Modeling and Simulation of LSPMSM for Estimation of Thermal Effect during Different Load Condition
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.1-8, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.18
Abstract
In this work a methodology to estimate the effect of elevated temperature on a Line Start Permanent Magnet Synchronous Motor (LSPMSM) has been proposed. A simulated model of LSPMSM has been developed for Finite Element Analysis (FEA). The losses obtained from FEA were fed to a Lumped Parameter Thermal Network (LPTN) developed for LSPMSM in the LTSpice environment. The extent of demagnetisation was estimated and the FEA was conducted to identify the change in motor performance. The thermal modeling of the motor has been developed to evaluate the increase in temperature at different parts of LSPMSM under three different load conditions and even after switching off the motor. The results so obtained were validated on a physical setup. The results were analysed to ascertain the performance of the permanent magnets in LSPMSM.
Key-Words / Index Term
Electromagnetic Analysis, LSPMSM, Lumped Parameter Thermal Network, Thermal Analysis, Demagnetisation
References
[1] J. G. Hayes, and G.A. Goodarzi, “Electric Power Train: Energy Systems, Power Electronics and Drives for Hybrid, Electric and Fuel Cell Vehicles”, First Edition, John Wiley & Sons Limited, 2018
[2] S. Rochi, “The Mars Mission – Technology for another world,” Maxon Motors Application Stories, 2018
[3] A.A. Adly& A. Huzayyin, “The Impact of Demagnetization on the Feasibility of Permanent Magnet Synchronous Motors in Industry Applications”, Journal of Advanced Research17, pp103-108, 2019
[4] S. K. Chowdhury and P. K. Baski, "A simple lumped parameter thermal model for electrical machine of TEFC design," Joint International Conference on Power Electronics, Drives and Energy Systems & 2010 Power India, New Delhi, India, pp.1-7, 2010.
[5] Xu, Y, Xu, Z, Meng, Y, & Wang, Y. “Fluid-thermal characteristics of high-voltage line-start permanent magnet synchronous motor based on bidirectional hydraulic-thermal network coupling” Engineering Science and Technology, an International Journal, 41, Article 101386.pp.1-12,2023
[6] Q. Chen, Z. Zou and B. Cao, "Lumped-parameter thermal network model and experimental research of interior pmsm for electric vehicle," in CES Transactions on Electrical Machines and Systems, vol. 1, no. 4, pp. 367-374, 2017.
[7] K. Bersch, S. Nuzzo, P.H. Connor, C.N. Eastwick, M. Galea, R. Rolston and G. Vakil "Combined Thermo fluid and Electromagnetic Optimization of Stator Vent Cooling," XIII International Conference on Electrical Machines (ICEM),
[8] A. Tikadar, N. Kumar, Y. Joshi and S. Kumar, "Coupled Electro-Thermal Analysis of Permanent Magnet Synchronous Motor for Electric Vehicles,"19th IEEE Intersociety Conference on Thermal and Thermo mechanical Phenomena in Electronic Systems (ITherm), Orlando, FL, USA, 2020
[9] A. Tikadar, J. W. Kim, Y. Joshi and S. Kumar, "Flow-Assisted Evaporative Cooling for Electric Motor," IEEE Transactions on Transportation Electrification, vol. 8, no. 1, pp. 1128-1143, March 2022
[10] A. L. Rodríguez, P. Lombard, V. Leconte, P. Wendling and I. Villar, "Thermal modelling of a Permanent Magnet Synchronous Machine through FEM simulation with experimental validation," 2020 IEEE
[11] M. Cheng, S. Ding, W. Li, P. Zhang, Q. Wang and M. Duan, "Cooling System Design and Thermal analysis of a PMSM for Rail Transit," 2020 15th IEEE Conference on Industrial Electronics and Applications (ICIEA), Kristiansand, Norway, 2020, pp. 1912-1915
[12] Q. Chen, Z. Zou and B. Cao, "Lumped-parameter thermal network model and experimental research of interior pmsm for electric vehicle," in CES Transactions on Electrical Machines and Systems, Vol.1, no.4, pp. 367-374, 2017.
[13] Liang, Dawei& Zhu, Z.Q. & Zhang, Yafeng & Feng, Jianghua & Guo, Shuying& Li, Yifeng & Wu, Jiangquan& Zhao, Anfeng “A Hybrid Lumped-Parameter and 2-D Analytical Thermal Model for Electrical Machines” IEEE Transactions on Industry Applications. pp. 1-1.
[14] S. Mukundan, H. Dhulipati, J. Tjong and N. C. Kar, "Parameter Determination of PMSM using Coupled Electromagnetic and Thermal Model Incorporating Current Harmonics," 2018 IEEE International Magnetics Conference (INTERMAG), Singapore, 2018, pp. 1-1.
[15] C. Liu, J. Zou, Y. Xu and G. Yu, "An Efficient Thermal Computation Model of PMSM Based on FEA Results and Interpolation," in IEEE Transactions on Applied Superconductivity, vol. 31, no. 8, pp. 1-4, Nov. 2021.
[16] Y. Ryu, S. W. Hwang, J. W. Chin, Y. S. Hwang, S. W. Yoon and M. -S. Lim, "Mathematical Modeling of Fast and Accurate Coupled Electromagnetic-Thermal Analysis," in IEEE Transactions on Industry Applications, vol. 57, no. 5, pp. 4636-4645, Sept.-Oct. 2021.
