Pub Date : 2021-06-11DOI: 10.14419/ijet.v10i2.31604
H. Azizi, Hassanzadeh Reza
Several studies have been conducted in recent years to discriminate between fractured (FZs) and non-fractured zones (NFZs) in oil wells. These studies have applied data mining techniques to petrophysical logs (PLs) with generally valuable results; however, identifying fractured and non-fractured zones is difficult because imbalanced data is not treated as balanced data during analysis. We studied the importance of using balanced data to detect fractured zones using PLs. We used Random-Forest and Support Vector Machine classifiers on eight oil wells drilled into a fractured carbonite reservoir to study PLs with imbalanced and balanced datasets, then validated our results with image logs. A significant difference between accuracy and precision indicates imbalanced data with fractured zones categorized as the minor class. The results indicated that the accuracy of imbalanced and balanced datasets is similar, but precision is significantly improved by balancing, regardless of how low or high the calculated indices might be.
{"title":"Data mining based investigation of the impact of imbalanced dataset over fractured zone detection","authors":"H. Azizi, Hassanzadeh Reza","doi":"10.14419/ijet.v10i2.31604","DOIUrl":"https://doi.org/10.14419/ijet.v10i2.31604","url":null,"abstract":"Several studies have been conducted in recent years to discriminate between fractured (FZs) and non-fractured zones (NFZs) in oil wells. These studies have applied data mining techniques to petrophysical logs (PLs) with generally valuable results; however, identifying fractured and non-fractured zones is difficult because imbalanced data is not treated as balanced data during analysis. We studied the importance of using balanced data to detect fractured zones using PLs. We used Random-Forest and Support Vector Machine classifiers on eight oil wells drilled into a fractured carbonite reservoir to study PLs with imbalanced and balanced datasets, then validated our results with image logs. A significant difference between accuracy and precision indicates imbalanced data with fractured zones categorized as the minor class. The results indicated that the accuracy of imbalanced and balanced datasets is similar, but precision is significantly improved by balancing, regardless of how low or high the calculated indices might be. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"40 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89570650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-24DOI: 10.14419/ijet.v10i2.31523
Yuvaraj George
The objective is to identify potential risks in the aircraft development and to quantify the risks in the process, ultimately to find mitigating strategies. Monte-Carlo simulation for quantitative risk assessment and RAND DAPCA IV to calculate the cost are employed. These results are comprehended and collectively assessed with few assumptions. The assumptions are in due consideration to the local conditions, and thus they reflect in the approximations. These assumptions indicate the impact of the industrial and academic environment of the Russian Federation on the developmental cycle of the aircraft. The estimated financial risk for the development of an air medical ambulance for the Russian Federation is 29%, and the cost for unit production of the medical aircraft is nearly 19 million USD. The suggested strategies can reduce the financial risk to 22% and the cost for unit production of the medical aircraft to nearly 13 million USD.
{"title":"Parametric cost analysis and quantitative risk assessment for developing strategies to counter risks in the design and production of medical aircraft in the Russian federation","authors":"Yuvaraj George","doi":"10.14419/ijet.v10i2.31523","DOIUrl":"https://doi.org/10.14419/ijet.v10i2.31523","url":null,"abstract":"The objective is to identify potential risks in the aircraft development and to quantify the risks in the process, ultimately to find mitigating strategies. Monte-Carlo simulation for quantitative risk assessment and RAND DAPCA IV to calculate the cost are employed. These results are comprehended and collectively assessed with few assumptions. The assumptions are in due consideration to the local conditions, and thus they reflect in the approximations. These assumptions indicate the impact of the industrial and academic environment of the Russian Federation on the developmental cycle of the aircraft. The estimated financial risk for the development of an air medical ambulance for the Russian Federation is 29%, and the cost for unit production of the medical aircraft is nearly 19 million USD. The suggested strategies can reduce the financial risk to 22% and the cost for unit production of the medical aircraft to nearly 13 million USD.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89727184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-24DOI: 10.14419/ijet.v10i2.31538
M. Kowsher, M. J. Uddin, A. Tahabilder, Nusrat Jahan Prottasha, Mahid Ahmed, K. M. R. Alam, Tamanna Sultana
Progression in machine learning and statistical inference are facilitating the advancement of domains like computer vision, natural language processing (NLP), automation & robotics, and so on. Among the different persuasive improvements in NLP, word embedding is one of the most used and revolutionary techniques. In this paper, we manifest an open-source library for Bangla word extraction systems named BnVec which expects to furnish the Bangla NLP research community by the utilization of some incredible word embedding techniques. The BnVec is splitted up into two parts, the first one is the Bangla suitable defined class to embed words with access to the six most popular word embedding schemes (CountVectorizer, TF-IDF, Hash Vectorizer, Word2vec, fastText, and Glove). The other one is based on the pre-trained distributed word embedding system of Word2vec, fastText, and GloVe. The pre-trained models have been built by collecting content from the newspaper, social media, and Bangla wiki articles. The total number of tokens used to build the models exceeds 395,289,960. The paper additionally depicts the performance of these models by various hyper-parameter tuning and then analyzes the results.
