International Journal of Emerging Science and Engineering
EISSN : 2319-6378
Published by: Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP (10.35940)
Total articles ≅ 22
Latest articles in this journal
Published: 30 March 2022
International Journal of Emerging Science and Engineering, Volume 10, pp 1-7; https://doi.org/10.35940/ijese.d2524.0310422
In the present work, transitional wear of atmospheric plasma sprayed Cr2O3 and Cr3C2 coatings on low carbon steel substrate have been investigated with coating thickness of 100μm and 200μm. The produced coated and uncoated mild steel substrate samples were characterized by means of microscopic examinations, hardness and sliding wear tests for varying parameters of load, sliding speed, and sliding distance, SEM analysis were carried out for characterization studies of worn surface of samples. The obtained results revealed that the wear rate was much lower in Cr3C2 coated samples followed by Cr2O3 coated samples on mild steel substrate. When comparison to chromium oxide composite coatings the chromium carbide coatings showed better improved results
Published: 30 March 2022
International Journal of Emerging Science and Engineering, Volume 10, pp 8-15; https://doi.org/10.35940/ijese.c2525.0310422
The aim of this article looks into the comprehensive methods in re-architecting a security operations centre (SOC) to protect corporate computing frameworks. Through persistent exploitation using advanced technologies, cyber threat infiltration has caused financial losses to enterprises all over the world. No progress has been made yet in terms of technological improvements, particularly in combining cybersecurity equipment. Cybercriminals, on the other hand, are constantly improving their tools and methodologies in order to breach any business. Multiple exploitations through networks, systems, and phishing emails have resulted in incoming dangers, threats, and vulnerabilities in areas such as data privacy and security due to rapid technological advancement. To protect their working environment, several firms in many sectors have resorted outmoded technologies which are ineffective in the face of advanced persistent threats (APT). Cybersecurity actors are well-equipped groups with extensive knowledge that can infiltrate even the most secure of organizations. Cyber security is seen as a major issue around the world. As a result, dedicated cyber security researchers are analysing both existing dangers and emerging threat approach patterns in order to develop a technique that can be integrated with cybersecurity management.
Published: 30 January 2022
International Journal of Emerging Science and Engineering, Volume 10, pp 1-13; https://doi.org/10.35940/ijese.c2521.0110322
HEMS (home energy management systems) are controllers that manage and coordinate a home's generation, storage, and loads. These controllers are becoming increasingly important. To ensure that distributed energy penetration continues to grow resources are appropriately utilized and the process is not disrupted within the grid. An approach to hems design based on behavioural control approaches is discussed in this paper which do not require accurate models or forecasts and are particularly responsive to changing situations, in this study. In this study, the role of the customer as well as the micro grid in intelligent demand management is demonstrated using MATLAB 2018 Fuzzy tool.
Published: 30 November 2021
International Journal of Emerging Science and Engineering, Volume 7, pp 9-13; https://doi.org/10.35940/ijese.e2518.117421
In today’s world, a Phasor Measurement Unit (PMU) is a crucial component of our power network for managing, controlling, and monitoring. PMU can provide synchronized voltage current, and frequency measurements in real time. We can't put a PMU in every bus in the electrical grid because it's not viable from a productivity and economic standpoint, and it's also not practical for handling huge data. As a result, it's critical to reduce the amount of PMU in the power network while also increasing the power network's observability. The optimal PMU placement problem is solved using a variety of methodologies. The paper's main goal is to provide a brief overview of synchrophasor technology, phasor measurement units (PMU), and optimal PMU placement in order to reduce the number of PMUs in the system while maintaining complete observability and application in today's power systems.
Published: 30 November 2021
International Journal of Emerging Science and Engineering, Volume 7, pp 1-8; https://doi.org/10.35940/ijese.e2517.117421
A hybrid structured asymmetric switching capacitor multilevel inverter (ASC-MLI) is suggested in this work. The notion behind presenting this topology is to reduce the device count and DC sources as compared with conventional MLI. The step by step operating mode of single phase ASC-MLI is presented and by doing slight modifications the same configuration is used in three phase utility application and electric drive. The proposed configurations utilize major benefits of self-voltage balancing capability of capacitor voltage, which is independent from different load type and modulations index. To generate the switching pulse for corresponding switches the multi-carrier based sinusoidal pulse width modulation (MCS-PWM) technique is used; in addition to this simulation result are obtained using MATLAB/Simulink 2016b software version. Simulation results of an induction motor drive connected as three phase load highlights good performance of 17-level MLI.
Published: 30 June 2021
International Journal of Emerging Science and Engineering, Volume 7, pp 1-9; https://doi.org/10.35940/ijese.c2509.067321
Pull system and Kanban are effective lean manufacturing tools. Though many companies in various manufacturing fields have successfully implemented pull manufacturing using Kanban systems, such studies in apparel manufacturing are rarely found. Kanban system was implemented in an apparel manufacturing company, which had implemented some of the lean manufacturing tools. The apparel manufacturing line was identified in four different sub sections and separate Kanbans were used in each sub section. The system was evaluated using two parameters: the number of Kanban cards in each point; the production output. Correct number of Kanban cards were found at all the time of the monitoring period of two weeks-the production efficiency has increased by 22%.
