International Journal of Engineering and Manufacturing @ijem
Статьи журнала - International Journal of Engineering and Manufacturing
Все статьи: 550
Early Detection of Dementia using Deep Learning and Image Processing
Статья научная
Dementia is the world's most deadly disease. A degenerative disorder that affects the thinking, memory, and communication abilities of the human brain. According to World Health Organization, more than 40 million people worldwide suffer from this illness. One of the most common methods for analyzing the human brain, including detecting dementia, is using MRI (Magnetic resonance imaging) data, which provides insight into the inner working of the human body. Using MRI images a deep Convolution neural network was designed to detect dementia, we are utilizing image processing to help doctors detect diseases and make decisions on observation, in an earlier stage of the disease. In this paper, we are going to get to the bottom of the DenseNet-169 model, to detect Dementia. There are approximately 6000 brain MRI images in the database for which the DenseNet-169 model has been used for classification purposes. It is a Convolution Neural Network (CNN) model that classifies Non-Dementia, Mild Dementia, Severe Dementia, and Moderate Dementia. The denseNet-169 model helps us determine Dementia disease. And also present the 97% accuracy for clarification of disease is present in the patient body. we are conducted this survey for providing effective disease prediction model for physicians to conclude that the disease stage is accurate and provide proper treatment for that.
Бесплатно
Edge Detection of Image Using Image Divergence and Downsampling Method
Статья научная
Classically, the points where digital image brightness transforms rapidly are ordered into a group of curved line segments termed as edges. Edge detection is an important feature and tool in digital image processing to analyze the significant changes in gray level image intensity. In this paper, an edge detection method is proposed. In the proposed method divergent operation is applied to the image to compute the Laplacian of the image. After then the sample rate of Laplacian of image is decreased by downsampling. A threshold value is yielded by computing the mean on the down sample value. Laplacian of image and threshold value is compared and pixel values are set according to the threshold value. Then the morphological operation is performed on the processed image to produce the final edge detection image. The significance and value of this research are reducing image noise by downsampling and searching vital edge information through divergence operation. The present study introduces a new method of edge detection. The finding of this research work is to detect the edges of objects. The proposed method is compared with other existing edge detection methods i.e., Canny, Sobel, Robert, Zero cross, and Frei-Chen. Quantitative evaluation is performed through various metrics i.e., Entropy, Edge-based contrast measure (EBCM), F-Measure, and Performance ratio. Experimental results obtained from MATLAB 2018a show that the proposed method performs better than other well-known edge detection methods.
Бесплатно
EduCloud: A Dynamic Three Stage Authentication Framework to Enhance Security in Public Cloud
Статья научная
Now-a-days, one of the most exciting technology is cloud computing. Accessing dynamically virtualized resources through internet is called as cloud computing. Security and confidentiality are the major concerns in public cloud. Though EduCloud (Educational Cloud) uses public cloud, moving data from one location to another location may lead to risk. Information related to staff, student and management or admin that can be shared in EduCloud, are to be secured in public educational cloud environment. In this scenario, data security is the most critical issue in cloud. But present authentication system available does not provide enough security in public EduCloud. Hence, we propose new authentication framework to enhance security in public educational cloud. The features of various authentication techniques are discussed in this paper and a novel framework is proposed for pubic EduCloud, which provides not only security but also increases the response time. The developed software tool is best suited and provably a secured solution to the public educational cloud environment.
