Статьи журнала - International Journal of Engineering and Manufacturing

Все статьи: 484

The Research of Automatic License Plate Location Algorithm Under Various Conditions

The Research of Automatic License Plate Location Algorithm Under Various Conditions

Xiaobo Guo, Yongping Liu

Статья научная

The paper presents a method of automated license plate location, the first key step of the license plate recognition is to find and separate the license plate area from the image of license plate. In this article, the quality of the license plate image is improved though a series of digital image processing in the image pretreatment, and the quick and exact license plate location is realized based on the gray projection algorithm. Large numerous of plate license images are acquired and tested by the development platform of VC++6.0, and the result shows that the technology adopted in the article has good adaptability, especially it can quickly and reliably locate the license plate images shot under complex backgrounds.

Бесплатно

The Research of Using Irregular Triangulated Network to Achieve the Relevant Water Calculation

The Research of Using Irregular Triangulated Network to Achieve the Relevant Water Calculation

Hongbin Ma, Xue Wang, Xinrui Liu, Haifeng Zhang

Статья научная

This article describes the method of using irregular triangulated network to establish DEM (digital elevation model).Based on the DEM model, the article established and gave the relevant models and methods on the water areas and storage capacity in real time simulation by computer for forecasting and controlling of storage capacity and other related terms.

Бесплатно

The Stability of Boolean Rules Memory Based on the Core Systems of Number-Processing

The Stability of Boolean Rules Memory Based on the Core Systems of Number-Processing

Xiuzhen Wang, Weiquan Gu

Статья научная

Activation of how and where arithmetic operations are displayed in the brain has been observed in various number-processing tasks. However, it remains poorly understood whether stabilized memory of Boolean rules are associated with background knowledge. The present study reviewed behavioral and imaging evidence demonstrating that Boolean problem-solving abilities depend on the core systems of number-processing. The core systems account for a mathematical cultural background, and serve as the foundation for sophisticated mathematical knowledge. The Ebbinghaus paradigm was used to investigate learning-induced changes by functional magnetic resonance imaging (fMRI) in a retrieval task of Boolean rules.

Бесплатно

The Utilization of Escherichia Coli-based Magnetic Nanobeads as An Ultrasensitive Biosensor for Mercucy

The Utilization of Escherichia Coli-based Magnetic Nanobeads as An Ultrasensitive Biosensor for Mercucy

Sun Ying

Статья научная

It is an arduous task to detect the traces of heavy metals in real environmental samples. In this paper, the use of micro-organisms as bioreceptors and the merits of nanobeads’ (NBs) properties are combined to develop a novel electrochemical biosensor based on nanocomposite films. The whole Escherichia. coli cells were fixed onto a surface of indium-tin-oxide glass with and without NBs and/or polyelectrolyte multilayers. In addition, the electrochemical impedance spectroscopy technique, mercury was used to detect.

Бесплатно

Thermal Enhancement of Capsaicin on Target Tissue Involved in Hyperthermia

Thermal Enhancement of Capsaicin on Target Tissue Involved in Hyperthermia

Peng Zeng, Zhong-Shan Deng, Jing Liu

Статья научная

Local thermal enhancement in target tissue is of great interest in tumor hyperthermia. In this study, we proposed a brand-new thermal enhancement protocol for tumor hyperthermia using heat generated from thermogenesis of capsaicin, which can safely deliver a totally localized heating to target tissue. A healthy male volunteer was recruited, whose partial areas of opisthenar and forearm were smeared with 1% (w/w) capsaicin solution, to determine the increase of thermogenesis in local area of human body. In addition, animal experiments on several healthy Kunming (KM) mice (20-22g) were performed to test the feasibility of this capsaicin based thermal enhancement method. Preliminary experiments on the volunteer showed an effective temperature increase in the skin area smeared with capsaicin solution. Animal experiments indicated that distinct enhancement in heating effect presents in the target tissue of mice where capsaicin solution was introduced. The thermal enhancement ability of capsaicin, therefore, suggests that capsaicin can be used as a potential therapeutic adjuvant to locally enhance heating effects in target tissue during tumor hyperthermia.

