Journal Vol – 15 No -5, May 2020

MINIMIZING INFLUENCE OF RUMOURS ON SOCIAL NETWORKS USING MACHINE LEARNING ALGORITHMS AND ANALYSIS

Authors:

T. C. Subash Ponraj, S. S. Subashka Ramesh

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00016

Abstract:

The advancement of large scale online social networks, online data sharing is turning out to be pervasive consistently. Both positive and negative information is spreading through online social networks. It centres on the negative data issues, for example, online rumours. Blocking of online rumour is one of the major issues in large scale social media networks. Hostile rumours can lead to confusion in the public eye and consequently should be quickly as fast as time permits in the wake of being distinguished. For this we used hybrid SVM, Naive Bayes and KNN algorithm. We will probably limit the impact of the rumour which is the quantity of clients that have acknowledged and sent the rumour by obstructing a specific subset of hubs

Keywords:

Rumour,malicious,Hybrid SVM,Naive Bayes,KNN,

Refference:

I. Castillo, C., Mendoza, M., &Poblete, B. (2011), March. Information credibility on twitter. In Proceedings of the 20th international conference on World wide web (pp. 675-684).

II. Kwon S Cha, M. Jung, K., Chen, W. & Wang, Y. (2013), November. Aspects of rumor spreading on a microblog network. In: International Conference on Social Informatics. Springer, Cham.

III. Kwon S Cha, M., Jung, K., Chen, W., & Wang, Y. (2013), December. Prominent features of rumor propagation in online social media. In: 2013 IEEE 13th International Conference on Data IEEE.

IV. Mendoza, M., Poblete, B., & Castillo, C. (2010), July. Twitter under crisis: Can we trust what we RT?. In: Proceedings of the first workshop on social media analytics (pp. 71-79).

V. Qazvinian, V., Rosengren, E., Radev, D. R., & Mei, Q. (2011), July. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the conference on empirical methods in natural language processing (NPL). Association for Computational Linguistics.

View Download

SELF-EVALUATION FRAMEWORK FOR SEPARATION ESTIMATION FROM SCREENS TO ENSURE EYES PROTECTION UTILIZING IMAGE PROCESSING

Authors:

Naveen Raj Y

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00017

Abstract:

Picture dealing with is a strategy for changing over an image into cutting edge structure by playing out certain technique on it, in order to get the trademark features of that image. Face recognition is one of numerous utilizations of computerized picture preparing. Monitors placed too close or too far away may cause problems that may lead to eyestrain. Design is to implement automatic alert based on distance. Web camera can be used for capturing human head positions and separate the background from foreground head positions. Then face can be detected and recognized using image processing. Finally, the distance from monitor to face via web camera is calculated. If the distance is minimum to pre-define threshold value means, alert will be automatically generated and intimated to users without using any sensors.

Keywords:

Image processing,Face Recognition,

Refference:

I. C. Guo and L. Zhang, “A novel multi-resolution spatiotemporal saliency detection model and its applications in image and video compression”, TIP, vol. 19, no. 1, pp. 185–198, 2010
II. F. Perazzi, P. Kr¨ahenb¨uhl, Y. Pritch, and A. Hornung, “Saliency filters: Contrast based filtering for salient region detection”, in CVPR. IEEE, 2012, pp. 733–740
III. L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis”, TPAMI, no. 11, pp. 1254–1259, 1998
IV. M. Cheng, N. J. Mitra, X. Huang, P. H. Torr, and S. Hu, “Global contrast based salient region detection”, TPAMI, vol. 37, no. 3, pp. 569–582, 2015
V. M. Donoser, M. Urschler, M. Hirzer, and H. Bischof, “Saliency driven total variation segmentation”, ICCV, IEEE, 2009, pp. 817–824
VI. M.-M. Cheng, J. Warrell, W.-Y. Lin, S. Zheng, V. Vineet, and N. Crook, “Efficient salient region detection with soft image abstraction”, ICCV, 2013, pp. 1529–1536
VII. P. Jiang, H. Ling, J. Yu, and J. Peng, “Salient region detection by ufo: Uniqueness, focusness and objectness”, in ICCV, 2013, pp. 1976–1983
VIII. Q. Yan, L. Xu, J. Shi, and J. Jia, “Hierarchical saliency detection”, in CVPR. IEEE, 2013, pp. 1155–1162
IX. S. Frintrop, G. M. Garcia, and A. B. Cremers, “A cognitive approach for object discovery”, ICPR, IEEE, 2014, pp. 2329–2334
X. S. Frintrop, T. Werner, and G. M. Garc´ıa, “Traditional saliency reloaded: A good old model in new shape”, in CVPR, 2015, pp. 82–90

View Download

AN INTELLIGENT SYSTEM TO PREVENT THE SPREADING OF SENSITIVE CONTENT ONLINE

Authors:

L. Jaba Sheela, S. Kousalya, R. Abinaya

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00018

Abstract:

In recent years, there is a striking surge in the availability of porn images and other such sensitive content on the Internet.  Filtering of image porn has become one of the big challenges for searches; they are tied to finding methods to filter porn images and videos. Social media network is interested in filtering porn images from normal ones. The main objective of the proposed “Intelligent System to Prevent the Spreading of Sensitive Content Online” is to reduce the risk of harassment to a large extent by preventing anti-social elements from uploading such obscene content online. For attaining the ultimate goal, we will be using CNN algorithm to detect pornographic content. By RGB Channel Shifting, pixels of those pornographic contents will be corrupted in the device of the person trying to upload it on social media or internet. By using this “Intelligent System to Prevent the Spreading of Sensitive Content Online” we can prevent spreading of pornographic images/videos and thus avoid the harmful effects caused by these obscene practices.

