Статьи журнала - International Journal of Engineering and Manufacturing

Все статьи: 532

Gas Leakage Detector and Monitoring System

Gas Leakage Detector and Monitoring System

Yekini N. Asafe, Adigun J. Oyeranmi, Oloyede A. Olamide, Akinade O. Abigael

Статья научная

Leakage of gas is a major issue in the industrial sector, residential buildings, and gas-powered vehicles, one of the preventive methods to stop accidents associated with gas leakage is to install gas leakage detection devices. The focus of this work is to propose a device that can detect gas leakage and alert the owners to avert problems due to gas leakages. The system is based on a microcontroller that employs a gas sensor as well as a GSM module, an LCD display, and a buzzer. The system was designed for gas leakage monitoring and alerts with SMS via an Arduino microcontroller with a buzzer and an MQ2 gas sensor. The circuit contains a Microcontroller MQ2 gas sensor, buzzer, LCD display, and GSM module, when the sensor detects gas leakage it transmit the information to the Microcontroller while the microcontroller makes a decision and then forwarded a warning message to the user as SMS to a mobile phone for decision to be taken accordingly. The output of this research will be significant in averting problems associated with gas leakages now and in future.

Бесплатно

Gender Classification Optimization with Thermal Images Using Advanced Neural Networks

Gender Classification Optimization with Thermal Images Using Advanced Neural Networks

Kethineni Keerthi, Gurram Harika, Kommineni Deva Harshini, Kakani Soumya

Статья научная

In this study, we investigate the effectiveness of deep learning models with thermal images for gender categorization. In order to explore the possibilities of thermal imaging as a tool for gender identification, the study focuses on two sophisticated convolutional neural network (CNN) architectures: InceptionV3 and AlexNet. Thermal imaging is a powerful substitute for traditional visual data because it provides distinct physiological insights.A collection of thermal imaging datasets was assembled, methodically preprocessed, and divided into training and testing sets. For this comparison analysis, two well-known CNNs AlexNet, a fundamental model recognised for its straightforward yet efficient design, and InceptionV3, a complex model acclaimed for its inception modules were chosen. The training subset was used to carefully refine both models so they could accurately capture the subtleties of thermal-based gender traits.Accuracy was the main criterion used to assess the performance of the revised models on the testing subset. According to our results, InceptionV3 performs noticeably better than AlexNet, with an accuracy of 92.3% as opposed to 82.6% for AlexNet. This disparity in performance demonstrates how much better InceptionV3 is at identifying and deciphering minute thermal patterns and physiological indicators that are essential for precise gender categorization. This study highlights how sophisticated CNN architectures may improve gender categorization using thermal images, both in terms of accuracy and dependability. We provide a path for future research to investigate more intricate and integrated strategies, like multi-modal fusion and sophisticated feature extraction techniques, to further enhance the resilience of thermal-based gender classification systems by proving the efficacy of InceptionV3 over a more conventional model like AlexNet.

Бесплатно

Generation of Images from Text Using AI

Generation of Images from Text Using AI

Nimesh Yadav, Aryan Sinha, Mohit Jain, Aman Agrawal, Sofia Francis

Статья научная

Reading the words can be confusing, and it may be hard to picture what is happening. There are some circumstances where words can be misunderstood. It's much simpler to recognize text if it's displayed as an image. The use of visuals is proven to increase viewership and retention. Synthesizing realistic images automatically is a challenging undertaking, and even the most advanced artificial intelligence and machine learning algorithm has trouble meeting this standard. GANs (Generative Adversarial Networks) are just one example of a powerful neural network architecture that has shown promising results in recent years. Existing text-to-image methods can generate examples that generally reflect the meaning of the provided descriptions, but they often lack the necessary details and colorful object elements. The primary objective of our research was to explore diverse architectural methodologies with the intention of facilitating the generation of visual representations from textual descriptions. By delving into this investigation, we aimed to discover and examine various approaches that could effectively support the creation of visuals that accurately depict the content and context provided within written narratives. Our aim was to unlock new possibilities in the realm of visual storytelling by establishing a strong connection between language and imagery through innovative architectural techniques.

