Archive

A SYSTEMATIC LITERATURE REVIEW PROTOCOL FOR BLOCKCHAIN REVOLUTIONIZING ARENAS OF SMART CITY

Authors:

Sheraz Ahmed, Muhammad Arif Shah, Ghufran Ullah, Karzan Wakil

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00011

Abstract:

The transformation of the Internet of Things (IoT) is changing numerous ideas, making them "Smartest". It has upset numerous territories of reality. Smart City is one of the key ideas of this revolution. In spite of the fact that urban areas are carefully and digitally changed, it still has hindrances en route. In this paper, we have dissected various productions for our Systematic Literature Review Protocol (SLRP). This studyhighlights the zones where the blockchain is utilized and decides the advantages of utilizing blockchain. The principle commitment is to investigate and recognize the hindrances and obstacles in Smart City Domain and how these obstacles are relieved by the blockchain innovation. This Systematic Study additionally addresses various difficulties and issues, for example, security, changelessness, interoperability, decentralization, protection, and trust in the advancement of Smart Cities. An overview of the precise research is likewise introduced that would help distinguish the most and least examined concerns tended to in this examination. This paper targets investigating how blockchain innovation is utilized in various SmartCity plans of action, what are the highlights of blockchainthat could believe it to be utilized past digital currencies. We trust that this investigation can motivate enthusiasm for hypothesis and exercise to substitute conversations here in this area to adhere to these confines.

Keywords:

Blockchain,Decentralization,immutability,Security,Smart City,Systematic Literature Review Protocol (SLRP),

Refference:

I. B. Kitchenham,”Procedures for performing systematic reviews.” Keele, UK, Keele University 33.2004 (2004): 1-26.
II. D. Efanov and P. Roschin, “The all-pervasiveness of the blockchain technology,” Procedia Comput. Sci., vol. 123, pp. 116–121, 2018.
III. D. Y. Liao and X. Wang, “Design of a Blockchain-Based Lottery System for Smart Cities Applications,” Proc. – 2017 IEEE 3rd Int. Conf. Collab. Internet Comput. CIC 2017, vol. 2017-Janua, pp. 272–282, 2017.
IV. F. E. P. Simona Ibba, Matteo Seu, Andrea Pinna, “City Sense: blockchain-oriented Smart Cities,” 2017.
V. F. R. Batubara, J. Ubacht, and M. Janssen, “Challenges of blockchain technology adoption for e-government: A systematic literature review,” ACM Int. Conf. Proceeding Ser., 2018.
VI. H. S. M. and R. G. António Brandão, “A Smart City’s Model Secured by Blockchain,” 2019.
VII. J. C. Ferreira, A. L. Martins, F. Gonçalves, and R. Maia, “A Blockchain and Gamification Approach for Smart Parking,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng. LNICST, vol. 267, pp. 3–14, 2019.
VIII. J. H. Noh and H. Y. Kwon, “A Study on smart city security policy based on blockchain in 5G Age,” 2019 Int. Conf. Platf. Technol. Serv. PlatCon 2019 – Proc., pp. 1–4, 2019.
IX. J. H. P. Pradip Kumar Sharma, Seo Yeon Moon, “Block-VN A Distributed Blockchain Based Vehicular Network,” 2017.
X. J. Qiu, X. Liang, S. Shetty, and D. Bowden, “Towards Secure and Smart Healthcare in Smart Cities Using Blockchain,” 2018 IEEE Int. Smart Cities Conf. ISC2 2018, pp. 1–4, 2019.
XI. J. Rodrigues and A. Cardoso, “Blockchain in Smart Cities: An Inclusive Tool for Persons with Disabilities,” 2019 Smart Cities Symp. Prague, SCSP 2019 – Proc., no. 2018, pp. 1–6, 2019.
XII. J. Sun, J. Yan, and K. Z. K. Zhang, “Blockchain-based sharing services: What blockchain technology can contribute to smart cities,” Financ. Innov., vol. 2, no. 1, 2016.
XIII. K. Al Harthy, F. Al Shuhaimi, and K. K. Juma Al Ismaily, “The upcoming Blockchain adoption in Higher-education: Requirements and process,” 2019 4th MEC Int. Conf. Big Data Smart City, ICBDSC 2019, pp. 1–5, 2019.
XIV. K. Biswas and V. Muthukkumarasamy, “Securing smart cities using blockchain technology,” Proc. – 18th IEEE Int. Conf. High Perform. Comput. Commun. 14th IEEE Int. Conf. Smart City 2nd IEEE Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2016, pp. 1392–1393, 2017.
XV. K. Kotobi and M. Sartipi, “Efficient and Secure Communications in Smart Cities using Edge, Caching, and Blockchain,” 2018 IEEE Int. Smart Cities Conf. ISC2 2018, pp. 1–6, 2019.
XVI. L. Cui, G. Xie, Y. Qu, L. Gao, and Y. Yang, “Security and privacy in smart cities: Challenges and opportunities,” IEEE Access, vol. 6, pp. 46134–46145, 2018.
XVII. M. Altulyan, L. Yao, S. S. Kanhere, X. Wang, and C. Huang, “A unified framework for data integrity protection in people-centric smart cities,” Multimed. Tools Appl., 2019.
XVIII. P. K. Sharma and J. H. Park, “Blockchain based hybrid network architecture for the smart city,” Futur. Gener. Comput. Syst., vol. 86, pp. 650–655, 2018.
XIX. R. A. Salha, M. A. El-Hallaq, and A. I. Alastal, “Blockchain in Smart Cities: Exploring Possibilities in Terms of Opportunities and Challenges,” J. Data Anal. Inf. Process., vol. 07, no. 03, pp. 118–139, 2019.
XX. R. G. António Brandão, Henrique São Mamede, “Systematic Review of the Literature, Research on Blockchain Technology as Support to the Trust Model Proposed Applied to Smart Places,” 2018.
XXI. R. Paul, P. Baidya, S. Sau, K. Maity, S. Maity, and S. B. Mandal, “IoT Based Secure Smart City Architecture Using Blockchain,” Proc. – 2nd Int. Conf. Data Sci. Bus. Anal. ICDSBA 2018, pp. 215–220, 2018.
XXII. R. Rivera, J. G. Robledo, V. M. Larios, and J. M. Avalos, “How digital identity on blockchain can contribute in a smart city environment,” 2017 Int. Smart Cities Conf. ISC2 2017, vol. 00, no. c, 2017.
XXIII. R. Zhang et al., “Exploring the Attack Surfaces in Blockchain Enabled Smart Cities,” 2018 IEEE Int. Smart Cities Conf. ISC2 2018, vol. 890, no. 1, pp. 1–4, 2019.
XXIV. R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” ACM Comput. Surv., vol. 52, no. 3, 2019.
XXV. S. Aggarwal, R. Chaudhary, G. S. Aujla, N. Kumar, K. K. R. Choo, and A. Y. Zomaya, “Blockchain for smart communities: Applications, challenges, and opportunities,” J. Netw. Comput. Appl., vol. 144, no. July, pp. 13–48, 2019.
XXVI. S. Li, “Application of blockchain technology in smart city infrastructure,” Proc. – 2018 IEEE Int. Conf. Smart Internet Things, SmartIoT 2018, pp. 276–282, 2018.
XXVII. T. S. F. Orecchini, A. Santiangeli, F. Zuccari, Alessandra Pieroni(&), “Blockchain Technology in Smart City: A New Opportunity for Smart Environment and Smart Mobility,” 2019.
XXVIII. V. N. P. and C. N. Patel, “Blockchain Technology: An Aid to the Governance of Smart Cities,” 2019.
XXIX. V. Skwarek, “Blockchains as security-enabler for industrial IoT-applications,” Asia Pacific J. Innov. Entrep., vol. 11, no. 3, pp. 301–311, 2017.
XXX. W. S. and C. X. Yi Zhang, “Blockchain in Smart City Development—The Knowledge Governance Framework in Dynamic Alliance,” 2019.
XXXI. Y. C. Deeraj Nagothu, Ronghua Xu, Seyed Yahya Nikouei, “A Microservice-enabled Architecture for Smart Surveillance using Blockchain Technology,” 2018.
XXXII. Y. Qian, Z. Liu, J. Yang, and Q. Wang, “A Method of Exchanging Data in Smart City by Blockchain,” Proc. – 20th Int. Conf. High Perform. Comput. Commun. 16th Int. Conf. Smart City 4th Int. Conf. Data Sci. Syst. HPCC/SmartCity/DSS 2018, no. 51578128, pp. 1344–1349, 2019.
XXXIII. Ž. Turk and R. Klinc, “Potentials of Blockchain Technology for Construction Management,” Procedia Eng., vol. 196, no. June, pp. 638–645, 2017.

