首页 > 最新文献

International journal of engineering research and technology最新文献

英文 中文
An Overview: Stochastic Gradient Descent Classifier, Linear Discriminant Analysis, Deep Learning and Naive Bayes Classifier Approaches to Network Intrusion Detection 综述:随机梯度下降分类器、线性判别分析、深度学习和朴素贝叶斯分类器在网络入侵检测中的应用
Pub Date : 2021-04-26 DOI: 10.17577/IJERTV10IS040188
O. Osho, Sungbum Hong
The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.
网络系统的安全性受到系统攻击的破坏,攻击者试图获得对网络系统的未经授权的访问。网络入侵检测系统的目的是在攻击展开时或有证据表明入侵发生后检测异常模式。多年来,人们对互联网的需求和渴望激增,并将继续增长,这也使连接到网络的设备面临网络恐怖分子和黑客攻击的风险。这个问题不仅局限于个人或公司,也包括电子政府和企业,尽管数十亿美元被分配给网络安全,计算机系统和网络并不能100%保证不受网络攻击。在这种背景下,我们必须建立网络入侵检测系统,以发现和应对网络和计算机系统的网络攻击。Keywords-Component;格式;风格;样式;网络安全;机器学习,网络入侵检测。
{"title":"An Overview: Stochastic Gradient Descent Classifier, Linear Discriminant Analysis, Deep Learning and Naive Bayes Classifier Approaches to Network Intrusion Detection","authors":"O. Osho, Sungbum Hong","doi":"10.17577/IJERTV10IS040188","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040188","url":null,"abstract":"The security of Network Systems is ravaged by attacks on Systems in a bid to gain unauthorized access into the network system. The aim of Network Intrusion Detection Systems is to detect anomaly patterns either while the attack is unfolding or after evidence that an intrusion occurred. The demand and crave for Internet usage have surged over the years and will continue to rise, which also puts gadgets that are connected to Networks at risk of attacks by Cyber Terrorist and hackers. This problem is not limited to individuals or Corporations alone but also E-Governments and Enterprises, despite billions of dollars allocated to Cyber Security, computer systems and networks do not give a 100 percent guarantee against Cyber-attacks. It is against this backdrop that we must establish Network Intrusion Detection Systems to reveal and counter Cyber-attacks on Networks and Computer Systems. Keywords—Component; formatting; style; styling; Cyber Security; machine learning, Netwrok Intrusion Detection.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90797042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Advance Recommendation System Formulated on End-User Interest and Rating Difference 基于用户兴趣和评分差异的预推荐系统
Pub Date : 2021-04-26 DOI: 10.17577/IJERTV10IS040153
Priyanshi Singh, V. Kimbahune
{"title":"An Advance Recommendation System Formulated on End-User Interest and Rating Difference","authors":"Priyanshi Singh, V. Kimbahune","doi":"10.17577/IJERTV10IS040153","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040153","url":null,"abstract":"","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88384231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decomposed Algorithm for Reducing Time Complexity in Binary Search 降低二分搜索时间复杂度的分解算法
Pub Date : 2021-04-15 DOI: 10.17577/IJERTV10IS040081
Kunal, Tushar, G. Chakraborty
Searching is one of the principal tasks in computer science. Binary Search is one of the most common and efficient algorithms used. Binary Search targets the middle element and checks for the target key in the list. The worstcase Time Complexity of Binary Search is O(log(n)) where n less length of the search list. In this paper, we have proposed a fast and efficient approach to binary Search by decomposing the main search list into multiple search lists. The Time Complexity for the proposed algorithm is O(log(k)) where k < n and n is the length of the sorted list and k is the length of the sub-list.