[17] D. Liang et al., "Estimation of Two- and Three-Dimensional Spatial Magnet Temperature Distributions for Interior PMSMs Based on Hybrid Analytical and Lumped-Parameter Thermal Model," IEEE Transactions on Energy Conversion, vol. 37, no. 3, pp. 2175-2189, Sept. 2022.
[18] C. Debruyne, M. Polikarpova, S. Derammelaere, P. Sergeant, J Pyrhönen, J.J.M. Desmet, L. Vandevelde, “Evaluation of the Efficiency of Line-Start Permanent-Magnet Machines as a Function of the Operating Temperature”, IEEE Transactions on Industrial Electronics, Vol. 61, No. 8, pp. 4443-4454, 2014.
[19] P. Bhattacharya, A. Roy, “Condition Monitoring System of a Three Phase Induction Motor Against Thermal Overloading” International Journal of Computer Sciences and Engineering, Vol.07, Special Issue.18, pp.305-308, 2019.
[20] Anurag Singh Tomer and S.P.Dubey , "Response Based Tunning of Proportional and Integral Constants in PI Controlled Six Phase PMSM Drive", International Journal of Computer Sciences and Engineering, Vol.3, Issue.12, pp.23-28, 2015.
[21] M. F. Palangar, A. Mahmoudi, S. Kahourzade and W. L. Soong, "Electromagnetic and Thermal Analysis of a Line-Start Permanent-Magnet Synchronous Motor," 2020 IEEE Energy Conversion Congress and Exposition (ECCE), Detroit, MI, USA, pp.502-508, 2020.
[22] F. J. T. E. Ferreira, B. Leprettre, A. Q. Duarte and A. T. De Almeida, "Comparison of protection requirements in IE2-, IE3-, and IE4-class motors," IEEE International Electric Machines & Drives Conference (IEMDC), Coeur d`Alene, ID, USA, pp.1874-1880, 2015.
[23] Putek, P., Pulch, R., Bartel, A. et al. Shape and topology optimization of a permanent-magnet machine under uncertainties. J.Math.Industry 6, 11, 2016.
[24] M. J. Bala, N. K. Deb and S. K. Chowdhury, "Improvement of the performances of line start permanent magnet synchronous motor with flux barrier in the rotor," 2017 IEEE Calcutta Conference (CALCON), pp. 357-361, 2017.
[25] J.F. Gieras, “Permanent Magnet Motor Technology: Design and applications”, Third Edition, CRC Press, Taylor & Francis Group, 2010,ISBN 978-1-4200-6440-7.
[26] L. Urši? & M. Nemec,“Permanent Magnet Synchronous Machine Demagnetization Prevention and Torque Estimation Control Considering Rotor Temperature” IET Power Electronics, 2019, 12.10.1049/iet-pel.2018.6162.
[27] F. Qi, M. Schenk, R. W. De Doncker, “Discussing details of lumped parameter thermal modelling in electrical machines,’’ 7th IET International Conference on Power Electronics, Machines and Drives(PEMD 2014), Manchester, UK, pp.1-6, 2014.
[28] A. Ka?enka, A. -C. Pop, I. Vintiloiu and D. Fodorean, "Lumped Parameter Thermal Modeling of Permanent Magnet Synchronous Motor," 2019 Electric Vehicles International Conference (EV), Bucharest, Romania, pp.1-6, 2019.
[29] David A. Staton and Andrea Cavagnino “Convection Heat Transfer and Flow Calculations Suitable for Electric Machines Thermal Models” IEEE transactions on Industrial Electronics, Vol.55, no. 10, 2008.
[30] Ogbonnaya I. Okoro, ‘‘Steady and Transient States Thermal Analysis of a 7.5-kW Squirrel-Cage Induction Machine at Rated-Load Operation’’, IEEE Transactions on Energy Conversion, vol. 20, no. 4, December 2005, pp.730, 2005.
[31] P. R .Mellor, D. .Roberts and D. R. Turner, “Lumped parameter thermal model for electrical machines of TEFC design”, IEE Proc.B, vol.138, no.5, September, pp. 205, 1991.
[32] M. J. Bala, C. Jana, S. K. Chowdhury and N. K. Deb, "Performance analysis of different rotor configuration of LSPMSM for Electric Vehicles," 2022 IEEE Calcutta Conference (CALCON), Kolkata, India, pp. 223-227, 2022.
Citation
Mousumi Jana Bala, Chandan Jana, Suparna Kar Chowdhury, Arindam Kumar Sil, "Modeling and Simulation of LSPMSM for Estimation of Thermal Effect during Different Load Condition," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.1-8, 2023.
A Quadcopter at Your Service-108 with Secure Delivery of Medicine
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.9-15, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.915
Abstract
Revolutionizing supply chain dynamics, medicine-carrying drones facilitate a stable vertical flight for seamless supply transfers to remote areas. Empowered by Ardupilot, an open-source Unmanned Vehicle Autopilot software suite, these drones showcase advanced flight control capabilities. GPS ensures precise navigation, while Mission Planner, intricately connected with MAVLink, optimizes quadcopter operations. The RFID-Arduino Nano interface secures the container housing medical resources. Post-compilation, the code dynamically runs, extracting RFID card serial numbers for heightened security. Exclusive access is granted solely to cards with designated UIDs, fortifying overall mission security and reliability. This abstract encapsulates a technological nexus, converging advanced flight systems and robust security measures, propelling medicine delivery to new frontiers with efficiency and precision.
