Pub Date : 2021-02-02DOI: 10.17577/IJERTV10IS010228
Hariprasad Thimmegowda, S. Yadukrishnan
- Several kinds of wind tunnels are developed in the past few decades. It is an essential tool for aerodynamic studies in research and academia. However, irrespective of the tunnel, it becomes crucial to maintain the flow quality in the test section holding the measurements accurate. This study emphasizes on the flow quality of low speed subsonic open-loop wind tunnel. Experimental findings were validated with computational results. Flow quality parameters were examined by verifying the uniformity and velocity profile of the test section. At various fan speed, test section wind velocity was measured and compared with numerical results. Both results agree with each other. Uniformity assessment was evaluated along the centerline of the test section and noted that wind velocity remains constant in both experimental and computational investigation. Velocity profile was measured from the upper to lower wall, which confirms the boundary layer near the walls. The profile, in computational and experimental results, were similar. These validated results can be employed as a reference to the design and construction of a low-speed subsonic wind tunnel.
{"title":"Computational and Experimental Study on Flow Quality of Open-Loop Low-Speed Wind Tunnel","authors":"Hariprasad Thimmegowda, S. Yadukrishnan","doi":"10.17577/IJERTV10IS010228","DOIUrl":"https://doi.org/10.17577/IJERTV10IS010228","url":null,"abstract":"- Several kinds of wind tunnels are developed in the past few decades. It is an essential tool for aerodynamic studies in research and academia. However, irrespective of the tunnel, it becomes crucial to maintain the flow quality in the test section holding the measurements accurate. This study emphasizes on the flow quality of low speed subsonic open-loop wind tunnel. Experimental findings were validated with computational results. Flow quality parameters were examined by verifying the uniformity and velocity profile of the test section. At various fan speed, test section wind velocity was measured and compared with numerical results. Both results agree with each other. Uniformity assessment was evaluated along the centerline of the test section and noted that wind velocity remains constant in both experimental and computational investigation. Velocity profile was measured from the upper to lower wall, which confirms the boundary layer near the walls. The profile, in computational and experimental results, were similar. These validated results can be employed as a reference to the design and construction of a low-speed subsonic wind tunnel.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73745543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-01-25DOI: 10.17577/IJERTV10IS010120
A. Mishra, A. Sahu
The paper summarizes the steps taken in finalizing the design of an electric ATV, made for SAE BAJA which provides a platform for undergraduate students to apply the principles of engineering to expose their proficiency in the automotive world. The purpose of the paper is to calculate various boundary conditions on the frame, steering knuckle, suspension arms of a light ATV under extreme conditions and use them to improve the overall design which requires the minimum amount of material while providing a significant Factor of safety. An iterative approach using standard calculations & FEA is discussed in the study for simulation and optimization of the design. For all parts, stress & deformation analysis is performed. For design optimization in the knuckle, topology is done. Von mises Stress, total deformation and safety factor were calculated for each part under appropriate boundary conditions. The study discussed step by step calculations of forces on each component in detail and their simulations with an appropriate degree of precision. Following the methodology shown in the study will be useful in the development of a Light ATV, further, the suggested simulations will ensure the safety of the vehicle. Keywords— Von mises stress, Deformation, Safety factor, Design, Material Selections, FEA, Topology, Knuckle, Frame, Suspension Arms.
{"title":"Design Analysis and Optimization of an All-Terrain Vehicle (ATV)","authors":"A. Mishra, A. Sahu","doi":"10.17577/IJERTV10IS010120","DOIUrl":"https://doi.org/10.17577/IJERTV10IS010120","url":null,"abstract":"The paper summarizes the steps taken in finalizing the design of an electric ATV, made for SAE BAJA which provides a platform for undergraduate students to apply the principles of engineering to expose their proficiency in the automotive world. The purpose of the paper is to calculate various boundary conditions on the frame, steering knuckle, suspension arms of a light ATV under extreme conditions and use them to improve the overall design which requires the minimum amount of material while providing a significant Factor of safety. An iterative approach using standard calculations & FEA is discussed in the study for simulation and optimization of the design. For all parts, stress & deformation analysis is performed. For design optimization in the knuckle, topology is done. Von mises Stress, total deformation and safety factor were calculated for each part under appropriate boundary conditions. The study discussed step by step calculations of forces on each component in detail and their simulations with an appropriate degree of precision. Following the methodology shown in the study will be useful in the development of a Light ATV, further, the suggested simulations will ensure the safety of the vehicle. Keywords— Von mises stress, Deformation, Safety factor, Design, Material Selections, FEA, Topology, Knuckle, Frame, Suspension Arms.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84357158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3705-3709
S. Rudyka
The paper deals with the use of probing laser systems for solving complex security problems. In particular, laser systems for remote detection of unobtrusive obstacles and for detection of vapors of hazardous substances in the air are considered. The calculations showed the efficiency of the probing laser systems for the detection of small objects, like high-voltage wires, at distances up to 800 m. It was also shown that a compact laser probe system based on the principle of differential absorption and use of semiconductor DFB lasers, can be used to diagnose the vapors of a number of chemically hazardous substances in concentrations 1...1000 ppm at distances up to 1000 meters. Keywords-sensing, laser system, integrated security, unobtrusive targets.