{"title":"BnVec: Towards the Development of Word Embedding for Bangla Language Processing","authors":"M. Kowsher, M. J. Uddin, A. Tahabilder, Nusrat Jahan Prottasha, Mahid Ahmed, K. M. R. Alam, Tamanna Sultana","doi":"10.14419/ijet.v10i2.31538","DOIUrl":"https://doi.org/10.14419/ijet.v10i2.31538","url":null,"abstract":"Progression in machine learning and statistical inference are facilitating the advancement of domains like computer vision, natural language processing (NLP), automation & robotics, and so on. Among the different persuasive improvements in NLP, word embedding is one of the most used and revolutionary techniques. In this paper, we manifest an open-source library for Bangla word extraction systems named BnVec which expects to furnish the Bangla NLP research community by the utilization of some incredible word embedding techniques. The BnVec is splitted up into two parts, the first one is the Bangla suitable defined class to embed words with access to the six most popular word embedding schemes (CountVectorizer, TF-IDF, Hash Vectorizer, Word2vec, fastText, and Glove). The other one is based on the pre-trained distributed word embedding system of Word2vec, fastText, and GloVe. The pre-trained models have been built by collecting content from the newspaper, social media, and Bangla wiki articles. The total number of tokens used to build the models exceeds 395,289,960. The paper additionally depicts the performance of these models by various hyper-parameter tuning and then analyzes the results.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"34 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90116671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-05-22DOI: 10.14419/ijet.v10i2.31524
Bertrand Ledoux Ebassa Eloundou, Aimé Joseph Oyobe Okassa, Hervé Ndongo Abena, P. Ele
Technological developments for several years have resulted in the handling (storing, exchanging or processing) of increasingly important data in various fields and particularly in medical field. In this works we present a new image compression / decompression algorithm based on the quaternion wavelet transform (QWT). This algorithm is simple, fast and efficient. It has been applied to medical images. The results obtained after decompression are appreciated through the compression parameter values of CR, PSNR, and MSE and by visual observation. By the values of these parameters, the results of the algorithm are considered encouraging.
{"title":"Compression of medical images by quaternionic wavelet transform","authors":"Bertrand Ledoux Ebassa Eloundou, Aimé Joseph Oyobe Okassa, Hervé Ndongo Abena, P. Ele","doi":"10.14419/ijet.v10i2.31524","DOIUrl":"https://doi.org/10.14419/ijet.v10i2.31524","url":null,"abstract":"Technological developments for several years have resulted in the handling (storing, exchanging or processing) of increasingly important data in various fields and particularly in medical field. In this works we present a new image compression / decompression algorithm based on the quaternion wavelet transform (QWT). This algorithm is simple, fast and efficient. It has been applied to medical images. The results obtained after decompression are appreciated through the compression parameter values of CR, PSNR, and MSE and by visual observation. By the values of these parameters, the results of the algorithm are considered encouraging. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"54 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91050288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-14DOI: 10.32474/LTTFD.2021.03.000173
Redwanul Islam, A. Chakrabortty, Joyjit Ghosh, T. Iqbal, Tanvir Hossen
In textile industries, spinning sector plays a vital role because this sector produces the main raw material for the textile industries which is known as yarn. So for getting good qualities garments, it is needed to ensure the good qualities yarn. There are many things which are re-sponsible for producing good qualities yarn. Among these spindle speed is an important thing. One must have to change the spindle speed, when he changes the count. As every count has a particular spindle speed in which the production shows maximum production efficiency. Here we used five most commonly used yarn counts in the maximum factories. The counts are 15 Ne, 20 Ne, 25 Ne, 30 Ne and 40 Ne. We analyzed these counts with different speed and found that every count showed maximum efficiency at a particular spindle speed. The out-come of this paper is applicable in all types of ring frame machine , especially for producing single carded and combed yarn.