Key-Words / Index Term
Unmanned aerial vehicle, ArduPilot, MAV, Mission Planner, RFID, UID, GPS.
References
[1] Andrew S. Hardy and Mohammed T. Rajeh "Design of the Life-ring Drone Delivery System for Rip Current Rescue” Systems and Information Engineering Design Symposium (SIEDS) Conference, 2016.
[2] Xiaoli Wang and Aakanksha Chowdhery "Networked Drone Cameras for Sports Streaming," IEEE International Conference, 2017.
[3] Brad Hyeong-Yun Lee and James R. Morrison "Multi-UAV Control Testbed for Persistent UAV Presence: ROS GPS Waypoint Tracking Package and Centralized Task Allocation Capability," 2017. International Conference on Unmanned Aircraft Systems (ICUAS)
[4] M. S. Minu and R. Aroul Canessane “Secure image transmission scheme in unmanned aerial vehicles using multiple share creation with optimal elliptic curve cryptography” Indian Journal of Computer Science and Engineering (IJCSE), Vol.12, 2021.
[5] Rajagopal A, Nirmala. V “Autonomous Self-evolution of AI on drones: Transfer Learning of Neural Architecture Search’s brain” Vol.7, Issues.6, 2019.
[6] Revathi K, Tamilselvi T “A Smart Drone for Ensuring Precision Agriculture with Artificial Neural Network” Vol.13, 2022.
[7] U.S. Department of Transportation, “Traffic Detector Handbook”. Hostettler R, Birk W., Nordenvaad L. M. Third Edition –Vol.1, chapter 2, pp.1–5. 22, 2006.
[8] Alexander Kleiner “Evaluation of Reactive Obstacle Avoidance Algorithms for a Quadcopter” 14th International Conference on Control, Automation, Robotics & Vision Phuket, Thailand, 13-15th November 2016, ICARCV, 2016.
[9] Martin L. Hazelton, “Estimating Vehicle Speed from Trac Count and Occupancy Data”, Journal of Data Science 2, pp.231-244, 2004.
[10] International Telecommunications Union, "Characteristics of Unmanned Aircraft Systems and Spectrum Requirements to Support their Safe Operation in Non-Segregated Airspace," ITU-R M.2171, December 2009.
[11] US Dept. of Transportation, "Unmanned Aircraft System (UAS) Service Demand 2015-2035: Literature Review and Projections of Future Usage," Technical Report, v.1.0, DOT-VNTSC-DOD-13-01, February 2014.
[12] Hideaki Okazaki, Kaito Isogai “Modelling and Simulation of Motion of a Quadcopter in a Light Wind” IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS), Abu Dhabi, UAE, October, pp.16-19, 2016.
Citation
Gokula G., Minavathi, "A Quadcopter at Your Service-108 with Secure Delivery of Medicine," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.9-15, 2023.
Broadening the Scope: Exploring Best Machine Learning Algorithms for Customer Churn Prediction
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.16-20, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.1620
Abstract
As businesses strive to maintain a competitive edge in today`s dynamic market, understanding and mitigating customer churn has become a critical imperative. This study explores the application of machine learning algorithms in Python for predicting customer churn, providing valuable insights to empower businesses in customer retention strategies. Leveraging a comprehensive dataset encompassing customer behavior, transaction history, and demographic information. Our methodology incorporates a diverse set of machine learning techniques, encompassing K-Nearest Neighbors (KNN), Support Vector Classifier (SVC), Random Forest, Logistic Regression, Decision Tree Classifier, AdaBoost Classifier, Gradient Boosting Classifier, and Voting Classifier. The outcomes reveal that the machine learning models demonstrate auspicious predictive capabilities, presenting businesses with a proactive means of identifying and mitigating potential churn risks. The discoveries from this investigation contribute valuable insights to the expanding realm of knowledge in customer relationship management, offering actionable guidance for businesses seeking to enhance customer retention strategies through the implementation of machine learning techniques in Python.
Key-Words / Index Term
Machine Learning Algorithm, Analysis, Best Algorithms, Customer Churn Prediction.
References
[1] Coussement, Kristof, and Dirk Van den Poel. "Churn prediction in subscription services: An application of support vector machines while comparing two parameter-selection techniques." Expert systems with applications 34.1: pp.313-327, 2008.
[2] Nigam, Bhawna, Himanshu Dugar, and M. Niranjanamurthy. "Effectual predicting telecom customer churn using deep neural network." Int J Eng Adv Technol (IJEAT) 8.5, 2019.
[3] Asthana, Praveen. "A comparison of machine learning techniques for customer churn prediction." International Journal of Pure and Applied Mathematics 119.10: pp.1149-1169, 2018.
[4] Ahmad, Abdelrahim Kasem, Assef Jafar, and Kadan Aljoumaa. "Customer churn prediction in telecom using machine learning in big data platform." Journal of Big Data 6.1: pp.1-24, 2019.
[5] Aziz, Rabia, C. K. Verma, and Namita Srivastava. "Artificial neural network classification of high dimensional data with novel optimization approach of dimension reduction." Annals of Data Science 5: pp.615-635, 2018.
