Pub Date : 2023-06-30DOI: 10.35940/ijeat.e4188.0612523
Chintam KavithaShravan, Sai Krishna Marri, Rapolu Saidulu, Panchareddy Tejasvey, Sai Radha Krishan G
Directly or indirectly adders are the basic elements in almost all digital circuits, three operand adders are the basic building blocks in LCG (Linear congruential generator) based pseudo-random bit generators. Elementary adders are fast, area and power efficient for small bit sizes. Carry save adder computes the addition in O(n) time complexity, due to its ripple carry stage. Parallel prefix adders such as Han-Carlson compute the addition in O(log(n)) time complexity but at the cost of additional circuitry. Hence new high-speed power-efficient adder architecture is proposed which uses four stages to compute the addition, which consumes less power, and the adder delay decreases to O(n/2). Even though it is not much faster than the High-speed Area efficient VLSI architecture of three operand adders (HSAT3), it computes the addition by utilizing less power. The proposed architecture is implemented using Verilog HDL in Xilinx 14.7 design environment and it is evident that this adder architecture is 2 times faster than the carry save adder and 1, 1.5, 1.75 times faster than the hybrid adder structure for 32, 64, 128 bits respectively. Also, power utilization is 1.95 times lesser than HSAT3, 1.94 times lesser than the Han-Carlson adder, and achieves the lowest PDP than the existing three operand techniques.
{"title":"A Novel High Computing Power Efficient VLSI Architectures of Three Operand Binary Adders","authors":"Chintam KavithaShravan, Sai Krishna Marri, Rapolu Saidulu, Panchareddy Tejasvey, Sai Radha Krishan G","doi":"10.35940/ijeat.e4188.0612523","DOIUrl":"https://doi.org/10.35940/ijeat.e4188.0612523","url":null,"abstract":"Directly or indirectly adders are the basic elements in almost all digital circuits, three operand adders are the basic building blocks in LCG (Linear congruential generator) based pseudo-random bit generators. Elementary adders are fast, area and power efficient for small bit sizes. Carry save adder computes the addition in O(n) time complexity, due to its ripple carry stage. Parallel prefix adders such as Han-Carlson compute the addition in O(log(n)) time complexity but at the cost of additional circuitry. Hence new high-speed power-efficient adder architecture is proposed which uses four stages to compute the addition, which consumes less power, and the adder delay decreases to O(n/2). Even though it is not much faster than the High-speed Area efficient VLSI architecture of three operand adders (HSAT3), it computes the addition by utilizing less power. The proposed architecture is implemented using Verilog HDL in Xilinx 14.7 design environment and it is evident that this adder architecture is 2 times faster than the carry save adder and 1, 1.5, 1.75 times faster than the hybrid adder structure for 32, 64, 128 bits respectively. Also, power utilization is 1.95 times lesser than HSAT3, 1.94 times lesser than the Han-Carlson adder, and achieves the lowest PDP than the existing three operand techniques.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90868013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.35940/ijeat.e4130.0612523
Muhammad Djuneydi, Yudi Setio Prabowo, M. O. Mahendra
In carrying out the PPLP Banten Building construction project, it experienced delays. The causes of delays are the addition of time, changes in shop drawings and material delays. Then the solution in theMicrosoft project is an alternative crashing method of 4 hours of overtime and work shifts. The research results obtained 18 jobs that are on the critical path of 43 jobs. The normal total duration is 942 days and the normal fee is Rp. 569.100.000 using AHSP. The results obtained are the total duration of the alternative crashing 4 hours of overtime work is 678 days, while the work shift is 530 days, the AHSP Project produces an alternative total cost of 4 hours overtime of Rp. 3.066.675.000 and work shifts with accident costs of Rp. 1.223.565.000. The alternative cost of 4 hours of overtime using the AHSP project is Rp. 193.067.245,23 and work shifts using the AHSP project of Rp. 33.638.199,58 then the work shift alternative is more economical and was chosen to be applied to the project. The results of the comparison of direct and indirect costs for the 4-hour overtime alternative are direct costs Rp. 9.672.161.032,2 indirect costs Rp. 1.322.728.805,77 and direct costs for work shift alternatives Rp.9.512.731.986,58 costs Rp. 1.273.456.116,78 then the work shift alternative is more economical and is chosen to be applied to the project.