View Download

DESIGN, TESTING AND DETAILED COMPONENT MODELING OF A DOUBLE TELESCOPING SELF-CENTERINGENERGY-DISSIPATIVE BRACE (DT-SCED)

Authors:

Mohammad hossein Baradaran Khalkhali, Abbas Karamodin

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00012

Abstract:

Telescopic Self-Centering braces are one of the very successful examples of Self-Centering braces which perform well in seismic loading. In this study, a new example of Telescopic Self-Centering brace is introduced, which has superior features over other telescopic braces. These include: high axial load capacity, use of shorter cables in brace construction, simplicity of construction, use of separate cables for compressive and traction modes, less fatigue in cyclic loads and, allowing for more dynamic loading cycles. In this paper, a sample was designed with an axial force capacity of 300kN.Modeling of behavior (DT-SCED) was accurately expressed using numerical relationships. Nonlinear incremental stiffness analysis method was also used to calculate the hysteresis brace behavior. The cyclic load test was applied to this brace and the result showed complete Self-Centering behavior. The results are compared with numerical relationships that were in good agreement.

Keywords:

Telescoping Self-Centering Energy-Dissipative Brace (DT-SCED),Cyclic Load Test,Nonlinear Incremental Stiffness Analysis,

Refference:

I. 10. Alam, S., Rafiqul Haque, A.“Cyclic Performance of a Piston Based Self-Centering Bracing System,” Structures Congress, 2015, 1:2360-2372.

II. 4 Christopoulos, C., Filiatrault, A., & Folz, B. (2002a). Seismic response of self-centring hysteretic SDOF systems. Earthquake Engineering & Structural Dynamics. 31(5), 1131-1150.

III. 5Christopoulos, C., Filiatrault, A., Uang, C-M., & Folz, B. (2002b). Posttensioned Energy Dissipating Connections for Moment-Resisting Steel Frames. J. Struct. Eng. 128(9), 1111-1120.

IV. 6 Christopoulos, C., Tremblay, R., Kim, H.-J., & Lacerte, M. (2008). Self-Centering Energy Dissipative Bracing System for the Seismic Resistance of Structure: Development and Validation. Journal of Structural Engineering, 134(1), 96-107.

V. 11 Erochko, j.Christopoulos, C., Tremblay, R. (2014) “Design, Testing, and Detailed Component Modeling of a High-Capacity Self-Centering Energy-Dissipative Brace,” ASCE Journal of Structural Engineering, 131:370-381.

VI. 9 Erochko, J., Christopoulos, C., & Tremblay, R. (2011). Design and Testing of an Enhanced-Elongation Telescoping Self-Centering Energy-Dissipative Brace. J. Struct. Eng. 137 (5), 589-599.