{"title":"Importance of spindle speed in ring frame","authors":"Redwanul Islam, A. Chakrabortty, Joyjit Ghosh, T. Iqbal, Tanvir Hossen","doi":"10.32474/LTTFD.2021.03.000173","DOIUrl":"https://doi.org/10.32474/LTTFD.2021.03.000173","url":null,"abstract":"In textile industries, spinning sector plays a vital role because this sector produces the main raw material for the textile industries which is known as yarn. So for getting good qualities garments, it is needed to ensure the good qualities yarn. There are many things which are re-sponsible for producing good qualities yarn. Among these spindle speed is an important thing. One must have to change the spindle speed, when he changes the count. As every count has a particular spindle speed in which the production shows maximum production efficiency. Here we used five most commonly used yarn counts in the maximum factories. The counts are 15 Ne, 20 Ne, 25 Ne, 30 Ne and 40 Ne. We analyzed these counts with different speed and found that every count showed maximum efficiency at a particular spindle speed. The out-come of this paper is applicable in all types of ring frame machine , especially for producing single carded and combed yarn. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"24 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73921908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-14DOI: 10.14419/ijet.v10i1.31492
Wenming Liu, Hongdong Xie, Guoping Peng, Shiping Wang
The project team maintains workflow continuity as much as possible to deliver products on time. Nevertheless, poor construction management makes the workflow unstable during the construction process, which leads to the delayed delivery of the building. As different methods to improve production efficiency, Lean Construction and Building Information Modelling (BIM) have a positive impact on the industry. Although many researches have shown the unique advantages of the Last Planner System (LPS) and BIM Technology, the advantages of their integration have not been fully exploited. This paper explores the application of the LPS and BIM in the construction phase through a project that transforms from traditional construction process planning to the use of the LPS. The project results show the impact of the LPS and BIM as lean methods on the project, which can improve the workflow of the construction project by improving efficiency and coordination.
{"title":"Application of last planner system with BIM in construction plan management","authors":"Wenming Liu, Hongdong Xie, Guoping Peng, Shiping Wang","doi":"10.14419/ijet.v10i1.31492","DOIUrl":"https://doi.org/10.14419/ijet.v10i1.31492","url":null,"abstract":"The project team maintains workflow continuity as much as possible to deliver products on time. Nevertheless, poor construction management makes the workflow unstable during the construction process, which leads to the delayed delivery of the building. As different methods to improve production efficiency, Lean Construction and Building Information Modelling (BIM) have a positive impact on the industry. Although many researches have shown the unique advantages of the Last Planner System (LPS) and BIM Technology, the advantages of their integration have not been fully exploited. This paper explores the application of the LPS and BIM in the construction phase through a project that transforms from traditional construction process planning to the use of the LPS. The project results show the impact of the LPS and BIM as lean methods on the project, which can improve the workflow of the construction project by improving efficiency and coordination. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"154 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73215911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes HealthTracker, a mobile health application to record, store, display, and analyze personal health data. This application allows an individual to log several types of data encompassing their personal health. HealthTracker serves as a model for both a recording and a recommending system. Its goal is to serve as a bridge for future personal health systems to build from. A person’s health information is displayed in an easy-to-understand manner but is also practical for medical professionals. Users should find the system useful and effective no matter if they use it simply or extensively. Currently, the system serves as a prototype for determining the practical applications for smart health systems running on mobile platforms.