{"title":"Selection of Alternative Working Methods using the Crashing and Microsoft Project Methods","authors":"Muhammad Djuneydi, Yudi Setio Prabowo, M. O. Mahendra","doi":"10.35940/ijeat.e4130.0612523","DOIUrl":"https://doi.org/10.35940/ijeat.e4130.0612523","url":null,"abstract":"In carrying out the PPLP Banten Building construction project, it experienced delays. The causes of delays are the addition of time, changes in shop drawings and material delays. Then the solution in theMicrosoft project is an alternative crashing method of 4 hours of overtime and work shifts. The research results obtained 18 jobs that are on the critical path of 43 jobs. The normal total duration is 942 days and the normal fee is Rp. 569.100.000 using AHSP. The results obtained are the total duration of the alternative crashing 4 hours of overtime work is 678 days, while the work shift is 530 days, the AHSP Project produces an alternative total cost of 4 hours overtime of Rp. 3.066.675.000 and work shifts with accident costs of Rp. 1.223.565.000. The alternative cost of 4 hours of overtime using the AHSP project is Rp. 193.067.245,23 and work shifts using the AHSP project of Rp. 33.638.199,58 then the work shift alternative is more economical and was chosen to be applied to the project. The results of the comparison of direct and indirect costs for the 4-hour overtime alternative are direct costs Rp. 9.672.161.032,2 indirect costs Rp. 1.322.728.805,77 and direct costs for work shift alternatives Rp.9.512.731.986,58 costs Rp. 1.273.456.116,78 then the work shift alternative is more economical and is chosen to be applied to the project.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88024582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.35940/ijeat.e4199.0612523
K. C. Bhuyan, Pushpak Jain, Srutisagar Pattanaik
The world's growing economy and demographic advancement are driving an increase in global energy demand. As worries about carbon emissions grow and the demand for electrical energy production continues to rise, it is necessary to develop new methods of electricity production. Fuel cell energy system is one of the promising factors for addressing this problem due to its low emissions, easy accessibility, and fuel flexibility. In this paper, a mathematical model of Solid Oxide Fuel Cell (SOFC) is designed and used as an input for the KY converter. As the output voltage of the fuel cell is low, a KY Converter is desired to raise the output voltage for required applications. To regulate the electrical output voltage of the KY Converter, PID, Fuzzy Logic Controller (FLC), hybrid fuzzy PID, and an ANFIS feedback control mechanism have been simulated and investigated. The function of a fuel cell with a KY Converter, as well as state-space modelling, is developed. The Ziegler-Nichols technique is used to determine the gain parameters of a PID controller, which are Kp, Ki, and Kd. The fuel cell with a Closed-loop system of KY converter is developed using MATLAB/Simulink software. Thus, the fuel cell power system can be used for a variety of applications, including rural and military.
{"title":"Development of Power Conditioning Unit for KY Converter in Fuel Cell Power System","authors":"K. C. Bhuyan, Pushpak Jain, Srutisagar Pattanaik","doi":"10.35940/ijeat.e4199.0612523","DOIUrl":"https://doi.org/10.35940/ijeat.e4199.0612523","url":null,"abstract":"The world's growing economy and demographic advancement are driving an increase in global energy demand. As worries about carbon emissions grow and the demand for electrical energy production continues to rise, it is necessary to develop new methods of electricity production. Fuel cell energy system is one of the promising factors for addressing this problem due to its low emissions, easy accessibility, and fuel flexibility. In this paper, a mathematical model of Solid Oxide Fuel Cell (SOFC) is designed and used as an input for the KY converter. As the output voltage of the fuel cell is low, a KY Converter is desired to raise the output voltage for required applications. To regulate the electrical output voltage of the KY Converter, PID, Fuzzy Logic Controller (FLC), hybrid fuzzy PID, and an ANFIS feedback control mechanism have been simulated and investigated. The function of a fuel cell with a KY Converter, as well as state-space modelling, is developed. The Ziegler-Nichols technique is used to determine the gain parameters of a PID controller, which are Kp, Ki, and Kd. The fuel cell with a Closed-loop system of KY converter is developed using MATLAB/Simulink software. Thus, the fuel cell power system can be used for a variety of applications, including rural and military.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79294585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.35940/ijeat.e4133.0612523
Dr. K. Kavitha, K. Karthika
Outcome-based education is a closed-loop control system accepted globally for enhancing the teaching-learning processes. However, the success of the system is not prominently visible in fresh graduates. Hence detailed research and optimal process to implement OBE is necessary. This paper aims to investigate the challenges in implementing Outcome-based education and explores opportunities for improvement. Further, pedagogic planning for the analytical subjects has been proposed and the performance of the proposed method is analyzed using a case study. Performance improvement in Course Outcome attainments of the course Antennas and Wave Propagation, offered for undergraduate engineering (ECE) students have been investigated and evaluated in this paper. The investigation shows that dynamically adapting the teaching-learning and assessment methods during the course based on the assessments of the student’s capabilities results in improved performance. The following changes in the system have been suggested for the optimal implementation of OBE. The CO targets for the current semester course should be fixed based on the CO attainment of the previous semester courses of the same batch instead of the traditional way of fixing CO attainment targets. The microanalysis of the end-semester marks and students’ feedback at the ratio of 5:1 may be considered for overall CO attainment computation at the end of the course.
