Abstract. Machine fault diagnosis is a very important topic in industrial systems and deserves further considera- tion in view of the growing complexity and performance requirements of modern machinery. Currently, manufactur- ing companies and researchers are making a great attempt to implement efficient fault diagnosis tools. The signal processing is a key step for the machine condition monitoring in complex industrial rotating electrical machines. A number of signal processing techniques have been reported from last two decades conventionally and effectively ap- plied on different rotating machines. Induction motor is the one of widely used in various industrial applications due to small size, low cost and operation with existing power supply. Faults and failure of the induction machine in indus- try can be the cause of loss of throughput and significant financial losses. As compared with the other faults with the broken rotor bar, it has significant importance because of severity which leads to a serious breakdown of motor. De- tection of rotor failure has become significant fault but difficult task in machine fault diagnosis. The aim of this paper is indented to summarizes the fault diagnosis techniques with the purpose of the broken rotor bar fault detection.
In the essence of many fire detection system based on the color variations. Different color models are used for fire detection such as RGB, HSI ,YUV models. Using RGB model fire pixels can be abide by RGB color space. Mostly RGB color models is use for color analysis in fire detection process. In this model every color appears as its primary color like red, green, blue also its various shades can be effectively calculated. In RGB color space it takes three number to form RGB color ,the two digits hex number assigns to each its safe color . eg. For accompaniment the bright green in the form of decimal like R=0, G= 255(FF) ,B=0.This postulate 256 colors variation is the smallest possible quantity of color that can be assemble faithfully by any system .Using 256 color combinations calculate many different shades of color hence the RGB model can be preferred to the fire detection system. Exact portion of fire can be calculate using RGB color and other portion is discarded to get true positive results. Grayscale models carries only intensity information of an image in this the value of each and every pixel is a single sample it is in form of black and white it forms exclusive shades of grayspace. In grayspace variable form of black is at the faint intensity and white is at dark shade. Grayscale image gives the outcome of measuring light intensity of the each and every pixel in the given image they can be combine at ample color image. Grayscale algorithm takes the normal image as input and gives outcome image is in the form of gray color. There are various algorithms are used for motion variation and shape analysis. The flickering effect of fire can be easily detected through algorithms that are use for motion. In motion based model threshold value is main asset using this threshold value we can calculate the pixel position. we got the result by using absolute difference technique of each frame pixel. Shape Identification technique is mainly based on ratio of height and width of an image. By thresholding technique we can evaluate shape of fire image and its variation ratio to reduce number of false outcome.
In the detection processes, the decision process will be take account of the signal distortion that has been introduced by the channel. The detector takes full account of the intersymbol interference. This is done by removing the intersymbol interference (introduced by the channel) from the received symbol. With the appropriate estimation of the channel in the receiver, the message will be detect correctly. MMSE equalizer minimizes the probability of error in the detection of the received message. However, it is depend on the channel estimation accuracy .
The interval between two successive HELLO messages is predefined. We propose that after n number of HELLO transmissions, a node sends Helloed which represents the HELLO for one hop neighbor discovery phase of the wormhole detection method. The subsequent phases of the wormhole detection process are as mentioned in section 3.3. The number n depends on the desired security level. The performance evaluation of the topological comparison based wormhole detection method is presented in Fig 4 and Fig. 5. In Fig. 4, the topological based approach is compared with the method. The graph shows that the detection rate for the topological comparison based method is significantly higher than the other method. In addition, higher accuracy of alarm can also be achieved as shown in Figure 5.
In the lane line detection process, the image processed by the system is mainly captured by the car’s camera. The pictures used in this article are mainly shot on a Canon EOS 100D DSLR camera. In the smart car identi- fication and navigation system based on image process- ing, due to the interference of external factors in the actual road conditions, such as the influence of optical fiber, weather, roads, and the surrounding environment, the images collected by the smart car camera include spots, pits, etc. The interference factors and the decline of image quality will directly affect the detection and recognition of the target information lane line . Therefore, it is necessary to preprocess the collected images, reduce the useless interference information and en- hance the target information, simplify the image processing algorithm, and improve the detection and recognition accuracy of lane lines.