{"title":"Health tracker: data acquisition and analysis for monitoring health trends and assessing disease risk","authors":"Du’a Alzaleq, Suboh Alkhushayni, Austin FitzGerald","doi":"10.14419/IJET.V10I1.31370","DOIUrl":"https://doi.org/10.14419/IJET.V10I1.31370","url":null,"abstract":"This paper describes HealthTracker, a mobile health application to record, store, display, and analyze personal health data. This application allows an individual to log several types of data encompassing their personal health. HealthTracker serves as a model for both a recording and a recommending system. Its goal is to serve as a bridge for future personal health systems to build from. A person’s health information is displayed in an easy-to-understand manner but is also practical for medical professionals. Users should find the system useful and effective no matter if they use it simply or extensively. Currently, the system serves as a prototype for determining the practical applications for smart health systems running on mobile platforms. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"6 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83511658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-27DOI: 10.14419/ijet.v10i1.30533
Ugwuanyi Donald Chidiebere, Okafor Fidelis Onyebuchi
Thermally induced cracks due to temperature gradient in mass concrete have adverse effects on its durability and service life. Heat released during the hydration of Portland cement in early age mass concrete can be quite excessive depending on the ambient temperature, cement content of the concrete mix and the size. Finite difference model using Crank Nicholson implicit method was developed based on the two dimensional unsteady state heat conduction. Optimized MATLAB based software was developed for simulation and data visualization. A mass concrete block cast with standard mix ratio and water cement ratio was used to verify the efficacy of the model. Type-K thermocouple and digital thermometer were used to monitor the temperature at time intervals. The temperature profile showed a hotter core and cooler surface except for the initial placement temperature, which exhibited a uniform temperature for all thermocouple locations. Peak temperature values were recorded within the first day of concrete placement. The model successfully predicted the temperature profile of the mass concrete at early ages of cement hydration. With the knowledge of the ambient temperature and the configuration of the mass concrete, the model can reliably predict the temperature profile from which potential for thermal cracks occurrence can be determined to enable suitable proactive preventive and control measures.
{"title":"Modeling temperature profile in mass concrete at early ages of cement hydration","authors":"Ugwuanyi Donald Chidiebere, Okafor Fidelis Onyebuchi","doi":"10.14419/ijet.v10i1.30533","DOIUrl":"https://doi.org/10.14419/ijet.v10i1.30533","url":null,"abstract":"Thermally induced cracks due to temperature gradient in mass concrete have adverse effects on its durability and service life. Heat released during the hydration of Portland cement in early age mass concrete can be quite excessive depending on the ambient temperature, cement content of the concrete mix and the size. Finite difference model using Crank Nicholson implicit method was developed based on the two dimensional unsteady state heat conduction. Optimized MATLAB based software was developed for simulation and data visualization. A mass concrete block cast with standard mix ratio and water cement ratio was used to verify the efficacy of the model. Type-K thermocouple and digital thermometer were used to monitor the temperature at time intervals. The temperature profile showed a hotter core and cooler surface except for the initial placement temperature, which exhibited a uniform temperature for all thermocouple locations. Peak temperature values were recorded within the first day of concrete placement. The model successfully predicted the temperature profile of the mass concrete at early ages of cement hydration. With the knowledge of the ambient temperature and the configuration of the mass concrete, the model can reliably predict the temperature profile from which potential for thermal cracks occurrence can be determined to enable suitable proactive preventive and control measures. ","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"9 3 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83708729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-19DOI: 10.14419/ijet.v10i1.21480
Ms. K. Sudharani, Dr. N. K. Sakthivel
Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based cryptography scheme without requiring digital certificates. In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided. Due to the lack of authentication, the public key associated with the private key of a user may be replaced by anyone. Therefore, the ciphertext cannot be decrypted accurately. To mitigate this issue, an Enhanced Certificateless Proxy Signature (E-CLPS) is proposed to offer high security guarantee and requires minimum computational cost. In this work, the Hackman tool is used for detecting the dictionary attacks in the cloud. From the experimental analysis, it is observed that the proposed E-CLPS scheme yields better Attack Detection Rate, True Positive Rate, True Negative Rate and Minimum False Positives and False Negatives than the existing schemes.