Keywords:

CNN algorithm,RGB channel shifting,pornographic content,

Refference:

I. B. Liu, J. Su, Z. Lu and Z. Li, “Pornographic Images Detection Based on CBIR and Skin Analysis,” 2008 Fourth International Conference on Semantics, Knowledge and Grid, Beijing, 2008, pp. 487-488. doi: 10.1109/SKG.2008.48

II. H. Zhu, S. Zhou, J. Wang and Z. Yin, “An algorithm of pornographic image detection,” Fourth International Conference on Image and Graphics (ICIG 2007), Sichuan, 2007, pp. 801-804. doi: 10.1109/ICIG.2007.29

III. I. M. A. Agastya, A. Setyanto, Kusrini and D. O. D. Handayani, “Convolutional Neural Network for Pornographic Images Classification,” 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA), Subang Jaya, Malaysia, 2018, pp. 1-5. doi: 10.1109/ICACCAF.2018.8776843

IV. Islam, MdKamrul, MdManjur Ahmed, and Kamal ZuhairiZamli. “Identifying the Pornographic Video on YouTube Using Vlog Stream.” 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, 2018.

V. J. Shayan, S. M. Abdullah and S. Karamizadeh, “An overview of objectionable image detection,” 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), Langkawi Island, 2015, pp. 396-400.doi: 10.1109/ISTMET.2015.7359066

VI. K. Zhou, L. Zhuo, Z. Geng, J. Zhang and X. G. Li, “Convolutional Neural Networks Based Pornographic Image Classification,” 2016 IEEE Second International Conference on Multimedia Big Data (BigMM), Taipei, 2016, pp. 206-209. doi: 10.1109/BigMM.2016.29

VII. L. Lv, C. Zhao, H. Lv, J. Shang, Y. Yang and J. Wang, “Pornographic images detection using High-Level Semantic features,” 2011 Seventh International Conference on Natural Computation, Shanghai, 2011, pp. 1015-1018. doi: 10.1109/ICNC.2011.6022151

VIII. M. B. Garcia, T. F. Revano, B. G. M. Habal, J. O. Contreras and J. B. R. Enriquez, “A Pornographic Image and Video Filtering Application Using Optimized Nudity Recognition and Detection Algorithm,” 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), Baguio City, Philippines, 2018, pp. 1-5. doi: 10.1109/HNICEM.2018.8666227

IX. Moreira, Danilo&Fechine, Joseana. (2018). “A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images.” 1-8. 10.1109/IJCNN.2018.8489100.

X. Murugavalli, S., et al. “Enhancing security against hard AI problems in user authentication using CAPTCHA as graphical passwords.” International Journal of Advanced Computer Research 6.24 (2016): 93.

XI. MyoungBeom Chung, IlJuKo and DaeSik Jang, “Obscene image detection algorithm using high-and low-quality images,” 4th International Conference on New Trends in Information Science and Service Science, Gyeongju, 2010, pp. 522-527.

XII. Sheela, L. Jaba, V. Shanthi, and D. Jeba Singh. “Image mining using association rules derived from feature matrix.” Proceedings of the International Conference on Advances in Computing, Communication and Control. 2009.

XIII. Thenkalvi,B., and S. Murugavalli, “Image retrieval using certain block based difference of inverse probability and certain block based variation of local correlation coefficients integrated with wavelet moments.” Journal of Computer Science 10.8 (2014): 1497.

XIV. Y. Xu, B. Li, X. Xue and H. Lu, “Region-based Pornographic Image Detection,” 2005 IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, 2005, pp. 1-4. doi: 10.1109/MMSP.2005.248675

XV. Yaqub, Waheeb&Mohanty, Manoranjan&Memon, Nasir. (2018). “Encrypted Domain Skin Tone Detection For Pornographic Image Filtering”. 1-5. 10.1109/AVSS.2018.8639350.

XVI. Zhang, J., Sui, L., Zhuo, L., & Li, Z. (2013). “Pornographic image region detection based on visual attention model in compressed domain”. IET Image Processing, 7, 384-391.

View Download

CFD TOOL FOR UNDERSTANDING THE BEHAVIOR OF MULTI PHASE IN ENGINEERING APPLICATIONS

Authors:

G. Madhava Rao, G. Swamy Reddy

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00019

Abstract:

A fluid is anything that moves, typically a liquid or even a gasoline, the last being differentiated through its own wonderful loved one compressibility. Liquids are treated as continual media, and also their movement and also condition can be defined in regards to the speed u, tension p, density, etc reviewed at every aspect in space x and also time t. To describe the density at a point, for example, expect the point to be bordered by an extremely tiny component (little compared to length ranges of passion in practices) which however contains a very large variety of molecules. The density is actually at that point the overall mass of all the particles in the aspect separated due to the quantity of the component.

Keywords:

CFD tool,Engineering applications,turbulence,

Refference:

I. Booker, J.R.: Thermal convection with absolutely temperature-dependent viscosity. J. Liquid Mech. 76 (4), pp. 741-754 (1976).