Бесплатно

Thermodyamic and Kietic Study on the Corrosion of Aluminium in Hydrochloric Acid using Benzaldehyde as Corrosion Inhibitor

Thermodyamic and Kietic Study on the Corrosion of Aluminium in Hydrochloric Acid using Benzaldehyde as Corrosion Inhibitor

Musa Husaini, Muhammad Bashir Ibrahim

Статья научная

The inhibition of the corrosion of aluminium by benzaldehyde in 1.4 M HCl was investigated using weight loss method and characterized by FT-IR analysis. The results showed that the corrosion rate of aluminium in 1.4 M HCl decreases with increase in concentration of the inhibitor. The inhibition efficiency increases progressively as the concentration of the inhibitor increases. Effects of temperature on the inhibition efficiency of the inhibitor showed that inhibition efficiency decreases with increase in temperature. The value of activation energy (Ea) was found to be 20.55 Kjmol-1 for aluminium corrosion in 1.4 M HCl which was increased to 34.49 Kjmol-1 in the presence of 0.1 M inhibitor concentration. The calculated values for enthalpy of activation (ΔHa) were all positive indicating the endothermic nature of the aluminium dissolution process. The obtained values of Gibbs free energy (ΔGads) was in the range of -17.94 to -18.27 kJ mol-1. Kinetics of the reaction in the presence of the inhibitor revealed that it follows a first order reaction. The value of rate constant (k) was reduced from uninhibited acid to the inhibited acid solution, while the half-life values in the presence of the inhibitor were higher compared to the value in uninhibited acid solution suggesting that inhibition efficiency increases with increase in the concentration of the inhibitor.

Бесплатно

Towards Ambient Assisted Living (AAL): Design of an IoT-based Elderly Activity Monitoring System

Towards Ambient Assisted Living (AAL): Design of an IoT-based Elderly Activity Monitoring System

I.D.M.S. Rupasinghe, M.W.P. Maduranga

Статья научная

This paper presents a design and development of an IoT-based system to real-time track elders' physical activities using accelerometer sensor data. The objective behind conducting such research is to overcome the lack of ability to monitor physical activities. Especially with the development of the socio-economic sector, the number of elders who live in isolated areas such as elderly homes have increased rapidly. In such a case with declining cognitive abilities, the healthcare of these elderly personalities becomes vulnerable. This research project fulfilled the necessity of a system to capture the vital details about those people. The Internet of Things (IoT) and cloud-based applications have become a significant part of the Information and Technology sector. Realtime monitoring is a concept tightly coupled with IoT cloud cloud-native application for this application is an excellent example of that.Further, the requirement of a low-cost system was fulfilled by using hardware components such as NodeMCU and accelerometer sensors. The designed and developed system is composed of a cost-effective wrist-worn device capable of capturing hand movement on three different arises. Hence, the detected signals are transmitted to a master node to process and recognize the activity according to the detected signal. Another significant aspect of the project is using machine learning techniques to recognize the four different activities such as walking, sitting, sleeping, and standing. The use of supervised machine learning techniques is evaluated to overcome the barriers of real-time activity recognition. Further different supervised machine learning algorithms were used and evaluated, which were extracted from existing literature. The project was conducted while accomplishing the machine learning life cycle stages, and it has significantly benefitted from generating highly accurate final results for the overall system. Further different supervised machine learning algorithms were used and evaluated, which were extracted from existing literature. The supervised machine learning algorithm Decision Tree Classifier used for this study. Using the Decision Classifier Tree algorithm succeeded in gaining more than 80% of model accuracy. Since the research topic comes under a classification type-oriented problem, the testing process of the model has been done using the confusion matrix for the trained model.