搜索是计算机科学的主要任务之一。二分搜索是最常用和最有效的算法之一。二分查找以中间元素为目标,并检查列表中的目标键。二进制搜索的最坏情况下的时间复杂度是O(log(n)),其中n小于搜索列表的长度。在本文中,我们提出了一种快速有效的二分搜索方法,将主搜索表分解为多个搜索表。本文算法的Time Complexity为O(log(k)),其中k < n, n为排序列表的长度,k为子列表的长度。
{"title":"Decomposed Algorithm for Reducing Time Complexity in Binary Search","authors":"Kunal, Tushar, G. Chakraborty","doi":"10.17577/IJERTV10IS040081","DOIUrl":"https://doi.org/10.17577/IJERTV10IS040081","url":null,"abstract":"Searching is one of the principal tasks in computer science. Binary Search is one of the most common and efficient algorithms used. Binary Search targets the middle element and checks for the target key in the list. The worstcase Time Complexity of Binary Search is O(log(n)) where n less length of the search list. In this paper, we have proposed a fast and efficient approach to binary Search by decomposing the main search list into multiple search lists. The Time Complexity for the proposed algorithm is O(log(k)) where k < n and n is the length of the sorted list and k is the length of the sub-list.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85477676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Process Parameters on Temperature of Al Alloy 工艺参数对铝合金温度的影响
Pub Date : 2021-04-02 DOI: 10.17577/IJERTV10IS030241
S. M. Reddy, K. A. Rao, K. S. Reddy, J. P. Kumar
: In recent years Cast Al-alloys has been expanding widely in aeronautical, automobile and general industries. The wear characteristics of these alloys depend upon the material morphology such as composition, size, shape and distribution of micro constituents and service conditions such as load, contact surface, contact time and sliding speed. The influence of variables viz: contact time, sliding speed, and normal pressure on wear behaviour were studied. With the increase of contact time the corresponding frictional temperature rises steadily due to the increased conversion of frictional energy into heat energy and no influence of sliding speed on the temperature rise in the specimen. The temperature rise in all the specimens increases with increasing of normal pressure on the specimens.
近年来,铸铝合金在航空、汽车和一般工业中得到了广泛的应用。这些合金的磨损特性取决于材料的形貌,如微观成分的组成、尺寸、形状和分布,以及使用条件,如载荷、接触面、接触时间和滑动速度。研究了接触时间、滑动速度和法向压力对磨损行为的影响。随着接触时间的增加,由于摩擦能转化为热能的增加,且滑动速度对试样温升没有影响,相应的摩擦温度稳步上升。随着法向压力的增大,各试样的温升均增大。
{"title":"Effect of Process Parameters on Temperature of Al Alloy","authors":"S. M. Reddy, K. A. Rao, K. S. Reddy, J. P. Kumar","doi":"10.17577/IJERTV10IS030241","DOIUrl":"https://doi.org/10.17577/IJERTV10IS030241","url":null,"abstract":": In recent years Cast Al-alloys has been expanding widely in aeronautical, automobile and general industries. The wear characteristics of these alloys depend upon the material morphology such as composition, size, shape and distribution of micro constituents and service conditions such as load, contact surface, contact time and sliding speed. The influence of variables viz: contact time, sliding speed, and normal pressure on wear behaviour were studied. With the increase of contact time the corresponding frictional temperature rises steadily due to the increased conversion of frictional energy into heat energy and no influence of sliding speed on the temperature rise in the specimen. The temperature rise in all the specimens increases with increasing of normal pressure on the specimens.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75291302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Carcinogenic Heavy Metals 致癌重金属研究进展
Pub Date : 2021-03-30 DOI: 10.17577/IJERTV10IS030216
Akruti Amol Ingole, A. Mukherjee, Piyush Jagdish Balgote, Sampada Prakash Pendse, Surbhi Balwant Dhoke, Uddesh Ramesh Wanjari
Cancer is the leading cause of various incidences of mortality, morbidity, and premature death worldwide. Toxic metals like arsenic, chromium, nickel, aluminium obstruct several physiological processes, including the central nervous system (CNS) and renal functions, having specific interactions with system cells, tissues, and organs. Most importantly, these metals result in the induction of tumors leading to cancer. This review focuses on various heavy metals in the induction of complex disorders and cancer. This work also aims to provide a brief understanding to ordinary people about the most simple day-to-day activities that can get us exposed to heavy metals. Keywords— Cancer, tumor, heavy metal, toxic, mortality INTRODUCTION Nowadays, over half of world populations face newly diagnosed cancers, and 70% of all cancer death occur in developing and undeveloped countries [1,2]. The prevalence of cancer varieties is multifactorial polygenic diseases that may vary depending upon the environmental factors and genetic susceptibility because they have identifiable heredity factors. Rapidly changing lifestyle and diet adaptation may influence the heritability of variant phenotypes dependent on the nutraceutical's supplementation for their expression [3,4]. To date, relevant information about carcinogens is available, and many of these agents have already been identified [5]. However, many potential carcinogenic heavy metals are present in food and beverage items and are assumed to be safe when