{"title":"Implementation Challenges and Opportunities in the Outcome-Based Education (OBE) for Teaching Engineering Courses: A Case Study","authors":"Dr. K. Kavitha, K. Karthika","doi":"10.35940/ijeat.e4133.0612523","DOIUrl":"https://doi.org/10.35940/ijeat.e4133.0612523","url":null,"abstract":"Outcome-based education is a closed-loop control system accepted globally for enhancing the teaching-learning processes. However, the success of the system is not prominently visible in fresh graduates. Hence detailed research and optimal process to implement OBE is necessary. This paper aims to investigate the challenges in implementing Outcome-based education and explores opportunities for improvement. Further, pedagogic planning for the analytical subjects has been proposed and the performance of the proposed method is analyzed using a case study. Performance improvement in Course Outcome attainments of the course Antennas and Wave Propagation, offered for undergraduate engineering (ECE) students have been investigated and evaluated in this paper. The investigation shows that dynamically adapting the teaching-learning and assessment methods during the course based on the assessments of the student’s capabilities results in improved performance. The following changes in the system have been suggested for the optimal implementation of OBE. The CO targets for the current semester course should be fixed based on the CO attainment of the previous semester courses of the same batch instead of the traditional way of fixing CO attainment targets. The microanalysis of the end-semester marks and students’ feedback at the ratio of 5:1 may be considered for overall CO attainment computation at the end of the course.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"480 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78121023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-30DOI: 10.35940/ijeat.e4153.0612523
Dr. Joshua J. Tom, Dr. Nlerum P. Anebo, Dr. Bukola A. Onyekwelu, Adigwe Wilfred, Richard E. Eyo
Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecurity and high-profile cyber-attacks. In recent times, information security scientists and researchers had developed various cryptographic schemes that defeated attacks using the most sophisticated (in terms of processor speed) classical computer. However, this resistance will soon erode with the arrival of quantum computers. In this paper, we profiled quantum computers and quantum algorithms based on their widely believed threat against currently secure cryptographic primitives. We found that Grover’s and Shor’s quantum-based algorithms actually pose a threat to the continued security of symmetric cryptosystems (e.g. 128-bit AES) and asymmetric (public key) cryptosystems (e.g. RSA, Elgamal, elliptic curve Diffie Hellman (ECDH), etc.) respectively.We discovered that the source of the algorithms’ cryptanalytic power against the current systems, stems from the fact that they (Grover and Shor) both equipped their respective algorithms with a quantum circuit component that can execute the oracle in parallel by applying a single circuit to all possible states of an n-qubit input. With this exponential level of processing characteristic of quantum computers and quantum-based algorithms, it is easy for the current cryptosystems to be broken since the algorithms can existentially solve the underlying mathematical problems such as integer factorization, discrete logarithm problem and elliptic curve problem, which formed the basis of the security of the affected cryptosystems. Based on this realization and as part of our readiness for a post quantum era, we explored other mathematical structures (lattices, hashes, codes, isogenies, high entropy-based symmetric key resistance, and multivariate quadratic problems) whose hardness could surpass the cryptanalytic nightmare posed by quantum computers and quantum-based algorithms. Our contribution is that, based on the findings of this research work, we can confidently assert that all hope is not lost for organizations heavily relying on protocols and applications like HTTPS, TLS, PGP, Bitcoin, etc., which derived their security from the endangered cryptosystems.