Бесплатно

Towards the Development a Cost-effective Earthquake Monitoring System and Vibration Detector with SMS Notification Using IOT

Towards the Development a Cost-effective Earthquake Monitoring System and Vibration Detector with SMS Notification Using IOT

Shaina Delia G. Tomaneng, Jubert Angelo P. Docdoc, Susanne A. Hierl, Patrick D. Cerna

Статья научная

As one of the countries situated in the Pacific Ring of Fire, the Philippines suffers from an inexhaustible number of natural disasters every year. One of the most destructible ones is the occurrence of earthquakes. Because of the high damage that earthquakes incur, along with their inevitability and unpredictability, developing effective methods of earthquake damage mitigation as well as disaster preparedness is imperative to lessen the negative impacts it is capable of producing in communities. One efficient way of doing this is by implementing an earthquake early warning (EEW) system that is capable of sending message alerts to receivers to warn them in the event of a hazardous earthquake. With this objective, this study centers on creating an earthquake detector with SMS messaging to function as an EEW system with an added advantage of being low-cost to make it more accessible to the public. Using electronic components based on an Arduino Mega 2560 and a Global System for Mobile Communications (GSM) module, the earthquake detector and its alert message system were created. A series of tests in different locations across Butuan City was then performed to assess the device’s accuracy in measuring different Intensity levels when subjected to surface vibrations. Comparative analysis showed that its recorded values. Corresponded with the values obtained from accelerometer-based mobile applications. In conclusion, the study was deemed functional in its ability to detect low and high surface vibrations, which proves that it is successful in detecting earthquake tremors and vibrations in the event of an earthquake.

Бесплатно

Trajectory tracking control and robustness analysis of a robotic manipulator using advanced control techniques

Trajectory tracking control and robustness analysis of a robotic manipulator using advanced control techniques

Reham H. Mohammed, Basem E. Elnaghi, Fahmy A. Bendary, Kamel Elserfi

Статья научная

The main focuses are to design controlling systems of good disturbance, stability rejection, and small error-tracking. Trajectory tracking of robot manipulators are controlled by several methodologies, but when robot manipulator works with uncertain dynamic models, some limitations of this technique appear. Concerning the control perspective, such uncertainty can be divided into two groups: the unstructured inputs (e.g. disturbance effect) and the structure dynamics (e.g. the changes of parameter). Within a small number of applications, some environments, could be unknown or unstructured, make use of robot manipulators, along with some tools of strong mechanics also can make use of new methods of control to design a controller of nonlinear robust with a reasonable performance. So in this paper we test the effect of disturbance in control the first DOF of PUMA 560 using non model based FO-Fuzzy-PID controller and compared its results with two model based controllers (CTC, ANN). Also we study the effect of change of inertias parameters in the 2 cases Model based control and non- Model based control and then discus which controller give the best results. The main objective of this paper is that the non model based FO-Fuzzy-PID is able to emulate the manipulator dynamic behaviour without the need to have a complex nonlinear mathematical model for the robot.

Бесплатно

Transabdominal and Laparoscopic Myomectomy Comparative Analysis of 566 Cases

Transabdominal and Laparoscopic Myomectomy Comparative Analysis of 566 Cases

Minhua Gao

Статья научная

The purpose of our study here is introducing curative effect by comparing and analyzing abdominal type myomectomy and laparoscopic myomectomy. We have compared and analyzed 301 cases of abdominal type myomectomy and 265 cases of laparoscopic myomectomy which were in our hospital from January 2003 to December 2008. The study shows that the time of abdominal type myomectomy is 87.18±36.80 minutes, and the time of laparoscopic myomectomy is 81.56±30.71 minutes. There isn’t obvious difference between these two kinds of surgeries. The hemorrhagic volume in abdominal type myomectomy is 106.86±32.65 ml and the hemorrhagic volume in laparoscopic myomectomy is 85.23±30.37 ml. The hemorrhagic volume difference in these two kinds of surgeries is very important from the point of view of statistics (P<0.01). The average days which used to restore in abdominal type myomectomy is 2.85±1.73, and the average days which used to restore in laparoscopic myomectomy is 5.81±1.47. And the difference is also very important (P<0.01). We have concluded that the laparoscopic myomectomy has such advantages as small hurt, rapid restoration and no incision. On the other hand, the hemorrhagic volume is very low and the restoration-days are very low.

