Pub Date : 2021-07-30DOI: 10.37622/ijaer/16.7.2021.568-574
V. V, Hari Prasad D Adolf
The usage and user of internet and social media is increasing day-by-day and consequently cyberbully vulnerabilities are also growing. Cyberbullying is an aggressive, planned behavior carried out by a group or individual. It is happening by sending, posting, sharing negative, harmful, untrue contents in online. It leads to psychiatric and emotional disorders for those affected. Hence, there is a critical requirement to develop automated methods for cyberbullying detection and prevention. Over the past few years, most existing work on cyberbullying detection has focused on text based analysis. Text and image are the important mediums in cyberbullying incident. This paper presents a hybrid deep neural model for cyberbullying detection in two different modalities of social data, namely text and image. Deep learning methods have achieved state-of-the-art results in various applications. In this paper, hybrid deep learning technique is used in multiple modalities of data to detect cyber bullying. An experiment was conducted on hybrid model (CNN and LSTM) which detects cyberbullying on text and image. The experiments are conducted on publicly available datasets and tested with telegram chat. This paper aims to direct future research on integrating video source with existing multimodal data source to prevent cyberbullying issues.
{"title":"Multimodal Cyberbullying Detection using Hybrid Deep Learning Algorithms","authors":"V. V, Hari Prasad D Adolf","doi":"10.37622/ijaer/16.7.2021.568-574","DOIUrl":"https://doi.org/10.37622/ijaer/16.7.2021.568-574","url":null,"abstract":"The usage and user of internet and social media is increasing day-by-day and consequently cyberbully vulnerabilities are also growing. Cyberbullying is an aggressive, planned behavior carried out by a group or individual. It is happening by sending, posting, sharing negative, harmful, untrue contents in online. It leads to psychiatric and emotional disorders for those affected. Hence, there is a critical requirement to develop automated methods for cyberbullying detection and prevention. Over the past few years, most existing work on cyberbullying detection has focused on text based analysis. Text and image are the important mediums in cyberbullying incident. This paper presents a hybrid deep neural model for cyberbullying detection in two different modalities of social data, namely text and image. Deep learning methods have achieved state-of-the-art results in various applications. In this paper, hybrid deep learning technique is used in multiple modalities of data to detect cyber bullying. An experiment was conducted on hybrid model (CNN and LSTM) which detects cyberbullying on text and image. The experiments are conducted on publicly available datasets and tested with telegram chat. This paper aims to direct future research on integrating video source with existing multimodal data source to prevent cyberbullying issues.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72714564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-07-30DOI: 10.37622/ijaer/16.7.2021.563-567
R. Rajendran
{"title":"Investigations on the Doping Effect of Sodium Thiosulphate on KDP Single Crystals","authors":"R. Rajendran","doi":"10.37622/ijaer/16.7.2021.563-567","DOIUrl":"https://doi.org/10.37622/ijaer/16.7.2021.563-567","url":null,"abstract":"","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83600630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.37622/ijaer/16.6.2021.491-496
Muhammad Jawad Ahmad, X. Zhu, Kangrenke Anon, Dongzhigang Anon
: Cylindrical parts with deep holes and thin-wall structures are the backbone in aerospace, such as sleeves, actuators, and landing gears of aircraft. However, in precise, the precision machining of inner holes of cylindrical parts with small bores, large depth to diameter ratios (>7-8) is more problematic, which realized the significance of the grinding of such deep holes. In this article, an optimized structure of a deep hole internal grinding shaft tool is introduced. The vital structure of this grinding machine is the internal grinding shaft tool structure and one of the decisive factors distressing the surface grinding quality because of the length and complexity of the structure with a limited exterior dimension. First, the modal of the grinding shaft tool structure is designed in CREO-Parametric software. Then the designed modal is carried through the static and dynamic analyses employing ANSYS FEA software to authenticate and assure the structural stiffness and behavior to attain high precision machining of deep holes. In static analysis, various parameters such as materials of internal grinding shaft and various structural designs of the shaft took under research consideration. Next, the dynamic analysis has been performed against the optimized structure. Finally, harmonic analysis is performed to verify the internal grinding shaft tool design. Consequently, quite a few developments have been made in the structure and also provide a motorized spindle to segregate the effects of vibrations and forces on machining quality due to the driving mechanism.