VII. 3 Filiatrault, A., Tremblay, R., & Kar, R. (2000). Performance Evaluation of Friction Spring Seismic Damper. J. Struct. Eng. 126 (4), 491-499.

VIII. 1 Nims, D.K., Richter, P.J., & Bachman, R.E. (1993). The Use of the Energy Dissipating Restraint for Seismic Hazard Mitigation. Earthquake Spectra, 9(3), 467-489.

IX. 7 Rojas, P., Ricles, J.M., & Sause, R. (2005). Seismic Performance of Post-tensioned Steel Moment Resisting Frames With Friction Devices. J. Struct. Eng. 131(4), 529-540.

X. 2 Tsopelas, T., Constantinou, M.C. (1994). Experimental and Analytical Study of a System Consisting of Sliding Bearings and Fluid Restoring Force/Damping Devices (NCEER-94-0014). Buffalo, NY: Dept. ofCiv. Eng., State University of New York at Buffalo.

XI. 8 Zhu, S., & Zhang, Y. (2008). Seismic Analysis of Concentrically Braced Frame Systems with SelfCentering Friction Damping Braces.J.Struct.Eng.134(1),121-131.

View Download

ACTIVITY RECOGNITION FOR OLDER PEOPLE USING A BATTERYLESS WEARABLE DATASET WITH RFID SENSOR

Authors:

P. Jegathesh, P.Preetha, S. Chitra, A.S. Harivignesh

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00013

Abstract:

Perching on cot, perching on recliner, obtaining out of cot and step dancing (ambulating standing, walking round the room) somewhere is troublesome for the older folks. Ambulating with facilitate of the folks or oversight is known jointly of the key causes of patient falls in hospitals and rest home thus we tend to use Artificial Intelligent and Machine Learning for top falls risks of older folks. Machine learning is associate algorithmic rule that's used for predicting outcomes accurately. we tend to incontestable 2 datasets that embrace time in seconds, frontal axis of acceleration, vertical axis of acceleration, and Lateral axis of acceleration, label of activity, frequency, phase,  received signal strength indicator and Id of antenna reading sensing element. such a big amount of technological solutions area unit foreseen for bed existing detection employing a style of sensors that area unit fastened with older folk body, their cot or around  somewhere with context to the older folks orfloor.

Keywords:

Artificial Intelligent,Machine Learning,RFID(RadioFrequency Identification) sensor,Decision Tree,SVM tree,Data analytics,K-Means,Naïve Bayes theorem,

Refference:

I. A. Godfrey, A. Bourke, G. O´laighin, P. van de Ven, and J. Nelson. Activity classification using a single chest mounted tri-axial accelerometer. Med. Eng. Phys.,33(9):1127–1135, 2011.
II. A. M. Khan, A. Tufail, A. M. Khattak, and T. H. Laine. Activity recognition on smartphones viasensor-fusion and KDA-based SVMs. Int. J. Distrib. Sens.Netw., 2014:e503291, 2014.
III. B. Najafi, K. Aminian, A. Paraschiv-Ionescu, F. Loew,C. Bula, and P. Robert. Ambulatory system for human motion analysis using a kinematic sensor: Monitoring of daily physical activity in the elderly. IEEE Trans. Biomed. Eng., 50(6):711–723, 2003.
IV. D. C. Ranasinghe, R. L. Shinmoto Torres, A. P. Sample, J. R. Smith, K. Hill, and R. Visvanathan. Towards falls prevention: A wearable wireless and battery-less sensing and automatic identification tag for real time monitoring of human movements. In Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).