II. Bunge, H.P., Richards, M.A., Baumgardner, J.R.: Results of depth-dependent thickness on the platform of cover convection. Credit 379, pp. 436-438 (1996).

III. Burguete, J., Mokolobwiez, N., Daviaud, F., Garnier, N., Chiffaudel, A.: Buoyant-thermocapillary instabilities in significant coatings subjected to a straight temp slope. Phys. Fluids thirteen, pp. 2773-2787 (2001).

IV. Canuto, C., Hussaini, M.Y., Quarteroni, A., Zang, T.A. Spectral Approaches in Liquid Facet. Springer, Berlin (1988).

V. Daviaud, F., Vince, J.M.: Taking a trip surges in a fluid level subjected to a matching temperature incline. Phys. Rev. E 48, pp. 4432-4436 (1993).

VI. De Saedeleer, C., Garcimartin, A., Chavepeyer, G., Platten, J.K., Lebon, G.: The weakness of a liquefied level warmed up from the side when the higher place degrees to sky. Phys. Liquids 8( 3 ), pp. 670-676 (1996).

VII. D. Srinivasacharya, G. Swamy Reddy, “Heat and mass transfer by Natural convection in a doubly stratified porous medium saturated with Power-law fluid”, International Journal of Advanced Trends in Computer Applications, Vol.1 (1), pp.66–69, (2019).

VIII. G. Swamy Reddy, R. Archana Reddy, G.Ravi kiran ” A Review on computational Fluid Dynamics Projects”, Indian Journal of public health research and Development, Vol.9(11) (2018).

IX. G. Swamy Reddy, G. Ravi Kiran, R. Archana Reddy, “Radiation Impacts on Free Convection Circulation of a Power-Law Fluid past Vertical Plate Filled Along With Darcy Porous Medium” International Journal of Engineering and advanced Technology, Vol.8(6), pp.4582-4585, (2019).

X. G. Ravi Kiran, G. Swamy Reddy, B. Devika, R. Archana Reddy, “Effect Of Magnetic Field And Constriction On Pulsatile Flow Of a Dusty Fluid”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.14 (6), pp.67–82, (2019).

View Download

COMPUTATIONAL FLUID DYNAMICS AND NUMERICAL METHODS FOR SOLVING UNSTEADY FLOW PROBLEMS

Authors:

G. Swamy Reddy, G. Madhava Rao

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00020

Abstract:

The symbolic residential or commercial property of liquids (both fluids and also gases) is composed in the ease with which they could be flawed. A suitable meaning of a fluid is not easy to condition as, in many instances, it is certainly not apparent to distinguish a fluid from a strong. In this training course we will definitely deal with "straightforward fluids", which Bachelor (1967) specifies as follows. "A simple fluid is actually a material such that the loved one positions of elements of the component modification by a volume which is certainly not little when suitable selected powers, however little in measurement, are actually related to the material. Particularly a basic fluid can easily certainly not stand up to any type of possibility by administered pressures to warp it in such a way which leaves the volume the same."

Keywords:

computational fluid dynamics,numerical methods,unsteady flow problems,

Refference:

I. B.C. Sim, A. Zebib. “Result of complimentary surface area coziness loss as well as likewise rotation on change to oscillatory thermocapillary convection.” Phys. Liquids 14 (1), 225 (2002).

II. B.C. Sim, A. Zebib, D. Schwabe. “Oscillatory thermocapillary convection in on call sphere annuli. Component 2. Likeness.”J. Fluid Mech. 491, 259 (2003).

III. D. Srinivasacharya, G. Swamy Reddy, “Heat and mass transfer by Natural convection in a doubly stratified porous medium saturated with Power-law fluid”, International Journal of Advanced Trends in Computer Applications, Vol.1 (1), pp.66–69, (2019).

IV. E. Favre, L. Blumenfeld and also F. Daviaud, “Weak point of a liquid finish regionally warmed up on its own absolutely free area.”Phys. Liquids 9, 1473 (1997).

V. G. Swamy Reddy, R. Archana Reddy, G. Ravi kiran ” A Review on computational Fluid Dynamics Projects”, Indian Journal of public health research and Development, Vol.9(11) (2018).

VI. G. Swamy Reddy, G. Ravi Kiran, R. Archana Reddy, “Radiation Impacts on Free Convection Circulation of a Power-Law Fluid past Vertical Plate Filled Along With Darcy Porous Medium” International Journal of Engineering and advanced Technology, Vol.8(6), pp.4582-4585, (2019).

VII. G. Ravi Kiran, G.Swamy Reddy, B. Devika, R.Archana Reddy, “EFFECT OF MAGNETIC FIELD AND CONSTRICTION ON PULSATILE FLOW OF A DUSTY FLUID” JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, Vol.14 (6), pp.67–82, (2019).

VIII. M.A. Pelacho as well as J. Burguete, “Temperature oscillations of hydrothermal rises in thermocapillary-buoyancy convection.”Phys. Rev. E 59, 835 (1999).

IX. N. Garnier and also A. Chiffaudel. “2 perspective hydrothermal rises in an extended cylindrical vessel.” Eur. Phys. J. B 19, 87 (2001).

