie, D., Luo, X., & Sun, J. Z., (2019). A new threshold changeable secret
sharing scheme based on the Chinese remainder theorem. Information Sciences, 473,
13–30.
Kahate, A., (2003). Cryptography and Network Security (1stedn.). McGraw-Hill; New Delhi.
Kate Brush (2020). Asymmetric Cryptography (Public Key Cryptography). [Online] https://
searchsecurity.techtarget.com/definition/asymmetric-cryptography (accessed on 08
December 2021).
Lue, M., Lai, X., Xion, G., & Qin, L., (2007). Symmetric-key cryptosystem with DNA
technology. Sci. China Ser. F., 50(3), 324–333.
Mandrita Mondal, & Kumar S. Ray (2019). Review on DNA Cryptography. [Online] https://
arxiv.org/ftp/arxiv/papers/1904/1904.05528.pdf (accessed on 08 December 2021).
Naskar, P. K., Paul, S., Nandy, D., & Chaudhuri, A., (2019). “DNA encoding and channel
shuffling for secured encryption of audio data.” Multimedia Tools and Applications, 78(17),
25019–25042. Springer Nature.
Paul, S., Dasgupta, P., Naskar, P. K., & Chaudhuri, A., (2017). “Secured image encryption
scheme based on DNA encoding &chaotic map.” Review of Computer Engineering Studies,
IIETA, 4(2), 70–75.
Implementation of DNA Cryptography in IoT Using Chinese 331
Pelletier, O., & Weimerskirch, A., (2002). Algorithmic self-assembly of DNA tiles and its
application to cryptanalysis. In: Proc. of 4th Annual Conf. on Generic and Evolutionary
Computation (pp. 139–146). Morgan Kaufmann Publishers Inc.
Raj, S. J., Bashar, A., & Ramson, S. R. J., (2020). Elliptical curve cryptography based
access control solution for IoT based WSN. International Conference on Innovative Data
Communication Technologies and Application (pp. 742–749). Springer Nature.
Zeadally, S., Das, A. K., & Sklavos, N. (2019). Cryptographic Technologies and Protocol
Standards for Internet of Things, Internet of Things. https://doi.org/10.1016/j.iot.2019.100075.
CHAPTER 23
ABSTRACT
23.1 INTRODUCTION
To achieve our goal, power spectral density (PSD) and bit error rate
(BER) calculation like below. For PSD we used following formula.
mean x( f ) 2
Sx( f ) = lim
(2)
T →∞ T
T depict time period.
MATLAB® programming we have to modify the Eqn. (2) like below:
T /2
Sx ( f ) = lim T
1 ∫ ∫ C (t1 )C(t2 )mean ( n(t )1 n(t ) 2 ) e − j 2π f (t2 −t1 ) dt1dt2 (3)
T →∞ T /2
In the Eq. (3), product of mean n(t) and C(t) treated as noise. So, the inter
mediate PSD treated as noise which makes the both System more secure. In
the above equation C(t) is the deterministic signal and n(t) is Gaussian with
zero mean.
BER define as:
β max
Pb = Q
2 (4)
2 Tb
=β max ∫ [ p (t ) − q (t ) ] dt (5)
N
negative half express the distortion in the performance. But the distortion
not in practically, it depends on resolution. In Figure 23.11 it is clear that
jamming and no jamming BER is closed to each other.
Now, the spreading factor value with 13 and SIR value in 20 dB asso
ciated Figures 23.12, 23.13, and 23.14. Here, Figures 23.12 and 23.13 are
looking like same, i.e., this set of data removed all the jamming. Figure 23.14
described the results strongly in favor of no jamming.
As per Table 23.1, we calculate all the parameters under spreading factor 13.
It are clearly visible that in same spreading factor high SIR gives up almost
344 Advances in Data Science and Computing Technology
jamming free PSD. But in low SIR PSD quality is very good but effected by
narrow band jamming. As per PSD plots it is concluded that distortion is due
to resolution, not is practically.
KEYWORDS
• BER
• CDMA
• DSSS
• MATLAB®
• PSD
REFERENCES
Abimoussa, R., & Landry, R. J., (2000). Anti-jamming solution to narrowband CDMA interference
problem. In: 2000 Canadian Conference on Electrical and Computer Engineering. Conference
Proceedings (Vol. 2, pp. 1057–1062). Navigating to a New Era (Cat. No.00TH8492).
Fang-Biau, U., Jun-Da, C., & Sheng-Han, C., (2004). Smart antennas for multiuser DS/CDMA
communications in multipath fading channels. Eighth IEEE International Symposium on
Spread Spectrum Techniques and Applications - Program and Book of Abstracts (IEEE Cat.
No.04TH8738) (pp. 400–404).
Lichuan, L., & Hongya, G., (2003). Time-varying AR modeling and subspace projection for
FM jammer suppression in DS/SS-CDMA systems. The Thirty-Seventh Asilomar Conference
on Signals, Systems & Computers, 1, 623–627.
Robust Technique to Overcome Thwarting Communication 345
Lichuan, L., & Hongya, G., (2005). Subspace projection and time- varying AR modeling for anti
jamming DS-CDMA communications. In: 14th Annual International Conference on Wireless
and Optical Communications, 2005 (p. 104). WOCC.
Lu, M., Cheng, F., Wei, S., & Gang, Q., (2017). Comparison of detection methods for non-
cooperative underwater acoustic DSSS signals. Signal Processing Communications and
Computing (ICSPCC) 2017 IEEE International Conference, 1–5.
Lu, M., Cheng, F., Wei, S., & Gang, Q., (2018). A Real-Time Detection System for Non-Cooper
ative Communicates Electronic and Automation Control Conference (IMCEC) 2018 2nd IEEE
(p. 1331). Underwater acoustic DSSS signals based on LabVIEW, advanced information
management 1335.
Manna, T., & Kole, A., (2016). Performance analysis of secure DSSS multiuser detection
under near far environment. International Conference on Intelligent Control, Power and
Instrumentation 2016 (IEEE Conference). doi: 10.1109/ICICPI.2016.7859713 IEEE ISBN
No.:978-1-5090- 2636-4. IEEE Xplore.
Raju, K., Ristaniemi, T., Karhunen, J., & Oja, A., (2002). Suppression of bit-pulsed jammer
signals in DS-CDMA array system using independent component analysis. In: 2002 IEEE
International Symposium on Circuits and Systems (Vol. 1). Proceedings (Cat. No.02CH37353).
Rida, T., Saqib, E., Sobia, J., & Saqib, A., (2019). Performance analysis of multi-user polar
coded CDMA system. Applied Sciences and Technology (IBCAST) 2019 16th International
Bhurban. Conference (pp. 1000–1005).
Ristaniemi, T., Raju, K., & Karhunen, J., (2002). Jammer mitigation in DS-CDMA array system
using independent component analysis. In: 2002 IEEE International Conference on Communi
cations Conference Proceedings (Vol. 1, pp. 232–236). ICC 2002 (Cat. No.02CH37333).
Seyedi, A., & Saulnier, G. J., (2001). A sub-channel selective orthogonal frequency division
multiplexing spread spectrum system. In: 2001 MILCOM Proceedings Communications for
Network - Centric Operations Creating the Information Force (Cat. No.01CH37277) (Vol.