[6] Adwan, Omar, et al. "Predicting customer churn in telecom industry using multilayer preceptron neural networks: Modeling and analysis." Life Science Journal 11.3: pp.75-81, 2014.
[7] Brându?oiu, Ionu?, Gavril Toderean, and Horia Beleiu. "Methods for churn prediction in the pre-paid mobile telecommunications industry." 2016 International conference on communications (COMM). IEEE, 2016.
[8] Amuda, Kamorudeen A., and Adesesan B. Adeyemo. "Customers churn prediction in financial institution using artificial neural network." arXiv preprint arXiv:1912.11346, 2019.
[9] Saran Kumar, A., and D. Chandrakala. "A survey on customer churn prediction using machine learning techniques." International Journal of Computer Applications 975: 8887, 2016.
Citation
Megha Gupta, Anisha Patil, Ansh Tyagi, Deepanshi Singhal, "Broadening the Scope: Exploring Best Machine Learning Algorithms for Customer Churn Prediction," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.16-20, 2023.
VAARTALAP: Embedding Whisper-AI-like Model into a Video-Conferencing System to Aid Real-Time Translation and Transcription
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.21-25, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.2125
Abstract
In this world of digitalized communication, effective communication crosses regional boundaries and linguistic obstacles making the world more connected. The demand for seamless multilingual communication has never been more important as corporations, institutions, and individuals engage on a worldwide scale. This article explores a trailblazing initiative that uses real-time translation and transcription services offered by Whisper-AI to transform the world of video conferences. The goal of the research is to create an AI model that easily interfaces a translation and transcription-based model to work in a real-time video conferencing system. Participants may converse in real-time without any language barriers by utilizing cutting-edge voice recognition and translation technologies.
Key-Words / Index Term
Sound transcription, Sound translation, AI, Deep learning, Real-time, Language barrier, NLP.
References
[1]. A. Radford, J.W. Kim, T. Xu, G. Brockman, C. McLeavey, and I. Sutskever, “Robust Speech Recognition via Large- Scale Weak Supervision”, arXivpreprint, arXiv:2212.04356, 2022. doi10.48550/ arXiv.2212.04356
[2]. E. Cho, C. Fügen, T. Herrmann, K. Kilgour, M. Mediani, C. Mohr, J. Niehues, K. Rottmann, C. Saam, S. Stüker, and A. Waibel. 2013. “A real- world system for contemporaneous restatement of German lectures”, In the Proceedings of the 2013 INTERSPEECH, Lyon, France, pp.3473-3477, 2013.
[3]. N. Arivazhagan, C. Cherry, I. Te, W. Macherey, P. Baljekar and G. Foster, "Re-Translation Strategies for Long Form, Simultaneous, Spoken Language Translation," ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, pp.7919-7923, 2020. doi: 10.1109/ICASSP40776.2020.9054585.
[4]. Rothman and A. Gully, “Mills for Natural Language Processing” Second Edition, Packt Publishing, UK, ch. 2, 2022, ISBN 9781803247335
[5]. T. Chen, W. Wang, W. Wei, X. Shi, X. Li, J. Ye and K. Knight, "DiDi’s Machine Restatement System for WMT 2020", In the Proceedings of the 2020 Workshop on Statistical Machine Translation (WMT), pp.105?112, 2020.
Citation
Kunal Kashyap, Prashant Singh, Anjali Verma, Satya Mishra, Prachi Goel, "VAARTALAP: Embedding Whisper-AI-like Model into a Video-Conferencing System to Aid Real-Time Translation and Transcription," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.21-25, 2023.
Pothole Detection and Reporting System Implementation Using Yolov8 and TensorFlow.js
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.26-31, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.2631
Abstract
Potholes present a substantial hazard to both road safety and the structural integrity of vehicles. This paper introduces a novel approach to pothole detection leveraging YOLOv8, an object detection algorithm, and TensorFlow.js. The proposed system aims to detect potholes accurately and swiftly by analysing live video feeds. The trained model exhibits promising performance metrics in pothole detection, with the bounding box precision at 0.822 and the mean Average Precision (mAP) value of 0.847, highlighting the model`s robustness in accurately localizing potholes. The proposed pothole detection system presents a promising solution for proactive road maintenance and safety enhancement. Its efficiency in real-time detection, combined with the adaptability of TensorFlow.js, holds the potential for widespread implementation, contributing to mitigating road hazards and infrastructure maintenance. The use of Tensorflow.js allows JavaScript developers to work with YOLOv8 reducing the dependency on Python for this purpose. The Pothole Detection and Reporting System with YOLOv8 and Tensorflow.js provides quite promising results.
Key-Words / Index Term
Object detection, YOLOv8, TensorFlow.js, Road safety, Pothole detection.
References
[1] Anas Al Shaghouri, Rami Alkhatib, Samir Berjaoui, "Real-Time Pothole Detection Using Deep Learning," 2021. https://doi.org/10.48550/arXiv.2107.06356
[2] O. M. Khare, S. Gandhi, A. M. Rahalkar, S. Mane, "YOLOv8-Based Visual Detection of Road Hazards: Potholes, Sewer Covers, and Manholes," 2023.
[3] S. R. Kuthyar, R. S., V. Rasika, S. Manjesh, R. Girimaji, R. Davis Arjun, P. S., "An Intelligent Pothole Detection and Alerting System using Mobile Sensors and Deep Learning," 2021.