Published: 30 May 2021
International Journal of Emerging Science and Engineering, Volume 7, pp 1-10; https://doi.org/10.35940/ijese.b2502.057221
In the steel industry - Tata steel, India, most of the lime produced in the lime plant is used in the steel-making process at LD shops. The quality of steel produced at LD shops depends on the quality of lime used. Moreover, the lime also helps in the crucial dephosphorization process during steel-making. The calcined lime produced in the lime plant goes to the laboratory for testing its final quality (CaO%), which is very difficult to control. To predict, control and enhance the quality of lime during lime making process, five machine-learning-based models such as multivariate linear regression, support vector machine, decision tree, random forest and extreme gradient boosting have been developed using different algorithms. Python has been used as a tool to integrate the algorithms in the models. Each model has been trained on the past 14 months’ data of process parameters, collected from level 1 sensor devices, to predict the future quality of lime. To boost the model’s prediction performance, hyper-parameter tuning has been performed using grid-search algorithm. A comparative study has been done among all the models to select a final model with the least root mean square error in predicting and control future lime quality. After the comparison, results show that the model incorporating support vector machine algorithm has least value of root mean square error of 1.23 in predicting future lime quality. In addition to this, a self-learning approach has also been incorporated into support vector machine model to enhance its performance further in real time. The result shows that the performance has been boosted from 85% strike-rate in +/-2 error range to 90% of strike-rate in +/-1 error range in real-time. Further, the above predictive model has been extended to build a control model which gives prescriptions as output to control the future quality of lime. For this purpose, a golden batch of good data has been fetched which has shown the best quality of lime (≥ 94% of CaO%). A good range of process parameters has been extracted in the form of upper control limit and lower control limit to tune the set-points and to give the prescriptions to the user. The integration of these two models (Predictive model and control model) helps in controlling the quality of lime 12 hours before its final production of lime in lime plant. Results show that both models (Predictive model and control model) have 90% of strike-rate within +/-1 of error in real-time. Finally, a human machine interface has been developed to facilitate the user to take action based on control model’s output. Eventually this work is deployed as a lime making process automation to predict and control the lime quality.
Published: 30 March 2021
International Journal of Emerging Science and Engineering, Volume 7, pp 1-3; https://doi.org/10.35940/ijese.a2494.037121
A customer’s decision to purchase a product or service are primarily influenced by online reviews. Customers use online reviews, which are valuable sources of information to understand the public opinion on products and/or services. Dependability on online reviews can give rise to the potential concern that violator could give deceitful reviews in order to synthetically promote or decry products and services. This practice is known as Opinion Spam, where spammers manipulate reviews by making fake, untruthful, or deceptive reviews to get profit and boost their products, and devalue a competitor’s products. In order to tackle this issue, we propose to build a fraud risk management system and removal model. This captures fraudulent transactions based on user behaviors and network, analyses them in real-time using Data Mining, and accurately predicts the suspicious users and transactions. In this system, we use two algorithms NLP and TF-IDF to differentiate between fake and genuine reviews or feedback received by the customers
Published: 28 February 2021
International Journal of Emerging Science and Engineering, Volume 6, pp 1-5; https://doi.org/10.35940/ijese.l24900.0261221
Interest in philosophy and the humanities increased after the Second World War, especially in the West, as the critical movement began to reconsider the Western intellectual and philosophical heritage, and emerged approaches known as” postmodernism“, as critical foundations of Western cultural thought, and a product of that cultural and cognitive movement known as” postmodernism"; the concept of postmodernism, which is central This term is associated with a very diverse group that is rarely associated with each other with common things. The idea of postmodernism appears in a critique of the literary and philosophical trends on which modernism was based, and some theorists and philosophers believe that postmodernism is closely related to the social and political transformations that took place in industrial societies such as the postindustrial or knowledge society. Deconstruction is important critical movement as well as controversial, and no theory in literary criticism has provoked waves of admiration and created a state of aversion and resentment as well, as deconstruction has done in contemporary literary thought. Deconstruction emerged in the 1960s as a reaction to structuralism, the dominance of language, the centralization of the mind, and the dominance of linguistics over all fields of knowledge, and from the 1970s deconstruction became a literary critical methodology, and a mechanism for evaluating rhetoric and interpretation. Deconstructionism is mainly a critique of the structural proposition, which has been working to reveal the basic structures responsible for the most noticeable features of social and cultural interaction, since deconstructionism consistently negates the meaning in the text system and analyzes the margins, gaps, expectations, contradictions and conclusions within the texts, as formulations that contribute to the disclosure of the background of language and structure.
Published: 25 October 2020
International Journal of Emerging Science and Engineering, Volume 6, pp 1-8; https://doi.org/10.35940/ijese.k2482.1061120
Game-based learning is an approach to learning where gaming concepts are implemented in learning tasks designed by teachers. Here, learning activities boost a student’s commitment and inspiration to learn. Components of game-based learning include quizzes, point systems, leader boards, and classroom response systems. With the advancements in the field of education, game-based learning has proven that it is a utilitarian option in improving a student’s assessment where paper-based evaluation is not possible. Various Game-Based Learning Systems have been built previously and, in this paper, we have compared 11 existing models based on various factors like cost, quiz customization options, mobile support, etc. We have also pointed out the benefits and limitations of these systems. None of these systems give a complete set of all the features without being exorbitantly costly. So, we aspire to assemble a credible teaching project where all aspects would be included in a single application for the complete assessment of every student. The system has several key features like OCR, Speech to Text recognition, anti-cheating tools, and feedback after the quiz. For executing OCR, we have used OpenCV because of its extensive admiration and for Speech-to-Text Recognition (STR), we have adopted the Speech Recognition library because it is quite adaptable. This system aims at reducing the workload of teachers by creating a test by scanning the questions with the help of OCR or by using STR so the teacher need not type the question and also by assessing students based on their scores.