Editor(s)

Dr. Rajkumar Venkatesh Raikar
Department of Civil Engineering, KLE Dr. M. S. Sheshgiri College of Engineering and Technology, Karnataka, India.

ISBN 978-93-91215-62-0 (Print)
ISBN 978-93-91215-70-5 (eBook)
DOI: 10.9734/bpi/naer/v1

This book covers key areas of engineering research. The contributions by the authors include   eye aspect ratio, mouth aspect ratio, facial landmark, text mining, text characterization, feature selection, text tokenization, FPI and instructional phase, managed service provider, managed service, maturity model, IT service delivery, serial industrial robot, structural synthesis, redundant kinematic chain, workspace, kinematic analysis, measurement uncertainty, control, reliability, construction materials, probability, completeness of control, ASME codes and standards, modular refinery reactor shell, non-destructive testing, structural integrity, health-care, human emotion, patient, space, shell, shell structure, future development, combustion, ignition timing, fuzzy-PI controller, power Flow Controller, flexible AC transmission systems, security, malicious attacks. This book contains various materials suitable for students, researchers and academicians in the field of engineering research.

 

Media Promotion:


Chapters


Driver Drowsiness Detection and Alert System Using Computer Vision

K. Vinutha, N. Ashwini, Amrit Raj, Jayam Sukruth, M. Praneeth, Shubham Anand

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 1-10
https://doi.org/10.9734/bpi/naer/v1/2206F

In recent years, an increase in the demand for modern transportation necessitates a faster car-parc growth. Driver drowsiness has been generally recognized as a significant factor in the increasing number of road accidents. OpenCV technology employ the movement of the driver’s eyes and position of the driver’s head to determine the level of their fatigue. Using image capture, the photo of the driver can be taken by means of a web camera mounted in the car. Given the way a video is made by the camera, the measurement has to be done to either side of the video stream to get the edges for the further operation. By partitioning the video into individual frames, the situation in which the video is recorded is determined. The video will subsequently be separated into edges for exploration purposes. The region that contains the image of the driver is acknowledged at this point. For every package, a predefined count is for face region. By face recognition, we infer that through a certain improvement in the use of the PC, we consider the crucial facial characteristics. The eyes of the face should be identified upon and classified for further focus. The most important decision parameter to assess the driver's state is in the eyes.

Semi-Automated Text Categorization Using Demonstration and Integration Based Term Set

M. Pushpa, K. Nirmala, J. Vijayalakshmi

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 11-19
https://doi.org/10.9734/bpi/naer/v1/8766D

Manual Analysis of massive amounts of textual data requires incredible amount of processing time and effort in the interpretation of the text and organizing them in required format. In the current scenario, the major problem is with text or document categorization because of the high dimensionality of feature space. Now-a-days there are many methods available to deal with text feature selection. This paper aims at one such semi-automated text categorization feature selection methodology to deal with a enormous data using two phases of David Merrill’s First principles of instruction (FPI). It uses a pre-defined category group by providing them with the proper training set based on the demonstration and integration phase of FPI. The methodology involves the text tokenization, text categorization and text analysis.

Recent Study on Maturity Model for IT Managed Services

Suneel Wattal

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 20-28
https://doi.org/10.9734/bpi/naer/v1/9122D

There is a growing trend for Enterprises to engage Managed Service Providers in order to outsource their IT related activities. The basic intention of adopting a managed service is to transfer the responsibility of managing IT assets to the Managed service provider (MSP) for a financial consideration. The delivery capability of an MSP needs to be assessed in a standardized manner, which can be achieved by way of conceiving a Maturity model for the purpose. A study was conducted to develop a Maturity model for Managed Service providers. This model was implemented on a specific environment and the results were documented. The model had to undergo a few iterations and was refined during the implementation. Maturity scores for target rating were finalized after discussions with the customer teams from functional domains.

Serial industrial robots can be classified according to several criteria, the most important being: the number of mobility degrees or independent movements, the number of independent kinematic axis, the shape of the workspace, the value of the useful load, the precision of touching a predetermined point, etc. Among these criteria, the number of degrees of mobility directly determines the structure of the kinematic chain corresponding to the robot and implicitly its construction, functionality and utility. In this paper, we define the three classes of industrial serial robots according to the degree of mobility: the class of serial industrial robots of minimum configuration, the class of redundant serial industrial robots and the class of hyper-redundant serial industrial robots. For each class of serial industrial robots the structural synthesis method is presented and representative examples of structures are given. For two versions of redundant chain workspaces are represented, first sequentially, successively for each coupling, starting with the first coupling from the kinematic chain base and then the workspace is represented totally by overlapping workspaces obtained for each coupling. We present the direct kinematics analysis for kinematic chain with 6 and 8 axis using the homogeneous operators’ method too.

