International Journal of Engineering and Manufacturing @ijem
Статьи журнала - International Journal of Engineering and Manufacturing
Все статьи: 550
Статья научная
Menstrual discomfort significantly affects women’s productivity and engagement in structured environments such as offices, schools, colleges, and conferences. However, current access control systems fail to address this issue, resulting to inadequate accommodation. To bridge this gap, we propose an AI-driven menstrual detection system that uses closed-circuit (CC) cameras for facial recognition. Leveraging deep learning, our model analyzes facial cues—such as skin texture changes, eye fatigue, and puffiness to detect discomfort non-invasively while preserving privacy. To support this research, we introduce the Menstrual Presence Facial Dataset (MAFD-2024), a curated collection of facial images captured before and during menstruation, annotated for pain indicators. Our hybrid CNN-LSTM model (HCL-MD) enhances detection accuracy by 94.1%, combining spatial (facial features) and temporal (symptom progression) analysis. This system integrates with automated access frameworks, enabling real-time adjustments for affected individuals. Beyond access control, technology can be embedded in telemedicine for remote discomfort assessment or deployed in smart wearables and surveillance systems (e.g., in schools or public transport) to offer timely suggestions. By enabling discreet, real-time support, this AI solution fosters inclusivity and awareness, pioneering the fusion of facial recognition and menstrual health monitoring.
Бесплатно
Real-time construction of 3D welding torch in virtual space for welding training simulator
Статья научная
One unsolved problem in the development of an effective welding training simulator is how to construct an accurate 3D welding torch model based on the moving position of this torch in the training process. This paper presents an effective approach to deal with the problem. The whole scene is constructed in the base coordinate system and the torch is modeled as a 3D object in the sub-coordinate system. The sub-coordinate system firstly overlaps the base coordinate system, and it’s continuously changing as the trainer operates the torch. A nine axis sensor is installed in the torch at a selected point, which is the origin of the sub-coordinate system. The sensor can measure the rotation posture of the torch. Another marked point that can be captured by the Binocular Vision System (BVS) is installed with an infrared emitter. The BVS can measure the coordinate values of this point in the base coordinate system. As long as the coordinate values of a certain point on the model and its rotation posture based on this point can be determined, the VR development tool, such as Unity-3d,can track the model in real-time. That is the algorithm of this system, which is verified by Pro/E, a 3D modeling software. The approach presented above is applied to a welding training simulator product, which has been put into use and proved to be effective.
Бесплатно
Relating Interactive System Design and Information Theory from Information Leakage Perspective
Статья научная
In contemporary interactive software system design, to maintain equilibrium between usability and security is a challenging task because strictly enforced security policies directly affect the usability of the software. As a solution to this problem, information theoretic measure of information leakage in interactive system design has been proposed in the present work. The present paper first models the software system as a coloured Petri net model and after that using information theory and Petri net algebra; it defines the leakage in the interacting system. Based on the leakage definition, the present paper further quantifies information leakage and tries to establish a relation between information leakage and interactive system design principles. The paper also hints to decide consensus on the equilibrium of security and usability.
Бесплатно
Reliability Analysis Techniques in Distribution System: A Comprehensive Review
Статья научная
Quality of electricity with continuity is the reliability of the power system which is inversely proportional with the duration of power supply interruption. It depends on some expected or unexpected faults/failures on the systems, speed of protecting systems, preventive maintenance, and motivation of technical staffs. The detailed study of the distribution system is more crucial as its reliability is the concern of utility’s fame, service, customers’ satisfactions and reflects to the overall revenue. The relevant articles from the various sources has been collected and analyzed different reliability indices with their significance. Also, to realize the methodology related with reliability analysis, a comparative study among its different components has been carried out and the best techniques for maintaining system reliability are suggested.
Бесплатно
Reliability Analysis of Combat Architecture Model based on Complex Network
Статья научная
Based on the complex and networking characteristics of the combat system under the informationtization condition, combining the complex network theory, the author put forwards three network extension rules and established the network-based system model. Meanwhile, this article discussed the network characteristic parameters, reliability assessment and some other problems, and further relied on the simulation to analyze the network characteristics, reliability and the vital nodes mining under the different extension rules. The research methods and conclusions in this article can be used as the combat system’s arguments and references to its optimization.
Бесплатно
Remote sensing image scene classification
Статья научная
Remote sensing image scene classification has gained remarkable attention because of its versatile use in different applications like geospatial object detection, natural hazards detection, geographic image retrieval, environment monitoring and etc. We have used the strength of convolutional neural network in scene image classification and proposed a new CNN to classify the images. Pre-trained VGG16 and ResNet50 are used to reduce overfitting and the training time in this paper. We have experimented on a recently proposed NWPU-RESISC45 dataset which is the largest dataset of remote sensing scene images. This paper found a significant improvement of accuracy by applying the proposed CNN and also the approaches have applied.