Бесплатно
Effect of Thar Coal Fly Ash on Compressive and Tensile Strength of Concrete
Статья научная
This study's subject is the effectiveness of substituting Thar Coal Fly Ash (TCFA) for ordinary Portland cement, also known as OPC. Tharparkar, Pakistan, possesses the world’s third largest coal reserves, with deposited coal fuel of 175 billion tons and capable of providing energy for over 200 years. Thar Coal is a lignite type that produces 7-10% of by-products in ashes; among them, Fly Ash is a significant waste. Reusing this waste as a partial cement replacement offers an environmentally friendly solution. This study prepared concrete specimens with varying proportions of TCFA (0%, 10%, 20%, and 30% by mass) as cement substitutes. Compressive strength tests were conducted on 36 cubes (100mm x 100mm x 100mm) with different fly ash percentages at a proportion to water to cement of 0.52. Ages 7, 14, and 28 days for curing were considered. The findings demonstrate that a higher TCFA component enhances the workability of the concrete. At all curing ages, the strength in compression at a 20% TCFA replacement level was greater than that of standard concrete. However, as the cement replacement was increased to 30%, there was a slight decrease in the comparative compressive strength compared to regular concrete. The tensile strength of the splitting test, performed after twenty-eight days of curing age, reveals that it surpassed conventional concrete for all replacement levels. Considering the favorable outcomes in workability, constrictive strength, durability strength, and substantial economic and environmental benefits, there is much potential for using TCFA as a cement substitute in the construction sector.
Бесплатно
Статья научная
The main objective of the study was to investigate the effect of various filler materials on inter laminar shear properties of glass/epoxy composite materials. In this study three different filler materials were selected (SiO2, TiO2, Glass powder) for high strength and stiffness applications. The physical properties are also studied with the composites. The fiber volume fraction of material plays vital role in preparation of composite laminates. The fabrication method used was conventional hand lay-up process depending upon the resin system hot temperature cure and room temperature curing processes were selected. The short beam shear test was carried out to test inter laminar shear strength (ILSS). The short beam shear test results inter laminar shear strength and to find the significant influence of filler material on characterization of glass fiber reinforced plastic (GFRP) composite. The test results shown that high shear strength were observed with silicon dioxide(SiO2) filler material and with 10% of silicon dioxide filler material shows maximum ILSS value.
Бесплатно
Статья научная
The mechanical properties of a friction material primarily depend on the interfacial adhesion between all the ingredients of a friction material. In this work, a new friction material is developed by combination carbon fiber (CF), polymer matrix and other ingredients. The surface of CF is chemically inert and hydrophobic in nature and does not possess good bonding property with resin. Therefore, an attempt is made to improve the bonding strength between all the ingredients of a friction material. CF surface is modified by three different surface treatment techniques to increase hydroxyl or carboxyl groups on the surface. First, surface oxidation treatment, Second nitric acid treatment and third grafting multi walled carbon nano tubes functionalized (MWCNT-F) on CF surface. CF content after surface modifications is varied in wt % and mixed with remaining ingredients. Friction composite sheets are fabricated by using hand layup method. The resulting materials are characterized by SEM, TGA and FTIR analysis. MWCNTs-F on CF surface is observed. Twelve composite sheets with varying content of CF and surface treatment method is fabricated. Sample specimens are cut from the friction composite sheets to evaluate tensile and flexural properties of friction material. The best surface treatment method and optimum ingredients are selected for the improvement of tensile and flexural properties of friction material.
Бесплатно
Статья научная
To Monascus spp., light is not the required factor for its growth. But Monascus spp. has the capacity to sense and respond to light. This paper investigated the effects of blue light on growth and the changes of citrinin yield in Monascus 15. Our results demonstrated blue light was a stimulating signal for citrinin formation. Under the blue light illumination, the biomass of Monascus 15 was inhibited, but the citrinin yield increased when comparing with no light culture condition. Spores statistical results revealed that the blue light also influences the development of mycelium and spore formation.
Бесплатно
Efficient Design of Compact 8-bit Wallace Tree Multiplier Using Reversible Logic
Статья научная
Reversible logic is now employed in low-power CMOS circuits, optical data processing, DNA calculations, biological studies, quantum circuits, and nanotechnology. When building quantum computers, for example, the use of reversible logic is unavoidable. The structure of a reversible logic circuit is far more complex than that of an irreversible logic circuit. The multiplication operation is regarded as one of the most crucial in the ALU unit. In this study, the Wallace tree method is utilized to minimize the depth of circuits in 8x 8 reversible unsigned multiplier circuits. The proposed design is an attempt to enhance design factors including the number of gates, garbage outputs, constant inputs, and quantum cost for an 8-bit Wallace Tree multiplier using reversible logic. The Proposed design offers 27% less quantum cost compared to the existing 8-bit Wallace tree multiplier design.