2 pp. 1370–1374).
Sriyananda, M. G. S., Joutsensalo, J., & Hämäläinen, T., (2013). Interference cancellation
schemes for spread spectrum systems with blind principles. In: 2013 IEEE 27th International
Conference on Advanced Information Networking and Applications (AINA) (pp. 1078–1082).
Tsung-Chi, L., Chia-Cheng, H., Cheng-Yuan, C., Guu-Chang, Y., & Wing, C. K., ((2007).
Study of MFSK/FH-CDMA wireless communication systems without symbol-synchronous
assumption. IEEE Sarnoff Symposium, 1–5.
PART VII
CHAPTER 24
E-mail: [email protected]
ABSTRACT
in West Bengal, India. The research also tries to explore the effect of regional
language facility in accounting software on intra business communication at
managerial level. At the end the study seeks to understand the role played by
multilanguage software in meeting customer satisfaction.
24.1 INTRODUCTION
Studies in the past have successfully pointed out the utility of accounting
software in the progress of business. The researches have also been ardent
in assessing the significance of accounting information in business decision
making. However, it must be understood that the accounting information
generated by the accounting software must be lucid and should have enough
clarity to be understood by all concerned. Researchers however, have
352 Advances in Data Science and Computing Technology
The research takes into account the primary data collected from a population
of 90 accounting professionals and users of accounting information across
the state of West Bengal. The selection of the respondents was limited to
only those persons who have been using accounting software for at least 6
months. The population was selected using snow ball sampling technique.
From the period of February 2020 to March 2020 the respondents were asked
The Utility of Regional Language Facility in Accounting 353
20 questions mostly through online and verbal interview. The first part of the
questionnaire contained 10 questions about the respondent’s personal infor
mation [e.g., Educational qualification, medium of education, etc.]. While in
the second part, the respondents were asked to convey their degree of agree
ability towards a particular question using Likert’s 5-point scale. The second
part had nine questions which conclusively have formed the variables for the
research. At the end to have a better clarity of research the respondents were
also asked about any potential problems resulting from the use of regional
language in accounting and accounting information generation. The opinion
of the respondents was noted down and the descriptive statistics was used for
the analysis. For the convenience of research, the respondents were divided
into three different groups based on their work experience. The mean score
of the responses of each category were considered to determine the degree of
agreeability of the category for a particular question. The respective groups
with the number of respondents in each one of them is shown in Table 24.1.
24.6 ANALYSIS
The opinion of the respondent categories for each of the variables was
recorded in a data sheet. The respondent categories which had a mean score
higher than the overall average score signifies a greater degree of agree
ability towards a particular variable than the rest. The entire findings are
shown in Table 24.2.
The numerical analysis as presented in Table 24.2 is graphically shown
in Figure 24.1.
FIGURE 24.1 Mean score obtained by each category of respondents and overall mean score
for each variable.
24.7 FINDINGS
24.8 RECOMMENDATION
The role of regional language facility in accounting software is huge as all the
respondents have strongly agreed upon its viability. However, for software to
sustain in the global business scenario, accounting only in regional language
cannot suffice. For operational efficiency presence of regional language
facility is a must but for global expansion English which is the most widely
practiced professional language is required.
The feedback of the respondents indicates that professional accounting
terms [like Balance Sheet, print, etc.], are better understood in English than
in vernacular. Under such a background it is highly desirable that accounting
software have mixed language facility where professional accounting terms are
present in English and the same has been transliterated in regional language.
Owing to the perspective of business expansion on an international basis,
the accounting software demand the presence of both English and regional
The Utility of Regional Language Facility in Accounting 359
FIGURE 24.2 Model for existing and proposed dimensions of accounting software.
24.9 CONCLUSION
Indian population is fluent with the language. This proclaims the need for
regional language facility in accounting software. However, it must be under
stood that professional accounting terms are better understood in English
than in regional language. This very reason is worthy enough to convey that
not only regional translation but regional transliteration is equally important
in accounting software.
For any stake holder of accounting process, the financial information is
very relevant and is the best reference for decision making. This rationale
intensely justifies the clarity of accounting information. For a non-English
speaker the clarity of accounting information will be more when such
accounting information is reproduced in vernacular. In the light of such
significant reason the utility of regional language facility in accounting
software is noteworthy. However, it must be kept in mind that in the neces
sity of the presence of regional language facility in accounting software
the importance of English language in the same cannot be underestimated.
Operational efficiency in a multi linguistic country like India obviously
demands regional language facility but the presence of English alongside
provides the impetus for global expansion. On an ending note, it can be said
that for an accounting software to have utmost efficiency both the presence
of regional language along with English is not only a requirement but it must
form a basic feature of the same.
KEYWORDS
• accounting software
• customer
• linguistic diversity
• multi-language
• regional language
• retail market
REFERENCES
Aryan, L., (2017). The Role of Accounting Information Quality in Management. ResearchGate.
Aryan, L., Alrabei, A., & Haija, A., (2016). The Role of Accounting Information Quality in
Enhancing Cost Accounting Objectives in Jordanian Industrial Companies. ResearchGate.
The Utility of Regional Language Facility in Accounting 361
ABSTRACT
Seismic loads are one of the important loads that are to be considered while
designing any structure, like, buildings, power plants, towers, bridges, etc.,
irrespective of using a reinforced-concrete frame or steel frame. The Indian
subcontinent has a history of highly devastating earthquakes over the years.
The main reason behind the high frequency and intensity of earthquakes
is the driving of the Indian plate into the Eurasian plate at a rate of 47
mm/year. As per geographical statistics, about 54% of the landmass of
364 Advances in Data Science and Computing Technology
25.1 INTRODUCTION
25.2 DEFINITIONS
As per IS 1893 (Part 1): 2016 (IS 1893 (Part 1), 2016):
1. Design horizontal seismic coefficient, Ah (Clause 6.4.2) (IS 1893
(Part 1), 2016):
Z Sa
*
2 g
Ah =
R
where; Z is the seismic zone factor (IS 1893 (Part 1), 2016); I is the
importance factor (IS 1893 (Part 1), 2016); R is the response reduction
Sa
factor (IS 1893 (Part 1), 2016); is the design acceleration coeffi
g
cient for different soil types, normalized with peak ground acceleration,
corresponding to natural period T of structure (IS 1893 (Part 1), 2016)
2. Design lateral force, VB (Clause 7.2.1) (IS 1893 (Part 1), 2016)
VB = Ah × W
where; Ah is the design horizontal seismic load (IS 1893 (Part 1),
2016); W is the seismic height of the building (IS 1893 (Part 1), 2016).
The ETABS 2016 software has been used for 3D model analysis. As per
Figure 25.1 – Seismic Zones of India (IS 1893 (Part 1): 2016), the topography
of India can be divided into four seismic zones (IS 1893 (Part 1), 2016):
1. Zone II: Regions which fall under Low Damage Risk Zone and have
Seismic zone factor, Z = 0.1 (IS 1893 (Part 1), 2016).
366 Advances in Data Science and Computing Technology
2. Zone III: Regions which fall under Moderate Damage Risk Zone
and have Z = 0.16 (IS 1893 (Part 1), 2016).