V. D. C. Ranasinghe, R. L. Shinmoto Torres, K. Hill, and R. Visvanathan. Low cost and batteryless sensor-enabled radio frequency identification tag based approaches to identify patient bed entry and exit posture transitions. Gait & Posture, 39(1):118–123, 2014.
VI. D. Karantonis, M. Narayanan, M. Mathie, N Lovell, and B. Celler. Implementation of a real-time human movement classifier using a triaxial accelerometer for ambulatory monitoring. IEEE Trans. Inf. Technol. Biomed.,10(1):156–167, 2006.
VII. F. Miskelly. A novel system of electronic tagging in patients with dementia and wandering. Age and Ageing,33(3):304–306, 2004.
VIII. H. He and E. Garcia. Learning from imbalanced data.IEEE Trans. Knowl. Data Eng., 21(9):1263–1284,2009.
IX. H. Junker, O. Amft, P. Lukowicz, and G. Tro¨ster. Gesture spotting with body-worn inertial sensors to detect user activities. Pattern Recognition, 41(6):2010–2024, 2008. Bakharev T., “Durability of geopolymer materials in sodium and magnesium sulfate solutions”, Cement and Concrete Research. vol. 35, no. 6, pp: 1233-1246, 2005
X. J. Fessler and B. Sutton. Nonuniform fast fourier transforms using min-max interpolation. IEEE Trans. Signal Process., 51(2):560–574, 2003
XI. L. Gao, A. K. Bourke, and J. Nelson. Evaluation of accelerometer based multi-sensor versus single-sensor activity recognition systems. Med. Eng. Phys.,36(6):779–785, 2014.
XII. L. Gao, A. K. Bourke, and J. Nelson. Sensor positioning for activity recognition using multiple accelerometer-based sensors. In European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN), 2013.
XIII. L. Greengard and J. Lee. Accelerating the nonuniform fast fourier transform. SIAM Review, 46(3):443–454, 2004.
XIV. M. G o¨vercin, Y. Ko¨ltzsch, M. Meis, S. Wegel,M. Gietzelt, J. Spehr, S. Winkelbach, M. Marschollek, and E. Steinhagen-Thiessen. Defining the user requirements for wearable and optical fall prediction and fall detection devices for home use. Inform. Health Soc. Care, 35(3-4):177–187, 2010.
XV. M. Patel and J. Wang. Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wireless Commun. Mag., 17(1):80–88, 2010.
XVI. M.-W. Lee, A. M. Khan, and T.-S. Kim. A singletri-axial accelerometer-based real-time personal life log system capable of human activity recognition and exercise information generation. Pers. Ubiquitous Comput.,15(8):887–898, 2011.
XVII. N. C. Krishnan and D. J. Cook. Activity recognition on streaming sensor data. Pervasive and Mobile Computing,2012.
XVIII. R. Keys. Cubic convolution interpolation for digital image processing. IEEE Transactions on Acoustics, Speech and Signal Processing, 29(6):1153–1160, 1981.
XIX. R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. LIBLINEAR: A library for large linear classification. J. Mach. Learn. Res., 9:1871–1874,2008
XX. Shinmoto Torres, R. L., Ranasinghe, D. C., Shi, Q. (2013, December). Evaluation of wearable sensor tag data segmentation approaches for real time activity classification in elderly. In International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services (pp. 384-395). Springer International Publishing.
XXI. Shinmoto Torres, R. L., Ranasinghe, D. C., Shi, Q., Sample, A. P. (2013, April). Sensor enabled wearable RFID technology for mitigating the risk of falls near beds. In 2013 IEEE International Conference on RFID (pp.191-198). IEEE.
XXII. Shinmoto Torres, R. L., Visvanathan, R., Hoskins, S., van den Hengel, A., Ranasinghe, D. C. (2016). Effectiveness of a batteryless and wireless wearable sensor system for identifying bed and chair exits in healthy older people. Sensors, 16(4), 546.
XXIII. T. Kaufmann, D. C. Ranasinghe, M. Zhou, and C. Fumeaux. Wearable quarter-wave folded microstrip antenna for passive UHF RFID applications. Int. J. Antennas Propag., 2013.
XXIV. T. Pl o¨tz, N. Y. Hammerla, and P. Olivier. Feature learning for activity recognition in ubiquitous computing. In IJCAI Proceedings-International Joint Conference on Artificial Intelligence, volume 22, page 1729, 2011.
XXV. Wickramasinghe, A., Ranasinghe, D. C. (2015, August). Recognising Activities in Real Time Using Body Worn Passive Sensors With Sparse Data Streams: To Interpolate or Not To Interpolate?. In proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (pp.21-30). ICST.
XXVI. Wickramasinghe, A., Ranasinghe, D. C., Fumeaux, C., Hill, K. D., Visvanathan, R. (2016), ‘Sequence Learning with Passive RFID Sensors for Real Time Bed-egress Recognition in Older People,’ in IEEE Journal of Biomedical and Health Informatics

View Download

PERFORMANCEENHANCEMENTS OF PHASE CHANGE MATERIAL (PCM) CASCADE THERMAL ENERGY STORAGE SYSTEM BY USING METAL FOAM

Authors:

Alaa A.Ghulam, Ihsan Y. Hussain

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00014

Abstract:

A numerical simulation is proposed for the thermal performance enhancement of Cascade Thermal Energy Storage System (CTESS)of paraffin wax Phase Change Materials (PCMs), by using Metal Foam (MF). Both melting and solidification processes were investigated. Copper foam with different porosities was used as MF and air as Heat Transfer Fluid (HTF).The numerical study includes charging and discharging processes at different velocities of (HTF) for three systems: CTESS with MF in the PCM side(MF-CTES),CTESS with MF in the fluid side(MF-AIR) and CTESS with MF in both PCM and fluid sides(MF-ALL).A numerical simulation by using CFD ANSYS FLUENT software package (Version 19) was done for the problem. The main results showed that by using metal foam in both sides (MF-ALL), the heat transfer enhanced greatly; it was between (53% -84%) in charging process and between (60% -86%) in discharging process, compared to the improvement obtained by previous work (Hiba and Ihsan [VI-IX])which ranged between (20.96 % to 42.04%) and (25.31% to 54.92%) for charging and discharging process respectively. This enhancement increases with increasing velocity and also the time of melting and solidification process reduced compared with (MF-CTES) and (MF- AIR).

Keywords:

Cascade Thermal Energy Storage,Metal Foam,Charging and Discharging Process,Numerical Simulation,

Refference:

I. Atul Sharma, V.V. Tyagi, C.R. Chen and D. Buddhi, “Review on thermal energy storage with phase change materials and applications”, Department of Mechanical Engineering, Kun Shan University, Renewable and Sustainable Energy Reviews 13 (2009) 318–345.

II. Ban M. Hasan,” Experimental and Numerical Model of a Phase Change Material (PCM) with Thermal Conductivity Enhancers”, M.Sc. Thesis, Al-Mustansiriyah University, (2015).

III. Bernardo Buonomo, DavideErcole, OronzioManca and Sergio Nardini, “Thermal Behaviors of Latent Thermal Energy Storage System with PCM and Aluminum Foam”, international journal of heat and technology, Vol. 34, Special Issue 2, October 2016, pp. S359-S364.

IV. ChenJianqing, Donghuiyanga, Jinghua Jiang, AibinMaa and Dan Song,” Research progress of phase change materials (PCMs) embedded with metal foam”, College of Mechanics and, Hohai University Procedia Materials Science 4 (2014) 389 – 394.

V. D. Zhou and C.Y. Zhao, “Experimental investigations on heat transfer in phase change materials (PCMs) embedded in porous materials”, School of Engineering, University of Warwick, Applied Thermal Engineering 31 (2011) 970 – 977.

VI. Hiba A. Hasan and Ihsan Y. Hussain, “Experimental Investigation of Thermal Performance Enhancement of Cascade Thermal Energy Storage System by Using Metal Foam”, IJMET, Volume 9, Issue 9, September 2018, pp. 1537-1549.