View Download

EXPERIMENTAL ANALYSIS WITH BEHAVIOR RELIANCE INSIDER THREAT DETECTION MODEL

Authors:

K. Venkateswara Rao, T. Uma Devi

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00021

Abstract:

Malicious insiders are executing the severe attacks on cloud by misusing their privileges, which leads to the irreversible damages and loss of reputation. As the malicious insiders are authorized and integral part of the cloud, detecting and obstructing them to prevent the cloud from malicious attacks, became the complex and instantly focusable research aspect. An efficient “Insider Threat Detection Model” was proposed using the behavior reliance anomaly detection process. This paper elucidates Behavior Reliance Insider Threat Detection Model (BRITDM) implementation process and an empirical study was also conducted on the proposed model. Amazon AWS modeled log file input records were used as input to detect the insider activities, using the proposed Behavior Reliance Anomaly Detection (BRAD) four layer architecture. Detailed user and admin activities were collected from the cloud log files that are represented in JSON format. JSQL Parser used for the query knowledge extraction and to create XML Tree. SVM classifier is trained with Compact Prediction Tree (CPT) structures knowledge starts with the comparison of admin executed activity query knowledge against the respective CPT structures of design level activity base, to determine whether the executed admin activity is malicious or not according to the BRAD four layered architecture. Cloud BRITDM processed 30 input records and resulted 5 as unique activities, 5 as abnormal, 2 as unintended suspicious activities and one as intended insider thereat and reaming are normal activities. Experimental results shown the proposed BRITDM performed well in identifying the unique, abnormal, and suspicious and threats from insider activities.

Keywords:

ITDM,BRAD Process flow,Anomaly Detection,Malicious Insider Threat Detection,

Refference:

I. AWS CloudTrail: User Guide by Amazon AWS. Version-1, 2020, https://docs.aws.amazon.com/awscloudtrail/latest/userguide/awscloudtrail-ug.pdf

II. Bray, T. (2014). The JavaScript Object Notation (JSON) Data Interchange Format. RFC, 7158, 1-16

III. Cost of Insider Threats: Global Organizations,” https://www.observeit.com/ponemon-report-cost-of-insider-threats”

IV. Dawn Cappelli, Andrew Moore and Randall Trzeciak “The CERT Guide to Insider Threats”,Addison-Wesely,2012PearsonEducation, Inc.http://ptgmedia.pearsoncmg.com/images/9780321812575/samplepages/9780321812575.pdf

V. Eberle, William & Holder, Lawrence & Graves, Jeffrey. (2010). Insider Threat Detection Using a Graph-Based Approach. Journal of Applied Security Research. 6. 10.1080/19361610.2011.529413.

VI. Greitzer, F. L., &Hohimer, R. E. (2011). Modeling human behavior to anticipate insider attacks. Journal of Strategic Security, 4(2), 25

VII. Gueniche T., Fournier-Viger P., Raman R., Tseng V.S. (2015) CPT+: Decreasing the Time/Space Complexity of the Compact Prediction Tree. In: Cao T., Lim EP., Zhou ZH., Ho TB., Cheung D., Motoda H. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2015. Lecture Notes in Computer Science, vol 9078. Springer, Cham.

VIII. IBM X-Force Threat Intelligence Index Report “https://www.ibm.com/security/data-breach/threat-intelligence”

IX. Isaac Kohen, “2018 Crowd Research Partners ‘Insider Threat Report’: hopes and fears revealed”, 29 NOVEMBER 2017. http://crowdresearchpartners.com/wp-content/uploads/2017/07/Insider-Threat-Report-2018.pdf
X. Insider Threat Statistics for 2019: Facts and Figures : ”https://www.ekransystem.com/en/blog/insider-threat-statistics-facts-and-figures ”
XI. Jackson Project Home @github “https://github.com/FasterXML/jackson”

XII. Java Sql Parser, “http://jsqlparser.sourceforge.net/”.

XIII. K.VenkateswaraRao, Dr. T.Uma Devi “Architecture of Insider Threat Detection Model to Counter the Malicious Insider Threats on Cloud”, JASC: Journal of Applied Science and Computations – Volume 5, Issue 10, October/2018.

XIV. K.VenkateswaraRao, Dr. T.Uma Devi“Behavior Reliance Anomaly Detection with Customized Compact Prediction Trees”International Journal of Innovative Technology and Exploring Engineering (IJITEE)’, Volume-8 Issue-8, June 2019 https://www.ijitee.org/download/volume-8-issue-8/

XV. Kandias, Miltiadis&Virvilis, Nikos &Gritzalis, Dimitris. (2013). “The Insider Threat in Cloud Computing”. 6983. 93-103. 10.1007/978-3-642-41476-3_8.

XVI. P. Chattopadhyay, L. Wang and Y. Tan, “Scenario-Based Insider Threat Detection From Cyber Activities,” in IEEE Transactions on Computational Social Systems, vol. 5, no. 3, pp. 660-675, Sept. 2018.

XVII. S. Ceri and G. Gottlob, “Translating SQL Into Relational Algebra: Optimization, Semantics, and Equivalence of SQL Queries,” in IEEE Transactions on Software Engineering, vol. SE-11, no. 4, pp. 324-345, April 1985.

View Download

DEVELOPMENTS IN INPIPE INSPECTIONROBOT: A REVIEW

Authors:

R. Sugin Elankavi, D. Dinakaran, Jaise Jose

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00022

Abstract:

Pipeline inspection robots are gaining importance and have seen several developments throughout the past decade. Developing a pipeline inspection robot can specifically overcome the issues of humans in labor and their intervention in an inconvenient condition during repair and maintenance inside the pipeline. This survey shows the advancements made in the field of pipeline inspection robots by classifying them according to their type of locomotion. The locomotion’s are divided into seven basic types and prototypes are developed based on these motions. Each prototype has its benefits and drawbacks based on their purpose of inspection. Different models are designed and validated for ensuring their functionality and performance. This review attempts to present the capabilities of various inspection robot models and compares their performance. This will provide insights into selection, developments and research gaps in this domain.