Бесплатно

Government Expenditures, Transfer Payments and Economic Growth

Government Expenditures, Transfer Payments and Economic Growth

Lai Yue,Cheng Tianzhu

Статья научная

Incorporating a two-level government structure into an endogenous growth model, we distinguished between productive and non-productive government expenditures. With transfer payments considered, we showed that (1) there was an “Inverted U-shaped” relationship between the tax rate and the long-run economic growth, so was the relationship between the degree of fiscal decentralization and the long-run economic growth; (2) optimal ratios between productive and non-productive expenditures of two levels of governments, between transfer payments and other parts of expenditures of the state-level governments are needed to maximize the long-run economic growth.

Бесплатно

Graphic design principles and theories application in rendering aesthetic and functional installations for improved environmental sustainability and development

Graphic design principles and theories application in rendering aesthetic and functional installations for improved environmental sustainability and development

Odji Ebenezer

Статья научная

The basic difference between a sustainable aesthetically positive urban environment and an aesthetically negative one is in the way its component installations are rendered. The aesthetic positivity (AP) or aesthetic negativity (AN) of the whole is dependent on the aesthetics of the little parts that constitute it. Although may be functional, many electrical installations in Nigeria still lack considerable aesthetics mostly due to lack or laxity in the knowledge or practical application of basic design theories and principles. This study therefore examined how the application of design principles and theories used in graphic design can apply in electrical and design installations as a way of fostering a more aesthetic, yet functional and sustainable environments in developing West African countries using aesthetics as a key driver. Adopting a descriptive approach supported with direct observation, with a sample size of 320, respondents were purposively sampled in selected cities in Nigeria. The study showed a significant relationship between the application of graphic design theories and improved environmental aesthetics through the rendering of attractive-functional electrical/design installations. It also revealed that improved aesthetics of electrical/design installations limits negative interference which improves sustainability/safety in the built environment, hence serving as an abatement tool or technology for the alleviation of AN. This study therefore established the significance of the application of design theories and principles in achieving a more aesthetic, functional and sustainable environment, from the professionals’/ practitioners’ perspective.

Бесплатно

Green Functions for Sub-Laplacian on Half Spaces of the Heisenberg Group

Green Functions for Sub-Laplacian on Half Spaces of the Heisenberg Group

Na Wei, Pengcheng Niu, Jialin Wang

Статья научная

Green functions for sub-Laplacian on the domains in the Heisenberg group are derived, which can be used to solve partial differential equations subject to specific initial conditions or boundary conditions. Then the integral formulas for sub-Laplace equation on characteristic and non-characteristic half spaces are given, respectively.

Бесплатно

Guiding Aid for Visually Impaired

Guiding Aid for Visually Impaired

Pragati Chandankhede, Arun Kumar

Статья научная

Visual impairment is where the person either can’t see or his vision has weakened to large extent. There is no alternative technique for visually impairment, but to some extent it can be trim down with devices, smart sticks and sensors. Although many techniques are there for helping out through electronic travelling aid, cost effective and minimum hardware solution was the expectation by impaired. The device which can identify and classify the object ahead of impaired person is needed so that person can be prevented from the accident. In this paper, a unified model of YOLO (You Only Look Once) is used for detection of object ahead of camera. The proposed model is based on phenomena of detecting small object and good detection speed of yolov3 makes system more robust. Once detected, labeled objects name is converted from text to speech, so that blind person can be alerted from colliding with obstacles. This paper is one step in the direction to help them by exactly classifying, detecting and localizing target object along with providing voice based guideline. The proposed model has proved accuracy in many real time scenes.