3. Zone IV: Regions which fall under High Damage Risk Zone and
have Z = 0.24 (IS 1893 (Part 1), 2016).
4. Zone V: Regions which experience highest intensity of earthquakes
and have Z = 0.36 (IS 1893 (Part 1), 2016).
A model G+9 RC-structured building is placed at each of these 4 zones
keeping the material properties and structural members unchanged, unless
needed based on design check results (Table 25.1).
TABLE 25.1 Sites Chosen for Analysis from Different Seismic Zones
Location Seismic Zone Z Soil Type I R
Bengaluru II 0.10 II 1 5
Kolkata III 0.16 II 1 5
Delhi IV 0.24 II 1 5
Guwahati V 0.36 II 1 5
Model characteristics:
• Base of building structure: 20 m × 20 m;
• Number of floors: 10;
• Height of each floor: 3.3 m;
• Height of base floor: 3.5 m;
• Total height of building structure: 33.2 m;
• Aspect ratio: 1.6:1.
Initially, the structure is designed using M25 concrete with 250×400
beams, 450×500 columns and 125 mm thick two-way slabs. Further changes
are made as per requirements, based on the stability of beams and columns
after the design check, so that the building can attain the minimum stable
structure required to resist the seismic loads. The RC designs are made in
accordance with IS 456:2000 (IS 456, 2000).
The loads applied are:
• Dead load (DL) – Wall load, floor finish load, self-load (IS 456, 2000);
• Live Load (LL) (IS 456, 2000);
• Earthquake Loads along X-direction (ELX) and Y-direction (ELY) (IS
456, 2000).
As per assumptions, wind load is neglected.
Comparative Analysis of Storey Drift 367
As per Clause 6.3.1 of IS 1893 (Part 1) 2016, the following load combi
nations are to be considered for designing a seismic structure (IS 1893
(Part 1), 2016):
• 1.2[DL + IL ± (ELX ± 0.3ELY)] and 1.2[DL + IL ± (ELY ± 0.3ELX)] (IS
1893 (Part 1), 2016);
• 1.5[DL ± (ELX ± 0.3ELY)] and 1.5[DL± (ELY ± 0.3ELX)] (IS 1893
(Part 1), 2016);
• 0.9[DL ± (ELX ± 0.3ELY)] and 0.9[DL± (ELY ± 0.3ELX)] (IS 1893
(Part 1), 2016).
For story10:
i. Due to ELX:
Maximum displacement for story 10 = 16.856 mm
For story 1:
i. Due to ELX:
Maximum displacement for story 1 = 3.051 mm
As, the story drifts in both the floors, are less the maximum permissible
drift, for loads acting from both directions, we can consider the structure to
be safe.
For story10:
i. Due to ELX:
Maximum displacement for story 10 = 26.957 mm
Maximum displacement for story 9 = 26.028 mm
Storey drift = 0.929 mm
ii. Due to ELY:
Maximum displacement for story 10 = 27.140 mm
Maximum displacement for story 9 = 26.197 mm
Storey drift = 0.943 mm
For story 1:
i. Due to ELX:
Maximum displacement for story 1 = 4.860 mm
Maximum displacement for base = 0 mm
Storey drift = 4.860 mm
ii. Due to ELY:
Maximum displacement for story 1 = 4.846 mm
Maximum displacement for base = 0 mm
Storey drift = 4.846 mm
Comparative Analysis of Storey Drift 373
As, the story drifts in both the floors, are less the maximum permissible drift,
for loads acting from both directions, we can consider the structure to be safe.
For story 1:
i. Due to ELX:
As, the story drifts in both the floors, are less the maximum permissible drift,
for loads acting from both directions, we can consider the structure to be safe.
As, the story drifts in both the floors, are less the maximum permissible
drift, for loads acting from both directions, we can consider the structure to
be safe.
25.6 DISCUSSION
Using the values of story drift from the analysis, we can plot a graph to
explain the relation of story drift to the seismic zone factor, for both direction
of seismic loads. The seismic zone factor is plotted along X-axis and the
story drift along Y-axis (Figures 25.11 and 25.12).
FIGURE 25.11 Seismic zone factor v/s story drift graph for storys 1 and 10 due to seismic
loads along X-direction.
From the graphs it is observed that the slope for story drift curve for story
1 is much greater than that for story 10. This explains that the inertia forces
acting along the upper part of the structure is greater than that acting along
the lower part. This can cause shearing of the structure, which may result
in concentration of stresses along the walls or joints, leading to failure or
Comparative Analysis of Storey Drift 377
perhaps total collapse. Hence, measures should be taken to reduce the impact
of vibration on the lower floors due to an earthquake.
FIGURE 25.12 Seismic zone factor v/s story drift graph for storys 1 and 10 due to seismic
loads along Y-direction.
25.7 CONCLUSION
From the story drift plots, it can be observed that, taking the conditions
of soil type, importance factor and response reduction factor as constant,
for a structure studied at different seismic zones, the drift decreases from
the bottom floors to the top. This is opposite to the trend exhibited by
story displacement. Storey displacement is maximum at the top floor,
decreases towards the lower floors and ultimately becomes null at base or
ground level. Hence, we can conclude that story displacement is directly
proportional to the height of a building, while story drift is inversely
proportional to the height. Storey drift is greater at the bottom as the
bottom floors undergo lesser forces of inertia acting on them, than the
higher floors, due to seismic vibration. Measures should be taken to keep
the impact of seismic loads on the lower floors in check, in order to set
up a stable structure. The various approaches that can be taken to reduce
seismic impact are base-isolation technique, installation of seismic
dampers, setting up shear walls, using moment-resisting frame, energy-
dissipating devices, etc. The story drifts of the storys 1 and 10 of the
model structure do not exceed the maximum drift limit in all 4 seismic
zones, as specified by IS 1893 (Part 1): 2016. Hence the structures can
be considered safe.
380 Advances in Data Science and Computing Technology
KEYWORDS
REFERENCES
Aainawala, M. S., & Pajgade, P. S., (2014). “Design of multistoried R.C.C. buildings with
and without shear walls.” International Journal of Engineering Sciences & Research
Technology, 7(3), 498–510. ISSN: 2277-9655.
Alexander, S. D. B., & Simmonds, S. H., (1992). Punching shear tests of concrete slab-column
joints containing fiber reinforcement. ACI Structural Journal.
Avantika, H. D., Vinayak, D. V., & Valsson, V., (2019). “Effect of stiffness of different shapes
of building to seismic zones.” International Journal of Scientific Research and Engineering
Development, 2(2).
Azad, Md. S., & Gani, S., (2016). “Comparative study of seismic analysis of multistory
buildings with shear walls and bracing systems.” International Journal of Advanced
Structures and Geotechnical Engineering, 5, 72–77.
Behrooz, M., Wang, X., & Gordaninejad, F., (2014). Performance of a new magnetorheological
elastomer isolation system. Smart Materials and Structures, Smart Materials and Structures,
23(4).
Bulusu, U., (2016). “Earthquake Resistant Design of Structures.” https://www.linkedin.com/pulse/
earthquake-resistant-design-structures-udaya-bhaaskar-bulusu-1 (accessed on 08 December
2021).