VII. Hiba A. Hasan and Ihsan Y. Hussain, “Simulation and Testing of Thermal Performance Enhancement for Cascade Thermal Energy Storage System by Using Metal Foam”, IJMME-IJENS Vol: 18 No. 05.

VIII. Hiba A. Hasan and Ihsan Y. Hussain, “Theoretical Formulation and Numerical Simulation of Thermal Performance Enhancements for Cascade Thermal Energy Storage Systems”, International Conference on Engineering Sciences, IOP Conf. Series: Materials Science and Engineering 433 (2018) 0112043.

IX. Hiba A. Hasan and Ihsan Y. Hussain, “Thermal Performance Enhancement of Phase Change Materials (PCMs) by Using Cascade Thermal Energy Storage (CTES) System with Metal Foam”, Ph.D. Dissertation, University of Baghdad – College of Engineering, 2018.

X. IoanSarbu and AlexandruDorca,” Review on heat transfer analysis in thermal energy storage using latent heat storage systems and phase change materials”, Department of Building Services Engineering, Polytechnic University of Timisoara, (2018).

XI. Marwah A. Jasim and Ihsan Y. Hussain, “Thermal Performance Enhancement of Phase Change Materials (PCMs) by Using Metal Foams”, Al-Nahrain Journal for Engineering Sciences (NJES) Vol.20 No.1, 2017 pp.235 – 249.

XII. Xue Chen, Xiaolei Li, Xinlin Xia 2, Chuang Sun and Rongqiang Liu, “Thermal Performance of a PCM-Based Thermal Energy Storage with Metal Foam Enhancement”, School of Mechatronics Engineering, Harbin Institute of Technology, Key Laboratory of Aerospace Thermophysics of MIIT, Harbin Institute of Technology, MPDI Journal.

XIII. Y. Tian and C.Y. Zhao, “Thermal and exergetic analysis of Metal Foam-enhanced Cascaded Thermal Energy Storage (MF-CTES)”, School of Engineering, University of Warwick, International Journal of Heat and Mass Transfer 58 (2013) 86–96.

View Download

ACTIVE DYNAMIC KEY FOR SECURE DATA TRANSFER IN WIRELESS SENSOR NETWORK

Authors:

Vikkram R, Rajeshkumar G, Sadesh S

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00015

Abstract:

The day to day life billions of data are transferred across the internet using millions of devices. These Transferred data are theft or falsifying the original content by the intermediates when transferred from source to destination. So that data is transferred in a secure manner it does not theft or replicate. In the Virtual active key-based encryption a new idea of one-time active dynamic key is used (i.e.) while information transferred between the source and destination the original data is encoded with this key and the algorithm. A Secure un disclosed or secret key is created and applied to single packet and the different one-time active key is applied for consecutive packets, which is a protected communication context, the information to be sent is encoded with the Advanced Encryption Standard (AES) algorithm. The in-between nodes authenticate the acknowledged data packets if the received packet is untruthful or malicious data transmitted by any intruder such packets are noticed and removedor else the data is transferred to the succeeding node. In this Encryption method, there are two modes of operations that are carried out they are VABEK I and VABEK II [VABEK-Virtual Active Based Encryption Keying]. In VABEK I every node observe their adjacent node and in VABEK II every node arbitrarily chooses the nodes and track them. Thus, the two methods check all units and check those data packets if the data is a malicious one its dropped.

Keywords:

WSN,One-time dynamic active key,VABEK-I,VABEK-II,AES,

Refference:

I. Abd-alghafar, I ,Abdullah, B.,., Salama, G. I., Abd-alhafez, A. Performance evaluation of a genetic algorithm-based approach to network intrusion detection system Proceedings of the International Conference on Aerospace Sciences and Aviation Technology 2009 Cairo.

II. Breveglieri, L, Macchetti, M., Atasu, K. Efficient AES implementations for ARM based platforms. In: Symposium on Applied Computing, pp. 841–845. ACM, New York (2004)

III. Chen, H.-H ,Liu, H ,Khanna, R.,.,. Reduced complexity intrusion detection in sensor networks using genetic algorithm Proceedings of the IEEE International Conference on Communications June 2009 152-s2.0-7044948512210.1109/ICC.2009.5199399

IV. Eboka, A. O, Aghware, F. O,Ojugo, A. A.,.,Okonta, O. E., Yoro, R. E.,.Genetic algorithm rule-based intrusion detection system (GAIDS)Journal of Emerging Trends in Computing and Information Sciences 20123811821194.

V. F. Zao ,J. Liu, Y. Zhang, and, “Robust distributed node localization with error management,” in Proceeding of the 7th ACM International Symposium on Mobile Ad-Hoc Networking and Computing 2006.pp. 250–261, Florence, Italy, May 2006.

VI. J. Leonard, D. Moore, , D. Rus, and S. Teller, “Robust distributed network localization with noisy range measurements, “in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems 2004, pp. 50–61, November 2004.

VII. K. Gaj and P. Chodowiec, Very compact FPGA implementation of the AES algorithm. 5th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2003), pages 319-333,Germany, Sept. 8-10, 2003.

VIII. Lade, S. Dhak, B. S. An evolutionary approach to intrusion detection system using genetic algorithm International Journal of Emerging Technology and Advanced Engineering201222632637.

IX. M. Benaissa. And T. Good AES on FPGA from the fastest to the smallest.7th Int. Workshop on Cryptographic Hardware and Embedded Systems (CHES 2005), pages 427-440, Edinburgh, UK, Aug.09-01-2005.

X. M. Rabaey,, C. Savarese, J. and K. Langendoen, “Robust positioning algorithms for distributed ad-hoc wireless sensor networks,” in Proceedings of the 2002 USENIX Annual Technical Conference on General Track, pp. 317–327, USENIX Association, Berkeley, USA, 2002.

