Pub Date : 2021-04-26DOI: 10.17577/IJERTV10IS040188
O. Osho, Sungbum Hong
The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.
{"title":"An Overview: Stochastic Gradient Descent Classifier, Linear Discriminant Analysis, Deep Learning and Naive Bayes Classifier Approaches to Network Intrusion Detection","authors":"O. Osho, Sungbum Hong","doi":"10.17577/IJERTV10IS040188","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040188","url":null,"abstract":"The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"36 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90797042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-26DOI: 10.17577/IJERTV10IS040153
Priyanshi Singh, V. Kimbahune
{"title":"An Advance Recommendation System Formulated on End-User Interest and Rating Difference","authors":"Priyanshi Singh, V. Kimbahune","doi":"10.17577/IJERTV10IS040153","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040153","url":null,"abstract":"","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"111 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88384231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-15DOI: 10.17577/IJERTV10IS040081
Kunal, Tushar, G. Chakraborty
Searching is one of the principal tasks in computer science. Binary Search is one of the most common and efficient algorithms used. Binary Search targets the middle element and checks for the target key in the list. The worstcase Time Complexity of Binary Search is O(log(n)) where n less length of the search list. In this paper, we have proposed a fast and efficient approach to binary Search by decomposing the main search list into multiple search lists. The Time Complexity for the proposed algorithm is O(log(k)) where k < n and n is the length of the sorted list and k is the length of the sub-list.
搜索是计算机科学的主要任务之一。二分搜索是最常用和最有效的算法之一。二分查找以中间元素为目标,并检查列表中的目标键。二进制搜索的最坏情况下的时间复杂度是O(log(n)),其中n小于搜索列表的长度。在本文中,我们提出了一种快速有效的二分搜索方法,将主搜索表分解为多个搜索表。本文算法的Time Complexity为O(log(k)),其中k < n, n为排序列表的长度,k为子列表的长度。
{"title":"Decomposed Algorithm for Reducing Time Complexity in Binary Search","authors":"Kunal, Tushar, G. Chakraborty","doi":"10.17577/IJERTV10IS040081","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040081","url":null,"abstract":"Searching is one of the principal tasks in computer science. Binary Search is one of the most common and efficient algorithms used. Binary Search targets the middle element and checks for the target key in the list. The worstcase Time Complexity of Binary Search is O(log(n)) where n less length of the search list. In this paper, we have proposed a fast and efficient approach to binary Search by decomposing the main search list into multiple search lists. The Time Complexity for the proposed algorithm is O(log(k)) where k < n and n is the length of the sorted list and k is the length of the sub-list.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85477676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-04-02DOI: 10.17577/IJERTV10IS030241
S. M. Reddy, K. A. Rao, K. S. Reddy, J. P. Kumar
: In recent years Cast Al-alloys has been expanding widely in aeronautical, automobile and general industries. The wear characteristics of these alloys depend upon the material morphology such as composition, size, shape and distribution of micro constituents and service conditions such as load, contact surface, contact time and sliding speed. The influence of variables viz: contact time, sliding speed, and normal pressure on wear behaviour were studied. With the increase of contact time the corresponding frictional temperature rises steadily due to the increased conversion of frictional energy into heat energy and no influence of sliding speed on the temperature rise in the specimen. The temperature rise in all the specimens increases with increasing of normal pressure on the specimens.
