Browse Items (2150 total)
Sort by:
-
Detection of Fraudulent Alteration of Bank Cheques Using Image Processing Techniques
In todays world illegal alteration and illegal modifications of authenticated financial documents is increasing rapidly as a fastest growing crimes around the world. The result of this kind of crimes may result in a huge financial loss. In this paper image processing and document image analysis techniques are used to examine such cases in order to identify the fraudulent bank cheques. However, it is very difficult to detect an alteration made on documents once the printing ink of alike color is employed. In this paper, alterations and modifications caused with handwritten ball point pen strokes are considered and proposed a technique for recognition of such types of corrections by employing standard techniques under Digital image processing and pattern recognition. The results are quite promising during the experiments conducted. 2021, Springer Nature Singapore Pte Ltd. -
Recognition of Signature Using Neural Network and Euclidean Distance for Bank Cheque Automation
Handwritten signature recognition plays significant role in automatic document verification system in particularly bank cheque authorization. The proposed method focuses on A novel technique for offline signature recognition approach for bank cheque based on zonal features and regional features. These combined features are used to find genuinety of signature using Euclidean distance as a metric. Extensive experiments are carried out to exhibit the success of the recommended approach. 2019, Springer Nature Singapore Pte Ltd. -
An Analysis of Machine Learning and Deep Learning to Predict Breast Cancer
According to the report published by American Cancer Society, breast cancer is currently the most prevalent cancer in women. In addition, it is the second leading cause of death. It needs to be taken into serious consideration. Earlier and faster detection can help in the earlier and easier cure. Normally, medical practitioners take a large amount of time to understand and identify the presence of cancer cells in the human body. This can lead to serious complications even to the death of the individual. Hence there is a need to identify and detect the presence of this disease very accurately and in a shorter span of time. Like every other industry, the medical industry is shifting its paradigm to automation giving excellent results having high accuracy and efficiency, which is achieved using Artificial Intelligence. There are two sets of models developed based on the numerical dataset Wisconsin and image dataset BreakHis. Machine Learning algorithms and Deep Learning algorithms were applied on the Wisconsin dataset. Meanwhile, Deep Learning models were used for analysis of the Breakhis dataset. Machine Learning models- Logistic Regression, K Neighbors, Naive Bayes, Decision tree, Random Forest and Support vector classifiers were used. Deep Learning models- normal deep learning models, Convolutional Neural Network (CNN), VGG16 & VGG19 models. All the models have provided a very good accuracy ranging between 75% and 100%. Since medical research has a requirement for higher accuracy, these models can be considered and embedded into several applications. Grenze Scientific Society, 2022. -
An Efficient Face Recognition System using Deep Transfer Learning
Face recognition is an AI-based innovation used to find and recognize human appearances in videos and images. Organizations can apply face recognition to many different kinds of fields which may include biometrics, regulation of law, security and individual wellbeing; so as to take observation of individuals in any scenario. Face recognition has advanced from simple vision methods to progress in ML; and further to progressively refined neural networks (ANN) and related advances. It currently assumes an indispensable part as the initial phase in numerous basic applications, including the task of tracking a face. Face recognition is utilized to focus cameras or count the number of individuals present in a particular region. The innovation likewise has showcasing applications, for instance, showing recommended promotions when a specific user is detected. 2022 IEEE. -
Mechanical strength and water penetration depth of palmyra fibre reinforced concrete