XI. N.Reijers,.K.Langendoen “Distributed localization in wireless sensor networks: a quantitative comparison,” Computer Networks, vol. 43, no. 4, pp. 499–518, 2003.

XII. Schwabe, P,Bernstein, D.J. New AES software speed records. In: Chowdhury, D.R., Rijmen, V., Das, A. INDOCRYPT 2008. LNCS, vol. 5365, pp. 322–336. Springer, Heidelberg (2008)

XIII. Schwabe, P,Käsper, E.,.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. CHES 2009. LNCS, vol. 5747, pp. 1–17. Springer, Heidelberg (2009)

View Download

MINIMIZING INFLUENCE OF RUMOURS ON SOCIAL NETWORKS USING MACHINE LEARNING ALGORITHMS AND ANALYSIS

Authors:

T. C. Subash Ponraj, S. S. Subashka Ramesh

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00016

Abstract:

The advancement of large scale online social networks, online data sharing is turning out to be pervasive consistently. Both positive and negative information is spreading through online social networks. It centres on the negative data issues, for example, online rumours. Blocking of online rumour is one of the major issues in large scale social media networks. Hostile rumours can lead to confusion in the public eye and consequently should be quickly as fast as time permits in the wake of being distinguished. For this we used hybrid SVM, Naive Bayes and KNN algorithm. We will probably limit the impact of the rumour which is the quantity of clients that have acknowledged and sent the rumour by obstructing a specific subset of hubs

Keywords:

Rumour,malicious,Hybrid SVM,Naive Bayes,KNN,

Refference:

I. Castillo, C., Mendoza, M., &Poblete, B. (2011), March. Information credibility on twitter. In Proceedings of the 20th international conference on World wide web (pp. 675-684).

II. Kwon S Cha, M. Jung, K., Chen, W. & Wang, Y. (2013), November. Aspects of rumor spreading on a microblog network. In: International Conference on Social Informatics. Springer, Cham.

III. Kwon S Cha, M., Jung, K., Chen, W., & Wang, Y. (2013), December. Prominent features of rumor propagation in online social media. In: 2013 IEEE 13th International Conference on Data IEEE.

IV. Mendoza, M., Poblete, B., & Castillo, C. (2010), July. Twitter under crisis: Can we trust what we RT?. In: Proceedings of the first workshop on social media analytics (pp. 71-79).

V. Qazvinian, V., Rosengren, E., Radev, D. R., & Mei, Q. (2011), July. Rumor has it: Identifying misinformation in microblogs. In Proceedings of the conference on empirical methods in natural language processing (NPL). Association for Computational Linguistics.

View Download

SELF-EVALUATION FRAMEWORK FOR SEPARATION ESTIMATION FROM SCREENS TO ENSURE EYES PROTECTION UTILIZING IMAGE PROCESSING

Authors:

Naveen Raj Y

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00017

Abstract:

Picture dealing with is a strategy for changing over an image into cutting edge structure by playing out certain technique on it, in order to get the trademark features of that image. Face recognition is one of numerous utilizations of computerized picture preparing. Monitors placed too close or too far away may cause problems that may lead to eyestrain. Design is to implement automatic alert based on distance. Web camera can be used for capturing human head positions and separate the background from foreground head positions. Then face can be detected and recognized using image processing. Finally, the distance from monitor to face via web camera is calculated. If the distance is minimum to pre-define threshold value means, alert will be automatically generated and intimated to users without using any sensors.

Keywords:

Image processing,Face Recognition,

Refference:

I. C. Guo and L. Zhang, “A novel multi-resolution spatiotemporal saliency detection model and its applications in image and video compression”, TIP, vol. 19, no. 1, pp. 185–198, 2010
II. F. Perazzi, P. Kr¨ahenb¨uhl, Y. Pritch, and A. Hornung, “Saliency filters: Contrast based filtering for salient region detection”, in CVPR. IEEE, 2012, pp. 733–740
III. L. Itti, C. Koch, and E. Niebur, “A model of saliency-based visual attention for rapid scene analysis”, TPAMI, no. 11, pp. 1254–1259, 1998
IV. M. Cheng, N. J. Mitra, X. Huang, P. H. Torr, and S. Hu, “Global contrast based salient region detection”, TPAMI, vol. 37, no. 3, pp. 569–582, 2015
V. M. Donoser, M. Urschler, M. Hirzer, and H. Bischof, “Saliency driven total variation segmentation”, ICCV, IEEE, 2009, pp. 817–824
VI. M.-M. Cheng, J. Warrell, W.-Y. Lin, S. Zheng, V. Vineet, and N. Crook, “Efficient salient region detection with soft image abstraction”, ICCV, 2013, pp. 1529–1536
VII. P. Jiang, H. Ling, J. Yu, and J. Peng, “Salient region detection by ufo: Uniqueness, focusness and objectness”, in ICCV, 2013, pp. 1976–1983
VIII. Q. Yan, L. Xu, J. Shi, and J. Jia, “Hierarchical saliency detection”, in CVPR. IEEE, 2013, pp. 1155–1162
IX. S. Frintrop, G. M. Garcia, and A. B. Cremers, “A cognitive approach for object discovery”, ICPR, IEEE, 2014, pp. 2329–2334
X. S. Frintrop, T. Werner, and G. M. Garc´ıa, “Traditional saliency reloaded: A good old model in new shape”, in CVPR, 2015, pp. 82–90

View Download

AN INTELLIGENT SYSTEM TO PREVENT THE SPREADING OF SENSITIVE CONTENT ONLINE

Authors:

L. Jaba Sheela, S. Kousalya, R. Abinaya

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00018

Abstract:

In recent years, there is a striking surge in the availability of porn images and other such sensitive content on the Internet.  Filtering of image porn has become one of the big challenges for searches; they are tied to finding methods to filter porn images and videos. Social media network is interested in filtering porn images from normal ones. The main objective of the proposed “Intelligent System to Prevent the Spreading of Sensitive Content Online” is to reduce the risk of harassment to a large extent by preventing anti-social elements from uploading such obscene content online. For attaining the ultimate goal, we will be using CNN algorithm to detect pornographic content. By RGB Channel Shifting, pixels of those pornographic contents will be corrupted in the device of the person trying to upload it on social media or internet. By using this “Intelligent System to Prevent the Spreading of Sensitive Content Online” we can prevent spreading of pornographic images/videos and thus avoid the harmful effects caused by these obscene practices.