The likelihood image enables removing noise in the detection process. It also controls the minimum time required to assign a static pixel as an abandoned item. For each pixel, the likelihood image collects the evidence of being an abandoned item. In our model, we only use a single parameter for the likelihood image. Neither of the backgrounds and their mixture models depends on the likelihood stochastic image preset values. Consequently, it is not necessary to make any particular constraints for initializing the background modeling process. This property makes our method more robust and efficient detection even for the video sequences taken by using ordinary consumer cameras in complex environments.
In this work, the pictures of rice plants at the transplantation stage have been explored. In the first stage, the rice yield picture is procured and clamors from those pictures are uprooted utilizing Cross breed Middle Channel (HMF) which offers higher PSNR estimation of 46.22dB and the MSE estimation of 1.56. In the second stage, division is performed utilizing two calculations, for example, Fluffy C- Implies (FCM) and Part Fluffy C-Implies (KFCM) and their approval parameters are assessed. Of these, KFCM is chosen for the division process as a result of its high precision, specificity and affectability. In this work, a novel vermin distinguishment system is displayed which includes the combination of different highlights like shading, shape, composition, soil dampness. This minimizes the use of pesticides, enhances the product yield and quality. This methodology favors both ranchers and in addition shoppers.
To understand how commonly used pre-water treatment processes affect the detection of HAdV, hEV, and GARV, we have performed the detection of viruses before and after the treatment. Five samples all collected from residential houses in different locations were analyzed for the effect of commercially available 3-stage water purification system which contains polypropylene yarn for first stage filtration of suspended particles by sedimentation, second stage granular activated carbon for the removal of taste and odor of most organic chemicals, chlorine, insecticides, pesticides, herbicides, followed by a third stage UV post-treatment to give pure, pleasant-tasting drinking water. Moreover, the effect of heat treatment at 100 °C for 1 min was also evaluated. Water samples were analyzed before and after each treatment process for the comparison.
17 Read more
Based on the above analysis, the detection of phase synchronization can classify the temporal phase se- quences. A cluster means a temporal phase window, i.e., a state of some event, so the method provides a kind of way to give the process of event.
of assaults. The idea that we are presenting here is going to completely focus onto the design of these all of the collective type’s network which is going to produce onto a Sybil sort of the defending methodology. So we will have totally two counted group of to social network produces onto a Sybil defending methodology. The initial grouping, named as Sybil identification; that can function by the good judgment of individuality that may possible to obtain a Sybil. With the relations with previous let’s say, next concerned category, whose name is a Sybil easiness methodology, can not at all attempt for sake of label sort of individuality as a Sybil or also a non Sybil. Anyhow, all is going to endeavor for final bounding of the influence the attacker should accomplish by help of employing a number of a Sybil individuality. A Sybil sort of detection and an approval will then position for two sort of the unrelated methodology into a ways for accomplishing the very upper juncture objective of a Sybil sort of defend, finally used for sake of defensive all assailants by taking help of attaining development with always producing and also by make use of the a variety of individuality.
Abstract. This paper deals with testing of filters on the basis of visualization of filtration process. A filtration material can be damaged by flow of the filtered medium, high pressure drop and long-term adverse conditions. These negative effects can cause extensive damage of the filtration textile and filtration efficiency decreases. The filter can be also fractured during manufacturing, processing or by improper manipulation. A testing of a purposely damaged filtration textile is described in the article. Experiments were performed on the filtration setup which permits an optical entrance to the position where a sample of filter is placed. A laser sheet is directed into this place. Scattered light from seeding particles in front of and behind the filter is captured by a digital camera. Images from the camera are analyzed and the filtration efficiency versus time and also versus position can be obtained. Measuring chain including light scattering theory and measuring of light intensity by a digital camera are also discussed in the article.
With the high availability of image-editing softwares, authenticity of images is a major concern. This has led to the various forgery detection methods to check if a particular image is doctored or original. Copy-Move is a most difficult forgery to detect as the part which is pasted is taken from the same image. In this paper, a hybrid approach by combining the features of DCT (Discrete Cosine Transform) and SURF (Speeded Up Robust Features) has been proposed. This technique will show significant results against attacks performed by geometric transformations like rotation, scaling etc and is also robust to noise, blur and compression. Experimental results will prove that the proposed hybrid technique is better than Keypoint based methods in terms of reliability and block based methods in terms of efficiency.