无证书公钥加密(CL-PKC)方案是将基于身份的加密技术与传统的PKC技术相结合的一种新标准。它比基于id的加密方案具有更好的安全性,而不需要数字证书。在CL-PKC方案中,由于密钥生成中心(Key Generation Center, KGC)使用部分秘密密钥生成公钥,因此避免了可信第三方对公钥进行身份验证的需要。由于缺乏身份验证,与用户私钥关联的公钥可能被任何人替换。因此,密文无法准确解密。为了解决这一问题,提出了一种增强型无证书代理签名(E-CLPS),它提供了高安全性保证,并且需要最小的计算成本。在这项工作中,Hackman工具用于检测云中的字典攻击。实验分析表明,与现有方案相比,本文提出的E-CLPS方案具有更高的攻击检测率、真阳性率、真阴性率和最小假阳性和假阴性。
{"title":"Design and development of a secure certificateless proxy signature based (SE-CLPS) encryption scheme for cloud storage","authors":"Ms. K. Sudharani, Dr. N. K. Sakthivel","doi":"10.14419/ijet.v10i1.21480","DOIUrl":"https://doi.org/10.14419/ijet.v10i1.21480","url":null,"abstract":"Certificateless Public Key Cryptography (CL-PKC) scheme is a new standard that combines Identity (ID)-based cryptography and tradi- tional PKC. It yields better security than the ID-based cryptography scheme without requiring digital certificates. In the CL-PKC scheme, as the Key Generation Center (KGC) generates a public key using a partial secret key, the need for authenticating the public key by a trusted third party is avoided. Due to the lack of authentication, the public key associated with the private key of a user may be replaced by anyone. Therefore, the ciphertext cannot be decrypted accurately. To mitigate this issue, an Enhanced Certificateless Proxy Signature (E-CLPS) is proposed to offer high security guarantee and requires minimum computational cost. In this work, the Hackman tool is used for detecting the dictionary attacks in the cloud. From the experimental analysis, it is observed that the proposed E-CLPS scheme yields better Attack Detection Rate, True Positive Rate, True Negative Rate and Minimum False Positives and False Negatives than the existing schemes.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76755885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-30DOI: 10.24003/emitter.v8i2.550
Bhavana D, Veena M B, Santosh Kumar Sahu
Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to system crashing. This paper discusses a staged approach to detect leaks in firmware of remote server controller. Remote server controller monitors the server remotely with many processes running in the background. Any memory leak in the long running applications pose a threat to the performance of the system. The approach adopted here filters the processes running in the system with leaks based on time threshold in the first stage. These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind. The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report. The proposed approach has less impact on the performance of the system and is faster compared to many available systems as there is no need to modify or re-compile the program. In addition, the automated approach offers an effective technique for detecting possible leakages in early software development phases.
{"title":"An Automated Approach of Detection of Memory Leaks for Remote Server Controllers","authors":"Bhavana D, Veena M B, Santosh Kumar Sahu","doi":"10.24003/emitter.v8i2.550","DOIUrl":"https://doi.org/10.24003/emitter.v8i2.550","url":null,"abstract":"Memory leaks are a major concern to the long running applications like servers which make the working set to grow with the program. This eventually leads to system crashing. This paper discusses a staged approach to detect leaks in firmware of remote server controller. Remote server controller monitors the server remotely with many processes running in the background. Any memory leak in the long running applications pose a threat to the performance of the system. The approach adopted here filters the processes running in the system with leaks based on time threshold in the first stage. These processes with leaks are passed to the next stage where precise memory leak detection is done using the open source dynamic instrumentation tool Valgrind. The system leverages an automated leak detection approach that invokes the leak detection process on encountering any severity in the system and generates a consolidated leak report. The proposed approach has less impact on the performance of the system and is faster compared to many available systems as there is no need to modify or re-compile the program. In addition, the automated approach offers an effective technique for detecting possible leakages in early software development phases.","PeriodicalId":40905,"journal":{"name":"EMITTER-International Journal of Engineering Technology","volume":"94 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90521687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}