Keywords:

In-pipe robot,Pipelines,Mobile robots,Inspection,Shape adaptability,IPIR,

Refference:

I. Alnaimi FB, Mazraeh AA, Sahari KS, Weria K, Moslem Y. Design of a multi-diameter in-line cleaning and fault detection pipe pigging device. In2015 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS) 2015 Oct 18 (pp. 258-265). IEEE.
II. Brown L, Carrasco J, Watson S, Lennox B. Elbow Detection in Pipes for Autonomous Navigation of Inspection Robots. Journal of Intelligent & Robotic Systems. 2019 Aug 15;95(2):527-41.
III. Fang D, Shang J, Luo Z, Lv P, Wu G. Development of a novel self-locking mechanism for continuous propulsion inchworm in-pipe robot. Advances in Mechanical Engineering. 2018 Jan;10(1):1687814017749402.
IV. Ismail IN, Anuar A, Sahari KS, Baharuddin MZ, Fairuz M, Jalal A, Saad JM. Development of in-pipe inspection robot: A review. In2012 IEEE Conference on Sustainable Utilization and Development in Engineering and Technology (STUDENT) 2012 Oct 6 (pp. 310-315). IEEE.
V. Kakogawa A, Ma S. Mobility of an in-pipe robot with screw drive mechanism inside curved pipes. In 2010 IEEE International Conference on Robotics and Biomimetics 2010 Dec 14 (pp. 1530-1535). IEEE.
VI. Kwon YS, Yi BJ. Design and motion planning of a two-module collaborative indoor pipeline inspection robot. IEEE Transactions on Robotics. 2012 Jan 31;28(3):681-96.
VII. Kim JH, Sharma G, Iyengar SS. FAMPER: A fully autonomous mobile robot for pipeline exploration. In2010 IEEE International Conference on Industrial Technology 2010 Mar 14 (pp. 517-523). IEEE.
VIII. Kim Kim HM, Suh JS, Choi YS, Trong TD, Moon H, Koo J, Ryew S, Choi HR. An in-pipe robot with multi-axial differential gear mechanism. In2013 IEEE/RSJ international conference on intelligent robots and systems 2013 Nov 3 (pp. 252-257). IEEE.
IX. Kakogawa A, Ma S. Robotic Search and Rescue through In-Pipe Movement. InAerial Robotic Systems 2019 Aug 12. IntechOpen.
X. Li P, Tang M, Lyu C, Fang M, Duan X, Liu Y. Design and analysis of a novel active screw-drive pipe robot. Advances in Mechanical Engineering. 2018 Oct;10(10):1687814018801384.
XI. Li T, Liu K, Liu H, Cui X, Li B, Wang Y. Rapid design of a screw drive in-pipe robot based on parameterized simulation technology. SIMULATION. 2019 Jul;95(7):659-70.
XII. Mazraeh AA, Ismail FB, Khaksar W, Sahari KS. Development of ultrasonic crack detection system on multi-diameter PIG robots. Procedia Computer Science. 2017 Jan 1;105:282-8.
XIII. Mohammed MN, Nadarajah VS, Lazim NF, Zamani NS, Al-Sanjary OI, Ali MA, Al-Youif S. Design and Development of Pipeline Inspection Robot for Crack and Corrosion Detection. In2018 IEEE Conference on Systems, Process and Control (ICSPC) 2018 Dec 14 (pp. 29-32). IEEE.
XIV. Qiao J, Shang J, Goldenberg A. Development of inchworm in-pipe robot based on self-locking mechanism. IEEE/ASME Transactions On Mechatronics. 2012 Feb 23;18(2):799-806.
XV. Ramirez-Martinez A, Rodríguez-Olivares NA, Torres-Torres S, Ronquillo-Lomelí G, Soto-Cajiga JA. Design and Validation of an Articulated Sensor Carrier to Improve the Automatic Pipeline Inspection. Sensors. 2019 Jan;19(6):1394.
XVI. Sawabe H, Nakajima M, Tanaka M, Tanaka K, Matsuno F. Control of an articulated wheeled mobile robot in pipes. Advanced Robotics. 2019 Oct 18;33(20):1072-86.
XVII. Savin S, Vorochaeva L. Footstep planning for a six-legged in-pipe robot moving in spatially curved pipes. In2017 International Siberian Conference on Control and Communications (SIBCON) 2017 Jun 29 (pp. 1-6). IEEE.
XVIII. Savin S, Jatsun S, Vorochaeva L. State observer design for a walking in-pipe robot. InMATEC Web of Conferences 2018 (Vol. 161, p. 03012). EDP Sciences.
XIX. Savin S, Vorochaev A, Vorochaeva L. Inverse Kinematics for a Walking in-Pipe Robot Based on Linearization of Small Rotations. The Eurasia Proceedings of Science, Technology, Engineering & Mathematics. 2018;4:50-5.
XX. Savin S. RRT-based Motion Planning for In-pipe Walking Robots. In2018 Dynamics of Systems, Mechanisms and Machines (Dynamics) 2018 Nov 13 (pp. 1-6). IEEE.
XXI. Takagi M, Yoshida K, Hoshino H, Tadakuma R, Suzuri Y, Furukawa H. Sliding walk with friction control of double-network gel on feet of inchworm robot. Frontiers in Mechanical Engineering. 2019 Jul 19;5:44.
XXII. Venkateswaran S, Chablat D. A new inspection robot for pipelines with bends and junctions. InIFToMM World Congress on Mechanism and Machine Science 2019 Jun 30 (pp. 33-42). Springer, Cham.
XXIII. Wahed MA, Arshad MR. Wall-press type pipe inspection robot. In2017 IEEE 2nd International Conference on Automatic Control and Intelligent Systems (I2CACIS) 2017 Oct 21 (pp. 185-190). IEEE.