Бесплатно

HKCHB: Meta-heuristic Algorithm for Task Scheduling and Load Balancing in Cloud-fog Computing

HKCHB: Meta-heuristic Algorithm for Task Scheduling and Load Balancing in Cloud-fog Computing

Mahmoud Moshref, Sherin Hijazi, Azzam Sleit, Ahmad Sharieh

Статья научная

Cloud-fog computing has emerged as the contemporary approach for processing and analyzing Internet of Things applications due to its ability to offer remote resources. Cloud fog computing technology provides shared resources, information, and software packages, supporting distributed parallel systems in an open environment. It constructs and manages virtual machines to enhance efficiency and attractiveness. We have consistently strived to tackle challenges affecting the efficiency of cloud fog computing, including ineffective resource utilization and response times. The improvement of these challenges can be achieved through effective task scheduling and load balancing between Virtual Machines, this problem considered as NP-hard problem. This paper proposes a Hybrid K-means Clustering Honey Bee algorithm (HKCHB) to cluster Virtual Machines into two or more clusters. Subsequently, the hybrid Honey Bee algorithm is employed for task scheduling, enhancing load balance performance. The proposed algorithm is compared with other task scheduling and load balancing algorithms, including Round Robin, Ant Colony, Honey Bee, and Particle Swarm Optimization Algorithm, utilizing the CloudSim Simulator. The results demonstrate the superiority of the proposed algorithm, yielding the lowest response time. Specifically, the response time is reduced by 22.1%, and processing time is reduced by 47.9%, while throughput is increased by 95.4%. These improvements are observed under the assumption of multiple tasks in a heterogeneous environment, utilizing one or two Data Centers with Virtual Machines. This contribution gives the impression that network systems based on the Internet of Things and cloud fog computing will be improved in the future to operate within the framework of real-time systems with high efficiency.

Бесплатно

Hand Arm Vibration Alleviation of Motorcycle Handlebar using Particle Damper

Hand Arm Vibration Alleviation of Motorcycle Handlebar using Particle Damper

Sachin M. Baad, R. J. Patil, M. G. Qaimi

Статья научная

Vibration induced in the vehicle affects the performance of the driver or rider because of reduction in comfort & safety level. In case of motorcycle, poor suspensions system & uneven road condition make driving difficult, these also introduces vibration. The vibrations are directly transferred to the body through the seat & handlebar. It has been seen that handlebar vibrations are more serious & creates physical problem to the rider. Particle damping technology is a derivative of impact damping with several advantages. Particle damping is the use of particles moving freely in a cavity to produce a damping effect. In this paper a passive damper using particle damping technique is designed and developed to reduce the hand arm vibrations (HAV). The experiments are planned and conducted using DOE. Optimum configuration of particle damper has been derived through this research work. Experimental tests shows by employing a particle damper the vibration amplitude is minimized significantly.

Бесплатно

Hardware Synthesize and Performance Analysis of Intelligent Transportation Using Canny Edge Detection Algorithm

Hardware Synthesize and Performance Analysis of Intelligent Transportation Using Canny Edge Detection Algorithm

Aisha Baloch, Tayab D Memon, Farida Memon, Bharat Lal, Ved Viyas, Tony Jan

Статья научная

The World is moving toward Smart traffic management and monitoring technologies. Vehicle detection and classification are the two important features of intelligent transportation system. Several algorithms for detection of vehicles such as Sobel, Prewitt, and Robert etc. but due to their less accuracy and sensitivity to noise they could not detect vehicles clearly. In this paper, a simple and rapid prototyping approach for vehicle detection and classification using MATLAB Xilinx system generator and Zedboard is presented. The Simulink model of vehicle detection and classification is designed using a complex canny edge detection algorithm for vehicle detection. The canny edge detection algorithm offers 91% accuracy as compared to its counterpart Sobel and Perwitt algorithms that offer 79.4% and 76.1% accuracy. The feature vector approach is used for vehicle classification. The proposed model is simulated and validated in MATLAB. The Canny edge detection and feature vector algorithms for vehicle detection and classification are synthesized through the Xilinx system generator in Zedboard. The proposed design is validated with the existing works. The implementation results reveal that the proposed system for vehicle detection and classification takes only 8 ns of execution time with a 128MHz clock, which is the lowest and optimum calculation period for the smart city.