Natural fibre reinforced composites are replacing the conventional fibre reinforced composites for several applications due to natural fibre availability, variety and lesser raw material cost. Using natural fibres in composites also reduces the issue of agricultural residue disposals, which are in abundance. Different natural fibres exhibit unique properties when it is used in composites and hence there is a need to study the behaviour of scarcely used natural fibres. Indian palmyra trees (Borassus flabellifer) are fast growing commonly found trees in Southern India. From the base of these palm tree leaves, palmyra fibres are taken out. Though these fibres are locally available in huge quantities, these are very rarely used as reinforcing material in concrete compared to other natural fibres like coir, sisal, jute etc. Palmyra fibre reinforced cement composite specimens were prepared by varying the fibre content (0.5%, 1% and 2% by weight of cement) and length of fibre (25 mm and 50 mm). Plain concrete and palmyra fibre reinforced concrete specimens of identical size were tested for mechanical strength and also for its depth of water penetration. The work carried out revealed that the water penetration of palmyra fibre reinforced concrete increased with fibre content increase. The compressive strength of palmyra fibre reinforced concrete improved up to 1% of fibre content and further increase in fibre content upto 2% resulted in compressive strength reduction for both the fibre lengths. However, split tensile strength, flexure strength and shear strength increased with fibre content increase in the mix. Based on the mechanical strength properties investigated, increase in shear strength was found to be more significant with the inclusion of palmyra fibres in concrete. 2022 -
Optimal Sizing and Placement of Distributed Generation in Eastern Grid of Bhutan Using Genetic Algorithm
Power system has to be stable and reliable for its users. Nevertheless, due to the aging and ignorance, it tends to be unreliable and unstable. Distributed Generation (DG) is a small-scale energy production which are usually connected towards the load. It helps in the reduction of power losses and improvement of profile of voltage in a distribution network. However, if a DG is not optimally placed and sized, it will rather lead to an increase in a power loss and also deteriorates the voltage profile. This report exhibits the importance of DG placement and sizing in a distribution network using Genetic Algorithm (GA). Apart from the optimum DG placement and sizing, different scenarios with numbers of DGs is also being analyzed in this report. On eastern grid of Bhutan, a detailed analysis for its performance is carried out through MATLAB platform to demonstrate and study the effectiveness and reliability of a methodology that is being proposed. 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG. -
Early strength of concrete amended with waste foundry sand - A potential for early open to traffic (EOT) pavements
The most predominant and widely practiced methods for waste disposal are Landfill, Incineration, and composting. There is a scarcity of land for waste disposal and because of increasing land cost, recycling and utilization of industrial by-products and waste materials has become an attractive proposition to waste disposal. There are several types of industrial by-products and waste materials. The utilization of such materials in concrete not only decreases the overall cost of construction but also helps in reducing disposal concerns. One such industrial by-product is waste foundry sand (WFS). The annual production is about 3 million tons from different industries in India. In the metal casting process, foundry industries dispose of huge quantities of waste sand into landfills, causing a harmful impact on the environment. The silica-based spent foundry sands from iron, steel, and aluminum foundries are evaluated in the risk assessment. This paper mainly focuses on achieving concrete for EOT (Early Open to Traffic) rigid pavements with WFS along with the use of accelerator and super-plasticizer. Effects of WFS on concrete properties such as compressive strength and split tensile strength are presented. Two types of mix proportions were investigated in this study. FDOT (Florida Department of transportation) and IRC (Indian Road Congress) recommendations were adopted for mix proportions using 5% & 10% of WFS replaced partially for M-Sand. 1-day compressive strength for FDOT mix with 10% WFS was 30MPa & for IRC mix with 10%, WFS was 20?MPa. The 3-days strength for mixtures with 10% WFS was 45MPa & 47MPa for FDOT & IRC mix proportions, respectively. Though the strength decreased with the inclusion of WFS, the 1-day and 3-days strength achieved for mixtures with 10% WFS surpassed the minimum strength requirements as per the slab replacement guidelines. Normally the pavement will be open to traffic after three to four days of laying asphalt, this method of using foundry sand enables the pavements to be open to traffic inless than a day. 2023 Author(s). -
Prediction of Friction Stir Welding Parameters Using Response Surface Methodology
The Friction Stir Welding (FSW) technique results in mixing and densification of weld joint in a more accurate and localized manner. FSW has been used to create a more significant weld with more structural integrity. In this research work, to join AA 3103 and AA 7075 was carried out. These alloys were preferred due to their wide variety of applications varying from aluminium fabrication to the aerospace industry. AA 7075, being a costlier metal, can be partially replaced with AA 3103, which can be economically justifiable for this research. The study tries to reveal the regression model by considering the FSW parameters like speed feed and offset. Various mechanical tests, impact tests and hardness tests were used for determining the most suitable weld joint. After conducting the tests, the results were analyzed using Minitab 18 software. The mathematical equations were derived out of Response Surface Methodology, which proved to be efficient. The report thus discusses the details in the analysis and study of FSW. 2023 American Institute of Physics Inc.. All rights reserved. -