Firdous, P. A., & Kalurkar, L. G., (2018). “Performance of R.C. frames coupled with
exponential dampers under seismically triggered condition.” International Journal of
Research in Engineering and Technology.
Georgoussis, G., Tsompanos, A., & Makarios, T., (2015). Approximate seismic analysis of
multi-story buildings with mass and stiffness irregularities. Procedia Engineering, 125,
959–966. 10.1016/j.proeng.2015.11.147.
Comparative Analysis of Storey Drift 381
IS 1893 (Part 1), (2016). Criteria for Earthquake Resistant Design of structures – General
Provisions and Buildings (Sixth Revision).
IS 456, (2000). Indian Standard Code of Practice for Plain and Reinforced Concrete (Fourth
Revision).
Jangid, R. S. (2013). Lecture Series on Earthquake Engineering. Department of Civil Engi
neering, IIT Bombay.
Jean-Marie, R., & Nicolas, I., & Michael, B., (2010). Inelastic seismic analysis of the SPEAR
test building. European Journal of Environmental and Civil Engineering, 14, 855–867.
10.1080/19648189.2010.9693266.
Necdet, T., (2004). “Seismic isolation and energy dissipating systems in earthquake resistant
design.” In: 13th World Conference on Earthquake Engineering. Vancouver, B.C. Canada.
Patnaik, A., & Adhikari, S., (2012). Potential applications of steel fiber reinforced concrete to
improve seismic response of frame structures. NED University Journal of Research.
Sanyogita, S. B., (2019). Seismic analysis of vertical irregularities in buildings. In: Singh, H.,
Garg, P., & Kaur, I., (eds.), Proceedings of the 1st International Conference on Sustainable
Waste Management through Design. ICSWMD 2018 (Vol. 21). Lecture Notes in Civil
Engineering.
Seismic Base Isolation.” (2010). en.wikipedia.org. https://en.wikipedia.org/wiki/Seismic_
base_isolation (accessed on 08 December 2021).
Shariff, M., Owais, M., Rachana, C., Vinu, S., & AsishDubay, B., (2019). “Seismic analysis
of multistorey building with bracings using ETABS.” International Journal of Innovative
Research in Science, Engineering and Technology, 8(5).
Vrba, M., (2020). Hydraulic Shock Absorber in Vehicles and Other Applications [online].
Brno, [cit. 2021-01-29]. http://hdl.handle.net/11012/191756. Bachelor thesis. Technical
University Brno. Faculty of Mechanical Engineering. Department of Automotive and
Transportation Engineering.
CHAPTER 26
2
Director, School of Illumination Science, Engineering and Design,
E-mail: [email protected]
ABSTRACT
26.1 INTRODUCTION
• UV-B light: Photons in this range are known for sun burning, leads to
photo carcinogenesis and photo aging.
• UV-A light being comparatively longer in wave length has less detri
mental effects.
During time of survey, it was observed that most of the solid materials
like paper documents, textiles materials, etc., becomes brittle in nature
and changes its color as it ages. It is well known fact that microorgan
isms (Kowalski, 2009) may be responsible for the same. Same is also
observed in water and air medium which are affected by unwanted growth
of microorganism. So, at first identification of the types of micro-organism
are needed which are grown on subject materials. If micro-organism is
identified by experimentation, then it can be tries to remove or control for
safety purpose.
Some microorganisms were identified through microscope in laboratory
studies at Jadavpur University (Table 26.2).
As an illumination engineer it is necessary to find out ways and means
for destroying microbes like fungi, algae, bacteria, etc., with the applica
tion of light. An effort has been made by using UV radiation which is
available in artificial light sources specially mercury vapor discharge type
light sources.
In this chapter various types of lamps, i.e., incandescent lamp, Conven
tional Fluorescent Tube, CFL, and LED (both warm and cool white) and
UV-C lamps are experimented to find out the UV-C ranges in it (Table 26.3).
Experimentation has been carried out to measure the amount of UV-C
of the lamp which is mounted horizontally from top, facing downward. The
test results at various distances are as follows (Table 26.4 and Figure 26.1).
386 Advances in Data Science and Computing Technology
TABLE 26.2 Few Common Microorganism and UV Needed to Combat (Philips Catalogue,
n.d.)
Microorganism Under Discussion Dose Needed to Kill with UV (J/m2)
Mold Spores
Virus
MS-2 Coliphase 186
Rotavirus 81
Hepatitis A 73
Polio virus 58
Influenza virus 36
Bacteria
Salmonella typhimurium 80
Vibrio chlolerae 35
Staphylococcus aureus 26
The nature of decay of UV-C is same and values of “ bv” and “ bh” attained is
almost same. Values of “Av” and “Ah” are not same as the through of light is not
the same in all directions due to its linear shape. The intensity of factor “Av” and
“Ah” will vary with the type, size, shape, and intensity of radiations of the lamps.
Thus UV-C lamp employed for this experimental purpose was T5 Slim
Line of 4 W, 6,400 K, 306 microwatt/m2 output.
This experiment attempts to give a brief idea about how UV radiation
destroys or control microbes like fungi, algae, and bacteria with specific kind,
intensity, and exposure time.
388 Advances in Data Science and Computing Technology
machine is not in use to keep the interior of the work zone clean and
decontaminated.
2. Autoclave: It is a steam sterilizer machine. It is mainly use steam
under pressure to kill harmful microorganism like bacteria, viruses,
fungi, and spores. The items are heated to an appropriate sterilization
temperature for a specific amount of time.
3. Incubators: Incubator is a device which is used to grow and maintain
cell or microbiological cultures. This instrument maintains humidity,
optimal temperature, and other constraints (Figure 26.3).
26.6 OBSERVATIONS
For the above studies it has been observed that as the intensity and duration
increase effectiveness of reduction for bacteria’s colony increases for both cases:
390
1. UV Treatment Using Swab Test (Table 26.5):
TABLE 26.5 Result of Swab Test Method (Anubrata and Kamalika, 2019)
Sample Initial No. Intensity Duration Dose Final no. of Reduction Observations
of Bacterial of UV (hr.) (mJ/cm2) Bacterial (%)
Colonies lamp colonies
I.A 15 612 3 1.836 6 60.00*a Time remaining same with double intensity reduction
I.A 15 306 3 0.918 8 46.66*a is only 15%
I.A 60 612 6 3.672 17 71.66*b By increasing the Duration of time with higher
391
392 Advances in Data Science and Computing Technology
Conventional mercury vapor discharge lamps are rich source of UV. Even
newly introduced. LED lamps also content UV-C. Thus, an array of UV
lamps can be able to sanitize indoor area. The arrangement can be designed
based on the type, size, and density of virus as well as size of the place, etc.
Since UV-C is carcinogenetic for the long time exposure and it can damage
eyes restriction of human movement in the place must be maintained.
From our earlier studies it appeared that during ancient time people
in Egypt used to treat through Phototherapy by introduction of UV-A and
bio extract – Psolaran (Ammi majus). At present synthetically developed
Amotosalen (S-59) along with UV may alleviate respiratory suffocation.
Here TiO2 has been reported to act as a catalyst.