View Download

DEVELOPMENT OF A RAILROAD TRACK INSPECTION SYSTEM BASED ON VISUAL PERCEPTION USING LABVIEW

Authors:

Nithin Srinivasan, RM. Kuppan Chetty, Oh Joo Ztat, Manju Mohan, A. Joshuva

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00023

Abstract:

Railroad track inspection is essential to guarantee safe operation condition for the rails to travel on. Even though railway sector invests hefty costs, time and strong human workforce to ensure the performance and safety of the railroads, frequent accident occurs throughout the year due to poor visual inspection carried out by the human inspectors. The quality of inspection remains a question mark and deteriorates progressively when the experienced human inspectors are made to carry out the inspection all along the railroads exposing them to mental fatigue and other potential health hazards. Therefore, in this study, a simple method using visual perception and image processing techniques for the inspection of railroad track for anomalies is presented as an alternate solution to the traditional inspection system. An automated wheeled mobile robot is also prototyped to carry out the inspection on the railroads. This prototyped system uses a visual perception algorithm based on edge detection and feature extraction is developed in LabVIEW, which continuously records the images of the track; assesses and detects the railroad components such as loose bolts, bent boltsand surface cracks, which are very critical for rail safety. The performance of the proposed system is investigated in the laboratory conditions and results show high performance in the detection of railroad track anomalies.

Keywords:

Railroad Track Inspection,Visual Perception,Mobile Robot,Image Processing,Image Analysis,

Refference:

I. A. Distante, M. Nitti, E. Stella, P. L. Mazzeo, and F. Marino, “Automatic method and system for infrastructure visual inspection,” International Patent N. WO2007/010473, owned by the Italian National Research Council. World Intellectual Property Organization (WIPO), January 25, 2007 (International FilingDate: July 17, 2006; Priority Data: RM2005A000381, July 18, 2005).
II. A. Raza Rizvi, P. Rauf Khan, S. Ahmad., “Crack Detection in Railway Track Using Image Processing”, International Journal of Advance Research Ideas and Innovations in Technology, Vol.: 3, Issue: 4, pp. 489-496, 2017.
III. E.Resendiz, J.M.Hart and N.Ahuja., “Automated Visual Inspection of Railroad Tracks”, IEEE transactions on Intelligent Transportation Systems, Volume.: 14, Issue:2, pp. 751-760, 2013.
IV. E.Resendiz., L.Molina., J.Hart, J.Edwards, S.Sawadisavi, N.Ahuja and C.Barkan, “Development of a machine vision system for inspection of railway track components”, in Proceedings of the 12th WCTR World Conference on Transport Research, Lisbon, Portugal, pp.3355, 2010.
V. G.L. Foresti and C.S. Regazzoni, “New Trends in Video Communications, processing and Understanding in Surveillance Applications”, Proc. International Conference on Image Processing, Vol. : 89, Issue : 10, pp .1355 – 1367, 2001.
VI. H. Berger, “Non-Destructive Testing of Railroad Rail”, Transportation Research Record, Vol.: 744, pp. 22-26, 1980.
VII. Innotrack, D4.4.1, “Rail Inspection Technologies”, Projcet no. TIP5-CT-2006-031415, Available at: www.innotrack.net.
VIII. J.L. Rose, M.J. Avioli, P. Mudge and R. Sanderson, “Guidedwave inspection potential of defects in rail”, NDT&E International, Vol. : 37, pp153-161, 2004.
IX. K. Itoh, H. Tanaka and M. Seki, “Eye MovementAnalysis of Track Monitoring patterns of Night Train Operators :Effects of Geographic Knowledge and Fatigue”, in Proceedings of the IEA 2000/HFES Congress, pp. 360-363, 2000.
X. M. Karakose, O.Yaman, M. Baygin, K. Murat and E. Akin, “A New Computer Vision Based Method for Rail Track Detection and Fault Diagnosis in Railways”, International Journal of Mechanical Engineering and Robotics Research, Vol.:6, Issue:1, pp.22-27, 2017.
XI. M. Singh, S. Singh, J. Jaisal and J.Hempshall, “Autonomous Rail Track Inspection using Vision Based System”, IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, pp. 56 – 59, 2006.
XII. M.P. Papaelias and M. Lugg, “Detection and evaluation of rail surface defectsusingalternatingcurrentfieldmeasurement techniques”, Proceedings of the IMechE Part F : Journal of Rail and Rapid Transit, Vol.: 226, Issue: 5, pp. 530–541, 2016.
XIII. NI IMAQ Vision Assistance Tutorial [Online] Available: https://neurophysics.ucsd.edu/Manuals/National%20Instruments/NI%20Vision%20Assistant%20Tutorial.pdf
XIV. NI IMAQ Vision Manual [Online] Available : http://www.csun.edu/~rd436460/Labview/IMAQ-Manual.pdf
XV. NI Labview IMAQ Vision Concept Manual [Online]. Available: http://www.ni.com/pdf/manuals/322916b.pdf
XVI. P. L. Mazzeo, M. Nitti, E. Stella and A. Distante, “Visual Recognition of FasteningBolts for Railroad Maintenance”, Pattern Recognition Letters, pp. 669 – 677, 2004.
XVII. P. Yarza, A. Amirola, “New Technologies Applied to railway Infrastructure Maintenance”, Meeting on Planning, Design, Construction and Equipment of Metropolitan Railways, Madrid, 2003.
XVIII. R. A. Khan, S. Islam and R. Biswas, “Automatic Detection of defective rail anchors”, in Proc. IEEE 17th Internal Conferences on Intelligent Transportation Systems, pp.1583-1588, 2014.
XIX. R.K. Verma, A.Jeewan, S.Jain and M.Vats, “Automatic Railway Track Inspection for early warning using Real time image processing with GPS”, International Journal on Recent and Innovation Trends in Computing and Communication., Vol.:3, Issue:10, pp. 5880 – 5883, 2015.
XX. S. B. Aher and D. P. Tiwari, “Railway Disasters in India: Causes, Effects and Management”, International Journal of Reviews and Research in Social Science., Vol.: 6, Issue: 2, pp. 122-130, 2018.
XXI. S. Kenderian, B.B. Djordjevic, D. Cerniglia and G. Garcia, “Dynamic railroad inspection using the laser-air hybrid ultrasonic technique”, Insight, Vol.:48, Issue: 6, pp. 336-341, 2006.
XXII. S. Sawadisavi, J. Edwards, E.Resendiz, J. Hart., C. Barkan and N. Ahuja., “Development of a machine vision system for inspection of railroad track”, in Proceedings of the American Railway Engineering Maintenance Way Association Annual Conference, 2009.
XXIII. Y. Li, J. Wilson, and G.Y. Tian, “Experiment and simulation study of 3D magnetic field sensing for magnetic flux leakage defect characterization”, NDT & E International, Vol.:40, Issue.: 2, pp. 179-184, 2007.
XXIV. Z. Liu, A.D. Koffman, B. C. Waltrip and Y. Wang, “Eddy Current Rail Inspection Using AC Bridge Techniques”, Journal of Research of the National Institute of Standards and Technology, Vol.:118, pp.140-149, 2013.