Бесплатно

Transfer Characteristics of Three Kinds of Micro-groove Heat Pipes

Transfer Characteristics of Three Kinds of Micro-groove Heat Pipes

Liu Yi-Bing, Huang Zhi-Gang

Статья научная

In this paper, a simulation of three kinds of micro-groove plate heat pipes- rectangular; trapezoidal and triangular, is conducted by thermal analysis software ANSYS. Through comparing with the focal point temperature value of the surfaces of micro-groove plate heat pipes, respectively being 30W; 40W; 50W, the result is obtained that trapezoidal plate heat piper has more excellent performance.

Бесплатно

Transfer Learning based Breast Cancer Classification via Deep Convolutional Neural Network

Transfer Learning based Breast Cancer Classification via Deep Convolutional Neural Network

Markos Wondim Walle, Kula Kakeba Tune, Natnael Tilahun Sinshaw, Sudhir Kumar Mohapatra

Статья научная

Breast cancer is a leading cause of death among women, and the subjectivity of human visual perception and lack of automated detection methods can lead to misclassification of breast cancer images. In this study, a breast cancer classification model using a Convolutional Neural Network (CNN) deep learning algorithm was proposed. The model demonstrated high accuracy in classifying breast images as benign or malignant, with a classification accuracy of 97.1%. The model was also able to run on low computational resources. The study used a dataset of 2009 breast images labeled by two radiologists and included six scenarios based on different hyperparameters, augmentation values, pretrained models, and models built from scratch. While the performance of the proposed model was promising, further improvement may be achieved by using a larger breast image dataset and a machine with more powerful GPU hardware.

Бесплатно

Translating SQL Into Relational Algebra Tree-Using Object-Oriented Thinking to Obtain Expression Of Relational Algebra

Translating SQL Into Relational Algebra Tree-Using Object-Oriented Thinking to Obtain Expression Of Relational Algebra

XU Silao, HONG Mei

Статья научная

When we are translating SQL into relational algebra, we need a simple but flexible form to represent the data structure involved. As an interim result of the calculation, relational algebra tree combined with object-oriented model can gives us simple, intuitive notation allowing the query to be efficiently expressed and implemented at amazing ease.

Бесплатно

Transmitting security enforcement by text encrypting and image hiding technique using combined encrypt/hide keys

Transmitting security enforcement by text encrypting and image hiding technique using combined encrypt/hide keys

Mohammed Jawar Khami

Статья научная

Comparative study of cryptography and steganography techniques shows that they have some strong and weak points when they used alone. But as we know from soft computing techniques (neural, genetic, and fuzzy computing), that when combining (hybridizing), more than one techniques, by the suitable way to do a job, the outcome will be a better technique with more strong points and less weak points. Work of this paper represents an attempt to prove that combining cryptography with steganography techniques will result in hard transmitting system to break and thus enforcing security issues of secret text data transmitting over public channels. Matlab programs are written to encrypt plain text secret information following AES encrypt/decrypt algorithm with a key of 128 bits long and then hide/extract the text according to LSB insertion method with a key of 128 bits long too. System tests show that both techniques enforce each other and private data transmitting become more secure.

Бесплатно

Tree-classification Algorithm to Ease User Detection of Predatory Hijacked Journals: Empirical Analysis of Journal Metrics Rankings

Tree-classification Algorithm to Ease User Detection of Predatory Hijacked Journals: Empirical Analysis of Journal Metrics Rankings

Arnold Adimabua Ojugo, Obinna Nwankwo

Статья научная

A major challenge today in communication and over various communications medium is the wanton havoc wreaked by attackers as they continue to eavesdrop and intrude. Young and inexperienced academia are today faced with the challenge of journal houses to send cum have their articles published. The negative impact thus, of predatory and hijacked journals cannot be over-emphasized as adversaries use carefully crafted, social engineering (phishing attack) skills – to exploit unsuspecting and inexperienced academia usually for personals gains. These attacks re-direct victims to fake pages. The significance of the study is to advance a standard scheme/techniques employed by phished (predatory/hijacked) journals to scam young academia and inexperienced researchers in their quest for visibility in highly impactful indexed journals. Thus, our study advances a decision-tree algorithm that educates users by showing various indicators cum techniques advanced by predatory and hijacked journals. We explore journal phishing attacks employed by such journals, targeted at young academia to adequately differentiate also using web-page ranking. Results show the classification algorithm can effectively detect 95-percent accuracy of journal phishing based on journal metric indicators and website ranks.