From earlier studies it has also been found that UV has been successful
upon H1N1, Ebola, etc., virus with UV irradiation of 2 mJ/cm2 of 222 nm and
4 J/m2 (0 to 30 s) of 254 nm, respectively.
Under the guidance of David Brenner, PhD, Director of the Center for
Radiological (Columbia University) believes they may have identified a
new, low-cost solution to eradicating airborne viruses in indoor public areas.
Here reports has been attached in Table 26.7.
A Proposal for Disinfection of Contaminated Subject
TABLE 26.7 Some Information from the International Study (David, n.d.; Misc, n.d.)
Disease Causative Agent Organism Symptoms Effective Infective Dose Incubation Mortality
Persistence on Person (Aerosol) Period
to Person
Anthrax Bacillus anthracis, Life of Spores Fever, cough, No
10,000– 50 000 1–6 d High if
infected animals may be more discomfort in
spores symptoms
are responsible than 40 years respiratory track,
occur.
for transmitting to etc.
humans.
Plague (i) Bubonic, Yersinia pestis Can persist in Cough and cold Yes
<100 organisms 1–10 bacteria, High, unless
(ii) Pneumonic, soil for about followed by High
more for treated
24 days. fever, Dyspepsia, etc.
aerosol immediately.
(iii) Septicemic (100–20,000)
Treatment
Ebola virus disease Filoviridae family, Stable Intense weakness, Yes
i) particles 1–21 d, 90% fatality
(i) Bundibugyo virus, genus Ebolavirus muscle pain,
of < 5–10 μm avg. 8–10d
(ii) Ebola virus, caused by plants, headache, sore throat,
ii) droplets
(iii) Sudan virus, arthropods, birds, vomiting, diarrhea,
of diameters
(iv) Taï Forest virus etc. rash, impaired kidney,
> 20 μm
and liver functions
393
394 Advances in Data Science and Computing Technology
26.9 CONCLUSION
From the above studies it can be inferred that UV can be utilized in controlled
manner to sanitize the infected areas and large scale water purification
(Adrita et al., 2020) for rural area. Further studies can also be made with
Photo therapy along with chemical aids as stated above for the diseases
where Antibiotic fails. In this case development of catalyst with the help of
upcoming Nanotechnology will be a great solution.
KEYWORDS
• COVID-19 virus
• germicidal effect
• photo biological effect
• ultraviolet
REFERENCES
Adrita, S., Antalina, S., Soumya, G., Ratan, M., & Kamalika, G., (2020). “Development
of UV aided water purification system powered by Solar energy for remote villages.”
International Conference on Sustainable Water Resources Management Under Changed
Climate. Organized by School of Water Resources Engineering, Jadavpur University,
Kolkata in Collaboration with Department of Geography, Women College Calcutta and
NIT Durgapur.
Anubrata, M., & Kamalika, G., (2019). “Studies on germicidal benefit of ultra violet ray upon
old paper documents.” Light& Engineering Journal, 24(4), 17–24. ([ISSN 0236-2945].
Scopus Indexed & SCI, Peer Reviewed & UGC Approved. (Included UGC Care List:
Group-A).
Bolton, J. R., (2010). Ultraviolet Applications Handbook (3rd edn.). (Updated) // Bolton Photo
sciences Inc.
David, B. Misc. publications of PhD, Director of the Center for Radiological Research and
Professor at Center for Radiological Research at Columbia University Irving Medical
Center. http://www.columbia.edu/~djb3/ (accessed on 11 January 2022).
Kowalski, W., (2009). Ultraviolet Germicidal Irradiation Handbook UVGI for Air and
Surface Disinfection (p. 501). Springer Heidelberg Dordrecht London New York.
Misc. publications of National Library of Medicine, US. https://collections.nlm.nih.gov/
(accessed on 11 January 2022).
A Proposal for Disinfection of Contaminated Subject 395
A applications, 220
automation, 153
Abnormal
backgrounds, 187
conditions, 198
overheating, 271
8, 9, 12, 13, 16
187–190, 194
Accounting
Ailment symptoms, 16
Achievability, 188
Alkaline chemistry, 157
Actual
Ambient temperature, 238
gradient value, 24
Ambulance, 158, 159
non-vessel pixels, 9
Amusement park, 96
raw pixels, 60
Analysis
vessel pixels, 9
brushless DC motor, 229, 234
Adaptive
expanded examination revelation
335
approaches (pay on the web), 91
Adenine, 322
solar pv array, 228, 230
Ad-hoc
calculations, 291
Administrative bodies, 48
Anchor
Affordability, 185
street, 291
Agricultural
Android
398 Index
application, 148
Authentication, 276, 283, 285
interface, 148
problem, 20
Anti
Authorized
aliasing technique, 25
user, 276, 306, 307, 316
Application oriented, 5, 19
Automated, 188
network architecture, 22
disease analysis system, 3
Arbitrary
learning algorithms, 21
combinations, 17
perception, 59
design, 364
retinal
Architecture, 63
analysis system development, 4
micro-controller, 166
accuracy, 69, 73, 74, 76, 78, 79
board, 152
range error, 69, 71, 73, 74, 77, 79
Arithmetic
B
coding, 330
Background diabetic retinopathy, 10
encoding
Bacteria, 383–385, 387, 389
algorithm, 327
Ball bearings, 377
Artifacts, 4, 62
isolation, 377
Artificial
technique, 378, 379
intelligence, 36, 44
Baseline intraocular pressure, 173
Asymmetric
Bearing fault, 204
algorithm, 285
Behavioristic, 85
cryptography, 327
Better predictive analytics, 86
encryption, 320
amalgamation, 89
Athletes, 148
companies, 84
Atrophy, 10
environment, 97
Index 399
Bio-medical images, 5
Cell state, 52
Biological
average methods, 247
molecules, 320
Centroid defuzzification, 247
Blindness, 171
Character
Blinking LEDs, 38
classification methods, 20
Blood vessels, 4
recognition, 21, 22
Bottom-hat transformation, 8
laboratory, 187, 189, 194
Broadcasting, 302
Chinese remainder theorem, 320, 321, 325,
Business
Chip payment cards, 276
analytics, 97
Chronic problem, 170
atmosphere, 351
Cipher text, 277, 281, 283–285, 305, 306,
brand value, 84
308, 316, 324, 328
communications, 276
Class investigation center point, 86
development, 87
Classification
endeavors, 91
accuracy, 19
environment, 96, 97
efficiency measurement, 10
fundamental concern, 91
evaluation, 5
opportunities, 97
quality assessment (CQA), 8
performance, 97, 351
Classy fuzzy logic MPPT controller, 237
plan, 165
Client, 83–87, 92, 93, 109, 110, 119, 120,
transactions, 95
131, 278, 283, 358
Buttery maculopathy, 10