Бесплатно
Research of Association Rule Mining Algorithm Based on Improved FP-Tree
Статья научная
Mining algorithm of FP-Tree is one of the most effective mining algorithms in association rule mining. It must produce large amounts of the candidate set and scan database repeatedly, but it generates conditional FPTree recursively in the process of mining frequent pattern and wastes the storage space greatly using the common tree's memory structure. It proposed an algorithm for mining frequent patterns by constructing reverse FP-tree with a binary tree storage structure. In mining process, it mines left son tree recursively, but gets frequent pattern not by generating conditional FP-Tree, so it greatly reduces the storage space and running time. The experiments show that the improved algorithm can realize effective mining on the time and space.
Бесплатно
Research of Distributed Data Mining System Based on Web Services
Статья научная
For the following reasons, the original centralized data mining became more and more out of date. First, the data source need to be processed is distributed on different computers in the networks. Second, because of the constrain of networks band, the privacy and safety of data, the incompatibility of systems and so on, it is not realistic to put all data source in a place for centralized data mining. Third, more and more demands have addressed on the openness and easy accessibility. The distributed data mining technology was presented for the problems mentioned above. This article introduced the latest technology for distributed component technology—web services technology into distributed data mining field, and took some tentative efforts in solving the problem of designing for suitable architecture of distributed data mining systems and corresponding distributed mining algorithms.
Бесплатно
Статья научная
In this paper, the advantages and disadvantages of three kinds of information code (subjection code, composite code and parallel code) were analyzed and compared. It was put forward that adopt parallel code method based on things characteristics realizing the information classifying and coding management of the whole life cycle of the products. And the structure model of product classifying code based on parallel code method was established. At the same time, the implementation method of product classifying code was presented for application requirements of the enterprise. Finally, the classifying and coding management system of product was introduced that supported by ORACLE and used JSP to development.
Бесплатно
Research of the QoC-Aware Service Selection for Middleware Based Pervasive Applications
Статья научная
With the rapid development of information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. Furthermore, with the development of SOA, more and more pervasive applications have been composed of different kinds of services. So how to choose a suitable service from all the useable services is the most important step for pervasive computing. Compare to the traditional service selection we must take more care of the context as well as the quality of them in pervasive environment. However, most of existing researches pay no attention to QoC (Quality of Service) which may lead to unreliable selections. Therefore we proposed a middleware based service selection scheme to support QoC-aware service selection efficiently.
Бесплатно
Research on Application of OGSA-based Digital Campus
Статья научная
This paper briefly introduces the concept and characteristics of Grid technology and Open Grid System Archi-tecture (OGSA). By analyzing the deficiencies existing in the present campus network and the comparative advantages of campus Grid, it presents and discusses the model and design of OGSA-based campus Grid. Building campus Grid is an important work in Grid gaining ground; therefore, the study on OGSA-based Cam-pus Grid is of great significance in applying Grid computing to educational field.
Бесплатно
Research on Cultivating Undergraduates in the Computer Science Based on Students
Статья научная
According to the existing problems in college students' learning, change the teaching method to cultivate students with innovative consciousness and innovative connotation. The article mainly elaborates on the current shortcomings in the teaching process of many ordinary colleges and universities, and proposes that teaching is mainly secondary school; teaching is supplemented, and student-oriented. The main responsibility of teachers is to guide patiently, actively communicate with students, and teach students in accordance with their aptitude. First teachers should understand the student's learning dynamics from the student's perspective, and then prescribe the right medicine to correct its drawbacks, encourage its advantages, and cultivate students' learning enthusiasm. Teachers stimulate students to learn actively, recognize their learning effects, and encourage students to experiment boldly and be creative. The students are more motivated to learn, build self-confidence in learning, and have a sense of innovation. According to the curriculum and being student-oriented, teachers prepare lessons, write lesson plans, design teaching links and do a good job in class counseling, which cultivate students' sense of innovation and enable students to have innovative connotations.
Бесплатно
Research on P2P Service Discovery Model Based on QoS
Статья научная
The existing P2P network service discovery lack of service quality assurance consideration, and can not fully utilize the network of some node powerful service quality attributes , in order to improve the efficiency of P2P networks service discovery,this paper proposes a P2P service discovery based on QoS algorithm model by combining QoS attributes and P2P characteristics. It defines P2P service description of based on QoS and introduces semantic information into service description to improve accuracy of service matching by using these service description. On this basis, it builds up P2P service discovery model of QoS guarantee and provides genetic algorithm on P2P service discovery. At last, analysis the feasibility and effectiveness of the service discovery algorithm through the proof.
Бесплатно
Research on Service Discovery Based on QoS in the Composition of Web Services
Статья научная
Web services are applications deployed in network, can be used in some fields such as B2B e-commerce, the integration between portals and content providers. Web services discovery mechanism is the important part of integration. We extended traditional service description and proposed a service discovery mechanism and realized the mechanism in an agent-based Web services integration framework. Results of this study can be applied to a wide range of cross-enterprise business entity docking, thereby promoting the development of electronic commerce.