Assessment of Reliability of Quality Control of Building Materials

Loganina Valentina Ivanovna, Zaytseva Maria Vladimirovna

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 44-74
https://doi.org/10.9734/bpi/naer/v1/9812D

The goal of this project is to evaluate the quality control of construction materials, taking into consideration measurement error, the status of the technical process of product manufacturing, control completeness, and quality indicator variability. Data on influence of an error of measurement on probability of decision-making about acceptance of production are resulted at statistical instability of process of manufacture. On the basis of the example of brick manufacture, it is demonstrated that accepting a batch of bricks while accounting for measurement error in an unstable production process may be incorrect. It is feasible to enhance the dependability of product quality control and eliminate mistakes in rejecting items by using a statistically stable and reproducible method.

Information about the results of calculating the reliability of quality control of dry building mixes, based on the requirements of regulatory documents, is provided. The block diagram of the control reliability is considered.  It is shown that the normative security of the quality of dry construction mixtures is 0.9447957, which implies a probability of a defect 5.52%. To ensure a higher level of dry building mixtures quality, the application of the six sigma methodology is proposed.

The information on evaluating the sample's representativeness in establishing the quality of construction materials is provided. The difference between the number of samples given in the normative standards for test methods and the computed data, taking into consideration the values for standard confidence probabilities, supplier and consumer risk, is demonstrated.

The methodology of quality control of building materials is considered taking into account the indicator of completeness of control. 

Ensuring Structural Integrity via Non-destructive Testing for Developing Modular Refinery Shell

ThankGod Enatimi Boye, Frank Efe Erukainure, Linus Akpan, Eyere Emagbetere

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 75-89
https://doi.org/10.9734/bpi/naer/v1/9578D

The quest to develop reactors locally for different applications is increasing. In this work, the shell of a modular refinery reactor, as well as its external components, were designed, constructed and tested. First of all, specifications of a conventional refinery reactor shell were obtained for the design and then scaled down to get what is suitable for a modular refinery reactor.  The design was carried out using the provisions of the American Society of Mechanical Engineers (ASME) Boiler and Pressure Vessel Codes (BPVC), sections II and VIII. The modular refinery reactor was designed to have a refining capacity of 600 barrels of crude oil per batch. To further guarantee the structural integrity of the modular refinery reactor, two Non-Destructive Test (NDT) techniques, which are Radiographic Inspection and Liquid Penetrant Inspection, were used to analyze the residual stresses on the fabricated reactor shell. It was shown that non-destructive test techniques serve as reliable tools to investigate the structural integrity of welded vessels and structures. This paper, thus, demonstrates the production and testing of a reactor shell locally, which will favour the development and operation of modular refineries in developing nations.

As one of requirements of human life is health and hygiene, so, some places should be forecasted for these affairs to being true. Hygiene and health will be divided to physical and mental branches which researchers states that if mental health is provided, physical health can be easily available and finally, human can easily take his course during treatment which obtain healthy life. It finally causes creating great works and massive movements in human life. One characteristics of a good medicinal center is easy and rapid access, so that patients can have access to these centers with minimum time. This access is defined from the place where the patient resides to the interior spaces of medical centers, and many factors affect the quality of this path. On factor is the human view of form, how to create a different form by designing an external shell and embedding the original structure under this shell so that it can be developed and expanded at the same time, and at the same time be inviting, so that clients and users move towards these centers and walk indoors comfortably and away from double stress.

Doing studies and data collection and information evaluation is of the basics of designing and requires a full research design. The present study is to provide a comprehensive cognitive understanding of all those involved in architectural design for hospital building and patients. Besides, studying and collecting all available written and verbal references, principles and optimized guidelines of designing an efficient hospital were extracted in order to meet medicinal and psychological needs of patients.

The purpose of this work was to show and elucidate the combustion characteristics of gasoline EN91 in a spark ignition engine under different ignition timing. The combustion characteristics of gasoline under different ignition timing were obtained using the kiva4 code. The numerical results obtained in kiva4 were compared with the numerical results from other researchers who used kiva3vr2 as the simulation code. For achieving this, two cases were investigated; a complete engine cycle was successfully simulated using a four valve pent - roof engine and a comparison was made with experimental results by other researchers. At a constant speed of 600 rpm, a BASF (BadischeAnilin- und Soda Fabrik) octane rating engine - single cylinder was used where ignition timing was changed in the range of 40 BTDC to 180 BTDC. The temperature and pressure combustion characteristics in kiva4 and kiva3vr2 show a percentage error of 10%. The peak and average temperature and pressure under different ignition timing from the Kiva4 code and measured experimental results shows a qualitative closeness with a percentage error of 4%. The average temperature and pressure in kiva4 were 640K and 16.48 bar while in kiva3vr2 were 600K and 14.83 bar, the peak temperature and pressure in kiva4 were 2316.3K and 21.5 bar while in kiva3vr2 were 2171.5K and 19.4 bar. The peak temperature and pressure in kiva4 at 40 BTDC was 2075.7K and 20.37 bar while at 180 BTDC was 2166.0K and 23.47bar. The peak temperature and pressure increase with increasing spark advance until the most favorable instant time is determined. Best performance was achieved when the ignition time was set to10 degrees before top dead center.