dedication, 84
Bygone models, 60
Climatic parameters, 188
Cake pops, 86
architecture, 134
Carcinogenetic, 392
cloud system, 121, 132
Cardio-vascular diseases, 4
load balancing, 121, 132
400 Index
technology, 121
characteristics, 321
Clustering, 4, 37
complexity, 22, 29, 31
Coal industry, 70
software, 204
Coefficients of,
methods, 41
correlation, 199
techniques, 37
wavelet, 200
Computerization, 188
Color histogram, 60
Confidential, 276, 277, 328, 330
Column
Confusion matrix, 62, 64
Communication
Consecutive nodes, 23
experience, 98
Consumer
loyalty, 84
process, 284
science, 276
Contemporary literatures, 3
Communities, 100
Content analysis, 97
Compact gadgets, 84
Competent
enhancement, 6, 8, 73
network, 19
limited adaptive histogram equalization
Complex
pitch accurator system (CSA), 257
variants, 60
Convenience of research, 353
vision problems, 60
Conventional
Complimentary
DC motors, 220
delivery, 86
energy
transportation, 87
crisis, 237
Comprehensive
resources, 237
Compression
motors, 220
algorithms, 277
neural network, 61
permutation, 280
Converter, 219, 221–229, 231–235, 238,
spring, 182
239, 243, 244, 249, 250
technique, 327
duty cycle, 239
Index 401
Convolution
Cyber-crime, 306
layers, 11, 61
Cytosine, 322
Dashboard camera, 36
Cornea, 175
Data
Correlation
accessibility, 99
acquisition
technique, 202
task, 205
augmentation, 12, 63
Country-wide prediction, 49
bank, 84
breaches, 105
centers, 120
394
innovation, 92
Cross-entropy, 61
management, 99
loss function, 11
preprocessing, 52
Cryptanalysis, 308
reception, 70, 72
sets, 50, 60
algorithms, 282
hashing, 309
Current
boost converter, 238, 239, 243, 244,
input, 51, 52
246, 248–250
ripple, 225
converters, 220, 239, 243
Customary datasets, 85
type electrical energy, 238
feedback, 102
Decentralized, 302
requirements, 99
Decision making, 38, 93, 349, 351, 360
tendencies, 90
Decryption, 275, 277, 279, 281, 282, 284,
value proposition, 98
305–308, 310, 316, 320, 322, 323, 325,
wellbeing, 98
327–329
Customized recommendations, 87
process, 323, 325, 328
402 Index
Deep
key, 284, 286
architecture, 5, 19, 22
exchange algorithm, 275, 281, 286
classification
exchange protocol, 278
evaluation metrics, 5
Merkle algorithm, 278
experiments, 5
Digit
metric evaluation, 13
recognition, 19–22, 31, 32
process, 19
system, 21
ConvNet, 62
Digital
44, 59–62, 66
image processing, 6
application, 20
India, 56
architecture, 5, 22
object recognition, 59
environment, 20
people, 101
methods, 21
result verification, 17
technology, 99
techniques, 21
Digitization, 20, 99
architecture, 11, 19
system, 99
implementation requirements, 12
Dilating drops, 170
training, 12
Diode (D), 244, 246, 247, 253, 258, 285,
structural benefits, 61
286, 289, 292, 299, 323, 363, 370, 371,
Degree of,
333, 334, 344
accuracy, 49
CDMA
acidity, 189
communication system, 334
219, 291
Discrete
channel, 101
logarithmic
Denoising, 203
wavelet transform (DWT), 197, 199–201,
performances, 199
215
Disintegration, 36
327–330, 384
Diabetes, 3
Distributed
retinopathy, 10
channel activities, 99
Diffie-Hellman
nature, 290
Index 403
Documents study, 97
Efficiency, 4, 5, 16, 19, 20, 24, 36, 38, 41,
Drinking, 39
Electric
Driver attention
devices, 271
monitor, 41
fault, 199
tracking, 38
grid network, 256
Dropbox, 110
science, 276
hyperparameter, 25
vehicles (EVs), 239, 250
schedule, 172
spectrum, 384
Dynamic
Electronic
performances, 234
commerce, 84, 276
method, 228
E components, 155
E-commerce, 93
Elliptic curve, 285
business, 83
discrete logarithm problem, 286
organizations, 85
E-mail, 148
sites, 83
Emergency
websites, 89
alert systems, 165
Economic
responders, 149
condition, 101
Empirical
indicators, 101
research, 97
operation, 253
studies, 85
Edge
Encoded encrypted image, 309
detection, 37, 60
Encrypted, 275, 277–282, 284–286,
segmentation, 37
325, 327, 328
tively, 5
message, 310
404 Index
purpose, 323
dropper, 169, 170, 173, 176, 178, 180
Energy
lids, 175
consumption, 122
piece arrangements, 176
dissipating, 378
False
Enterprises, 103
Environmental parameters, 70
Epicenter, 364
Fault
Error
diagnosis, 199
backpropagation algorithm, 61
prediction, 198
matrix, 76
percentage, 56
prone, 20
IQA metrics, 8
lifetime, 190
Execution measurements, 83
Feature extraction, 203
Expansion
confinement, 379
boards, 152
reinforced concrete, 379
permutation, 280
Final
Experimental
cipher text, 327
phase, 59
permutation, 281
Explorative study, 86
statements, 349, 350
Exponential
Fire
dampers, 378
breakout, 163
growth, 104
brigade, 158, 163
External
fighters, 160, 161, 163
attacks, 292
Firmness abnormality, 367
Eye
Flora micro-controller, 165
drop
Foreseeing conduct, 83
installation, 171
Fossils energy, 253
Index 405
Fovea, 4, 10
system for mobile communications
Frequency
(GSM), 148, 149, 153, 154, 164, 166,
bandwidth, 198
190
information, 198
warming, 238
Fuzzy
online colab cloud environment, 12, 27
control, 245
tracks customized ads, 87
MPPT, 245
Government agencies, 44, 105
de-fuzzification, 247
descent, 24
fuzzification, 245
exploding problem, 50
image, 40
Gaming, 112
Greenhouse
Gamma
farming, 188
correction, 4, 6, 12
gas emission, 238
Gaussian-filtering, 37
frequency, 254
Geographical
reliability, 254
statistics, 363
Guanine, 322
Germicidal
agent, 384
H
effect, 384, 394
Hadoop, 97
operation, 388
Hall
Giant companies, 96
effect signal position sensors, 222
Gigantic data, 89
sensor signal values, 228
sufferers, 171
tremors, 172
Global
written character, 20
casualty, 48
gadgets, 84
pandemic, 47, 48
digits, 25, 26
164, 166
text recognition tool, 20
406 Index
breadboard, 155
error, 35, 36
153
to-computer interaction, 147
switches, 156
visual perception based metric, 16
Harmonic, 257
Hungarian method, 112, 113, 115, 116, 136,
changes, 257
139
Hashing, 309
Hydraulic shock absorbers, 378
Healthcare, 105
batch size evaluation, 29
Hemorrhages, 4
learning rate evaluation, 27
Heterogeneity, 134
optimization algorithm evaluation, 27
Heterogeneous
parameter, 20–23, 31
nodes, 79
tuning, 23
sensor systems, 37
serious economy, 92
Hidden
state, 51, 52
ICMP messages, 293, 296, 298
High
Ideal customer profile (ICP), 84