[4] R. Hiremath, K. Malshikare, M. Mahajan, "A Smart App for Pothole Detection Using Yolo Model," 2021.
[5] A. Kumar, S. Kumar, "Road quality management using mobile sensing," International Conference on Innovations in Information Embedded and Communication Systems, 2018.
[6] A. Mendis, G. Starzadnis, G. K. Anoris, "Real-time pothole detection using Android smartphones and accelerometers," 12th International Conference on ITS Telecommunications (ITST), pp. 668-672, 2019.
[7] B. Piao, K. Aihara, "Detecting the road surface condition by using mobile crowd sensing with a drive recorder," IEEE 20th International Conference on Intelligent Transportation Systems, 2019.
[8] Collinson Colin M. Agbesi, Ebenezer K. Gavua, Seth Okyere-Dankwa, Kwame Anim Appiah, Kofi Adu-Manu Sarpong, “Pothole Detection, Reporting and Management using Internet of Things: Prospects and Challenges”, International Journal of Emerging Science and Engineering (IJESE), 2017.
[9] Jetashri R. Gandhi, U. K. Jaliya, D. G. Thakore, “A Review Paper on Pothole Detection Methods”, International Journal of Computer Sciences and Engineering (IJCSE), 2019
[10] Young-Mok Kim, Young-Gil Kim, Seung-Yong Son, Soo-Yeon Lim, Bong-Yeol Choi and Doo-Hyun Choi, “Review of Recent Automated Pothole-Detection Methods”, Applied Sciences, 2022.
[11] Hsiu-Wen Wang, Chi-Hua Chen,Ding-Yuan Cheng, Chun-Hao Lin and Chi-Chun Lo, “A Real-Time Pothole Detection Approach for Intelligent Transportation System”, ResearchGate, 2015.
Citation
Nidhi Ruhil, Devansh Sahni, Anushaka, Anurag Wadhwa, Anjali Sharma, "Pothole Detection and Reporting System Implementation Using Yolov8 and TensorFlow.js," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.26-31, 2023.
Blockchain Based Data Privacy through Artificial Intelligence: Review
Review Paper | Journal Paper
Vol.11 , Issue.12 , pp.32-37, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.3237
Abstract
Data privacy and security have become paramount concerns in the realm of artificial intelligence (AI) due to the increasing reliance on vast datasets for training AI models. This review paper explores the potential of blockchain technology to enhance data privacy and security in AI applications. Blockchain, known for its core features of decentralization, immutability, transparency, and security, offers a promising framework to address data privacy challenges. Keywords like decentralized data storage, access control mechanisms, data provenance, and privacy-preserving machine learning are discussed in the context of blockchain integration with AI. Several use cases, including healthcare, finance, supply chain, and identity verification, demonstrate the practical applicability of blockchain in safeguarding sensitive data. However, challenges related to scalability, regulation, and adoption must be addressed. The paper concludes by highlighting emerging trends, research directions, and the importance of ongoing efforts to harness blockchain`s potential for preserving data privacy in AI.
Key-Words / Index Term
Blockchain, Data Privacy, Artificial Intelligence, Decentralized Data Storage, Access Control, Data Provenance, Privacy-Preserving Machine Learning, Use Cases, Challenges, Emerging Trends.
References
[1]. Sweeney, L. K-anonymity: “A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems” Vol.10, Issue.5, pp.557-570, 2002.
[2]. Dwork, C, McSherry, F, Nissim, K, & Smith, A. “Calibrating noise to sensitivity in private data analysis”. In Proceedings of the Third Conference on Theory of Cryptography (TCC`06), 2002.
[3]. Nakamoto, S. “Bitcoin: A Peer-to-Peer Electronic Cash System” https://bitcoin.org/bitcoin.pdf, 2008.
[4]. Lauter, K., Naehrig, M., & Vaikuntanathan, V. “Can homomorphic encryption be practical” In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (CCSW`11), 2008.
[5]. Back, A, Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., ... & Wuille, P.” Enabling Blockchain Innovations with Pegged Sidechains”, 2014.
[6]. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., ... & Virza, M. (2014). Zero Cash: Decentralized anonymous payments from Bitcoin in IEEE Symposium on Security and Privacy, 2014.
[7]. LeCun, Y. Bengio, Y. & Hinton, G. “Deep learning. Nature”, 521(7553), pp.436-444, 2014.
[8]. Swan, M. “Blockchain: Blueprint for a New Economy” O`Reilly Media, 2015.
[9]. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., & Felten, E. W. “Research perspectives and challenges for bitcoin and cryptocurrencies” in Proceedings of the IEEE Symposium on Security and Privacy. 2015.
[10]. Intel. (2016). Intel Software Guard Extensions (Intel SGX) for Fun and Profit. 2016.
[11]. O`Neil, C. “Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy Crown”, 2016.
[12]. Poon, J., & Dryja, T “The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments” https://lightning.network/lightning-network-paper.pdf . 2016.
[13]. Mougayar, W. “The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology”, Wiley. 2016
[14]. Tapscott, D., & Tapscott, A. “Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money, Business, and the World. Penguin” 2016.
[15]. Kosba, A., Miller, A., Shi, E., Wen, Z., & Papamanthou, C. Hawk “The blockchain model of cryptography and privacy-preserving smart contracts” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS`16), 2016
[16]. Crosby, M., Pattanayak, P., Verma, S., & Kalyanaraman, V. “Blockchain technology: Beyond bitcoin Applied Innovation”, 6-10, pp.71-81, 2016.