consumed by humans that cause serious health problems. In this regard, Regular consumption of daily requirements may expose them to heavy metals in drinking water which pose the greatest threat to public health. Daily life's basic necessity is water, which is the primary source of heavy metals that contaminate the surface and ground waters by industrial sewage and agricultural runoff [6]. Some people may not afford the purified mineral water, and they consume tap water which is the direct source of contaminated heavy metal mixed water [7]. According to several research studies, the concentration of these carcinogenic groundwater elements is high in some countries, including India, Bangladesh, and Argentina [8,9]. These elements are known to induce cancer of different types leading to genetic and epigenetic effects [10]. Epigenetic mechanisms play a prominent role in the process of carcinogenesis. Such events include reversible modification of CpG islands of gene promoters and histone proteins that affect somatic cells and germ cells' gene expression level and cause indirect changes genetically [11,12]. Mammalia genes account for nearly 40% of CpG islands (5-CG-3 sequence). The C5 position of cytosine residue results in hypermethylation and hypomethylation, which involved the inhibition of the expression of tumor suppression of genes or an increase in oncogenic gene expression, jointly contributing to cancer development and progression [13]. Deamination of methy
本作品采用知识共享署名4.0国际许可协议。出版单位:www.ijert.org第10卷第03期,2021年3月
{"title":"A Review on Carcinogenic Heavy Metals","authors":"Akruti Amol Ingole, A. Mukherjee, Piyush Jagdish Balgote, Sampada Prakash Pendse, Surbhi Balwant Dhoke, Uddesh Ramesh Wanjari","doi":"10.17577/IJERTV10IS030216","DOIUrl":"https://doi.org/10.17577/IJERTV10IS030216","url":null,"abstract":"Cancer is the leading cause of various incidences of mortality, morbidity, and premature death worldwide. Toxic metals like arsenic, chromium, nickel, aluminium obstruct several physiological processes, including the central nervous system (CNS) and renal functions, having specific interactions with system cells, tissues, and organs. Most importantly, these metals result in the induction of tumors leading to cancer. This review focuses on various heavy metals in the induction of complex disorders and cancer. This work also aims to provide a brief understanding to ordinary people about the most simple day-to-day activities that can get us exposed to heavy metals. Keywords— Cancer, tumor, heavy metal, toxic, mortality INTRODUCTION Nowadays, over half of world populations face newly diagnosed cancers, and 70% of all cancer death occur in developing and undeveloped countries [1,2]. The prevalence of cancer varieties is multifactorial polygenic diseases that may vary depending upon the environmental factors and genetic susceptibility because they have identifiable heredity factors. Rapidly changing lifestyle and diet adaptation may influence the heritability of variant phenotypes dependent on the nutraceutical's supplementation for their expression [3,4]. To date, relevant information about carcinogens is available, and many of these agents have already been identified [5]. However, many potential carcinogenic heavy metals are present in food and beverage items and are assumed to be safe when consumed by humans that cause serious health problems. In this regard, Regular consumption of daily requirements may expose them to heavy metals in drinking water which pose the greatest threat to public health. Daily life's basic necessity is water, which is the primary source of heavy metals that contaminate the surface and ground waters by industrial sewage and agricultural runoff [6]. Some people may not afford the purified mineral water, and they consume tap water which is the direct source of contaminated heavy metal mixed water [7]. According to several research studies, the concentration of these carcinogenic groundwater elements is high in some countries, including India, Bangladesh, and Argentina [8,9]. These elements are known to induce cancer of different types leading to genetic and epigenetic effects [10]. Epigenetic mechanisms play a prominent role in the process of carcinogenesis. Such events include reversible modification of CpG islands of gene promoters and histone proteins that affect somatic cells and germ cells' gene expression level and cause indirect changes genetically [11,12]. Mammalia genes account for nearly 40% of CpG islands (5-CG-3 sequence). The C5 position of cytosine residue results in hypermethylation and hypomethylation, which involved the inhibition of the expression of tumor suppression of genes or an increase in oncogenic gene expression, jointly contributing to cancer development and progression [13]. Deamination of methy","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption 基于对角碎片和加密的云上文本文件隐私
Pub Date : 2021-03-02 DOI: 10.33976/JERT.8.1/2021/3
T. Barhoom, Mahmoud Y. Abu Shawish
Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it.This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm.The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.