{"title":"Quantum Computers and Algorithms: A Threat to Classical Cryptographic Systems","authors":"Dr. Joshua J. Tom, Dr. Nlerum P. Anebo, Dr. Bukola A. Onyekwelu, Adigwe Wilfred, Richard E. Eyo","doi":"10.35940/ijeat.e4153.0612523","DOIUrl":"https://doi.org/10.35940/ijeat.e4153.0612523","url":null,"abstract":"Contemporary cryptographic algorithms are resistant to the strongest threats to cybersecurity and high-profile cyber-attacks. In recent times, information security scientists and researchers had developed various cryptographic schemes that defeated attacks using the most sophisticated (in terms of processor speed) classical computer. However, this resistance will soon erode with the arrival of quantum computers. In this paper, we profiled quantum computers and quantum algorithms based on their widely believed threat against currently secure cryptographic primitives. We found that Grover’s and Shor’s quantum-based algorithms actually pose a threat to the continued security of symmetric cryptosystems (e.g. 128-bit AES) and asymmetric (public key) cryptosystems (e.g. RSA, Elgamal, elliptic curve Diffie Hellman (ECDH), etc.) respectively.We discovered that the source of the algorithms’ cryptanalytic power against the current systems, stems from the fact that they (Grover and Shor) both equipped their respective algorithms with a quantum circuit component that can execute the oracle in parallel by applying a single circuit to all possible states of an n-qubit input. With this exponential level of processing characteristic of quantum computers and quantum-based algorithms, it is easy for the current cryptosystems to be broken since the algorithms can existentially solve the underlying mathematical problems such as integer factorization, discrete logarithm problem and elliptic curve problem, which formed the basis of the security of the affected cryptosystems. Based on this realization and as part of our readiness for a post quantum era, we explored other mathematical structures (lattices, hashes, codes, isogenies, high entropy-based symmetric key resistance, and multivariate quadratic problems) whose hardness could surpass the cryptanalytic nightmare posed by quantum computers and quantum-based algorithms. Our contribution is that, based on the findings of this research work, we can confidently assert that all hope is not lost for organizations heavily relying on protocols and applications like HTTPS, TLS, PGP, Bitcoin, etc., which derived their security from the endangered cryptosystems.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86689010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.35940/ijeat.d4053.0412423
Ondo Boniface, Nasso Toumba Richard, Ombété Tsimi Giscard, Kombé Timothée, Elé Pierre
The aim is to develop a more simple and effective method's performance and dynamic reliability assessment for complex industrial systems. By using the operating data of the industrial system characterized by a strong desynchronization and applying to it prediction algorithms of artificial intelligence applied to the time series, the model will have learned from the behavior of the complex manufacturing system allowing the operator or decision-maker to better orientate the maintenance, production, and quality policies. Furthermore, we propose this approach to avoid tedious mathematical methods related to dynamic reliability calculations and performance evaluation to make forecasts of the company's operation over a long period by identifying future bottlenecks in the system's behavior. The low-performance indicators and irrelevant reliability presented by many third-generation industries are due to the lack of efficient and simple tools for reliability assessment taking into account the dynamic aspect of the different elements of the production chain, maintenance department, production department, and quality department. We propose to develop a model that will abstract from conventional, complex, and inefficient mathematical methods for systems subject to combinatorial explosion problems in the manufacturing industry.