Keywords:

CNN algorithm,RGB channel shifting,pornographic content,

Refference:

I. B. Liu, J. Su, Z. Lu and Z. Li, “Pornographic Images Detection Based on CBIR and Skin Analysis,” 2008 Fourth International Conference on Semantics, Knowledge and Grid, Beijing, 2008, pp. 487-488. doi: 10.1109/SKG.2008.48

II. H. Zhu, S. Zhou, J. Wang and Z. Yin, “An algorithm of pornographic image detection,” Fourth International Conference on Image and Graphics (ICIG 2007), Sichuan, 2007, pp. 801-804. doi: 10.1109/ICIG.2007.29

III. I. M. A. Agastya, A. Setyanto, Kusrini and D. O. D. Handayani, “Convolutional Neural Network for Pornographic Images Classification,” 2018 Fourth International Conference on Advances in Computing, Communication & Automation (ICACCA), Subang Jaya, Malaysia, 2018, pp. 1-5. doi: 10.1109/ICACCAF.2018.8776843

IV. Islam, MdKamrul, MdManjur Ahmed, and Kamal ZuhairiZamli. “Identifying the Pornographic Video on YouTube Using Vlog Stream.” 2018 4th International Conference on Computing Communication and Automation (ICCCA). IEEE, 2018.

V. J. Shayan, S. M. Abdullah and S. Karamizadeh, “An overview of objectionable image detection,” 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), Langkawi Island, 2015, pp. 396-400.doi: 10.1109/ISTMET.2015.7359066

VI. K. Zhou, L. Zhuo, Z. Geng, J. Zhang and X. G. Li, “Convolutional Neural Networks Based Pornographic Image Classification,” 2016 IEEE Second International Conference on Multimedia Big Data (BigMM), Taipei, 2016, pp. 206-209. doi: 10.1109/BigMM.2016.29

VII. L. Lv, C. Zhao, H. Lv, J. Shang, Y. Yang and J. Wang, “Pornographic images detection using High-Level Semantic features,” 2011 Seventh International Conference on Natural Computation, Shanghai, 2011, pp. 1015-1018. doi: 10.1109/ICNC.2011.6022151

VIII. M. B. Garcia, T. F. Revano, B. G. M. Habal, J. O. Contreras and J. B. R. Enriquez, “A Pornographic Image and Video Filtering Application Using Optimized Nudity Recognition and Detection Algorithm,” 2018 IEEE 10th International Conference on Humanoid, Nanotechnology, Information Technology,Communication and Control, Environment and Management (HNICEM), Baguio City, Philippines, 2018, pp. 1-5. doi: 10.1109/HNICEM.2018.8666227

IX. Moreira, Danilo&Fechine, Joseana. (2018). “A Machine Learning-based Forensic Discriminator of Pornographic and Bikini Images.” 1-8. 10.1109/IJCNN.2018.8489100.

X. Murugavalli, S., et al. “Enhancing security against hard AI problems in user authentication using CAPTCHA as graphical passwords.” International Journal of Advanced Computer Research 6.24 (2016): 93.

XI. MyoungBeom Chung, IlJuKo and DaeSik Jang, “Obscene image detection algorithm using high-and low-quality images,” 4th International Conference on New Trends in Information Science and Service Science, Gyeongju, 2010, pp. 522-527.

XII. Sheela, L. Jaba, V. Shanthi, and D. Jeba Singh. “Image mining using association rules derived from feature matrix.” Proceedings of the International Conference on Advances in Computing, Communication and Control. 2009.

XIII. Thenkalvi,B., and S. Murugavalli, “Image retrieval using certain block based difference of inverse probability and certain block based variation of local correlation coefficients integrated with wavelet moments.” Journal of Computer Science 10.8 (2014): 1497.

XIV. Y. Xu, B. Li, X. Xue and H. Lu, “Region-based Pornographic Image Detection,” 2005 IEEE 7th Workshop on Multimedia Signal Processing, Shanghai, 2005, pp. 1-4. doi: 10.1109/MMSP.2005.248675

XV. Yaqub, Waheeb&Mohanty, Manoranjan&Memon, Nasir. (2018). “Encrypted Domain Skin Tone Detection For Pornographic Image Filtering”. 1-5. 10.1109/AVSS.2018.8639350.

XVI. Zhang, J., Sui, L., Zhuo, L., & Li, Z. (2013). “Pornographic image region detection based on visual attention model in compressed domain”. IET Image Processing, 7, 384-391.

View Download

CFD TOOL FOR UNDERSTANDING THE BEHAVIOR OF MULTI PHASE IN ENGINEERING APPLICATIONS

Authors:

G. Madhava Rao, G. Swamy Reddy

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00019

Abstract:

A fluid is anything that moves, typically a liquid or even a gasoline, the last being differentiated through its own wonderful loved one compressibility. Liquids are treated as continual media, and also their movement and also condition can be defined in regards to the speed u, tension p, density, etc reviewed at every aspect in space x and also time t. To describe the density at a point, for example, expect the point to be bordered by an extremely tiny component (little compared to length ranges of passion in practices) which however contains a very large variety of molecules. The density is actually at that point the overall mass of all the particles in the aspect separated due to the quantity of the component.