尽管人们越来越依赖云服务和软件,但保护隐私还是有些困难。我们将数据存储在不受信任的云环境中的远程服务器上。如果我们不妥善处理存储的数据,数据隐私可能会在我们不知情的情况下受到侵犯。虽然它需要昂贵的计算,但在发送数据之前对数据进行加密似乎是解决这个问题的一种方法。到目前为止,所有已知的使用加密算法保护文本文件的解决方案都没有达到隐私预期。这是因为加密不能单独存在。云服务器上的加密数据成为手中的完整文件,导致这些数据的隐私容易受到入侵,从而允许入侵者在解密后访问文件数据。本研究旨在开发一种有效的基于文本文件碎片化和加密相结合的云保密模型,以弥补加密方法的不足。碎片化方法使用的策略是通过轴将文本文件分成两个三角形。而加密方法使用的是河豚算法。该研究得出结论,通过构建多层模型来实现高机密性:加密、块和每个块的碎片,以防止入侵者访问数据,即使他们能够解密文件。使用隐私准确性方程(为此研究目的而开发),当在小、中、大文件中每个块分别使用100和200个单词时,该模型的准确率水平分别为96%和90%。
{"title":"Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption","authors":"T. Barhoom, Mahmoud Y. Abu Shawish","doi":"10.33976/JERT.8.1/2021/3","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/3","url":null,"abstract":"Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it.\u0000This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm.\u0000The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Swirl Type Retrofit CFD Simulation to Study Turbulent Kinetic Energy at Different Crank Angles 不同曲柄角下涡流型改进型湍流动能CFD模拟研究
Pub Date : 2021-03-02 DOI: 10.17577/IJERTV10IS020229
M. SomanathSwamyRH, Hiregoudar Yerrennagoudar, G. Mahesh, B. Basavaprakash
{"title":"Swirl Type Retrofit CFD Simulation to Study Turbulent Kinetic Energy at Different Crank Angles","authors":"M. SomanathSwamyRH, Hiregoudar Yerrennagoudar, G. Mahesh, B. Basavaprakash","doi":"10.17577/IJERTV10IS020229","DOIUrl":"https://doi.org/10.17577/IJERTV10IS020229","url":null,"abstract":"","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87211839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Documentation Process of Traffic Accidents Registry in Gaza City Using GIS 利用地理信息系统加强加沙市交通事故登记的文件编制过程
Pub Date : 2021-03-01 DOI: 10.33976/JERT.8.1/2021/2
Maher A. El-Hallaq
Gaza City is the largest city in the Gaza Strip and the Palestinian territories. The city has a population about 700,000 inhabitants with an average population density of 12600 person/km2. Documentation procedure of traffic accidents in the city is traditional and inefficient. It is not only based on paper formatting but also is not performed in the correct way since it misses the determination of exact position of occurrence of these accidents. Furthermore, documentation data do not involve appropriate level of details and need to be re-organized. This study aims to enhance the documentation process of the traffic accidents in Gaza City using GIS as well as developing appropriate recommendations that can raise the level of traffic safety in it. To enhance the documentation, a new mobile and desktop applications based on GIS Cloud are developed in order to automatically store spatial and descriptive data about traffic accidents in a computerized geodatabase. Many analysis using GIS of the accidents statistics of 2019 are performed. Results indicate that the hot neighborhood in the city is Northern Remal, the hot road is Salah Al-Din Str., the hot period is 12 – 14 O'clock, most accidents are caused by cars, and medium injuries are the dominant of these accidents. The study recommends to build a digital geodatabase that involves all necessary data associated with traffic accidents because it is the basis for planning, analyzing and making decisions. It is also recommended to establish a GIS department in Ministry of Transportation. There is a strong need to legislate binding laws to prevent the increase in the number of traffic accidents in addition to make field actions such as the necessity to set up traffic lights as much as possible near health centers, schools and other public places. DOI: https://doi.org/10.33976/JERT.8.1/2021/2
加沙城是加沙地带和巴勒斯坦领土上最大的城市。全市人口约70万,平均人口密度为12600人/平方公里。城市交通事故的记录程序传统,效率低下。它不仅是基于纸张格式,而且没有以正确的方式执行,因为它错过了确定这些事故发生的确切位置。此外,文档数据不包含适当级别的详细信息,需要重新组织。这项研究的目的是利用地理信息系统加强加沙城交通事故的记录工作,并提出可提高加沙城交通安全水平的适当建议。为了加强文件编制,开发了基于GIS云的移动和桌面应用程序,以便在计算机化地理数据库中自动存储有关交通事故的空间和描述性数据。利用GIS对2019年的事故统计数据进行了分析。结果表明:城区热点街区为北城区,热点道路为Salah Al-Din街,热点时段为12 ~ 14点,交通事故以汽车事故为主,中等伤害事故占主导地位。该研究建议建立一个包含与交通事故有关的所有必要数据的数字地理数据库,因为它是规划、分析和决策的基础。建议在交通运输部设立地理信息系统部门。除了采取实地行动,如必须在保健中心、学校和其他公共场所附近尽可能多地设置交通信号灯外,还迫切需要制定有约束力的法律,以防止交通事故数量的增加。DOI: https://doi.org/10.33976/JERT.8.1/2021/2