Due to rapidly development of high power semiconductor devices with fast control features have made possible to control the power flow more efficiently and effectively. The Flexible AC Transmission Systems (FACTS) in this category introduces several innovative operating control devices. One of the recent device is Advanced Unified Power Flow Controller (AUPFC) or multi-converter UPFC or Generalized-UPFC, which can control bus voltage and power flows, both real and reactive, of more than one line or even a sub-network. This chapter presents an innovative real time based approach for analysis of Advanced Unified Power Flow Controller. Based on the analysis, a new fuzzy logic rules based controller has been proposed which improves the system performance. The controller rules are structured depending upon the relationship between series inserted voltages in multi-line and the desired changes of real/reactive power flows in the power system. The effects of different controllers along with parameters of series transformers and transmission lines have been investigated through developed control block models in SIMULINK. The effectiveness of the proposed scheme is demonstrated by a case study.

Snort’s Role in IoT Deployment

T. J. Jeyaprabha, G. Sumathi, S. Ahila, S. Deepika, P. Jaya Varshini

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 138-148
https://doi.org/10.9734/bpi/naer/v1/9767D

The need for the detection of attacks against our networks has exploded with the "Internet of Things" (or IoT). The users have become habituated to the Internet of Things (IoT) devices. The increased growth of devices had led to prioritizing security measures in the development cycle of IoT devices. The main objective of opting for security in IoT deployments is to provide a more secured domain or environment for seamless activities and data privacy against malicious attacks. The physical interfaces of devices in a network are most viable to vulnerabilities. Assessing and analyzing the attacks in terms of volume and severity and sequentially developing the ability to counteract them becomes indispensable. In an IoT deployment, the devices are mostly designed for the specified function with limited resources for computing, so in such scenarios, prevention from DDoS attacks becomes quite challenging. The most common cyber-attacks are Malware, Phishing, Man-in-the- middle attack, DDoS attack, SQL injection, Zero-day exploit. Distributed Denial of Service attacks are of three types namely volume-based attacks, protocol attacks, and application layer attacks, and are commonly made to bring down the performance of servers or networks. The experimental results show the detection and prevention methods of the intrusions in a wired environment. This work is designed to detect and prevent the DDoS attack within a network, where one device acts as a server, the other as a target,   and with one host made as a botnet and the other tries to prevent the victim from being attacked. The botnet architecture is worked out by replaying packet captures through tcpreplay. The software used are Snort, Wireshark, and various other attack implementation tools such as Kali Linux, Slowloris, Golden Eye, etc. The attack in the network is either internal or external. So, the connected component becomes the victim. In a wired mode the connections are done via a centralized hub providing faster detections. In wireless deployment, Wi-Fi is used to make a LAN of devices. Our approach analyzes the threats, vulnerabilities, attacks, and Intrusion Detection and Prevention System (IDPS) methods applicable for an IoT environment.

Study of the Stress-strain State of Frame Structures of Tractor Trailers

Anvar A. Togaev, Abdulaziz A. Shermukhamedov

New Approaches in Engineering Research Vol. 1, 24 June 2021, Page 149-162
https://doi.org/10.9734/bpi/naer/v1/2176F

The approach for determining the stress-strain condition of the trailer frame is discussed in the article on an example of a tractor trailer with a load-carrying capacity of 4 tons.There is a comparison of the outcomes of theoretical and experimental researches. It has been determined that the deviations of maximum values of stress when driving on a road with a satisfactory tar coating are within 4%, 10% on gravel roads with worn areas, 11% on a rotary strip with ridges in height of 8-12 cm and step of 90 cm, and 9% on a deep ditch depth of 40-45 cm and width of 100-150 cm. The calculations take into account the specific road conditions of the cotton-producing countries, which occupy four categories of road sections. The proposed method of calculation of the stress-strain state of the frame gives a good agreement with the experimental data (maximum values of stress in the range 11%) and can be used in justifying the strength parameters of tractor-trailers.