[17]. Voigt. P, Von dem Bussche, A. “The EU General Data Protection Regulation” (GDPR): A Practical Guide. Springer. 2017.
[18]. B., Patel, S., ... & Viswanathan, V. “Practical secure aggregation for privacy-preserving machine learning”. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS`17), 2017.
[19]. McMahan, H. B. Moore, E. Ramage, D. Hampson, S. & Arcas, “Communication-efficient learning of deep networks from decentralized data”, in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 2018.
[20]. Gupta, A. Capretz, L. F. & Ahmed, F. “Towards understanding blockchain roles in improving the Internet of Things”. in IEEE 5th World Forum on Internet of Things (WF-IoT) (pp. 127-132). 2018.
[21]. Mengelkamp. E, Notheisen, B, Bräuer, S, & Flath, C. M. “A blockchain-based smart grid: towards sustainable local energy markets” in Computer Science-Research and Development, Vol.33, Issue.1-2, pp.207-214, 2018.
[22]. Al-Bassam. M, Sonnino. A, Bano. S, Hrycyszyn, D., Danezis, G., & Papamanthou, C. (2018). Chainspace: A Sharded Smart Contracts Platform. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS`18). 2018.
[23]. Hernandez, C. (2019). 6 “Biggest Data Breaches in History Forbes. www.forbes.com/sites/christopherhelman2019/01/19/6-of-the biggest-data-breaches-in-history. 2019.
[24]. Kairouz. P, McMaha. B, Avent. B, Bellet. A. Bennis. M, Bhagoji. Zhang, S. “Advances and open problems in federated learning”. preprint arXiv:1912.04, 2019.
Citation
Shashank Saroop, Radha, "Blockchain Based Data Privacy through Artificial Intelligence: Review," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.32-37, 2023.
Implementation of an Automated Attendance System with Integrated Face Recognition using Haar Cascade and LBPH Algorithm
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.38-45, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.3845
Abstract
This research explores the implementation of a state-of-the-art attendance system utilizing face recognition technology with a focus on Haar Cascade and Local Binary Pattern Histogram (LBPH) algorithms. The primary objective of this system is to revolutionize traditional attendance management methodologies by incorporating computer vision techniques. The Haar Cascade algorithm is employed for precise face detection, ensuring accurate identification of facial features, while the LBPH algorithm enhances facial recognition robustness. The paper elucidates the architectural framework of the proposed system, delineates the algorithmic workflow, and presents empirical results demonstrating the efficacy of the implemented solution. By integrating these advanced algorithms, the developed attendance system not only automates the attendance tracking process but also provides a secure and efficient mechanism for organizations to manage attendance records in a contemporary and technologically sophisticated manner.
Key-Words / Index Term
Attendance system, Analysis, LBPH Algorithms, Haar cascade, LBP, HOG, cascade classifier
References
[1] R. Padilla, C. F. F. Costa Filho and M. G. F. Costa, “Evaluation of Haar Cascade Classifiers Designed for Face Detection”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol.6, No.4, 2012.
[2] C. Shrestha, S. Dhungana, S. Maskey, A. Alkhudher, “Attendance System Using Facial Recognition”, ISSN NO: 1076-5.
[3] Jomon Joseph1, K. P. Zacharia, “Automatic Attendance Management System Using Face Recognition”, International Journal of Science and Research (IJSR), 2013.
[4] Ahonen, T. Hadid, A. Pietikäinen, “M. Face Recognition with Local Binary Patterns”. In the Proceedings of the Advances in Visual Computing; Springer Science and Business Media LLC: Berlin, Germany, Vol.3021, pp.469–481, 2004.
[5] Gangagowri G, Muthuselvi J, Sujitha S. Attendance Management System.
[6] A. Ahmed, J. Guo, F. Ali, F. Deeba, and A. Ahmed, “LBPH based improved face recognition at low resolution” International Conference on Artificial Intelligence and Big Data (ICAIBD), pp.144-147, 2018.
[7] P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features”, In the proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, 2001.
[8] Patel UA, Swaminarayan Priya R. “Development of a student attendance management system using RFID and face recognition”: a review. Int J Adv Res Compute Sci Manag Stud. pp.109–19, 2014.
[9] Kadry, Seifedine Smaili, Mohamad. “Wireless attendance management system based on iris recognition”. Scientific Research and Essays. pp.1428-1435, 2010.
[10] Will Berger, Deep Learning Haar Cascade Explained, WILL BERGER.
[11] Sanjeev Kumar,?Harpreet, K. Face Recognition Techniques: Classification and Comparisons. International Journal of Information Technology and Knowledge Management, 5 No.2, pp.361–363, 2012.
[12] Akram Qureshi, Ashok Kajla, “Intelligent Face Recognition”, International Journal of Computer Sciences and Engineering, Vol.4, Issue.2, pp.128-133, 2016.
[13] Ranganatha S, Y P Gowramma2, “Image Training and LBPH Based Algorithm for Face Tracking in Different Background Video Sequence”, Research Paper Vol.6, Issue.9, pp.43-49, 2018.
Citation
Shuchi Sharma, Anirudh Sharma, Priyam Jain, Ishant Popli, Harsh Chahar, "Implementation of an Automated Attendance System with Integrated Face Recognition using Haar Cascade and LBPH Algorithm," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.38-45, 2023.