{"title":"The Use of Probing Laser Systems in the Complex Safety Problems","authors":"S. Rudyka","doi":"10.37624/IJERT/13.11.2020.3705-3709","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3705-3709","url":null,"abstract":"The paper deals with the use of probing laser systems for solving complex security problems. In particular, laser systems for remote detection of unobtrusive obstacles and for detection of vapors of hazardous substances in the air are considered. The calculations showed the efficiency of the probing laser systems for the detection of small objects, like high-voltage wires, at distances up to 800 m. It was also shown that a compact laser probe system based on the principle of differential absorption and use of semiconductor DFB lasers, can be used to diagnose the vapors of a number of chemically hazardous substances in concentrations 1...1000 ppm at distances up to 1000 meters. Keywords-sensing, laser system, integrated security, unobtrusive targets.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74830148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3596-3600
Oleg Yuryevich Panischev, Artur Tagirovich Makridin, A. Katasev, A. M. Akhmetvaleev, D. V. Kataseva
This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepare the initial data for training, to determine the parameters of the network, to conduct training, and to evaluate the results of its testing. When developing a neural network model, data from the publicly available set "NSLKDD" were used. During data processing, entries that were not related to network scanning attacks were removed from the original NSL-KDD set. After processing the initial data, the sample contained 5108 records, 3379 of which characterized normal connections, and 1729 connections were related to network scanning attacks. The Deductor modeling environment was used to build a neural network model. The structure of the constructed neural network was as follows: 11 input neurons, 1 output neuron, and one hidden layer consisting of 23 neurons. The neural network was trained using an error backpropagation algorithm. The quality of the neural network model was assessed using contingency tables with the calculation of the classification accuracy, as well as errors of the first and second kind. The values of these errors turned out to be insignificant. The constructed neural network model revealed most of the connections characterizing network scanning attacks. The neural network assessment confirmed its adequacy and the possibility of effective practical use for detecting network scanning attacks. Keywordsnetwork scanning attack, information security, data mining, neural network, neural network model.
{"title":"Neural Network Model for Detecting Network Scanning Attacks","authors":"Oleg Yuryevich Panischev, Artur Tagirovich Makridin, A. Katasev, A. M. Akhmetvaleev, D. V. Kataseva","doi":"10.37624/IJERT/13.11.2020.3596-3600","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3596-3600","url":null,"abstract":"This paper discusses the concept and problem of detecting network scanning attacks and describes the targets of network scanning attacks. The main attack methods and approaches to scanning network ports are considered. Intrusion detection systems (IDS) are used to detect network scanning attacks. Based on the method of detecting attacks, such systems are divided into IDS, which detects attacks based on signatures, and IDS, which detects attacks based on anomalies. In practice, it is recommended that these IDS detection methods be used together. It is proposed to use a trained neural network as a tool for detecting network scanning attacks. The implementation of the neural network required to prepare the initial data for training, to determine the parameters of the network, to conduct training, and to evaluate the results of its testing. When developing a neural network model, data from the publicly available set \"NSLKDD\" were used. During data processing, entries that were not related to network scanning attacks were removed from the original NSL-KDD set. After processing the initial data, the sample contained 5108 records, 3379 of which characterized normal connections, and 1729 connections were related to network scanning attacks. The Deductor modeling environment was used to build a neural network model. The structure of the constructed neural network was as follows: 11 input neurons, 1 output neuron, and one hidden layer consisting of 23 neurons. The neural network was trained using an error backpropagation algorithm. The quality of the neural network model was assessed using contingency tables with the calculation of the classification accuracy, as well as errors of the first and second kind. The values of these errors turned out to be insignificant. The constructed neural network model revealed most of the connections characterizing network scanning attacks. The neural network assessment confirmed its adequacy and the possibility of effective practical use for detecting network scanning attacks. Keywordsnetwork scanning attack, information security, data mining, neural network, neural network model.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84209347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3359-3366
Vyakhaya Bhatia, S. Malik, Dharmesh K. Mishra, Dipen Paul