Бесплатно

Hash Function Construction Based on RBFNN and Chaotic Mapping

Hash Function Construction Based on RBFNN and Chaotic Mapping

Jun Chen, Chunxiao He, Pengcheng Wei

Статья научная

One-way Hash function is not only widely used in the aspects of the digital signature, identity authentication and integrity checking, etc. but also the research hotspot in the field of contemporary cryptography. In this paper, it firstly utilized neural network and practiced the chaotic sequences produced by one-dimensional nonlinear mapping. And then, it constructed Hash function with cipherkey by means of altering sequences. One of the advantages of this algorithm is that neural network hides the chaotic mapping relations and make it difficult to obtain mapping directly. Simulation experiment showed that the algorithm have good unidirectionality and weak collision, and stronger confidentiality than the tradition-based Hash function, as well as easy to achieve.

Бесплатно

Healthcare System Technology using Smart Phones and Web Apps (Case Study Iraqi Environment)

Healthcare System Technology using Smart Phones and Web Apps (Case Study Iraqi Environment)

Suhiar Mohammed Zeki, Abdul Monem Saleh Rahma

Статья научная

In the Past a Few Years, smart devices like smart phones and tablets have radically change in many aspect, started from Entertainment to Shopping services to transfer Money and Banking, the next is Health Services. With the development in information technology And the big development in cloud computing Here smart phones have entered heavily in all aspects of health care. Now with the revolution of the smart devices (smart phones or tablets) and it's applications, there is many applications and tools are available started from attachments that allow to diagnose an infections and Now remotely and continuously monitor each heartbeat , blood pressure readings, the rate and depth of breathing, body temperature, oxygen concentration in the blood, glucose, brain waves, activity, mood, so the end result will be can reduce using of doctor ,also reduce the cost , and give us speed up and give power to patients , so make it possible for Patient to use portable devices (smart phones or tablet) to access their medical information, and achieve the goal to put information technology to work in health care and make the integration of health information technology into primary care .So the using information technology give us the good solution that won’t replace physicians. Health Information technology give the providers of health care to give better manage patient care. By making the health information are available electronically anytime and anywhere is needed, Health Information technology can help us to improve the quality Of Health , so can decrease the cost. Now, after all these advantages should shed light on the side of personal privacy And Hacking side that must have been tested all application and tools, All of these tools must be accurate and needs to be tested. So that must provide the highest level of security and privacy for the patients. After that. The application does not arrive the goal with 100% percent, according to the limitation that mentioned later.

Бесплатно

Heterostructure Silicon and Germanium Alloy Based Thin Film Solar Cell Efficiency Analysis

Heterostructure Silicon and Germanium Alloy Based Thin Film Solar Cell Efficiency Analysis

Ashish Kumar Singh, Manish Kumar, Dilip Kumar, S. N. Singh

Статья научная

Thin film solar cell along with enhanced absorption property will be the best, so combination of SiGe alloy is considered. The paper presented here consists of a numerical model of Si/Si1−xGex heterojunction solar cell. The addition of Ge content to Si layer will affect the property of material. The research has investigated characteristics such as short circuit current density (Jsc), generation rate G , absorption coefficient (α), and open circuit voltage (Voc), power, fill factor (FF) with optimal Ge concentration. The speculative determination of appropriate germanium mole fraction is done to get the maximized thin-film solar cell efficiency.

Бесплатно

High Accuracy Swin Transformers for Image-based Wafer Map Defect Detection

High Accuracy Swin Transformers for Image-based Wafer Map Defect Detection

Thahmidul Islam Nafi, Erfanul Haque, Faisal Farhan, Asif Rahman

Статья научная

A wafer map depicts the location of each die on the wafer and indicates whether it is a Product, Secondary Silicon, or Reject. Detecting defects in Wafer Maps is crucial in order to ensure the integrity of the chips processed in the wafer, as any defect can cause anomalies thus decreasing the overall yield. With the current advances in anomaly detection using various Computer Vision Techniques, Transformer Architecture based Vision models are a prime candidate for identifying wafer defects. In this paper, the performance of Four such Transformer based models – BEiT (BERT Pre-Training of Image Transformers), FNet (Fourier Network), ViT (Vision Transformer) and Swin Transformer (Shifted Window based Transformer) in wafer map defect classification are discussed. Each of these models were individually trained, tested and evaluated with the “MixedWM38” dataset obtained from the online platform, Kaggle. During evaluation, it has been observed that the overall accuracy of the Swin Transformer Network algorithm is the highest, at 97.47%, followed closely by Vision Transformer at 96.77%. The average Recall of Swin Transformer is also 97.54%, which indicates an extremely low encounter of false negatives (24600 ppm) in contrast to true positives, making it less likely to expose defective products in the market.