To Enhance the RPS Game using Open CV & CV Zone by using Python Platform
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.46-52, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.4652
Abstract
The paper involves the development of a rock- paper-scissors game using computer vision techniques, specifically gesture recognition. The game aims to provide an engaging and interactive user experience by allowing players to use hand gestures to play the game against a computer opponent. The user interface was designed for optimal user experience, incorporating visual feedback to effectively engage the player. The accuracy of gesture recognition was evaluated using quantitative metrics, measuring the precision of identifying rock, paper, and scissor gestures. The paper serves as an educational tool to demonstrate the practical applications of computer vision in gaming scenarios, potentially inspiring interest in STEM fields. It sets the foundation for future advancements in computer vision applications, with potential enhancements including multi- player functionality, improved gesture recognition using deep learning models, and integration into augmented or virtual reality environments. While the rock-paper-scissors game using OpenCV and CV Zone has several merits, there are also a few demerits to consider, indicating areas for further improvement. Overall, the paper contributes to the practical understanding of gesture recognition and image processing within the context of an interactive gaming application.
Key-Words / Index Term
Rock-Paper-Scissors (RPS) Game, Computer Vision, OpenCV, CVZone, Python Programming, Gesture Recognition, Image Processing, Object Detection
References
[1]Khobragade, Kavita. “A Comparative study of Converting Coloured Image to Gray-scale Image using Different Technologies”, In the Proceedings of the 2012 National Conference on Recent Trends in Information Technology At: JSPM Pune Maharashtra India, pp.1-3, 2012.
[2]CV Zone Library Documentation. 2023.
[3]What is Python? Executive Summary | Python.org. 2022.
[4]Bradski, G., & Kaehler, “Learning OpenCV”, O`Reilly Media, Inc. Publisher, USA, pp.1-30, 2008.
[5]Python 3.12.1 documentation, 2023.
[6]Li Liu, Wanli Ouyang, Xiaogang Wang, Paul Fieguth, Jie Chen, Xinwang Liu, Matti Pietikäinen, “Deep Learning for Generic Object Detection: A Survey”, International Journal of Computer Vision, Vol.4, Issue.9, pp.1-19, 2019. https://doi.org/10.1007/s11263-019-01247-4
[7]Hasrshdeep Singh Sabharwal, Tushar Kanti Maujumdar, Shashank Saroop, Lokesh Meena, "To Enhance the RPS Game using Open CV & CV Zone by using Python Platform", International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.1-8, 2023. https://doi.org/10.26438/ijcse/v11i12.14
Citation
Harshdeep Singh Sabharwal, Tushar Kanti Majumdar, Shashank Saroop, Lokesh Meena, "To Enhance the RPS Game using Open CV & CV Zone by using Python Platform," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.46-52, 2023.
Face Recognition Attendance System
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.53-55, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.5355
Abstract
In today’s digital era, face recognition systems have emerged as a vital component across various sectors. As one of the most commonly used biometric technologies, face recognition offers a multitude of advantages including security, authentication, and identification. Despite its lower accuracy compared to iris recognition and fingerprint recognition, face recognition continues to gain traction due to its contactless and non-invasive nature. Moreover, it can be effectively utilized for attendance marking in educational institutions and workplaces, addressing the shortcomings of traditional manual methods such as consumption and the risk of proxy attendance. This paper proposes a class attendance system based on face recognition, aiming to streamline the attendance process and eliminate its associated challenges. The system encompasses four key phases: database creation, face detection, face recognition, and attendance updation. The database is created by capturing images of students in the classroom. Face detection and recognition are performed using the Haar-Cascade classifier and Local Binary Pattern Histogram algorithm, respectively. Faces are detected and recognized in real time using live streaming videos. At the end of each session, the attendance is automatically sent via email to the respective faculty.
Key-Words / Index Term
Face Recognition, Face Detection, Haar-Cascade classifier, Local Binary Pattern Histogram, attendance system
References
[1]. M. Fuzail, f. Noman, m.o. mushtaq. “Face detection system for attendance of class’ students”, International journal of multidisciplinary sciences and engineering, Vol.5, No.4, 2014.
[2]. Hapani, Smit, et al. (ICCUBEA) IEEE, 2018.
[3]. Akbar, Md Sajid, et al. "Face Recognition and RFID Verified Attendance System." 2018 International Conference on Computing, Electronics & Communications Engineering (ICCECE). IEEE, 2018.
[4]. Okokpujie, Kennedy O., et al. (CSCI). IEEE, 2017.
[5]. Rathod, Hemantkumar, et al. "Attendance system using machine learning approach." 2017 (ICNTE).IEEE, 2017.
[6]. Siswanto, Adrian Rhesa Septian, “Implementation of face recognition algorithm for biometrics based time attendance system.” 2014 International Conference on ICT For Smart Society (ICISS). IEEE, 2014.
[7]. Lukas, Samuel, et al. "Student attendance system in classroom using face recognition technique." 2016.
[8]. International Conference on Information and Communication Technology Convergence (ICTC). IEEE, 2016.
[9]. Salim,Omar Abdul Rehman, Rashidah Funke Olanrewaju, and Wasiu Adebayo Balogun. "Class attendance management system using face recognition." 2018.
Citation
Prachi Goel, Abdul Aleem Ansari, Apurva Jain, Anshul Nagar, "Face Recognition Attendance System," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.53-55, 2023.