Food labelling is an important component when it comes to consumer awareness, advertisements of brands, information the product wants to convey, and the like. Parallelly, genetically modified foods have always been a controversial experimental product. It is always linked to health and ethical issues. Hence, this paper focuses on the two most important aspects i.e. labelling and Genetically Modified foods. This paper analyses the Indian consumer’s knowledge, risk perception, and trust in Genetically Modified labelling. Majorly it focuses on apprehending the consumer awareness about Genetically Modified food labelling in India and understanding the perception of the selected population towards genetically modified food. The sample population involved women who are married and are homemakers, working men who are married and are involved in the grocery purchasing decision of their house, working women and men who are unmarried and are involved in the grocery purchasing decision of their house and students who are involved in the grocery purchasing decision in their house. 227 candidates were selected for this whole analysis. It was found that most of the population was unaware of genetically modified labelling. It was though observed that with increasing consumer awareness, the customers are becoming cautious about the food that they purchase and consume for them and their families. The consumers were divided into three cohorts including, benefit seeker, aware consumers, and risk concerned customers. It was found in the study that education, gender, and marital status did not contribute to the result of our analysis. There is a lot of potential for genetically modified food especially in a country like India, where there is an issue of food security. Genetically modified crops have proved to have better yield and quality. India should ponder upon its production. The consumer should be made aware of Genetically Modified crops. Strict labelling should be done of the food containing Genetically Modified because consumers have the right to know their food.
{"title":"The Labelling of Genetically Modified Foods in India: Consumer’s Risk Perception, Trust, and Knowledge","authors":"Vyakhaya Bhatia, S. Malik, Dharmesh K. Mishra, Dipen Paul","doi":"10.37624/IJERT/13.11.2020.3359-3366","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3359-3366","url":null,"abstract":"Food labelling is an important component when it comes to consumer awareness, advertisements of brands, information the product wants to convey, and the like. Parallelly, genetically modified foods have always been a controversial experimental product. It is always linked to health and ethical issues. Hence, this paper focuses on the two most important aspects i.e. labelling and Genetically Modified foods. This paper analyses the Indian consumer’s knowledge, risk perception, and trust in Genetically Modified labelling. Majorly it focuses on apprehending the consumer awareness about Genetically Modified food labelling in India and understanding the perception of the selected population towards genetically modified food. The sample population involved women who are married and are homemakers, working men who are married and are involved in the grocery purchasing decision of their house, working women and men who are unmarried and are involved in the grocery purchasing decision of their house and students who are involved in the grocery purchasing decision in their house. 227 candidates were selected for this whole analysis. It was found that most of the population was unaware of genetically modified labelling. It was though observed that with increasing consumer awareness, the customers are becoming cautious about the food that they purchase and consume for them and their families. The consumers were divided into three cohorts including, benefit seeker, aware consumers, and risk concerned customers. It was found in the study that education, gender, and marital status did not contribute to the result of our analysis. There is a lot of potential for genetically modified food especially in a country like India, where there is an issue of food security. Genetically modified crops have proved to have better yield and quality. India should ponder upon its production. The consumer should be made aware of Genetically Modified crops. Strict labelling should be done of the food containing Genetically Modified because consumers have the right to know their food.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84914156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3616-3624
Oleg Yuryevich Panischev, R. Babayev, Dmitriy Gennadievich Petrosyants, A. Katasev, A. M. Akhmetvaleev, Irina Vladislavovna Akhmetvaleev, D. V. Kataseva
This article solves the problem of collecting initial data for constructing models for assessing the functional state of a person by pupillary response to changes in illumination. We analyzed the drawbacks of the traditional approach to collecting initial data using computer vision and time series smoothing methods. Attention is focused on the importance of the quality of the initial data for the creation of adequate highprecision mathematical models. We actualized the need for manual marking of the iris and pupil circles to improve the accuracy and quality of the initial data. We described the initial data collection stages in the proposed technology. We gave an example of the resulting pupillogram, which has a smooth shape and does not contain outliers, noise, anomalies and missing values. Based on the given technology, we developed a software and hardware complex, which is a collection of specially developed software that has two main modules and hardware implemented on the basis of a Raspberry Pi 4 Model B microcomputer, with peripheral equipment that implements the specified functionality. To evaluate the effectiveness of the given technology for collecting initial data, we used models of a single-layer perspetron and a collective of neural networks, together with the initial data on the functional state of intoxication of a person. The studies have shown that the number of errors of the 1st and 2nd genus in determining the assessment of the functional state of a person is lower, and the classification accuracy is higher when using the initial data generated by manual marking of circles, compared with the initial data collected by computer vision methods. Thus, the given technology for collecting initial data can be effectively used to build models for assessing the functional state of a person by pupillary response to changes in illumination.