Бесплатно

Home Occupancy Classification Using Machine Learning Techniques along with Feature Selection

Home Occupancy Classification Using Machine Learning Techniques along with Feature Selection

Abdullah-Al Nahid, Niloy Sikder, Mahmudul Hasan Abid, Rafia Nishat Toma, Iffat Ara Talin, Lasker Ershad Ali

Статья научная

Monitoring systems for electrical appliances have gained massive popularity nowadays. These frameworks can provide consumers with helpful information for energy consumption. Non-intrusive load monitoring (NILM) is the most common method for monitoring a household’s energy profile. This research presents an optimized approach for identifying load needs and improving the identification of NILM occupancy surveillance. Our study suggested implementing a dimensionality reduction algorithm, popularly known as genetic algorithm (GA) along with XGBoost, for optimized occupancy monitoring. This exclusive model can masterly anticipate the usage of appliances with a significantly reduced number of voltage-current characteristics. The proposed NILM approach pre-processed the collected data and validated the anticipation performance by comparing the outcomes with the raw dataset’s performance metrics. While reducing dimensionality from 480 to 238 features, our GA-based NILM approach accomplished the same performance score in terms of accuracy (73%), recall (81%), ROC-AUC Score (0.81), and PR-AUC Score (0.81) like the original dataset. This study demonstrates that introducing GA in NILM techniques can contribute remarkably to reduce computational complexity without compromising performance.

Бесплатно

Hotspot sequence patterns with an improvement in spatial feature

Hotspot sequence patterns with an improvement in spatial feature

Imas Sukaesih Sitanggang, Dewi Asiah Shofiana, Boy Sandi Kristian Sihombing

Статья научная

Forest fires in Sumatra and Kalimantan resulted in degradation of peatlands significantly. The strong indicator of forest and land fires including in peatland can be identified using hotspots which occurred consecutively in 2 to 5 days. The previous studies have been conducted in mining sequence patterns on hotspot datasets in Sumatra and Kalimantan. However, those studies applied the sequential pattern algorithms on the datasets containing temporal and rough spatial features. This study aims to generate sequence pattern of hotspot datasets using the SPADE algorithm with the improvement of the spatial feature. The study results in 892 1-frequent sequences and 28 2-frequent sequence patterns at the minimum support of 0.02%. A total of 484 hotspots were found from the 28 2-frequents sequence patterns, most of which were occurred in September to November 2014 and 2015. Central Kalimantan, Riau, and South Sumatra are the area where hotspots mostly occurred in 2014 and 2015. The visualization module for hotspot sequences was successfully developed in two iterations using the JavaScript.

Бесплатно

Human Identification Using Foot Features

Human Identification Using Foot Features

Kadhim M.Hashem, Fatima Ghali

Статья научная

The goal of this paper is to investigate a new technique for human identification using foot features. This work can be mainly decomposed into image preprocessing, feature extraction and pattern recognition by Artificial Neural Network (ANN). Foot images are rarely of perfect quality. To obtain good minutiae extraction in foot with varying quality, we conducted preprocessing in form of image enhancement and binarization .To extract features from human foot based on shape geometry of foot boundaries by extracting 16 geometric features from a human foot image. The foot center has been determined, and then the distances between the center point and outer points are measured with different angles .The angles are from 30˚ to 360˚ by increment with 30˚ gradual. The 13th feature that can be extracted is the length of a foot which is defined as the distance between the top point of the foot and the bottom point. The 14th, 15th and 16th are three major features the width of the foot. The first width is passing through center point, therefore, the second widths of foot is measured from the upper part above the center point and third width from the region the center point under the center point at the bottom of the foot. Euclidean distance is used in the proposed system. Artificial Neural network used for recognition. MATLAB version 8.1(R2013a) and windows 7 with 32 bit is used to build the application and performed on pc of core i3 processor, and our test system on 40 persons, results were satisfactory up to more 92.5%.