{"title":"Effect of Process Parameters on Temperature of Al Alloy","authors":"S. M. Reddy, K. A. Rao, K. S. Reddy, J. P. Kumar","doi":"10.17577/IJERTV10IS030241","DOIUrl":"https://doi.org/10.17577/IJERTV10IS030241","url":null,"abstract":": In recent years Cast Al-alloys has been expanding widely in aeronautical, automobile and general industries. The wear characteristics of these alloys depend upon the material morphology such as composition, size, shape and distribution of micro constituents and service conditions such as load, contact surface, contact time and sliding speed. The influence of variables viz: contact time, sliding speed, and normal pressure on wear behaviour were studied. With the increase of contact time the corresponding frictional temperature rises steadily due to the increased conversion of frictional energy into heat energy and no influence of sliding speed on the temperature rise in the specimen. The temperature rise in all the specimens increases with increasing of normal pressure on the specimens.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75291302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cancer is the leading cause of various incidences of mortality, morbidity, and premature death worldwide. Toxic metals like arsenic, chromium, nickel, aluminium obstruct several physiological processes, including the central nervous system (CNS) and renal functions, having specific interactions with system cells, tissues, and organs. Most importantly, these metals result in the induction of tumors leading to cancer. This review focuses on various heavy metals in the induction of complex disorders and cancer. This work also aims to provide a brief understanding to ordinary people about the most simple day-to-day activities that can get us exposed to heavy metals. Keywords— Cancer, tumor, heavy metal, toxic, mortality INTRODUCTION Nowadays, over half of world populations face newly diagnosed cancers, and 70% of all cancer death occur in developing and undeveloped countries [1,2]. The prevalence of cancer varieties is multifactorial polygenic diseases that may vary depending upon the environmental factors and genetic susceptibility because they have identifiable heredity factors. Rapidly changing lifestyle and diet adaptation may influence the heritability of variant phenotypes dependent on the nutraceutical's supplementation for their expression [3,4]. To date, relevant information about carcinogens is available, and many of these agents have already been identified [5]. However, many potential carcinogenic heavy metals are present in food and beverage items and are assumed to be safe when consumed by humans that cause serious health problems. In this regard, Regular consumption of daily requirements may expose them to heavy metals in drinking water which pose the greatest threat to public health. Daily life's basic necessity is water, which is the primary source of heavy metals that contaminate the surface and ground waters by industrial sewage and agricultural runoff [6]. Some people may not afford the purified mineral water, and they consume tap water which is the direct source of contaminated heavy metal mixed water [7]. According to several research studies, the concentration of these carcinogenic groundwater elements is high in some countries, including India, Bangladesh, and Argentina [8,9]. These elements are known to induce cancer of different types leading to genetic and epigenetic effects [10]. Epigenetic mechanisms play a prominent role in the process of carcinogenesis. Such events include reversible modification of CpG islands of gene promoters and histone proteins that affect somatic cells and germ cells' gene expression level and cause indirect changes genetically [11,12]. Mammalia genes account for nearly 40% of CpG islands (5-CG-3 sequence). The C5 position of cytosine residue results in hypermethylation and hypomethylation, which involved the inhibition of the expression of tumor suppression of genes or an increase in oncogenic gene expression, jointly contributing to cancer development and progression [13]. Deamination of methy
{"title":"A Review on Carcinogenic Heavy Metals","authors":"Akruti Amol Ingole, A. Mukherjee, Piyush Jagdish Balgote, Sampada Prakash Pendse, Surbhi Balwant Dhoke, Uddesh Ramesh Wanjari","doi":"10.17577/IJERTV10IS030216","DOIUrl":"https://doi.org/10.17577/IJERTV10IS030216","url":null,"abstract":"Cancer is the leading cause of various incidences of mortality, morbidity, and premature death worldwide. Toxic metals like arsenic, chromium, nickel, aluminium obstruct several physiological processes, including the central nervous system (CNS) and renal functions, having specific interactions with system cells, tissues, and organs. Most importantly, these metals result in the induction of tumors leading to cancer. This review focuses on various heavy metals in the induction of complex disorders and cancer. This work also aims to provide a brief understanding to ordinary people about the most simple day-to-day activities that can get us exposed to heavy metals. Keywords— Cancer, tumor, heavy metal, toxic, mortality INTRODUCTION Nowadays, over half of world populations face newly diagnosed cancers, and 70% of all cancer death occur in developing and undeveloped countries [1,2]. The prevalence of cancer varieties is multifactorial polygenic diseases that may vary depending upon the environmental factors and genetic susceptibility because they have identifiable heredity factors. Rapidly changing lifestyle and diet adaptation may influence the heritability of variant phenotypes dependent on the nutraceutical's supplementation for their expression [3,4]. To date, relevant information about carcinogens is available, and many of these agents have already been identified [5]. However, many potential carcinogenic heavy metals are present in food and beverage items and are assumed to be safe when consumed by humans that cause serious health problems. In this regard, Regular consumption of daily requirements may expose them to heavy metals in drinking water which pose the greatest threat to public health. Daily life's basic necessity is water, which is the primary source of heavy metals that contaminate the surface and ground waters by industrial sewage and agricultural runoff [6]. Some people may not afford the purified mineral water, and they consume tap water which is the direct source of contaminated heavy metal mixed water [7]. According to several research studies, the concentration of these carcinogenic groundwater elements is high in some countries, including India, Bangladesh, and Argentina [8,9]. These elements are known to induce cancer of different types leading to genetic and epigenetic effects [10]. Epigenetic mechanisms play a prominent role in the process of carcinogenesis. Such events include reversible modification of CpG islands of gene promoters and histone proteins that affect somatic cells and germ cells' gene expression level and cause indirect changes genetically [11,12]. Mammalia genes account for nearly 40% of CpG islands (5-CG-3 sequence). The C5 position of cytosine residue results in hypermethylation and hypomethylation, which involved the inhibition of the expression of tumor suppression of genes or an increase in oncogenic gene expression, jointly contributing to cancer development and progression [13]. Deamination of methy","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-02DOI: 10.33976/JERT.8.1/2021/3
T. Barhoom, Mahmoud Y. Abu Shawish
Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.