View Download

NUMERICAL INVESTIGATION OF NATURAL VENTILATION IN A ROOM THAT INTEGRATED WITH SOLAR CHIMNEY OF METAL FOAM ABSORBER

Authors:

Suhaib J. Shbailat, Mohammed A. Nima

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00024

Abstract:

In this paper, Numerical investigation of the influence of inserting the metal foam to the solar chimney to induce natural ventilation in the test room is analyzed in this work. Two types of solar chimneys which without insertion of metal foam absorber and with insertion of metal foam absorber are designed with dimensions of length× width× air gap (2 m× 1 m×0.3 m) and size of the test room (1.5 m× 1.5 m×1 m). Four incline angles are tested (30o,45o,60o,90o) for each chimney and two length of tower inlet (30 cm, 40 cm). ANSYS FLUENT program (version 14.5) used to simulate this model and solve the governing equations by finite volume technique. The results showed that the air flow velocity at the outlet of ventilation solar chimney increases of the model with copper foam absorber about 33% from the model without copper foam absorber at constant inclination angle, therefore this gives indication of the important of insertion the copper foam as an absorber media in the ventilation solar chimney.

Keywords:

Solar Chimney,Low-Energy House,Ventilation,Metal Foam,Porous Media,ANSYS FLUENT,

Refference:

I. Abdallah, AmrSayed Hassan, et al. “Integration of evaporative cooling technique with solar chimney to improve indoor thermal environment in the New Assiut City, Egypt.” International Journal of Energy and Environmental Engineering 4.1 (2013): 45.‏
II. Aboulnaga, Mohsen M. “A roof solar chimney assisted by cooling cavity for natural ventilation in buildings in hot arid climates: an energy conservation approach in Al-Ain city.” Renewable Energy 14.1-4 (1998).
III. Ali Ghaffari and RaminMehdipour. Modeling and Improving thePerformance of Cabinet Solar Dryer Using Computational Fluid Dynamics.Int. J. Food Eng. 2015; 11(2): 157–172
IV. Ali, S.A.G. Study the effect of upstream riblet on wing- wall junction.M.Sc, Thesis, University of Technology, Iraq. 2011.
V. Bansal, N.K, R. Mathur, M.S. Bhandari,” A Study of Solar Chimney Assisted Wind Tower System for Natural Ventilation in Buildings”. Building and Environment, Vol. 29, 4, Pergamon Press., pp. 495-500, (1994).
VI. Bassiouny, Ramadan, and Nader SA Korah. “Effect of solar chimney inclination angle on space flow pattern and ventilation rate.” Energy and Buildings 41.2 (2009).‏
VII. Buonomo, Bernardo, et al. “Thermal and fluid dynamic analysis of solar chimney building systems.” International Journal of Heat and Technology 31.2 (2013).‏
VIII. Calmidi V. V., and Mahajan R. L. Forced convection in high porosity metalfoams. Journal of Heat Transfer, 2000; 122 (8): Õ 557.
IX. Guo C.X., Zhang W.J., and Wang D.B. Numerical investigation of heat transfer enhancement in latent heat storage exchanger withparaffin/graphite foam. 10th Int. Conf. on Heat Transfer, Fluid Mechanicsand Thermodynamics 2014; July: 14 – 26.
X. Hweij, WalidAbou, et al. “Evaporatively-cooled window driven by solar chimney to improve energy efficiency and thermal comfort in dry desert climate.” Energy and Buildings 139 (2017).‏
XI. Jianliu, X., Weihua, L.” Study on solar chimney used for room natural ventilation in nanjing”. Energy and Buildings, Vol.66, PP. 467-469, (2013).
XII. Kumar, MadhanAnand, and U. Krishnaveni. “Analysis of solar chimney with evaporative cooling cavity to improve indoor air quality.” Journal of Chemical and Pharmaceutical Sciences ISSN 974 (2015): 2115.‏
XIII. Rabani, Mehran, et al. “Empirical investigation of the cooling performance of a new designed Trombe wall in combination with solar chimney and water spraying system.” Energy and Buildings 102 (2015): 45-57.‏
XIV. Sarachitti, R., J. Hirunlabh, and J. Khedari. “3-D modelling of solar chimney-based ventilation system for building.” World Renewable Energy Congress VI. Pergamon, 2000.‏
XV. Struckmann, Fabio. “Analysis of a flat-plate solar collector.” Heat and Mass Transport, Project Report, 2008MVK160 (2008).‏

View Download

MODIFIED METHOD FOR STUDYING THE EFFECT OF LASER SHOT PEENING IN THIN PLATE ON DYNAMIC CRACK PROPAGATION UNDER CYCLING THERMAL EFFECT

Authors:

Fathi A. Alshamma, Munaf Hadi Salman

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00025

Abstract:

In this research, for studying dynamic crack propagation behavior in thin plate, a modified method has adopted, when solidification with laser shot peening with cycling thermal effect have done. Since anew a technique is based on an accumulating two types of energies and employments, these together or alone by [Griffith] approach are used to emulate what happen in fuselage with specific conditions in order to study crack velocity and stress intensity factor. The two energies are coming from laser ray and cycling thermal. Analytical model has built with two scenarios for comparing between them. The first one (oven state) when cycling temperatures range for one cycle is from 30 to 150°C and the second (plane path state) when temperature range decreases from 30 to -30 °C  . In addition, the functions (cycling thermal) are functions of duration. Therefore, Fourier series method for periodic functions has built for cycling during path of flight. Oven state for a specific function has assumed with specific shape. Accordingly, simply support condition is adopted for all plates' edges. Laser ray influence has applied according to (P. Peyer & R. Fabbro) equations. For plane path state (cooling), it has been observed that the dynamic crack propagation clearly decreases when the energy of laser was influenced and cycling thermal has increased retardation of crack extension. While for oven state (heating), cycling thermal leads to reducing retardation of crack extension. Also, when comparing between two energies, a high benefit energy is produced from laser (positive effect), and thermal effect depends on state of system if heating or cooling and type of boundary conditions. The values are as well depended on thickness, crack ratio and properties of material

Keywords:

dynamic crack propagation,stress intensity factor,laser energy,thermal energy,

Refference:

I. Burns, J. T., et al. “Fatigue crack propagation of aerospace aluminum alloy 7075-T651 in high altitude environments.” International Journal of Fatigue 106 (2018): 196-207.
II. Duffy, Dean G. Advanced engineering mathematics with MATLAB. Crc Press, 2016.
III. E. Carrera, et al. “Simulation of shock wave impact due to explosion on a flying flexible aircraft.” Combustion, Explosion, and Shock Waves 43.6 (2007): 732-740.H.L.EWaldsand, R.J.H.Wanhill (1989)”Fracture mechanics”
IV. J. Zhang, et al. “Crack initiation and propagation mechanisms during thermal fatigue in directionally solidified superalloy DZ125.” International Journal of Fatigue 119 (2019): 355-366.
V. M. Sticchi, et al. “Review of residual stress modification techniques for extending the fatigue life of metallic aircraft components.” Applied Mechanics Reviews 67.1 (2015).
VI. Peyre, P., et al. “FEM simulation of residual stresses induced by laser peening.” The European Physical Journal-Applied Physics 23.2 (2003): 83-88.
VII. Peyre, P., et al. “Laser shock processing of aluminium alloys. Application to high cycle fatigue behaviour.” Materials Science and Engineering: A 210.1-2 (1996): 102-113.
VIII. R. A. Everett, et al. “The effects of shot and laser peening on fatigue life and crack growth in 2024 aluminum alloy and 4340 steel.” (2001).
IX. Syed, Abdul Khadar, et al. “Effect of temperature and thermal cycling on fatigue crack growth in aluminium reinforced with GLARE bonded crack retarders.” International Journal of Fatigue 98 (2017): 53-61.
X. Timoshenko, Stephen P., and Sergius Woinowsky-Krieger. Theory of plates and shells. McGraw-hill, 1959.
XI. Y. K. Gao, and X. R. Wu. “Experimental investigation and fatigue life prediction for 7475-T7351 aluminum alloy with and without shot peening-induced residual stresses.” Acta Materialia 59.9 (2011): 3737-3747.

View Download