Keywords:

CFD tool,Engineering applications,turbulence,

Refference:

I. Booker, J.R.: Thermal convection with absolutely temperature-dependent viscosity. J. Liquid Mech. 76 (4), pp. 741-754 (1976).

II. Bunge, H.P., Richards, M.A., Baumgardner, J.R.: Results of depth-dependent thickness on the platform of cover convection. Credit 379, pp. 436-438 (1996).

III. Burguete, J., Mokolobwiez, N., Daviaud, F., Garnier, N., Chiffaudel, A.: Buoyant-thermocapillary instabilities in significant coatings subjected to a straight temp slope. Phys. Fluids thirteen, pp. 2773-2787 (2001).

IV. Canuto, C., Hussaini, M.Y., Quarteroni, A., Zang, T.A. Spectral Approaches in Liquid Facet. Springer, Berlin (1988).

V. Daviaud, F., Vince, J.M.: Taking a trip surges in a fluid level subjected to a matching temperature incline. Phys. Rev. E 48, pp. 4432-4436 (1993).

VI. De Saedeleer, C., Garcimartin, A., Chavepeyer, G., Platten, J.K., Lebon, G.: The weakness of a liquefied level warmed up from the side when the higher place degrees to sky. Phys. Liquids 8( 3 ), pp. 670-676 (1996).

VII. D. Srinivasacharya, G. Swamy Reddy, “Heat and mass transfer by Natural convection in a doubly stratified porous medium saturated with Power-law fluid”, International Journal of Advanced Trends in Computer Applications, Vol.1 (1), pp.66–69, (2019).

VIII. G. Swamy Reddy, R. Archana Reddy, G.Ravi kiran ” A Review on computational Fluid Dynamics Projects”, Indian Journal of public health research and Development, Vol.9(11) (2018).

IX. G. Swamy Reddy, G. Ravi Kiran, R. Archana Reddy, “Radiation Impacts on Free Convection Circulation of a Power-Law Fluid past Vertical Plate Filled Along With Darcy Porous Medium” International Journal of Engineering and advanced Technology, Vol.8(6), pp.4582-4585, (2019).

X. G. Ravi Kiran, G. Swamy Reddy, B. Devika, R. Archana Reddy, “Effect Of Magnetic Field And Constriction On Pulsatile Flow Of a Dusty Fluid”, Journal Of Mechanics Of Continua And Mathematical Sciences, Vol.14 (6), pp.67–82, (2019).

View Download

COMPUTATIONAL FLUID DYNAMICS AND NUMERICAL METHODS FOR SOLVING UNSTEADY FLOW PROBLEMS

Authors:

G. Swamy Reddy, G. Madhava Rao

DOI NO:

https://doi.org/10.26782/jmcms.2020.05.00020

Abstract:

The symbolic residential or commercial property of liquids (both fluids and also gases) is composed in the ease with which they could be flawed. A suitable meaning of a fluid is not easy to condition as, in many instances, it is certainly not apparent to distinguish a fluid from a strong. In this training course we will definitely deal with "straightforward fluids", which Bachelor (1967) specifies as follows. "A simple fluid is actually a material such that the loved one positions of elements of the component modification by a volume which is certainly not little when suitable selected powers, however little in measurement, are actually related to the material. Particularly a basic fluid can easily certainly not stand up to any type of possibility by administered pressures to warp it in such a way which leaves the volume the same."

Keywords:

computational fluid dynamics,numerical methods,unsteady flow problems,

Refference:

I. B.C. Sim, A. Zebib. “Result of complimentary surface area coziness loss as well as likewise rotation on change to oscillatory thermocapillary convection.” Phys. Liquids 14 (1), 225 (2002).

II. B.C. Sim, A. Zebib, D. Schwabe. “Oscillatory thermocapillary convection in on call sphere annuli. Component 2. Likeness.”J. Fluid Mech. 491, 259 (2003).

III. D. Srinivasacharya, G. Swamy Reddy, “Heat and mass transfer by Natural convection in a doubly stratified porous medium saturated with Power-law fluid”, International Journal of Advanced Trends in Computer Applications, Vol.1 (1), pp.66–69, (2019).

IV. E. Favre, L. Blumenfeld and also F. Daviaud, “Weak point of a liquid finish regionally warmed up on its own absolutely free area.”Phys. Liquids 9, 1473 (1997).

V. G. Swamy Reddy, R. Archana Reddy, G. Ravi kiran ” A Review on computational Fluid Dynamics Projects”, Indian Journal of public health research and Development, Vol.9(11) (2018).

VI. G. Swamy Reddy, G. Ravi Kiran, R. Archana Reddy, “Radiation Impacts on Free Convection Circulation of a Power-Law Fluid past Vertical Plate Filled Along With Darcy Porous Medium” International Journal of Engineering and advanced Technology, Vol.8(6), pp.4582-4585, (2019).

VII. G. Ravi Kiran, G.Swamy Reddy, B. Devika, R.Archana Reddy, “EFFECT OF MAGNETIC FIELD AND CONSTRICTION ON PULSATILE FLOW OF A DUSTY FLUID” JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, Vol.14 (6), pp.67–82, (2019).

VIII. M.A. Pelacho as well as J. Burguete, “Temperature oscillations of hydrothermal rises in thermocapillary-buoyancy convection.”Phys. Rev. E 59, 835 (1999).

IX. N. Garnier and also A. Chiffaudel. “2 perspective hydrothermal rises in an extended cylindrical vessel.” Eur. Phys. J. B 19, 87 (2001).

View Download