Бесплатно

Hybrid Solar Power Plant in Saint Martin's Island can Enlarge Tourist Attraction in Bangladesh

Hybrid Solar Power Plant in Saint Martin's Island can Enlarge Tourist Attraction in Bangladesh

Saikat Roy, M. M. Rhaman

Статья научная

Saint Martin's Island is the best tourist spot in Bangladesh and one of the most beautiful tourist places in the world. But the accommodation facilities are not suitable for tourists. The supply of electricity in the hotels is only 4-5 hours from the generator. For the geographical position, the electricity cannot supply from the mainland grid and the cost of electricity is so high and is not favourable to the environment. In this paper, Hybrid system of photovoltaic (PV), diesel generator, battery for generating electricity in the Saint Martin's Island is analyzed for 18 hotels. The main objective of the present study is to determine the optimum size of Hybrid system which can fulfil the requirements of 528 kWh/day primary load with 125 kW peak for 18 hotels in this island. By using HOMER (Hybrid Optimization Model for Electric Renewables) software an optimum model is established for the renewable system. The aim is to configure a renewable system with low interest and low energy cost. The diagrams and tables which show prices and performances of the types of equipment on the optimum model are also presented. The result shows that PV (185 kW), diesel generator (105 kW), converter (96 kW) and 615 piece batteries of the Hybrid system is most commercially reliable and least cost of energy is about 19.48Tk per kWh or $ 0.253 per kWh ($1=77Tk) with total net present cost $ 624,391 or 48,078,107TK. The emission of CO2 is very low in this Hybrid system.

Бесплатно

IOT Based Burglar Detection and Alarming System Using Raspberry Pi

IOT Based Burglar Detection and Alarming System Using Raspberry Pi

Sahana V., Shashidhar R., Bindushree R., Chandana A.N.

Статья научная

In today’s world, security has become the most difficult task. With increasing urbanization and the growth of big cities, the crime graph is also on the rise. In order to ensure the security and safety of our home while we are away, we propose the use of Raspberry Pi to implement an IOT-based burglar detection and alert system. IoT involves the improvement of networks to efficiently acquire and inspect statistics from different sensors and actuators, then send the statistics via Wi-Fi connection to a personal smartphone or laptop. The concept of antitheft devices has been around for decades, but most are only CCTVs, IP cameras, or magnetic doorbells. There is a limited amount of work devoted to face recognition and weapon detection. The design of anti-theft protection devices relies primarily on face recognition and remote tracking. Here, our objective is to improve this system by incorporating weapon detection feature by image processing. The system uses Raspberry Pi, in which a person is only permitted access to the house if his/her face is recognized by the proposed system, and if he/she does not carry any weapons. From the standpoint of security, this system is more reliable and efficient. The proposed system is intended to develop a secure access control application based on face recognition along with weapon detection. By using the Telegram app, the proprietor can monitor the digital camera mounted on the door frame. As a means of improving the accuracy and efficiency of our system, we use the Python language and the Open CV library.

Бесплатно

Identifying Cross-Site Scripting Attacks Based on URL Analysis

Identifying Cross-Site Scripting Attacks Based on URL Analysis

Zhihua Tang, Ning Zheng, Ming Xu

Статья научная

Cross-site scripting (XSS) is one of the major threats to the security of web applications. Many techniques have been taken to prevent XSS. This paper presents an approach to identify Cross-Site Scripting attacks based on URL analysis. The fundamental assumption of our method is that the URL contains a part that can produce a valid JavaScript syntax tree. First, we extract the parameters of the URL to produce a valid JavaScript syntax tree and weight its parsing depth. If its depth exceeds a user-defined threshold, the URL is considered suspicious. Second, to the exception URLs, a second level of defense is formed by analyzing its structure. The experimental results demonstrate that our approach can effectively distinguish most of the malicious URLs from the benign ones.

Бесплатно

Журнал