IJEAI 

Volume 5 Issue 4


1:Intelligent Wi-Fi-Controlled Water Distribution System: A Dual-Channel Approach Using ESP32, Solenoid Valve, and Servo-Controlled Ball Valve


ABSTRACT: 


The rapid growth of urban populations and the increasing demand for efficient water distribution systems have necessitated the development of innovative solutions to manage and control water resources. This study presents the design and implementation of a Wi-Fi-based Water Distribution Control System that aims to optimize water usage and distribution in domestic and industrial settings. The proposed system consists of a two-channel control mechanism that employs an ESP32 WROOM-32 microcontroller and Blynk application for remote monitoring and control. The first channel utilizes a 12V solenoid valve to regulate water flow, while the second channel controls a servomotor attached to a ball valve, which has been modified to accommodate the servo. A 128x64 Graphical LCD (GLCD) is used for displaying system information and an ultrasonic sensor is incorporated for measuring water depth in a 9-liter container acting as a tank. Power regulation is achieved with boost and buck converters, with additional components such as a rotary encoder, push button, IRF3205 MOSFET, and BC547 transistor integrated into the system. A 12V DC adapter provides the power supply, and a Vero board is used for circuit connections. The system is assembled using 1/2-inch pipes for water distribution. The developed Wi-Fi-based Water Distribution Control System demonstrates the potential for efficient and cost-effective water management using readily available components and technologies. This study contributes to the ongoing efforts to conserve water resources and promote sustainable water management practices in various applications.

 

Keywords: Wi-Fi, Blynk, Controlled Water, ESP32.



2: Machine Learning Enabled Predictive Analysis of Network Traffic Demands for Improved Bandwidth Management in Data Transmission Systems

ABSTRACT: 


dependencies in network traffic patterns. Comprehensive data was collected from diverse network environments, including real-time logs and synthetic data. Through rigorous pre-processing, which addressed missing values and standardized formats, the dataset was prepared for training and testing. Crucial features such as latency, packet loss, traffic volume, throughput, and Quality of Service (QoS) were identified for predictive models. Implementation in Python facilitated system development, integrating machine learning libraries for Bayesian inference and real-time network management. By employing machine learning (ML) algorithms – specifically Bayesian networks, logistic regression, and decision trees – we analysed their effectiveness in forecasting bandwidth needs. Logistic regression showed strong performance with an accuracy of 92%, precision, recall, and F1-scores above 90% for both high and low traffic categories. Bayesian networks, although accurate at 84%, had a high mean squared error, indicating room for improvement in handling network traffic variability. Decision trees performed robustly with a 92% accuracy and a favourable mean squared error, demonstrating its reliability in predicting bandwidth requirements. The findings contribute to a resilient and adaptive approach to bandwidth management, fostering optimized network infrastructure.

 

Keywords:  Artificial Intelligence, Bandwidth Management, Logistic regression, Bayesian Network, Decision Tree, Machine Learning, Quality of Service, Network.



3: An Overview of Cyber Criminal

ABSTRACT: 


Cyber Criminal is a person who use modern technology to commit malicious activities on digital instruments system or internet networks with the intention of stealing sensitive company information or personal data, hack banking money account to transferring money to their own, and generating profit and create social violence by pornography. Cyber Criminal is a common phenomenon in the world. It is a provocative question of the age. Cyber Criminal is being increased day by day. People have been greatly suffering for it. Cyber Criminal not only creates human suffering but also puts effect on the economy. Cyber Criminal generally use Computer system. Cyber Criminal is unlikely to focus on a single entity, but conduct operations on broad masses of victims defined only by similar platform types, online behavior, or programs used. Cyber Criminals are collaborating to become more efficient at planning and executing attacks. Years ago a Cyber Criminal would develop the skills he or she needed in order to carry out a cyber-attack. Today, Cyber Criminals will seek out other criminals with the required specialized skills and a good reputation to assist in the planning or execution of a cyber-attack. It is impossible to solve the problem by the government alone. Everybody will have to come toward and it is sooner the better. This paper gives an overview of Cyber Criminal.  

 

Keywords:  Cyber Criminal, Cyber Crime, Child Pornography, Computer Crime, Cyberstalking, Cyber Security.

4: Automatic External Defibrillators Box Enhancement Based on GSM Module

ABSTRACT: 


An abnormal heart rhythm can induce sudden cardiac arrest (SCA), which is the abrupt cessation of all heart function. One of the emergency techniques for sudden cardiac arrest is cardiopulmonary resuscitation (CPR), which involves giving the heart electric shocks from an automated external defibrillator (AED).  Ensuring the success of the resuscitation process in an integrated manner, as well as the arrival of the ambulance in the shortest possible time since the occurrence of the emergency occurred, this paper aim to improve the calling process for an ambulance to be done automatically, and the location of the patient was sent immediately once the device box starts opening and the AED is initiated. The GSM shield with the microcontroller is introduced in the system to send and receive data in between two remote locations. The results revealed that using the system saves time and prevents us from forgetting to contact the ambulance to arrive at the site of the accident in time or to follow up on the situation after the cardiac arrest recovery process to check on the patient's vital signs.

 

 

Keywords:  Arduino Uno, AED, GSM, and Sudden Cardiac Arrest.


5Mechanical Reliability: A review

ABSTRACT: 

This study provides an overview of the past, present, and theoretical foundations of mechanical reliability, focusing specifically on its implications within the field of design engineering. This paper studies the effect of design choices on mechanical reliability and presents several reliability-engineering models that may provide valuable insights throughout the process of mechanical engineering design. The discussion is supported by relevant examples to show the use of these models in practice. Numerous contemporary technical systems include the amalgamation of diverse disciplines. These may be seen among a wide range of prominent sectors, including transportation, power generation, food production, chemical processing, and sophisticated manufacturing. After long studies and practical application, the engineering methodologies focused on limiting uncertainty have been thoroughly grasped, leading to the development of numerous instances of particularly dependable mechanical components. However, the specific challenge of predicting mechanical reliability persists. Specifically, this study examines the engineering knowledge derived from an analysis of potential failure modes, the insights gained from a contemplation of the load-strength interference theory, the utilization of the load-chain model, the incorporation of environmental factors, and the application of the complex equipment model. The objective is to identify the advantages of these approaches as foundational principles for mechanical design. Several challenges in addressing mechanical dependability are also recognized.

 

Keywords: Mechanical Reliability; mechanical systems; conventional methodology; methodologies.