{"title":"The Technology of Collecting Initial Data for Constructing Models for Assessing the Functional State of a Person by Pupillary Response to Changes In Illumination","authors":"Oleg Yuryevich Panischev, R. Babayev, Dmitriy Gennadievich Petrosyants, A. Katasev, A. M. Akhmetvaleev, Irina Vladislavovna Akhmetvaleev, D. V. Kataseva","doi":"10.37624/IJERT/13.11.2020.3616-3624","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3616-3624","url":null,"abstract":"This article solves the problem of collecting initial data for constructing models for assessing the functional state of a person by pupillary response to changes in illumination. We analyzed the drawbacks of the traditional approach to collecting initial data using computer vision and time series smoothing methods. Attention is focused on the importance of the quality of the initial data for the creation of adequate highprecision mathematical models. We actualized the need for manual marking of the iris and pupil circles to improve the accuracy and quality of the initial data. We described the initial data collection stages in the proposed technology. We gave an example of the resulting pupillogram, which has a smooth shape and does not contain outliers, noise, anomalies and missing values. Based on the given technology, we developed a software and hardware complex, which is a collection of specially developed software that has two main modules and hardware implemented on the basis of a Raspberry Pi 4 Model B microcomputer, with peripheral equipment that implements the specified functionality. To evaluate the effectiveness of the given technology for collecting initial data, we used models of a single-layer perspetron and a collective of neural networks, together with the initial data on the functional state of intoxication of a person. The studies have shown that the number of errors of the 1st and 2nd genus in determining the assessment of the functional state of a person is lower, and the classification accuracy is higher when using the initial data generated by manual marking of circles, compared with the initial data collected by computer vision methods. Thus, the given technology for collecting initial data can be effectively used to build models for assessing the functional state of a person by pupillary response to changes in illumination.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78333584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3977-3986
L. Grundel, N. I. Malis, I. Zhuravleva, N. P. Melnikova, O. Mandroshchenko
The use of specialized software in the field of e-audit is a recognized fact in world practice. However, at the same time, the specifics of the tax system of each state make it impossible to simply borrow such software. The article describes the data analysis software used by fiscal authorities in conducting e-audits, as well as presents a comparative analysis of the specialized software used for eaudit. The results of the study have shown that the specialized professional IT audit software named ACL Audit Exchange is a tool that currently provides great opportunities and can significantly simplify the audit process, namely, provide a sufficient level of support.
{"title":"Promising Information Technologies for Tax Purposes: International Trends in Software for Auditors","authors":"L. Grundel, N. I. Malis, I. Zhuravleva, N. P. Melnikova, O. Mandroshchenko","doi":"10.37624/IJERT/13.11.2020.3977-3986","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3977-3986","url":null,"abstract":"The use of specialized software in the field of e-audit is a recognized fact in world practice. However, at the same time, the specifics of the tax system of each state make it impossible to simply borrow such software. The article describes the data analysis software used by fiscal authorities in conducting e-audits, as well as presents a comparative analysis of the specialized software used for eaudit. The results of the study have shown that the specialized professional IT audit software named ACL Audit Exchange is a tool that currently provides great opportunities and can significantly simplify the audit process, namely, provide a sufficient level of support.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82703484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3927-3933
M. Jayakrishnan, Abdul Karim Mohamad, M. M. Yusof
Industry environments are increasingly complex and dynamic. Across the globe, strategic Information System (IS) management transformation is taking place. It is cutting across several sectors, organizations, processes, and industries. Continuous improvement in industry performance needs a Business Architecture (BA) model as a strategic imperative in their performance. BA underpins the usage of normalized management policy relevant to the turn of events and the use of IS and different assets. Once the BA instrument has been mapped with all the other rating and ranking systems, we will evaluate and propose an improved Railway Supply Chain (RSC) indicator. A draft of criteria, sub-criteria, and indicators will be developed based on the current need of the Railway Industry (RI). Strategic IS management may uphold the choices individuals make in each progression of a cycle that analyzes the sources of info, the time, and the yields for each progression of the cycle and helps distinguish the process bottlenecks. Therefore, we need a dynamic RSC perspective that posits a key enabler to the national agenda by developing an RSC model in BA. By giving a comprehensive, various leveled perspective on current and future assets RSC model in BA will support key arranging and other operational asset arranging measures by giving large-scale and miniature perspectives on how assets are to be utilized in achieving the objectives of the RI. Thus, we need to initiate the layout methodologies and an activity that intends to additionally build up the Malaysia RSC strategized decision-making process.