{"title":"Enhancing the Documentation Process of Traffic Accidents Registry in Gaza City Using GIS","authors":"Maher A. El-Hallaq","doi":"10.33976/JERT.8.1/2021/2","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/2","url":null,"abstract":"Gaza City is the largest city in the Gaza Strip and the Palestinian territories. The city has a population about 700,000 inhabitants with an average population density of 12600 person/km2. Documentation procedure of traffic accidents in the city is traditional and inefficient. It is not only based on paper formatting but also is not performed in the correct way since it misses the determination of exact position of occurrence of these accidents. Furthermore, documentation data do not involve appropriate level of details and need to be re-organized. This study aims to enhance the documentation process of the traffic accidents in Gaza City using GIS as well as developing appropriate recommendations that can raise the level of traffic safety in it. To enhance the documentation, a new mobile and desktop applications based on GIS Cloud are developed in order to automatically store spatial and descriptive data about traffic accidents in a computerized geodatabase. Many analysis using GIS of the accidents statistics of 2019 are performed. Results indicate that the hot neighborhood in the city is Northern Remal, the hot road is Salah Al-Din Str., the hot period is 12 – 14 O'clock, most accidents are caused by cars, and medium injuries are the dominant of these accidents. The study recommends to build a digital geodatabase that involves all necessary data associated with traffic accidents because it is the basis for planning, analyzing and making decisions. It is also recommended to establish a GIS department in Ministry of Transportation. There is a strong need to legislate binding laws to prevent the increase in the number of traffic accidents in addition to make field actions such as the necessity to set up traffic lights as much as possible near health centers, schools and other public places. \u0000 \u0000DOI: \u0000https://doi.org/10.33976/JERT.8.1/2021/2","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88915309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Stress-State based Peridynamics model for elastio-plastic material modeling 基于应力状态的弹塑性材料动力学模型
Pub Date : 2021-03-01 DOI: 10.33976/JERT.8.1/2021/1
M. Jahjouh
A Stress-State based PD (SSPD) model using a well-known yield criteria is proposed in this paper and tested on the modeling of two dimensional bars under different loading levels as a first step for further development. SSPD is based upon peridynamics (PD) which utilize temporal spatial integro-differential equation of motion and formulates continuum problems in terms of integral equations, which are capable of modeling discontinuities such as cracks. The proposed bond strength not only depends on the bond stretch, but on the current state of all bonds connected to a particle as well. Thus, a stress-based peridynamics model is obtained. The tensile simulation compared to conventional FEM shows promising performance with an error of 5%. Compression simulations, however, need more investigation to include the effect of contact forces. DOI: https://doi.org/10.33976/JERT.8.1/2021/1
本文提出了一种基于应力状态的屈服准则(SSPD)模型,并在不同荷载水平下的二维杆的模型上进行了试验,作为进一步发展的第一步。SSPD以周动力学(PD)为基础,利用时空运动的积分微分方程,用积分方程来表述连续体问题,能够模拟裂缝等不连续体。所提出的键强度不仅取决于键的拉伸,还取决于与粒子相连的所有键的当前状态。从而得到了基于应力的周动力学模型。与传统有限元法的拉伸模拟结果相比,拉伸模拟结果具有良好的性能,误差在5%以内。然而,压缩模拟需要更多的研究,以包括接触力的影响。DOI: https://doi.org/10.33976/JERT.8.1/2021/1