Бесплатно
Research on the Reform of Practical Teaching Driven By Practical Training under Constructivism
Статья научная
Reform of practical teaching driven by practical training with real projects is a reform to improve every aspect of practical teaching by introducing, processing and decomposing real world projects to create real cases for teaching. In this article, the current reforming process of practical teaching in the area of computer science is analyzed from the point of view of a constructivist. In regard of the characteristics of the educational system in computer science, we also discussed how to organize and implement such enterprise-level project-driven practical teaching under the guidance of constructivism theory.
Бесплатно
Статья научная
The paper conducted thorough research on the adaptability of Cymbidium Lucky Gloria (CLG) through different temperature and relative humidity levels by using intelligent artificial climate chamber. The effects of single and tow collaborated factors on plant surviving are explored. It finds that temperature’s role in CLG surviving is the most significant. The surviving rate reaches only 23.0% with the extreme level of temperature (410C, first period; 240C, second period). Extreme high temperature surpasses the endurance of heat shock proteins (HSPs), and leads the plants died. The survived plants under extreme levels are of excellent attributes for the succeeding strain invention.
Бесплатно
Reversible joint watermarking for medical images and videos
Статья научная
Nowadays Digital Watermarking is widely used in the health care centers to secure the patient’s records. In India, nowadays the hospitals are adapting the telemedicine technology where it is providing facility for the patients and doctors to transmit the reports and as well as to access it easily as and when it is required to do so. In order to protect the privacy, authenticity and the integrity of the Electronic Health Record (EHR), some measure has to be employed. In this regard Digital watermarking (DWM) plays a major role. Digital watermarking is implemented in mainly two domains: one at the pixel level usually called as the spatial domain and the other is at the frequency components of the information called as the frequency domain. Of the two methods, second method is most commonly adapted by most of the researchers. It includes the transforms like Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) and the variations of DWT viz. Lifting Wavelet Transform (LWT) and Integer Wavelet Transform (IWT). In this paper DWM for the medical scanned images and the medical video is implemented using DWT. The watermark is patient information which will be converted to quick response (QR) code using the built in function. A simple key is used at the embedding part of the DWM technique and the same key is used at the decoder side to retrieve the information which enhances the security of both medical images/videos and the patient details.
Бесплатно
Review of Vehicle Surveillance Using Iot in the Smart Transportation Concept
Статья научная
The background of this research raises the problem of the development of smart transportation in terms of monitoring and enforcement of traffic on the highway, with the proposed system that will help many parties such as the police and the government. The system that is running is to develop a system using CCTV that is placed on every corner of the capital city to replace the police in carrying out road surveillance and law enforcement against lawbreakers, especially in the traffic sector. The method used in this research is by using literature review of many previous research journals, by reading many journals will be able to add knowledge and can deepen ongoing research. The problem raised in this research is finding solutions to problems in the transportation sector, especially smart transportation, using smart transportation will be able to connect all systems that have been made. This research produces a system proposal that can be used in further research and can be applied in terms of the development of smart cities, especially smart transportation.
Бесплатно
Revising Algorithm for Pathology Image Stitching
Статья научная
Image stitching for pathological slice splices several adjacent images into an integrated seamless picture which is significant in remote medicine, especially remote diagnosis. However, because of limitations of image acquisition method, some mismatch could occur. This paper proposed a new image mosaic revising algorithms based on the relativity of adjacent images. After experimental verification, the 20 groups inaccurate pathological mosaic images were revised rapidly and accurately with error controlled within a pixel. It is proved that the algorithm is effective in revising the error matching in pathological images mosaic.
Бесплатно
Risk Based Ranking Using Component Cost Importance Measure
Статья научная
The present day systems are increasing in complexity in terms of both the size and functionality. Also society demands these systems to be ultra-reliable. Reliability evaluation and optimization techniques play a major role in these regards. However reliability evaluation & optimization techniques do not give any idea about maintenance, risk involved and related cost incurred and criticality of system components or subsystems. Important measures (IM) exist in literature that identify the weak components i.e critical components and give ranking to them. Recently some work has appeared on Cost Importance Measure (CIM). There are number of mistakes/short comings in the paper Cost-related importance measure by Ming et.al. Definition of CIM given in general and the same used for computation of CIM of component xi have appeared differently (Different definitions for CIM). PD(xi),Partial derivative of component xi obtained for most of the components are either inexact or are faulty in expression and computations are wrong. All other mistakes also have not only been pointed but have been corrected also. A New CIM (NCIM) proposed, which highlights the above issues and have done desired calculations. The new CIM which has been advanced is computationally simpler and yields the desired ranking of components.
Бесплатно