Optimization of cutting parameters and prediction of surface roughness during hard turning of H13 steel with minimal vegetable oil based cutting fluid application using response surface methodology
The manufacturing industries in modern era are competing to reduce cost of production by employing innovative techniques, one being hard turning. In hard turning process, the work piece is heat treated to the required hardness in the initial stage itself and near net shape is arrived directly by hard turning process. Hard turning reduces manufacturing lead time by excluding the normal cost incurring processes such as, turning, heat treatment, finish grinding etc. In this experimental investigation hard turning process is assisted with minimal cutting fluid application technique, which reduces cutting fluid usage to a minimum of 6-8 ml/min. Soya bean oil based emulsion was used to make the hard turning environment friendly. The oil was prepared by adding additives, which will enhance the desirable properties of the oil for hard turning. Response surface methodology was used for optimization of cutting parameters and for the prediction of surface roughness. A central composite design was implemented to estimate the second-degree polynomial model. The cutting parameters considered for experimentation were cutting speed, feed rate and depth of cut. The surface roughness was considered parameter for prediction. Surface roughness predicted by the response Surface Methodology matched well with the experimental results. Published under licence by IOP Publishing Ltd. -
Optimization of friction stir welding parameters during joining of AA3103 and AA7075 aluminium alloys using Taguchi method
This paper investigates the optimization of input parameters for the friction stir welding of AA3103 and AA7075 aluminium alloys. The properties of base materials AA3103 are non-heat-treatable alloy, which is having good weldability while AA 7075 is having higher strength. Therefore, the welding of these aluminium alloys will produce superior mechanical properties. Friction stir welding is a rapidly growing welding process which is being widely used in marine, automobile and aerospace industries. Rather than its widespread use, this type of welding has several advantages over normal welding processes like low production of fume, no consumable electrodes are used and can be used in any position. In this paper, optimization of input parameters were conducted based on Taguchi method using the L9 orthogonal array. There were nine experimental runs in total after creating the L9 orthogonal array table in MINITAB software. The input parameters selected for optimization are tool rotation speed, feed rate, tool pin profile the output parameters which are optimized hardness, tensile strength, impact strength. The ANOVA analysis was carried out in the Qualitek 4 software to find out the percentage influence of input parameters on the output parameters. This research work was carried out to find the optimized condition to carry out friction stir welding of above mentioned aluminium alloys. 2021 Elsevier Ltd. All rights reserved. -
Comparison of Various Types of Lubrication During Hard Turning of H13 Tool Steel by Analysing Flank Wear Using ANOVA
Hard machining of components has been a new attraction in the field of manufacturing, as it avoids the need for multiple cost inculcation processes for a single part. Hard machining attracts a wide attention to the researchers because of the usage of hard tools, tougher machinery and enormous quantities of cutting fluids. Optimized use of any of these functionaries can result in reduction of cost as well as safer and clean working environments. In this research new cutting fluid reduction processes were compared along with the use of hard metal inserts. These two methods suggest an enormous amount of cost reduction along with cleaner shop floor. Minimal quantity lubrication (MQL) and minimal cutting fluid application (MCFA) capacities in cutting fluid reduction as mentioned by various researchers in past two decades. These methods were compared in this research paper for finding out the best possible system. Flank wear is considered as a crucial parameter in hard machining as the wear rate affects other deserving product qualities such as surface finish and job profiles. In this research tungsten carbide coated hard metal inserts were used instead of conventional CBN or diamond tipped tools, which are of higher in price margin. The study comprised of Taguchis L9 orthogonal array, which was advised by previous researchers as good tool for optimisation. MQL and MCFA assisted experimentation were performed with same cutting conditions, which were then again compared with dry hard machining and wet machining. Influence of each input parameters where critically evaluated using ANOVA. The results revealed that a promising reduction in tool wear was noticed in MCFA assisted hard machining. 2020, Springer Nature Singapore Pte Ltd. -