{"title":"Business Architecture Model in Strategic Information System Management for Effective Railway Supply Chain Perspective","authors":"M. Jayakrishnan, Abdul Karim Mohamad, M. M. Yusof","doi":"10.37624/IJERT/13.11.2020.3927-3933","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3927-3933","url":null,"abstract":"Industry environments are increasingly complex and dynamic. Across the globe, strategic Information System (IS) management transformation is taking place. It is cutting across several sectors, organizations, processes, and industries. Continuous improvement in industry performance needs a Business Architecture (BA) model as a strategic imperative in their performance. BA underpins the usage of normalized management policy relevant to the turn of events and the use of IS and different assets. Once the BA instrument has been mapped with all the other rating and ranking systems, we will evaluate and propose an improved Railway Supply Chain (RSC) indicator. A draft of criteria, sub-criteria, and indicators will be developed based on the current need of the Railway Industry (RI). Strategic IS management may uphold the choices individuals make in each progression of a cycle that analyzes the sources of info, the time, and the yields for each progression of the cycle and helps distinguish the process bottlenecks. Therefore, we need a dynamic RSC perspective that posits a key enabler to the national agenda by developing an RSC model in BA. By giving a comprehensive, various leveled perspective on current and future assets RSC model in BA will support key arranging and other operational asset arranging measures by giving large-scale and miniature perspectives on how assets are to be utilized in achieving the objectives of the RI. Thus, we need to initiate the layout methodologies and an activity that intends to additionally build up the Malaysia RSC strategized decision-making process.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91491634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-11-30DOI: 10.37624/IJERT/13.11.2020.3934-3942
Fernando Jove Wilches, Giancarlo Patrón Lambraño, Carlos Millan-Paramo
The purpose of this manuscript is to present a collection of data showing the different variables involved in the design of asphalt pavements, obtained from 84 road sectors located in urban and rural roads in the department of Sucre, north of Colombia. The dataset presents the results of geotechnical studies obtained from soil samples taken in the field and from laboratory tests. Among the most relevant information, the characterization of the subgrade soils was determined, based on particle size analysis testing, Atterberg limits, natural moisture and the classification of soils based in the AASHTO system and the USCS system. The bearing capacity of the subgrade is also presented, from undisturbed samples, for the realization of the laboratory California Bearing Ratio. On the other hand, there is information related to design traffic for each of the evaluated road sectors, expressed in terms of the number of equivalent single axle loads (ESALs). Finally, the information was supplemented with the results of the pavement structures modeled and chosen as design alternatives, for which a rational design methodology was used and the fatigue laws of the TRRL (Transport and Road Research Laboratory) were followed, making use of the Pitra PAVE software to model pavement structures.
{"title":"Modelling of Asphalt Pavement Structures for Different Design Conditions on Roads in Northern Colombia","authors":"Fernando Jove Wilches, Giancarlo Patrón Lambraño, Carlos Millan-Paramo","doi":"10.37624/IJERT/13.11.2020.3934-3942","DOIUrl":"https://doi.org/10.37624/IJERT/13.11.2020.3934-3942","url":null,"abstract":"The purpose of this manuscript is to present a collection of data showing the different variables involved in the design of asphalt pavements, obtained from 84 road sectors located in urban and rural roads in the department of Sucre, north of Colombia. The dataset presents the results of geotechnical studies obtained from soil samples taken in the field and from laboratory tests. Among the most relevant information, the characterization of the subgrade soils was determined, based on particle size analysis testing, Atterberg limits, natural moisture and the classification of soils based in the AASHTO system and the USCS system. The bearing capacity of the subgrade is also presented, from undisturbed samples, for the realization of the laboratory California Bearing Ratio. On the other hand, there is information related to design traffic for each of the evaluated road sectors, expressed in terms of the number of equivalent single axle loads (ESALs). Finally, the information was supplemented with the results of the pavement structures modeled and chosen as design alternatives, for which a rational design methodology was used and the fatigue laws of the TRRL (Transport and Road Research Laboratory) were followed, making use of the Pitra PAVE software to model pavement structures.","PeriodicalId":14123,"journal":{"name":"International journal of engineering research and technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91406435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}