{"title":"Static and Dynamic Analysis of a Deep Hole Internal Grinding Shaft Tool","authors":"Muhammad Jawad Ahmad, X. Zhu, Kangrenke Anon, Dongzhigang Anon","doi":"10.37622/ijaer/16.6.2021.491-496","DOIUrl":"https://doi.org/10.37622/ijaer/16.6.2021.491-496","url":null,"abstract":": Cylindrical parts with deep holes and thin-wall structures are the backbone in aerospace, such as sleeves, actuators, and landing gears of aircraft. However, in precise, the precision machining of inner holes of cylindrical parts with small bores, large depth to diameter ratios (>7-8) is more problematic, which realized the significance of the grinding of such deep holes. In this article, an optimized structure of a deep hole internal grinding shaft tool is introduced. The vital structure of this grinding machine is the internal grinding shaft tool structure and one of the decisive factors distressing the surface grinding quality because of the length and complexity of the structure with a limited exterior dimension. First, the modal of the grinding shaft tool structure is designed in CREO-Parametric software. Then the designed modal is carried through the static and dynamic analyses employing ANSYS FEA software to authenticate and assure the structural stiffness and behavior to attain high precision machining of deep holes. In static analysis, various parameters such as materials of internal grinding shaft and various structural designs of the shaft took under research consideration. Next, the dynamic analysis has been performed against the optimized structure. Finally, harmonic analysis is performed to verify the internal grinding shaft tool design. Consequently, quite a few developments have been made in the structure and also provide a motorized spindle to segregate the effects of vibrations and forces on machining quality due to the driving mechanism.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84147682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.37622/ijaer/13.13.2018.11012-11017
J. R. L., A. M., A. A.
{"title":"Unadorned Gabor based Convolutional Neural Network Overrides Transfer Learning Concept","authors":"J. R. L., A. M., A. A.","doi":"10.37622/ijaer/13.13.2018.11012-11017","DOIUrl":"https://doi.org/10.37622/ijaer/13.13.2018.11012-11017","url":null,"abstract":"","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89648498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-30DOI: 10.37622/ijaer/16.6.2021.509-515
Kirtik Ayush, Ronojay Biswas
This paper is intended on a practical approach to design a prototype Robotic Vehicle by using application of Arduino Programming. The robotic vehicle follows a specified path using an IR sensor. The designed robotic vehicle was smart enough to follow the path and directions in given space. It moves& navigates automatically on specified black lines marked on surface. A customized programme coding was also done to perform customized function. Such programmed robot may be useful in several mechanical, industrial, medical & Army operations and can save cost of human labor, human life at hazardous location & time.
{"title":"Path Follower & Obstacle Avoidance Smart Robot Vehicle: Applications of Arduino Programming","authors":"Kirtik Ayush, Ronojay Biswas","doi":"10.37622/ijaer/16.6.2021.509-515","DOIUrl":"https://doi.org/10.37622/ijaer/16.6.2021.509-515","url":null,"abstract":"This paper is intended on a practical approach to design a prototype Robotic Vehicle by using application of Arduino Programming. The robotic vehicle follows a specified path using an IR sensor. The designed robotic vehicle was smart enough to follow the path and directions in given space. It moves& navigates automatically on specified black lines marked on surface. A customized programme coding was also done to perform customized function. Such programmed robot may be useful in several mechanical, industrial, medical & Army operations and can save cost of human labor, human life at hazardous location & time.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"144 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83063201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-15DOI: 10.37622/ijaer/16.4.2021.302-307
Jyotirmayee Routray, Sarthak Rout, J. J. Panda, Bhabani Shankar Das Mohapatra, Hitendrita Panda
{"title":"Hand Gesture Recognition using TOF camera","authors":"Jyotirmayee Routray, Sarthak Rout, J. J. Panda, Bhabani Shankar Das Mohapatra, Hitendrita Panda","doi":"10.37622/ijaer/16.4.2021.302-307","DOIUrl":"https://doi.org/10.37622/ijaer/16.4.2021.302-307","url":null,"abstract":"","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87943741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-15DOI: 10.37622/ijaar/16.4.2021.267-270
Akarshita Shankar, A. Shankar
: Network Intrusion is cybercrime, which involves hacking into users’ systems and stealing their sensitive and confidential information. The information could include credit card details, username, and passwords, bank details, etc. These attacks occur via ma licious viruses installed in the user’s system without his/her knowledge, blocking the network traffic to a legitimate site, etc. After obtaining the information, the attacker could commit crimes such as financial losses and identity theft. The target could be an individual, an organization, or a cluster in an organization. This paper provides an explanation of network intrusion, detection, and prevention to overcome them.