{"title":"Data-Based Estimation of the Dynamic Reliability and Performance Indicator of an Industrial Manufacturing System","authors":"Ondo Boniface, Nasso Toumba Richard, Ombété Tsimi Giscard, Kombé Timothée, Elé Pierre","doi":"10.35940/ijeat.d4053.0412423","DOIUrl":"https://doi.org/10.35940/ijeat.d4053.0412423","url":null,"abstract":"The aim is to develop a more simple and effective method's performance and dynamic reliability assessment for complex industrial systems. By using the operating data of the industrial system characterized by a strong desynchronization and applying to it prediction algorithms of artificial intelligence applied to the time series, the model will have learned from the behavior of the complex manufacturing system allowing the operator or decision-maker to better orientate the maintenance, production, and quality policies. Furthermore, we propose this approach to avoid tedious mathematical methods related to dynamic reliability calculations and performance evaluation to make forecasts of the company's operation over a long period by identifying future bottlenecks in the system's behavior. The low-performance indicators and irrelevant reliability presented by many third-generation industries are due to the lack of efficient and simple tools for reliability assessment taking into account the dynamic aspect of the different elements of the production chain, maintenance department, production department, and quality department. We propose to develop a model that will abstract from conventional, complex, and inefficient mathematical methods for systems subject to combinatorial explosion problems in the manufacturing industry.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88165656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.35940/ijeat.d4106.0412423
In the last 10 decades various methods have been introduced to detect prolonged speech segments automatically for stuttered speech signals. However less attention has been paid by researches in the detection of prolongation disorder at the parametric level. The aim of this study is to propose a hybrid approach to detect the prolonged speech segments by combining various spectral parameters with their recognition accuracies for the reconstructed speech signal. The paper presents prolonged segments detection by considering the parameters individually, combining various spectral parameters, validation of prolongation detection system, MFCC feature extraction process, basic model accuracies for the reconstructed signals. The proposed methods are simulated and experimented on UCLASS derived dataset. Obtained results are compared with the existing works of prolongation detection at parametric and word level. It is observed that hybrid parameters yield 92% of recognition rate for larger frame sizes of 200ms when modeled with SVM. The results are also tabulated and discussed for various metrics like sensitivity, specificity and accuracy metrics in detecting the prolonged segments. The study also focuses on the prolongation characteristics of vocalized and non-vocalized sounds at phoneme level. The detection accuracy of 71% is observed for Vocalized prolonged vowel phonemes over non-vocalized prolonged signal. Objectives: The objective of this work is to propose a hybrid algorithm to detect prolonged segments automatically for speech signal with prolongation disorder. The other objective is to evaluate the obtained spectral parameters performances by applying to various evaluation metrics and models to compute the recognition accuracy of a reconstructed signal. The objective is further extended to bring out the importance of variable frame size concept and to analyze the variations in vocalized and non-vocalized sounds. Methods: The methods adopted to detect prolonged speech segments are discussed at two levels namely at the preprocessing and modeling levels. The Preprocessing level is discussed by applying various parameters at an individual level, hybrid level by combing the Centroid, Entropy, Energy, ZCR parameters and MFCC feature extraction method. A new method has been applied using Specificity, Sensitivity and accuracy metrics to validate the prolongation detection model performance. In modeling level, the above parameters are discussed by applying evaluation metrics for the clustering and classification models like K-means, FCM and SVM. The performance of these methods is considered for evaluating and estimating the prolonged segment detection accuracy of the reconstructed speech signals of vocalized and non-vocalized sounds. All these methods are discussed in detail in the following sections. Findings: Hybridizing the spectral parameters to detect the prolonged speech segment automatically is a major finding of this work. It is also found that Sp
{"title":"Hybrid Approach to Detect Prolonged Speech Segments","authors":"","doi":"10.35940/ijeat.d4106.0412423","DOIUrl":"https://doi.org/10.35940/ijeat.d4106.0412423","url":null,"abstract":"In the last 10 decades various methods have been introduced to detect prolonged speech segments automatically for stuttered speech signals. However less attention has been paid by researches in the detection of prolongation disorder at the parametric level. The aim of this study is to propose a hybrid approach to detect the prolonged speech segments by combining various spectral parameters with their recognition accuracies for the reconstructed speech signal. The paper presents prolonged segments detection by considering the parameters individually, combining various spectral parameters, validation of prolongation detection system, MFCC feature extraction process, basic model accuracies for the reconstructed signals. The proposed methods are simulated and experimented on UCLASS derived dataset. Obtained results are compared with the existing works of prolongation detection at parametric and word level. It is observed that hybrid parameters yield 92% of recognition rate for larger frame sizes of 200ms when modeled with SVM. The results are also tabulated and discussed for various metrics like sensitivity, specificity and accuracy metrics in detecting the prolonged segments. The study also focuses on the prolongation characteristics of vocalized and non-vocalized sounds at phoneme level. The detection accuracy of 71% is observed for Vocalized prolonged vowel phonemes over non-vocalized prolonged signal. Objectives: The objective of this work is to propose a hybrid algorithm to detect prolonged segments automatically for speech