10 Read more
In complex organizational environments such as healthcare the details of specific events are often recorded with a high degree of granularity. High granularity produces complex process models which can be reduced by mapping low level, highly specific events to high-level activities. In , the authors suggest a formal method for mapping events to activities using the domain knowledge provided by stakeholders. This method has successfully captured m:n mapping relations between low-level events and high-level activities. This is like our approach in  and is expensive in domain expert time. Some simple mapping can be achieved where low-level event names are grouped into categories or ontologies such as SNOMED-CT.
Image stitching is the process in which different photographic images are integrated together to form a segmented panorama or a high resolution image. Multiple images are overlapped and blended to form a wide angle panoramic image. The entire image stitching process is done by images taken from a camera and then applying the process on a computer software. The main steps include image acquisition, image registration image blending. The image registration process used in this method is a feature based method which uses HARRIS corner detection algorithm for feature detection. The image stitching algorithm is then processed to give a stitched panoramic image.
The here described MS based high-throughput-screen- ing approach is shown to be suitable to detect in-vitro and in-vivo the pathogen C. fraxinea and may be ex- tended to be used to rapidly test ash genotypes for resis- tance/susceptibility to C. fraxinea infections. In com- parison with standard microbial and biochemical detec- tion methods, the use of MS techniques, especially MALDI- MS, exhibits several advantages, such as simplicity of sam- ple preparation, inherent high sensitivity and high sam- pling rate, capability to provide data in minutes. There- fore, our presented approach may be used as an alterna- tive to the standard detection methods.
10 Read more
The initial stage prior to the implementation of motor vehicle license plate detection is the image capture by digital camera on smart phone. To simplify the detection of vehicle license plate, the image taken using smart phone at least should be perpendicular with the vehicle plate object and using the specified distance, the capture of vehicle plate object image also should not be blocked or covered by other object. The detection will be difficult to conduct if inside the image there are a lot of writing objects similar to the writing on vehicle plate. The process of image or object capture from hand phone’s camera also is instrumental in the detection of motor vehicle license plate. Moreover, background color and vehicle plate’s writing also greatly affecting the ease of vehicle plate detection. Based on the problem mentioned above can be formulated several issues as; how to create motor vehicle license plate detection system based on mobile, and how is the performance of motor vehicle license plate detection system based on mobile.
This research has important implications for health care of care home residents in an international context. It demonstrates how family members are involved in timely detection of changes in health, and could potentially contribute to the reduction of avoidable hospitalisations, which is an international concern. However, it should be noted that this research has been carried out in UK nursing homes, where registered nurses are available on site. Therefore, the results may be different in care homes without registered nurses, or where there other types of staff member outside the UK context. There may be cultural differences in how family members become involved in health care (Parveen et al. 2017).
42 Read more
of coupled chatter and lobes in the process , ,  and . Li and Shin  presented a dynamic model that simulated plunge centerless grinding and predicted its instability-related characteristics. They assumed that the workpiece has continuous contact with the workrest blade and the regulating wheel, and that the center position is known if the workpiece is round. Other publications deal with measurements of the dynamic parameters such as horizontal and vertical movement of the workpiece center. Some reported measurements employed an inductive transducer . The vertical movement is more significant than the horizontal movement during the CGP.
In this paper Author assesses several distance-based outlier detection approaches and evaluates them. They begin by surveying and examining the design landscape of extant approaches, while identifying key design decisions of such approaches. Then implement an outlier detection framework and conduct a factorial design experiment to understand the pros and cons of various optimizations proposed by us as well as those proposed in the literature, both independently and in conjunction with one another, on a diverse set of real-life datasets. The outcome of this study is a family of state of the art distance-based outlier detection algorithms. The combination of optimization strategies enables significant efficiency gains. Their factorial design study highlights the important fact that no single optimization or combination of optimizations (factors) always dominates on all types of data .
GSM stands for Global System for Mobile communication. GSM is an open, digital cellular technology used for transmitting mobile voice and data services with the transmission of SMS. GPRS is a wireless data service developed from the existing GSM system and can be associated with the INTERNET. GSM used in this process to send message to the concern authoritarian mobile as an alert about the toxic gases emission.