286
acquisition, 306
end architecture, 20
classification, 39, 44, 59–61
quality analysis, 60
enhancement, 3–5, 8–10, 12, 16
Historical
contrast limited adaptive histogram
data, 100
enhancement, 6
information, 50
morphological operation enhancement,
Hop information, 71
net data set, 39, 59
Horticulture, 188
systems, 25, 306
Index 407
techniques, 40
Innovative eye drop, 172
quality
Input
selection, 309
layer, 23, 24, 27, 69, 74
recognition, 60
Installation procedure, 174, 176
segmentation methods, 37
Instillation attempts, 173
technique, 305
Instantaneous power, 228, 246
transformation, 4, 6
Institutional review board (IRB), 183
Implementation requirements, 5, 27
Insulation breakdown, 271
Improvisation, 185
Integrated infrastructure, 36
Incentives, 98
Intelligence
Incubators, 389
gathering, 277
Independent-installation, 185
transport systems, 291
In-depth understanding, 52
video processing, 60
Individual
387, 389, 392
class probability, 23
Interceptors, 285
parameter, 22
Intermediate computations, 23
Induction
Internal
generator, 257
attacks, 292
machine, 215
communication, 359
stator, 198
threaded passageway, 173
Industrialization, 220
business firms, 83
Influenzas, 50
Inventory, 95, 99, 103
Information
Inverse discrete wavelet transform (IDWT),
biological system, 86
201
dashboards, 102
Inverter, 204, 220, 222, 262
development, 83
Investment decisions, 350
driven
Iron-oxide, 189
advertising, 92
Irradiation, 219, 228–231, 234, 235, 238,
markets, 92
239, 241, 242, 245, 248, 249, 392
Itchiness-relieving, 170
photodiode, 178
radiations, 178
receivers, 178
J
transmitter, 178
Jamming condition, 333, 334
408 Index
K model implementation, 63
proposed work, 62
Kelvin, 241
training fine-tuning, 63
Kernel functions, 61
Lithium-ion, 157
algorithm, 278
Load
K-means clustering, 37
Knapsack
140
balancers, 123
Large
Localization, 61, 70, 71
Latency, 37, 40
tracker, 145, 146, 158, 162–165
Leaning rate, 23
Log-loss curves, 30
Learning
Long short
evaluation, 28
Long stretch accomplishment, 91
value, 24
Loss function, 24
algorithm, 309
Low narrowband jamming, 334
Legitimate prerequisites, 92
Low voltage ride through (LVRT), 254, 262
387
Luminance pixels, 4
Linguistic
fault analysis, 199
inputs, 245
61, 100–102
mélange, 350
algorithms, 102
dataset description, 62
Magnitude variations, 202
Index 409
isolation, 299
professionals, 4
Mammogram images, 5
Message
Mammoth, 49
authentication, 278
Man-in
communication, 285
Manufacturing performance, 89
evaluation, 9
Market
selection of optimal mother wavelet, 203
identification, 101
wavelet analysis, 200
penetration, 102
Methodology, 50, 157, 175, 293, 352, 384
Marketing
Metric
decisions, 85
of authentication, 292
departments, 101
values, 5, 15, 16, 29
MasterCard, 87
Metropolitan city, 149, 150
Mathematical
Micro aneurysms, 4
algorithms, 277
Microbes, 385, 387
design, 220
Microbiological cultures, 389
manipulation, 201
Microcontroller, 146, 152, 153, 190
tools, 200
Microprocessor, 146
344, 386
Military communications, 276
Matplotlib, 52
Min time, 135
Maximum
Mines environment, 70
average sensitivity, 16
Mini-batch gradient descent, 24
row-sum, 136–138
Mining, 44, 70
Mean
Min-min (MM), 112, 116, 123, 126, 127,
integrated systems, 99
134, 135, 139
Mechanical
technique, 112, 123
detection, 215
Misaligned rotor, 204
410 Index
Model
path routing technique, 293
accuracy rate, 62
Multiprocessing techniques, 38
design, 63
Multistoried
learning phase, 24
building, 160
Modern
cryptology, 276
N
retail business, 103
Naïve-Bayes, 21
database, 25
environment, 334
Momentum, 24
big (NB), 246, 247
Monolithic prediction, 49
small (NS), 246, 247
Morphological
Neighborhood
enhanced, 5, 16
climate deviations, 86
abnormal images, 15
nodes, 293
image, 16
Network
techniques, 5
architecture, 20, 27, 31, 63
test images, 16
communication, 299
operation, 3, 4, 7, 16, 73
execution resources, 12, 27
operators, 4, 12
failures, 164
Morphology, 13, 17
hyper parameter, 23
206–212, 215
learning, 22
selection, 215
performance, 20, 23, 29, 32
torque, 234
throughput, 299
Multi-language, 360
layers, 23
facility, 351
parameters, 20
software, 352
Neurons, 22, 23, 25, 31, 62
Multilayer
New revenue streams, 96
nonlinear transformation, 61
Nickel
perceptron, 21
cadmium, 157
Multilingual
Nitrogen, 189, 191, 194
computing, 351
Node, 23, 27, 70, 71, 73–76, 78, 111,
facility, 351
112, 120, 122, 123, 132, 133, 139, 140,
Multiple
transmission range, 290
heterogeneous sensors, 37
Noise, 4, 37, 40, 220, 334, 335, 337
Index 411
182–185
Online
design, 183
business frameworks, 91
Non-horizontal line, 21
storage, 112, 123
Non-orthogonal, 199
Operating
Non-popularity, 172
model, 98
Non-repudiation, 276
temperature, 241
characteristics, 323
units, 105
Normal
Oppressive loaded system, 112
Normalization
Optimal
algorithm, 25
energy, 254
Noteworthy speed, 83
parameter settings, 102
Numerical
Optimization, 11, 19, 20, 22, 24, 27–32, 60,
analysis, 353
254, 334
hyper parameter, 20
O values, 31
Object
Optimizer, 24, 28
classification, 60
Optimum
detection, 44
mother wavelet, 204, 205
Ocular
Organic
disturbance, 170
matter, 189
Onboard
challenges, 97
computer, 36
Orthogonal wavelet, 199, 200
processing environment, 38
decomposition, 199
412 Index
Oscillations, 227
diodes, 178
Output
transistors, 178
gate, 50, 52
Physical
level, 178
machine, 110
systems, 110
P workstations, 120
Pigment epithelium, 10
Pitch
Parameter
speed, 257
optimization, 19, 22
Pixel, 9, 10, 25–27, 61, 62, 310
search space, 22
intensity levels, 6
Pathological
Plateau region, 24
artifacts, 4
Police, 158, 159, 162, 163
symptoms, 15
Pooling of sources, 110
Payment
Population density, 48, 49, 53
flexibility, 98
Portfolio management, 349, 350
patterns, 102
Position routing mechanism, 291
16
small (PS), 246, 247
indices, 237
Potential customers, 100–102
management, 97
Pothole, 36
index, 16
data function, 37
Permutations, 285
detector, 38, 41, 43
guidance, 132
tracking system, 37
Petabytes, 86
Power
Photo
grid network, 255
aging, 385
output, 234
Index 413
Precautionary measures, 52
driver attention monitor, 39
Predicting, 47, 49, 50, 52, 53, 55, 56, 61, 69,