signal with prolongation disorder. The other objective is to evaluate the obtained spectral parameters performances by applying to various evaluation metrics and models to compute the recognition accuracy of a reconstructed signal. The objective is further extended to bring out the importance of variable frame size concept and to analyze the variations in vocalized and non-vocalized sounds. Methods: The methods adopted to detect prolonged speech segments are discussed at two levels namely at the preprocessing and modeling levels. The Preprocessing level is discussed by applying various parameters at an individual level, hybrid level by combing the Centroid, Entropy, Energy, ZCR parameters and MFCC feature extraction method. A new method has been applied using Specificity, Sensitivity and accuracy metrics to validate the prolongation detection model performance. In modeling level, the above parameters are discussed by applying evaluation metrics for the clustering and classification models like K-means, FCM and SVM. The performance of these methods is considered for evaluating and estimating the prolonged segment detection accuracy of the reconstructed speech signals of vocalized and non-vocalized sounds. All these methods are discussed in detail in the following sections. Findings: Hybridizing the spectral parameters to detect the prolonged speech segment automatically is a major finding of this work. It is also found that Sp","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80638626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.35940/ijeat.d4048.0412423
Sagar Yeruva, Machavolu Sri Harshitha, Miriyala Kavya, Murakonda Sai Deepa Sree, Tumpudi Sri Sahithi
Evolving technologies make human life easier with increasing challenges. Online payments have become an integral part of our lives in the era of digitalization. The credit card payment system has made transactions hassle-free. This led to E-Commerce appraisal. Digitalization of transactions has given rise to new forms of fraud and cyberattacks that can affect individuals and organizations. This had set hackers at a great deal to steal the cardholder details using different schemes. Credit card companies must recognize these fraudulent transactions at the earliest to retain credibility among the stakeholders. Traditional methods of fraud detection have proven ineffective in identifying and preventing these fraudulent activities and cyberattacks in real time. This paper discusses various Machine Learning algorithms that predict fraudulent transactions in real-time. Fraudulent activities are solved using data science and machine learning techniques with substantial processing power and the capacity to manage massive datasets. The model is trained on large volumes of the dataset. This paper emphasizes comparison of various machine learning algorithms' performance over the input. The accuracy and efficiency of several machine learning algorithms are measured and analyzed through tabulation and comparison. The trained model is integrated with a website to categorize financial transactions as either legitimate or fraudulent. On utilizing advanced machine learning algorithms, credit card fraud detection systems have become more refined and accurate in recent years. As a result, financial organizations and customers are protected against such fraudulent activities, leading to increased trust and confidence in utilization credit card payments.
{"title":"Credit Card Fraud Detection using Machine Learning","authors":"Sagar Yeruva, Machavolu Sri Harshitha, Miriyala Kavya, Murakonda Sai Deepa Sree, Tumpudi Sri Sahithi","doi":"10.35940/ijeat.d4048.0412423","DOIUrl":"https://doi.org/10.35940/ijeat.d4048.0412423","url":null,"abstract":"Evolving technologies make human life easier with increasing challenges. Online payments have become an integral part of our lives in the era of digitalization. The credit card payment system has made transactions hassle-free. This led to E-Commerce appraisal. Digitalization of transactions has given rise to new forms of fraud and cyberattacks that can affect individuals and organizations. This had set hackers at a great deal to steal the cardholder details using different schemes. Credit card companies must recognize these fraudulent transactions at the earliest to retain credibility among the stakeholders. Traditional methods of fraud detection have proven ineffective in identifying and preventing these fraudulent activities and cyberattacks in real time. This paper discusses various Machine Learning algorithms that predict fraudulent transactions in real-time. Fraudulent activities are solved using data science and machine learning techniques with substantial processing power and the capacity to manage massive datasets. The model is trained on large volumes of the dataset. This paper emphasizes comparison of various machine learning algorithms' performance over the input. The accuracy and efficiency of several machine learning algorithms are measured and analyzed through tabulation and comparison. The trained model is integrated with a website to categorize financial transactions as either legitimate or fraudulent. On utilizing advanced machine learning algorithms, credit card fraud detection systems have become more refined and accurate in recent years. As a result, financial organizations and customers are protected against such fraudulent activities, leading to increased trust and confidence in utilization credit card payments.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82519337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.35940/ijeat.d4084.0412423
Shobha K P, U. A, Dr. Prasanna Kumar H
The capacity to reap the highest output power in various environmental conditions is one of the most critical tasks in the application of photovoltaic (PV) systems. Although many cutting-edge methods have been developed to accomplish this, the majority of methods have significant drawbacks, for instance, poor tracking capabilities and heavy computational load. Therefore, the aim of this work is to present a control algorithm that takes into account the connection between the solar array output power and the controller's PWM duty cycle of the MPPT boost converter. The proposed customized CNN is implemented in MATLAB/SIMULINK and compared with well known for its performance. The findings demonstrate an increase in the PV system's ability to generate power in any weather, as well as a reduction in the effects of rapid changes in solar irradiation on output power.