Бесплатно
Efficient Parallel Design for Edit distance algorithm in DNA Sequence Alignment
Статья научная
The focus of Bioinformatics research is usually on two aspects—genomics and proteomics, specifically, it’s starting from nucleic acid and protein sequences, analyzing the structural and functional biological information expressed in the sequences. Biological sequence alignment is one of the common problems, the Needleman-Wunsch algorithm based on dynamic programming is the most basic algorithm, and Edit Distance(Levenshtein Distance) algorithm is also widely used in DNA sequence alignment. Nowadays, there are large amount of improvements on the Needleman-Wunsch algorithm, while few on Edit Distance algorithm, so this paper focuses on revealing the effects of parallel design on optimizing the Edit Distance algorithm, and it also compares the two algorithms’ different significances in DNA sequence alignment objectively.
Бесплатно
Electromagnet separator of different particles
Статья научная
In this paper we simulate and realize an electromagnetic separator excited with an alternating current. And, we will to see the factors that influence the separation. This realization is used for the separation of the ferromagnetic and non ferromagnetic particles. The aim of this application is to recover the particles of non ferrous and ferrous from mixture by attractive magnetic force with big rate of separation. Experiments’ results and simulation of this separator, finally the parameters of separation are optimized with prediction method is presented in this paper.
Бесплатно
Статья научная
In this paper, we have introduced the structure of resonance linear motion actuator which applied to coal mine. And we have built two-dimensional analyzing model by using finite element method. On the basis of the analysis, we have calculated the motor’s air-gap field and magnetism, and we also have studied the affection of motor which caused by permanent magnet’s size. We have studied motor’s winding current when it operates at constant amplitude, and the corresponding experiment results have verified the correctness of finite element model. We have studied the numerical value calculation of resonance linear motion actuator and calculation of its magnetism characteristic. What we have analyzed shows that the air-gap field of motor changes continuously and the magnetism is proportional to winding current. And the results can help technologists to design this kind of motor.
Бесплатно
Статья научная
Cloud computing is a fastest growing technology in the research and industry field.It provides the on demand resources to the customers on the rent basis. These resources are provided through the virtual machines. Resources required by the virtual machines can change dynamically. So load balancing in the cloud is more challenging task as compared to the traditional computing, where the resource requirements are not changed with time. Overall performance of the cloud system can be increased by the efficient load balancing approach. Three steps are involved in the load balancing method i.e., physical machine selection, virtual machine selection and destination physical machine selection. In the past few years a number of load balancing approaches have been proposed to increase the resource utilization and minimize the energy consumption. This paper has proposed a load balancing approach which uses the lower and upper threshold to select the physical machine (PM) for migrating the virtual machine (VM). Then place the selected VM to the PM which consumes minimum power to minimize the energy consumption. To create the cloud environment, CloudSim simulator is used which provides the interface to deal with the physical and virtual machines. To evaluate the performance, the proposed method is compared with already present load balancing approaches. Simulation result shows that proposed approach minimize the energy consumption, migrations and total simulation time.
Бесплатно
Статья научная
This project presents an architecture for approximate matching in Content Addressable Memory (CAM) systems, which are essential for search-intensive applications such as networking and genomic analysis. Traditional CAM designs often suffer from high power consumption and reduced performance. To address these challenges, this work proposes a low complexity sensing scheme that integrates transmission gate logic and a modified inverter architecture using the SAPON technique. The primary objective is to improve power efficiency and write ability in CAM systems. By incorporating the SAPON technique, the design significantly reduces power consumption, enhancing energy efficiency while maintaining high-speed functionality. Transmission gate logic improves write ability, facilitating smoother data operations, particularly in applications requiring approximate matching. The proposed design is thoroughly validated through extensive simulation using the GPDK 45nm library in Cadence Virtuoso. The results show substantial reductions in power consumption and delay, alongside improvements in performance. The optimized CAM architecture demonstrates high tolerance for mismatches, making it ideal for applications such as DNA sequencing and network routing. This CAM design provides a scalable and energy efficient solution for modern computing environments, where performance and low power consumption are critical. Overall, this design offers a reliable and energy-efficient solution for accelerating search operations in data-driven fields, positioning it as an advancement in content-addressable memory technology.