Strengthening the Security of IoT Devices Through Federated Learning: A Comprehensive Study
There is a strong need for having an operative security framework which can help in making IoT (Internet of Things) devices more secure and reliable which can further protect from adversarial intrusions. Federated Learning, due to its decentralized architecture, has emerged as one of the ideal choices by the research practitioners in order to protect sensitive data from wide IoT-based attacks like DoS (Denial of Service) attack, Device Tampering, Sensor-Data manipulation etc. This paper discusses the significance of federated learning in addressing security concerns with IoT (Internet of Things) devices and how those issues can be minimized with the use of Federated Learning has been deliberated with the help of comparative analysis. In order to perform this comparative analysis, we investigated the published work in FL based IoT application for the last five years i.e., 2018-2022. We have defined a few inclusion/exclusion criteria and based on that we selected the desired paper and provided a comprehensive solution to IoT based applications using FL approach. Federated learning offers an optimistic approach to intensify security in IoT environments by enabling collaborative model training while preserving information privacy. In this paper a framework named Federated AI Technology Enabler (FATE) has been envisaged which is one of the recommended frameworks in safeguarding security and privacy measures of IoT devices. 2024 IEEE. -
Upper Bounds of Zagreb Radio Indices
Let G= (V, E) be a simple connected graph with vertex set V and edge set E. This chapter consists of several bounds of the Zagreb radio indices of graphs such as the Primary Zagreb Radio Index, the First Zagreb Radio Index, the Second Zagreb Radio Index and the Third Zagreb Radio Index. The indices are defined for graphs after administering a radio labelling. In radio labelling, vertices are labelled with the positive integers such that the absolute difference of two vertex labels added to their distance should be at least one more than the diameter of the graph. In radio labelling, every vertex gets distinct labels. The least possible labels given to the vertices are used to create the radio indices. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Consecutive Radio Labelling of Graphs
Radio labelling or radio colouring is an assignment of positive integers to the vertices of a graph such that the difference between labels of any two vertices must be at least one more than the difference between the diameter of the graph and the distance between the vertices themselves. A graph G admits consecutive radio labelling when the radio number of the graph equals the order of the graph. In this paper, we study certain graphs admitting consecutive radio labelling and identify certain properties of such graphs. Moreover, we characterize the graphs with diameter two admitting consecutive radio labelling and examine certain properties of the labelling under some graph operations. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Optimizing Antenna Structures for 60 GHz Systems Microstrip Patch vs Microstrip Slot
This paper conducts a thorough comparison between microstrip patch and microstrip slot antennas for 60 GHz wireless communication systems, excluding the meander line antenna. The design process involves meticulous selection of substrate material, antenna geometry, and feed mechanism to achieve a compact, efficient, and wideband antenna suitable for 60 GHz applications. Performance analysis, based on theoretical derivations and HFSS simulator simulations, covers key parameters like radiation pattern, gain, and bandwidth. Results demonstrate that the proposed microstrip antenna meets 60 GHz system requirements, indicating potential for further optimization. The study highlights the unique advantages and disadvantages of each antenna structure, emphasizing that selection should align with specific application needs. This comparative analysis aids researchers and engineers in making informed decisions regarding the most suitable antenna structure for their 60 GHz wireless communication requirements. 2024 IEEE. -
Performance analysis of antenna with different substrate materials at 60 GHz