{"title":"Network Intrusion Detection and Prevention","authors":"Akarshita Shankar, A. Shankar","doi":"10.37622/ijaar/16.4.2021.267-270","DOIUrl":"https://doi.org/10.37622/ijaar/16.4.2021.267-270","url":null,"abstract":": Network Intrusion is cybercrime, which involves hacking into users’ systems and stealing their sensitive and confidential information. The information could include credit card details, username, and passwords, bank details, etc. These attacks occur via ma licious viruses installed in the user’s system without his/her knowledge, blocking the network traffic to a legitimate site, etc. After obtaining the information, the attacker could commit crimes such as financial losses and identity theft. The target could be an individual, an organization, or a cluster in an organization. This paper provides an explanation of network intrusion, detection, and prevention to overcome them.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-06-15DOI: 10.37622/ijaer/16.2.2021.154-160
Preetish Sinha, Akash Sambshio Madavi
The study focuses on the production of biodiesel from waste cooking oil using the transesterification method. A maximum yield of 94% of biodiesel is achieved using transesterification method in the presence of base alkali catalyst, KOH, 0.5 wt%, at a temperature of 60C and 1:06 oil: methanol ratio in 30 min at 600 rpm. Other properties such as Kinematic viscosity, flash point, acid value, %FFA, density of waste cooking oil and biodiesel are also estimated. Waste Cooking Oil being easily available and cheaper as compared to vegetable oil it is highly recommended for production of biodiesel, to be used in different applications including transportation. This will help in addressing the issues of natural resource depletion, environmental pollution and climate change.
{"title":"Study on Yield percentage of Biodiesel from Waste cooking oil using Transesterification","authors":"Preetish Sinha, Akash Sambshio Madavi","doi":"10.37622/ijaer/16.2.2021.154-160","DOIUrl":"https://doi.org/10.37622/ijaer/16.2.2021.154-160","url":null,"abstract":"The study focuses on the production of biodiesel from waste cooking oil using the transesterification method. A maximum yield of 94% of biodiesel is achieved using transesterification method in the presence of base alkali catalyst, KOH, 0.5 wt%, at a temperature of 60C and 1:06 oil: methanol ratio in 30 min at 600 rpm. Other properties such as Kinematic viscosity, flash point, acid value, %FFA, density of waste cooking oil and biodiesel are also estimated. Waste Cooking Oil being easily available and cheaper as compared to vegetable oil it is highly recommended for production of biodiesel, to be used in different applications including transportation. This will help in addressing the issues of natural resource depletion, environmental pollution and climate change.","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"80 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72660989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.37622/ijaer/16.5.2021.423-440
K. Elangovan, G. Gowtham, B. P. Srinidhi, Sonia S Anand
{"title":"Traffic Planning and Major Intersection Re-design of an Existing FourArmed Intersection at DB road, Coimbatore, India","authors":"K. Elangovan, G. Gowtham, B. P. Srinidhi, Sonia S Anand","doi":"10.37622/ijaer/16.5.2021.423-440","DOIUrl":"https://doi.org/10.37622/ijaer/16.5.2021.423-440","url":null,"abstract":"","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"2014 1","pages":"423"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86418749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-30DOI: 10.37622/ijaer/16.5.2021.357-361
Sanjana G. B., Girish Rao Salanke N. S.
{"title":"High Resilient Messaging Service for Microservice Architecture","authors":"Sanjana G. B., Girish Rao Salanke N. S.","doi":"10.37622/ijaer/16.5.2021.357-361","DOIUrl":"https://doi.org/10.37622/ijaer/16.5.2021.357-361","url":null,"abstract":"","PeriodicalId":36710,"journal":{"name":"International Journal of Applied Engineering Research (Netherlands)","volume":"116 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79819140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}