Бесплатно
Статья научная
Muffler acts as noise reduction element on exhaust system. Noise from an automotive application is the major source of noise pollution. Here the transmission loss of central inlet and central outlet muffler of single expansion chamber has been compared and validated in three methods namely transfer matrix method, finite element analysis and an experimental method for this purpose an experimental setup has been built up which is based on two load method. Several researchers have worked in the area of noise attenuation on central inlet by changing the position of outlet as side outlet but no one emphasizes on offset of the central inlet and central outlet position. Thereafter the finite element analysis tool Ricardo wave 1-D and comsol multiphysics is used to evaluate transmission loss for various offset position of inlet and outlet duct of the muffler. The very purpose to improve the acoustic performance of central inlet with offset outlet pipe by measuring transmission loss of offset inlet with offset outlet with various positions by keeping same space. Finite element analysis shows that higher attenuation can be achieved by increasing offset distance of central inlet & outlet outlet towards radial direction of the expansion chamber with the variation of 0.2r, 0.4r and 0.6r. Here 'r' is radius of single expansion chamber. The result shows that high transmission loss can be achieved by increasing the offset radial distance of the inlet pipe and outlet pipe. Further higher attenuation can also be achieved in case of fixed the distance of offset inlet and outlet at 0.6r by rotating the offset outlet which is also offseted at 0.6r distance by 0o, 45o, 90o, 135o and 180o. On ward rotation from remaining 180o to 360o the behavior of wave propagation will be same what has been reflected between 0o to 180o. Transmission loss maximizes when the offset outlet is loacted at 90o. It clearly reveals that optimization can be achieved by using finite element analysis tool by using virtual protyping.
Бесплатно
Статья научная
The use of virtual keyboards in mobile devices such as smartphones and tablets has become an essential tool for inputting information. The sound of keystrokes has been observed in previous studies to be recorded along with ambient noises, such as those produced by uncontrolled student noise, fans, doors and windows, moving cars, and similar sources. The presence of such noises negatively affects the quality of the keystrokes signal, which in turn affects keystroke analysis. The traditional FFT-based denoising methods are vital but they are often limited by their inability to adapt to the varying characteristics of real-world audio and noises. This paper proposes an enhanced Fast Fourier Transform (FFT) with an adaptive threshold technique that reduces ambient noises. The adaptive threshold technique is developed to identify frequency bins that contain noise and set their sizes to zero or attenuate them to reduce the noise. The paper evaluates the performance of the enhanced FFT with adaptive threshold on keystrokes recorded audio and validates it through extensive experimentation. The results show that the enhanced FFT outperforms the traditional FFT in terms of speed and the amount of noise removed from the recorded audio signal, indicating a significant improvement.
Бесплатно
Epipolar Geometry Estimation for Wide Baseline Stereo
Статья научная
The epipolar geometry is the intrinsic projective geometry between two views, and the fundamental matrix is the algebraic representation of epipolar geometry. Recovery of epipolar geometry is a fundamental problem in computer vision. Its importance is due to the fact that it provides relationships between corresponding point in the two images. In this paper, the problem of automatic robust estimation of the epipolar geometry for wide-baseline image pair is addressed. this problem for wide-baseline image pair is difficult because the putative correspondences include a low percentage of inlier correspondences, and it could become a severe problem when the veridical data are themselves degenerate or near-degenerate. Base on our previous work, a topological clustering(TC) is proposed to apply to fundamental matrix estimating. The TC algorithm has been demonstrated to be able to effectively eliminate the mismatches and reserve the correct matches. This advantage is extremely important to speeds up the performance of the epipolar geometry estimation and avoid the degeneracy. First, a set of match clusters are generated from the initial SIFT matches using topological clustering algorithm. Then, all the valid pairs of clusters are used to generate a series of fundamental matrix estimates and the best estimate is chosen as the solution. Six famous image pairs are used to test the proposed algorithms and the comparison with the related methods has been conducted. The compared experiments emphasize the performance of the proposed CPC algorithms.