Container-Based Serverless Computing with AI-Driven Resource Optimization for Cloud Fault Tolerance
Research Paper | Journal Paper
Vol.11 , Issue.12 , pp.56-60, Dec-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i12.5660
Abstract
The exponential growth of cloud computing services has led to increased concerns regarding fault tolerance, energy efficiency, and resource optimization. This paper introduces a novel approach combining container-based serverless architecture with artificial intelligence for dynamic resource management and fault prediction. Our system employs deep learning algorithms for workload prediction, reinforcement learning for resource allocation, and ensemble methods for failure detection. To forecast workloads, we utilized historical and real-time data with sequence modeling techniques, achieving accurate demand predictions. Failure detection leveraged ensemble methods, combining diverse predictive algorithms to enhance robustness. Experimental results from a three-month deployment demonstrate significant improvements: an 85% reduction in energy consumption, a 40% decrease in response latency, and a 60% lower operational cost while maintaining 99.99% service availability. These improvements stem from the system`s AI-driven predictive workload management, efficient resource allocation strategies, and robust failure detection mechanisms. These results surpass current industry standards and existing academic solutions by leveraging the synergy between containerization, serverless computing, and AI-driven optimization.
Key-Words / Index Term
AI-Driven Resource Optimization, Serverless Computing, Fault Prediction, Deep Reinforcement Learning and Ensemble Methods.
References
[1] Kumari, Priti, and Parmeet Kaur. "A survey of fault tolerance in cloud computing”, Journal of King Saud University-Computer and Information Sciences, Vol.33, Issue.10, pp.1159-1176, 2021.
[2] Uppal, Mudita, et al. "Cloud?based fault prediction using IoT in office automation for improvisation of health of employees”, Journal of Healthcare Engineering, Vol.2021, Issue.1, pp.8106467, 2021.
[3] Ahmad, Imtiaz, et al. "Container scheduling techniques: A survey and assessment”, Journal of King Saud University-Computer and Information Sciences, Vol.34, Issue.7, pp.3934-3947, 2022.
[4] Singh, Amritpal, Gagangeet Singh Aujla, and Rasmeet Singh Bali. "Container-based load balancing for energy efficiency in software-defined edge computing environment”, Sustainable Computing: Informatics and Systems, Vol.30, pp.100463, 2021.
[5] Aslanpour, Mohammad Sadegh, et al. "Energy-aware resource scheduling for serverless edge computing”, 2022 22nd IEEE International Symposium on Cluster, Cloud and Internet Computing (CCGrid). IEEE, 2022.
[6] Gill, Sukhpal Singh, et al. "AI for next generation computing: Emerging trends and future directions”, Internet of Things, Vol.19, pp.100514, 2022.
[7] Abouelyazid, Mahmoud, and Chen Xiang. "Architectures for AI Integration in Next-Generation Cloud Infrastructure, Development, Security, and Management”, International Journal of Information and Cybersecurity, Vol.3, Issue.1, pp.1-19, 2019.
[8] Bi, Jing, et al. "Integrated deep learning method for workload and resource prediction in cloud systems”, Neurocomputing, Vol.424, pp35-48, 2023.
[9] Alyas, Tahir, et al. "Optimizing Resource Allocation Framework for Multi-Cloud Environment”, Computers, Materials & Continua, Vol.75, Issue.2, 2023.
[10] Tuli, Shreshth, et al. "HUNTER: AI based holistic resource management for sustainable cloud computing”, Journal of Systems and Software, Vol.184, pp.111124, 2022.
[11] Tabrizchi, Hamed, and Marjan Kuchaki Rafsanjani. "A survey on security challenges in cloud computing: issues, threats, and solutions”, The journal of supercomputing, Vol.76, Issue.12, pp.9493-9532, 2020.
[12] Sultan, Sari, Imtiaz Ahmad, and Tassos Dimitriou. "Container security: Issues, challenges, and the road ahead”, IEEE access, Vol.7, pp.52976-52996, 2019.
[13] Samir, Areeg, et al. "Anomaly detection and analysis for reliability management clustered container architectures”, International Journal on Advances in Systems and Measurements, Vol2, Issue.3, pp.247-264, 2023.
[14] Marahatta, Avinab, et al. "PEFS: AI-driven prediction based energy-aware fault-tolerant scheduling scheme for cloud data center”, IEEE Transactions on Sustainable Computing, Vol.6, Issue.4, pp.655-666, 2020.
[15] Velepucha, Victor, and Pamela Flores. "A survey on microservices architecture: Principles, patterns and migration challenges”, IEEE Access, 2023.
[16] Li, Xiang, et al. "Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach”, IEEE access, Vol.7, 9368-9383, 2019.
[17] Chaurasia, Nisha, et al. "Comprehensive survey on energy-aware server consolidation techniques in cloud computing”, The Journal of Supercomputing, Vol.77, pp.11682-11737, 2021.
[18] Bi, Jing, et al. "Integrated deep learning method for workload and resource prediction in cloud systems”, Neurocomputing, Vol.424, pp.35-48, 2021.
Citation
Vikas Mongia, "Container-Based Serverless Computing with AI-Driven Resource Optimization for Cloud Fault Tolerance," International Journal of Computer Sciences and Engineering, Vol.11, Issue.12, pp.56-60, 2023.