{"title":"Performance Analysis of MPPT Algorithms Designed for Photovoltaic System","authors":"Shobha K P, U. A, Dr. Prasanna Kumar H","doi":"10.35940/ijeat.d4084.0412423","DOIUrl":"https://doi.org/10.35940/ijeat.d4084.0412423","url":null,"abstract":"The capacity to reap the highest output power in various environmental conditions is one of the most critical tasks in the application of photovoltaic (PV) systems. Although many cutting-edge methods have been developed to accomplish this, the majority of methods have significant drawbacks, for instance, poor tracking capabilities and heavy computational load. Therefore, the aim of this work is to present a control algorithm that takes into account the connection between the solar array output power and the controller's PWM duty cycle of the MPPT boost converter. The proposed customized CNN is implemented in MATLAB/SIMULINK and compared with well known for its performance. The findings demonstrate an increase in the PV system's ability to generate power in any weather, as well as a reduction in the effects of rapid changes in solar irradiation on output power.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"85 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86641997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.35940/ijeat.d4051.0412423
S. B, D. Keerthiprasad, D. Divakar, Dr. Savitha M, Allwin Yesuvadian R
Fiber-based hybrid composite materials are used for variety of industrial purposes going on from automotive to many engineering fields such as structural, aerospace because of unique properties compared over conventional materials. Fiber based hybrid composites have greatly long-drawn-out o varying applications in today's automotive industry reason behind is due their light weight, high strength, stiffness and ease of repair. This work aims to create a novel type of hybrid composite made by reinforcing S-glass (satin type) & carbon (twill form) in an epoxy matrix. Pure and hybrid composites are made by manual laying with 0° orientation of each fiber layer and the action has been tested with different combinations of each layer of S-glass and carbon and finally with a hybrid subjected to different mechanical stresses. The fiber matrix for the hybrid is created in a 50:50 ratio. Pure samples of fiberglass and carbon fiber-epoxy composites were compared to hybrid samples. The results showed that the hybrid samples outperformed the pure forms of the composite in mechanical tests, due to the presence of carbon fiber on the end faces of the sample, which offers the hybrid form's superior mechanical properties.
{"title":"Mechanical Investigation of S-Glass/Carbon Fibers Reinforced Epoxy Polymer Matrix Composites","authors":"S. B, D. Keerthiprasad, D. Divakar, Dr. Savitha M, Allwin Yesuvadian R","doi":"10.35940/ijeat.d4051.0412423","DOIUrl":"https://doi.org/10.35940/ijeat.d4051.0412423","url":null,"abstract":"Fiber-based hybrid composite materials are used for variety of industrial purposes going on from automotive to many engineering fields such as structural, aerospace because of unique properties compared over conventional materials. Fiber based hybrid composites have greatly long-drawn-out o varying applications in today's automotive industry reason behind is due their light weight, high strength, stiffness and ease of repair. This work aims to create a novel type of hybrid composite made by reinforcing S-glass (satin type) & carbon (twill form) in an epoxy matrix. Pure and hybrid composites are made by manual laying with 0° orientation of each fiber layer and the action has been tested with different combinations of each layer of S-glass and carbon and finally with a hybrid subjected to different mechanical stresses. The fiber matrix for the hybrid is created in a 50:50 ratio. Pure samples of fiberglass and carbon fiber-epoxy composites were compared to hybrid samples. The results showed that the hybrid samples outperformed the pure forms of the composite in mechanical tests, due to the presence of carbon fiber on the end faces of the sample, which offers the hybrid form's superior mechanical properties.","PeriodicalId":13981,"journal":{"name":"International Journal of Engineering and Advanced Technology","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85078392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}