Бесплатно
Статья научная
The removal of hexavalent chromium [Cr(VI)] is a challenging task due to its acute toxicity even at low concentration. In the present study, a low-cost activated carbon (LAC) was prepared from desert date seed shell by chemical activation with H3PO4 and utilized for the removal of hexavalent chromium from aqueous solution. Batch experiments were conducted to investigate the influence of operating variables such as pH, contact time, adsorbent dosage, initial concentration, co-existing ions and temperature. The amount of Cr(VI) adsorbed was found to vary with solution pH and maximum adsorption was observed at a pH value of 2.0. The extent of chromium uptake (mg g-1) was found to increase with increase in initial concentration and contact time. The applicability of the four isotherm models for the present equilibrium data follows the sequence: Freundlich > Temkin > Langmuir > Dubinin-Radushkevich. The mean free energy from the Duninin-Radushkevic isotherm model hinted that the adsorption of Cr(VI) onto the adsorbent surface follows physisorption mechanism. Thermodynamic parameters related to adsorption, Gibbs free energy change (∆G°), enthalpy change (∆H°), entropy change (∆S°), were also calculated and the negative value of ∆H° indicates the exothermic nature of the adsorption process. The considerable adsorption capacity of 99.09 mg g-1 is a signifier of the suitability of the prepared adsorbent for commercial application. The findings implicated that the adsorbent can be employed in the treatment of Cr-bearing water and wastewater.
Бесплатно
Estimating Missing Security Vectors in NVD Database Security Reports
Статья научная
Detection and analysis of software vulnerabilities is a very important consideration. For this reason, software security vulnerabilities that have been identified for many years are listed and tried to be classified. Today, this process, performed manually by experts, takes time and is costly. Many methods have been proposed for the reporting and classification of software security vulnerabilities. Today, for this purpose, the Common Vulnerability Scoring System is officially used. The scoring system is constantly updated to cover the different security vulnerabilities included in the system, along with the changing security perception and newly developed technologies. Different versions of the scoring system are used with vulnerability reports. In order to add new versions of the published scoring system to the old vulnerability reports, all analyzes must be done manually backwards in accordance with the new security framework. This is a situation that requires a lot of resources, time and expert skill. For this reason, there are large deficiencies in the values of vulnerability scoring systems in the database. The aim of this study is to estimate missing security metrics of vulnerability reports using natural language processing and machine learning algorithms. For this purpose, a model using term frequency inverse document frequency and K-Nearest Neighbors algorithms is proposed. In addition, the obtained data was presented to the use of researchers as a new database. The results obtained are quite promising. A publicly available database was chosen as the data set that all researchers accepted as a reference. This approach facilitates the evaluation and analysis of our model. This study was performed with the largest dataset size available from this database to the best of our knowledge and is one of the limited studies on the latest version of the official scoring system published for classification of software security vulnerabilities. Due to the mentioned issues, our study is a comprehensive and original study in the field.
Бесплатно
Статья научная
In this paper, we consider one-parameter exponential family and obtain the Bayes and. empirical Bayes estimators of the unknown parameter based on record values under a precaution asymmetry entropy loss function. The admissibility and inadmissibility of a class of inverse linear estimators of are studied based on upper records.
Бесплатно
Estimation of One-parameter Exponential Family Under Entropy Loss Function Based on Record Values
Статья научная
In this paper, we consider one-parameter exponential family and obtain the minimum variance unbiased estimator , Bayes and empirical Bayes estimators of the unknown parameter based on record values under entropy loss function. The admissibility and inadmissibility of a class of inverse linear estimators are also discussed based on upper records.
Бесплатно