pothole detector, 40
trends, 100
working steps (proposed work), 293
Preliminaries, 321
Protocols, 110, 183, 277, 278, 290, 291
stage, 3
cryptography, 278, 309, 323, 325, 327
sequence, 322
utility accounting, 351
Pre-operative, 170
Pre-process, 37, 38
Purine
image datasets, 10
adenine, 322
input function, 63
guanine, 322
Pre-trained ResNet18, 62
P-V characteristics, 241, 242
Price
PV module, 238–243, 249
comparisons, 99
Pyrimidine
fluctuation, 101
cytosine, 322
optimization, 101
thymine, 322
services, 103
Python programming, 52
strategies, 101
of occurrence, 6
evaluation, 8
Process analysis, 97
Quantitative assessment, 173
Procurement methods, 103
Quantum computing, 105
Product performance, 102
technologies, 20
forest, 21
Proposed
overlapping patches, 12
algorithm, 136
Range
model, 74
algorithms, 71
414 Index
localization algorithms, 71
GPS-SMS child tracking system (smart
positioning methods, 71
phone), 147
Raspberry pi, 62
system, 148
platform, 62
pedestrian tracking (shoe-mounted iner
Rate of transmission, 47, 53, 56
tial sensors), 149
Reaching behind, 39
smart IoT device (child safety-tracking),
Reactive
146
Real
temperature regulating timepieces, 149
life dataset, 4
Renewable
time
energy
monitoring, 35
resources, 238
world
sources, 219, 220, 238, 254
applications, 61
power, 255
situations, 184
Rescue operation, 159, 160
Reasonable price, 98
Residual eye drops, 173
ResNet-110, 63
Receiver
ResNet-18, 62–65, 67
ResNet-50, 62–67
model, 62
Resource
Reconstructed
allocations, 120
image, 10, 62
parity, 292
synthesis, 201
Respiratory suffocation, 392
waveform, 207–212
Respondents personal information, 353
74, 76
Results discussion, 40, 52, 183, 294, 337
Regional
sector, 96, 98, 103
transliteration, 360
artifacts, 7, 73
Regularity, 203
images, 3–5, 16
Index 415
structures, 12
Scratched training, 61
Revolutionary contribution, 98
wise trends, 100
accidents, 35, 36
292, 305–309, 316, 319–321, 323, 330,
camera, 36
334
surface, 36
protection, 292
Roadside
stricken laws, 92
infrastructure, 293
Segmentation, 3–5, 9, 16, 21, 37, 38, 60,
Robotics, 44
accuracy, 16
Role of,
Seismic
data, 99
load, 364–366, 376, 377, 379, 380
Rotor
waves, 364
position, 228
zone, 365, 379
unbalance, 210
Seismicity, 364, 380
Route
Self-configuration, 289, 302
Routers, 290
beginner category, 121
Row-sum, 112
initiated, 121, 133
S analysis, 102
Safe driving, 39
Sensor node, 69–78, 295
Sanitization, 383
buck boost converter, 219, 234
S-box, 281
Series-parallel resistances, 239
substitution, 280
Service provides on-demand, 110
(SISED), 389
Shunt resistance, 241
416 Index
Sigmoid
Special
function, 51, 52
database 1, 25
output, 52
database 3, 25
Signal
Speed
compression, 197
control, 254
noising, 197
Spores, 389
Single
SPV array output power, 234
Sinusoidal
Stakeholders, 349, 350, 359
excitations, 364
Standard
Skewness, 21
test conditions (STC), 238, 241–243
Small
farm dataset, 39
camera, 38
260, 262, 264–271
Social
load balancing algorithms, 111
distancing, 48
system algorithm, 121
media, 100
Stationary signal analysis, 198
websites, 101
Statistical
Socio-economic, 85, 92
analysis, 56, 97, 202
benefits, 105
error
problems, 238
IQA metric, 8
Sodium hypo-chloride, 383
metrics, 8, 16
Soil surface, 36
parameters, 202
energy, 238
Stego image, 307, 316
irradiation
Sterilization
availability, 219
indoor areas, 384
levels, 234
temperature, 389
panel, 220
Stochastic
Sound
Storage, 20, 109, 110, 131, 132, 220, 320
component, 185
Store extension, 88
Space studies, 44
displacement, 367, 369–375, 379
Sparse interpretation, 61
drift, 367, 370–372, 374, 375, 379
Index 417
376–380
useful definitions, 71
Strategic
stability, 255
decision-making, 105
topology, 290
planning, 100
analysis, 61
Structural
Systemic illness, 176
integrity, 10
T
Substantial growth, 254
Tablet, 84
Switches, 156
Target
vanets, 292
Technique comparison, 299, 300
algorithms, 285
penetration, 104
encryption, 307
Telecommunications, 96
key
company, 96
encryption, 320
Tenterhooks, 161
Symmetry, 203
Terabytes, 86
System
Test
communications, 132
accuracy, 14, 16, 22, 26, 27
congruence, 321
input matrix, 75, 76
sensor node, 76
Texting, 39
(convertor), 225
Theoretical background, 22
PV panel, 222
optimizer, 24
73
Thermal voltage, 241
418 Index
Three-layered architecture, 97
True
Thymine, 322
Tunable isolator, 377
Time
Turbine generator, 267
complexity, 22, 32
set, 265
consuming, 5, 20, 24
Turbulence, 257
process, 187
Twitter notification, 148
frame, 98
therapy, 170
Unauthorized
Tracking
access, 276, 319
devices, 149
user, 276, 307, 309
problem, 151
Unbalanced
Traditional
cost matrix, 112
cryptosystems, 321
rotor, 204
instillation, 173
Uncommitted component analysis, 334
retail business, 99
Unencrypted data, 277
model, 102
U-net
working, 257
type connections, 10
Traffic
Uneven illumination, 4
counting, 60
Union territories, 49
rules, 36
Unpredictable workloads, 120
scenario, 60
Unreadable format, 307
Trafficked, 151
Upsampling, 201
details, 5
Used cases, 160
Transducer, 180
child safety, 162
Transmission
women safety, 162
Trend
62, 64–66, 97
identification, 100
phase, 26
Index 419
set, 26
ripple, 226
Value information, 86
sag, 257
Variable
switching inverters (VSI), 219–222,
Vascular abnormalities, 10
W
Vehicle
Walmart, 86–88, 93
automation, 291
stores, 86
communication, 291
Wastage of,
medicine, 172
Versatile
Water pumping
infrastructure, 289
Vessel
classification, 4, 5, 9, 14, 16
identification, 10
probability map, 5
Video
transform, 197, 199, 200, 204, 205
frame, 306
Wearable
processing, 38
device, 151, 157
spilling applications, 92
tracker, 146
steganography, 308
Weather, 36, 161, 164
Virtual
Web
Virtualization
field, 85
concept, 121
life information, 86
techniques, 132
showcasing systems, 83
Visual
Weighting distribution (WD), 6, 7
clues, 38
Wind
information
assimilation, 253
IQA metric, 8
technology, 254
metrics, 8
generation, 253, 255
gain, 221
power in India, 255
420 Index
shear, 257
Wormhole attack, 290
Wireless
X
connection, 148
XOR operation, 322, 323
links, 70
consolidation, 120
Zero padding, 201
utilization, 120
Zigzag cipher, 324