With a tremendous demand on data rate and bandwidth utilization in RF communication systems, current research studies leads to explore the millimeter-wave unlicensed 57-64 GHz bandwidth of electromagnetic spectrum. This high frequency band is not channelized for long distance communication. However, it could be efficiently utilized for indoor and short range digital communication transmission systems for enhanced data rate and bandwidth utilization. This paper focused on designing antenna that utilizes 60 GHz frequency which falls under this spectrum by using different substrate materials such as like RT Duroid, FR4 Epoxy, Rogers RO3010 and GaAs for Rectangular Microstrip Antenna (RMSA). This research paper presents a detailed analysis on performance parameters comparison like gain, VSWR, return loss & radiation pattern analysis for the 60 GHz antenna designed with substrate materials having different properties. 2017 IEEE. -
Survey on Microwave frequency v Band: Characteristics and challenges
This paper presents the characteristics of V band frequency range of Microwave band in electromagnetic spectrum. The paper also identifies the challenges using this band in applications. The lower microwave frequency band of 2-3 GHz is used in wireless applications. Wi-Fi, Wi-Max and cellular frequencies are quite familiar using in the lower band of microwave frequency band. However, the congestion of the frequency band in this lower frequency band invoked researchers to think a higher frequency microwave band lies between 57 GHz-64 GHz band. The wireless application can utilize this unlicensed frequency band. However signal absorption, fast fading of signals in long range communication, also transceiver design architectures complexity pose great challenges in this higher band. Applications of short range such as military applications utilize this band. However, thinking a new dimension of characteristic features of microwave upper band is the focus of this paper. This paper tells the V Band, that is upper band of microwave range frequencies (57 - 64 GHz). 2016 IEEE. -
Mudhr: Malicious URL detection using heuristic rules based approach
Technology advancement helps the people in numerous ways such as it supports business development, banking, education, entertainment etc. Especially time critical and money related activities, people are fully really on internet and web applications. It saves valuable time and money. Despite of the benefits, it also gives wide space for the attackers to focus more victims. Malicious URL based attacks are most common and more dangerous attacks now a day which steals the credentials and sensitive data from the victims and perform malicious activities in the victim's space. Phishing, Spamming, drive by download are the example of such attacks and are preformed through malicious URL. Plenty of approaches are available to detect the malicious URL. That are grouped under three categories such as Blacklist based, Heuristic based and Machine Learning based approaches. Among the three, heuristic approach is better than the blacklist approach in term of better generalizing the malicious URL and gives equally accurate prediction with machine learning approach. This paper presents recent works in the field of malicious URL detection and novel technique to detect malicious URL based on the most important features derived from URL. 2022 Author(s). -
Novel PAPR Reduction in UFMC system for 5G Wireless Networks Using Precoding Algorithm
The Universal Filtered Multi-carrier (UFMC) system is promising alternative multicarrier modulation scheme for fifth generation (5G) cellular networks. UFMC systems offer many advantages such as larger spectral efficiency, robustness, lower latency and minimizing out of band emission. However, the most serious problem in the UFMC system is high peak to average power ratio (PAPR). This high peak signal is seriously harmed by the high power amplifier (HPA). Therefore, this research presents a novel Square Root raised Cosine function (SRC)-Precoding method introduced to reduction of PAPR. A performance analysis of various methods being examined upon in terms of CCDF of PAPR and the BER. The Simulation result shows that the proposed approach can effectively reduce the PAPR 6dB compared to standard UFMC. Moreover, the bit error rate (BER) study of the UFMC model indicates that the proposed approach significantly improves 15 dB compared with conventional UFMC systems. 2022 IEEE. -
Eccentric Graph of Join of Graphs
The eccentric graph Ge corresponding to a graph G is a derived graph with the same vertex set of G and two vertices in Ge are neighbours if one of them is the eccentric vertex of the other. Motivated by the studies on derived graphs and graph operations, in this article, the eccentric graph of the join of two graphs is analysed based on the variations in the radius. The notion of eccentric join of two graphs with at least one of them having radius 1, is introduced. The eccentric graph of eccentric join of graphs is also examined. Finally, the concept of r-eccentric join of graphs is also introduced. This study is analytical in nature, which involves deductive and logical reasoning. 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.