{"title":"Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption","authors":"T. Barhoom, Mahmoud Y. Abu Shawish","doi":"10.33976/JERT.8.1/2021/3","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/3","url":null,"abstract":"Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it.\u0000This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm.\u0000The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-02DOI: 10.17577/IJERTV10IS020229
M. SomanathSwamyRH, Hiregoudar Yerrennagoudar, G. Mahesh, B. Basavaprakash
{"title":"Swirl Type Retrofit CFD Simulation to Study Turbulent Kinetic Energy at Different Crank Angles","authors":"M. SomanathSwamyRH, Hiregoudar Yerrennagoudar, G. Mahesh, B. Basavaprakash","doi":"10.17577/IJERTV10IS020229","DOIUrl":"https://doi.org/10.17577/IJERTV10IS020229","url":null,"abstract":"","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87211839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-01DOI: 10.33976/JERT.8.1/2021/2
Maher A. El-Hallaq
Gaza City is the largest city in the Gaza Strip and the Palestinian territories. The city has a population about 700,000 inhabitants with an average population density of 12600 person/km2. Documentation procedure of traffic accidents in the city is traditional and inefficient. It is not only based on paper formatting but also is not performed in the correct way since it misses the determination of exact position of occurrence of these accidents. Furthermore, documentation data do not involve appropriate level of details and need to be re-organized. This study aims to enhance the documentation process of the traffic accidents in Gaza City using GIS as well as developing appropriate recommendations that can raise the level of traffic safety in it. To enhance the documentation, a new mobile and desktop applications based on GIS Cloud are developed in order to automatically store spatial and descriptive data about traffic accidents in a computerized geodatabase. Many analysis using GIS of the accidents statistics of 2019 are performed. Results indicate that the hot neighborhood in the city is Northern Remal, the hot road is Salah Al-Din Str., the hot period is 12 – 14 O'clock, most accidents are caused by cars, and medium injuries are the dominant of these accidents. The study recommends to build a digital geodatabase that involves all necessary data associated with traffic accidents because it is the basis for planning, analyzing and making decisions. It is also recommended to establish a GIS department in Ministry of Transportation. There is a strong need to legislate binding laws to prevent the increase in the number of traffic accidents in addition to make field actions such as the necessity to set up traffic lights as much as possible near health centers, schools and other public places. DOI: https://doi.org/10.33976/JERT.8.1/2021/2
{"title":"Enhancing the Documentation Process of Traffic Accidents Registry in Gaza City Using GIS","authors":"Maher A. El-Hallaq","doi":"10.33976/JERT.8.1/2021/2","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/2","url":null,"abstract":"Gaza City is the largest city in the Gaza Strip and the Palestinian territories. The city has a population about 700,000 inhabitants with an average population density of 12600 person/km2. Documentation procedure of traffic accidents in the city is traditional and inefficient. It is not only based on paper formatting but also is not performed in the correct way since it misses the determination of exact position of occurrence of these accidents. Furthermore, documentation data do not involve appropriate level of details and need to be re-organized. This study aims to enhance the documentation process of the traffic accidents in Gaza City using GIS as well as developing appropriate recommendations that can raise the level of traffic safety in it. To enhance the documentation, a new mobile and desktop applications based on GIS Cloud are developed in order to automatically store spatial and descriptive data about traffic accidents in a computerized geodatabase. Many analysis using GIS of the accidents statistics of 2019 are performed. Results indicate that the hot neighborhood in the city is Northern Remal, the hot road is Salah Al-Din Str., the hot period is 12 – 14 O'clock, most accidents are caused by cars, and medium injuries are the dominant of these accidents. The study recommends to build a digital geodatabase that involves all necessary data associated with traffic accidents because it is the basis for planning, analyzing and making decisions. It is also recommended to establish a GIS department in Ministry of Transportation. There is a strong need to legislate binding laws to prevent the increase in the number of traffic accidents in addition to make field actions such as the necessity to set up traffic lights as much as possible near health centers, schools and other public places. \u0000 \u0000DOI: \u0000https://doi.org/10.33976/JERT.8.1/2021/2","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88915309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-01DOI: 10.33976/JERT.8.1/2021/1