{"title":"A Stress-State based Peridynamics model for elastio-plastic material modeling","authors":"M. Jahjouh","doi":"10.33976/JERT.8.1/2021/1","DOIUrl":"https://doi.org/10.33976/JERT.8.1/2021/1","url":null,"abstract":"A Stress-State based PD (SSPD) model using a well-known yield criteria is proposed in this paper and tested on the modeling of two dimensional bars under different loading levels as a first step for further development. SSPD is based upon peridynamics (PD) which utilize temporal spatial integro-differential equation of motion and formulates continuum problems in terms of integral equations, which are capable of modeling discontinuities such as cracks. The proposed bond strength not only depends on the bond stretch, but on the current state of all bonds connected to a particle as well. Thus, a stress-based peridynamics model is obtained. The tensile simulation compared to conventional FEM shows promising performance with an error of 5%. Compression simulations, however, need more investigation to include the effect of contact forces. \u0000 \u0000DOI: \u0000https://doi.org/10.33976/JERT.8.1/2021/1","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84706693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fifth Wheel Drive System 五轮驱动系统
Pub Date : 2021-02-11 DOI: 10.17577/IJERTV10IS020056
Vaibhav B. Channewadkar, Nina Vaidya, Dhaval Shah
In earlier methods of parking, the time taken is 2 minutes (approx.), the driver needs to be more alert while parking in order to avoid hitting of the car during the reverse motion. Therefore, to avoid these inconveniences, a concept of parallel parking is made, where the total time will be 50 to 60 seconds. This parking can be done using an additional wheel (FIFTH WHEEL). A pneumatic cylinder and solenoid valve set up is used to control fifth wheel to land and lift. A DC motor enables the forward and reverse motion for the fifth wheel. A digital display is used to indicate the status of the wheel for the driver reference. It also helps to know malfunctions during landing or lifting of the wheel. This concept is mainly used for four-wheeler vehicles. This setup makes the vehicle to turn parallel in a significant angle with reference to the front axle within a short period. The model enables the driver to park the vehicle between two vehicles, where the space is limited. Keywords—Fifth wheel drive,Automotive,Prototype.
在早期的停车方法中,所需的时间为2分钟(大约),驾驶员在停车时需要更加警惕,以避免在倒车时撞到汽车。因此,为了避免这些不便,我们提出了平行停车的概念,总时间为50到60秒。这种停车可以用一个额外的轮子(第五轮)来完成。气缸和设置的电磁阀控制第五轮落地和升降。直流电机使第5轮的前进和反向运动成为可能。数字显示器用于指示车轮的状态,以供驾驶员参考。它也有助于了解在着陆或提升车轮时的故障。这个概念主要用于四轮车。这种设置使车辆转向平行在一个重要的角度与参考前轴在短时间内。该模型使驾驶员能够将车辆停放在两辆车之间,而空间有限。关键词:五轮驱动,汽车,原型
{"title":"Fifth Wheel Drive System","authors":"Vaibhav B. Channewadkar, Nina Vaidya, Dhaval Shah","doi":"10.17577/IJERTV10IS020056","DOIUrl":"https://doi.org/10.17577/IJERTV10IS020056","url":null,"abstract":"In earlier methods of parking, the time taken is 2 minutes (approx.), the driver needs to be more alert while parking in order to avoid hitting of the car during the reverse motion. Therefore, to avoid these inconveniences, a concept of parallel parking is made, where the total time will be 50 to 60 seconds. This parking can be done using an additional wheel (FIFTH WHEEL). A pneumatic cylinder and solenoid valve set up is used to control fifth wheel to land and lift. A DC motor enables the forward and reverse motion for the fifth wheel. A digital display is used to indicate the status of the wheel for the driver reference. It also helps to know malfunctions during landing or lifting of the wheel. This concept is mainly used for four-wheeler vehicles. This setup makes the vehicle to turn parallel in a significant angle with reference to the front axle within a short period. The model enables the driver to park the vehicle between two vehicles, where the space is limited. Keywords—Fifth wheel drive,Automotive,Prototype.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84970304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of engineering research and technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1