Бесплатно

Unilateral vital signs monitoring systems on IoT

Unilateral vital signs monitoring systems on IoT

Vinod Kumar P., U.B. Mahadevaswamy

Статья научная

With the consistent development of remote sensor systems and Internet of Things (IoT) different parts of life will benefit. IoT based pervasive human services framework can possibly give blunder free restorative information and alarming system in basic conditions with constant checking. The device will minimize the need of devoted medicinal staff for patient checking and help the ailing to lead an ordinary life other than furnishing them with great restorative medical aid. This paper presents the working model which fuses sensors to gauge parameters like body temperature, blood pressure level & pulse. A microcontroller board is utilized for examining the inputs from the patient. Additionally all the procedure parameters inside of an interim selectable by the patient are monitored. This is extremely valuable for future examination and survey of feeble wellbeing condition. For more flexible restorative applications, this venture can be extemporized, by consolidating continuous parameter observing parameters respiratory thoracic extension belt sensors and annunciation frameworks, in this manner making it valuable in clinics as an exceptionally effective and committed aid consideration unit.

Бесплатно

Variational Iteration Method for Solving Differential Equations with Piecewise Constant Arguments

Variational Iteration Method for Solving Differential Equations with Piecewise Constant Arguments

Qi Wang, Fenglian Fu

Статья научная

In this paper, variational iteration method is applied for finding the solution of differential equations with piecewise constant arguments. A correction functional is constructed by a general Lagrange multiplier, which can be identified by variational theory. This technique provides a sequence of functions which converges to the exact solution of the problem without discretization of the variables. The flexibility and adaptation provided by the method have been verified by an example.

Бесплатно

Virtual Prototype Technology of Product Which Based on Computer

Virtual Prototype Technology of Product Which Based on Computer

Xiaoyan Jiang, Yiming He

Статья научная

In this paper, we have mainly analyzed the relationship between virtual prototype and concurrent design. Then we have concluded the model of virtual prototype and simulation method which based on field object. On the other hand, we have introduced the key technology which supports virtual prototype’s integration framework.

Бесплатно

Voice Pathology Identification: A Survey on Voice Disorder

Voice Pathology Identification: A Survey on Voice Disorder

N.A. Sheela Selvakumari, V.Radha

Статья научная

Nowadays, Identification and Classification of voice pathology plays a major role in the field of speech processing. This paper explores and compares various things like input database, parameters, features extraction techniques, methodology and classification techniques used by the researchers in the problem of identifying the voice pathology. In this paper, we compared seven research works done in the field of voice pathology identification and classification. By analyzing the data's mentioned in these research papers and by considering these research papers as a base study, we wish to do the further research on voice pathology identification.

Бесплатно

Walking mobile robot of arbitrary orientation

Walking mobile robot of arbitrary orientation

Mikhail Polishchuk, Mark Opashnianskyi, Nikita Suyazov

Статья научная

The article describes the device and the mathematical model of a walking mobile robot of a fundamentally new construction. The difference between this technical solution is the ability to move the robot on surfaces of arbitrary orientation in different coordinate systems: rectangular Cartesian, cylindrical and spherical. In the proposed design, the walking robot mechanism is made in the form of flexible pedipulators and allows the mobile to perform transitions on surfaces that have an arbitrary orientation at different angles to the horizon. The technique for calculating the construction parameters of the walking robot mechanism and the trajectories of the robot legs bending is given. This walking robot is designed to perform technological operations in extreme conditions.

Бесплатно

Журнал