M. Jahjouh
A Stress-State based PD (SSPD) model using a well-known yield criteria is proposed in this paper and tested on the modeling of two dimensional bars under different loading levels as a first step for further development. SSPD is based upon peridynamics (PD) which utilize temporal spatial integro-differential equation of motion and formulates continuum problems in terms of integral equations, which are capable of modeling discontinuities such as cracks. The proposed bond strength not only depends on the bond stretch, but on the current state of all bonds connected to a particle as well. Thus, a stress-based peridynamics model is obtained. The tensile simulation compared to conventional FEM shows promising performance with an error of 5%. Compression simulations, however, need more investigation to include the effect of contact forces. DOI: https://doi.org/10.33976/JERT.8.1/2021/1
{"title":"A Stress-State based Peridynamics model for elastio-plastic material modeling","authors":"M. Jahjouh","doi":"10.33976/JERT.8.1/2021/1","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/1","url":null,"abstract":"A Stress-State based PD (SSPD) model using a well-known yield criteria is proposed in this paper and tested on the modeling of two dimensional bars under different loading levels as a first step for further development. SSPD is based upon peridynamics (PD) which utilize temporal spatial integro-differential equation of motion and formulates continuum problems in terms of integral equations, which are capable of modeling discontinuities such as cracks. The proposed bond strength not only depends on the bond stretch, but on the current state of all bonds connected to a particle as well. Thus, a stress-based peridynamics model is obtained. The tensile simulation compared to conventional FEM shows promising performance with an error of 5%. Compression simulations, however, need more investigation to include the effect of contact forces. \u0000 \u0000DOI: \u0000https://doi.org/10.33976/JERT.8.1/2021/1","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84706693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-11DOI: 10.17577/IJERTV10IS020056
Vaibhav B. Channewadkar, Nina Vaidya, Dhaval Shah
In earlier methods of parking, the time taken is 2 minutes (approx.), the driver needs to be more alert while parking in order to avoid hitting of the car during the reverse motion. Therefore, to avoid these inconveniences, a concept of parallel parking is made, where the total time will be 50 to 60 seconds. This parking can be done using an additional wheel (FIFTH WHEEL). A pneumatic cylinder and solenoid valve set up is used to control fifth wheel to land and lift. A DC motor enables the forward and reverse motion for the fifth wheel. A digital display is used to indicate the status of the wheel for the driver reference. It also helps to know malfunctions during landing or lifting of the wheel. This concept is mainly used for four-wheeler vehicles. This setup makes the vehicle to turn parallel in a significant angle with reference to the front axle within a short period. The model enables the driver to park the vehicle between two vehicles, where the space is limited. Keywords—Fifth wheel drive,Automotive,Prototype.
{"title":"Fifth Wheel Drive System","authors":"Vaibhav B. Channewadkar, Nina Vaidya, Dhaval Shah","doi":"10.17577/IJERTV10IS020056","DOIUrl":"https://doi.org/10.17577/IJERTV10IS020056","url":null,"abstract":"In earlier methods of parking, the time taken is 2 minutes (approx.), the driver needs to be more alert while parking in order to avoid hitting of the car during the reverse motion. Therefore, to avoid these inconveniences, a concept of parallel parking is made, where the total time will be 50 to 60 seconds. This parking can be done using an additional wheel (FIFTH WHEEL). A pneumatic cylinder and solenoid valve set up is used to control fifth wheel to land and lift. A DC motor enables the forward and reverse motion for the fifth wheel. A digital display is used to indicate the status of the wheel for the driver reference. It also helps to know malfunctions during landing or lifting of the wheel. This concept is mainly used for four-wheeler vehicles. This setup makes the vehicle to turn parallel in a significant angle with reference to the front axle within a short period. The model enables the driver to park the vehicle between two vehicles, where the space is limited. Keywords—Fifth wheel drive,Automotive,Prototype.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84970304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}