首页 > 最新文献

INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY最新文献

英文 中文
SHAPE OPTIMIZATION OF A TWO WHEELER SUSPENSION WITHDIFFERENT CROSS SECTIONS 不同横截面两轮悬架的形状优化
Pub Date : 2020-12-04 DOI: 10.48047/ijarst/v10/i12/01
The two-wheeler chassis consists of the frame, suspension, wheels and brakes. The chassis iswhat truly sets the overall style of the two-wheeler. Automotive chassis is the main carriagesystems of a vehicle. The frame serves as a skeleton upon which parts like gearbox and engineare mounted. It can be made of steel, aluminum or an alloy. It keeps the wheels in line tomaintain the handling of the two-wheeler.The frame of a motor vehicle supports all the driveassemblies, i.e. the engine, gearbox and axles (front and rear). In addition the suspension andsteering systems and the shock absorbers are attached to it. The appropriate body is fixed to thechassis. It is essential that the frame should not buckle on uneven road surfaces and that anydistortions which may occur should not be transmitted to the body. The frame must therefore betorsion−resistant. The frame of a motor vehicle is the load bearing part of the chassis whichsupports all forces (wheel forces) and weights. It should be as rigid as possible.The main aim ofthe project is to model a frame of a two wheeler using 3D modeling software Pro/Engineer. Twomodels of suspension are designed for pipe type and rectangular cross sections.Considering theframe as a beam, calculations are done to determine the displacement and stress by applyingloads.To validate the strength of two models, Structural analysis is done by applying the wheelforces. In this analysis ultimate stress limit for the model is determined. Analysis is done forframe using two materials steel and aluminum to verify the best material for frame. Modalanalysis is also done to determine natural frequencies of suspension frame. Analysis is done inANSYS software.Comparison is done mathematically and by FEA analysis. And also we canvalidate the better cross section and material for suspension frame.
两轮车的底盘由车架、悬架、车轮和刹车组成。底盘是真正设置的整体风格的两轮车。汽车底盘是汽车的主要承运系统。框架作为一个骨架,在其上安装了齿轮箱和发动机等部件。它可以由钢、铝或合金制成。它使车轮保持直线,以保持两轮车的操控性。机动车辆的车架支撑着所有的驱动部件,即发动机、变速箱和车轴(前后)。此外,悬架、转向系统和减震器也安装在上面。适当的主体固定在底盘上。至关重要的是,框架不应在不平整的路面上弯曲,任何可能发生的扭曲都不应传递给身体。因此,框架必须是抗变形的。汽车的车架是底盘的承重部分,它支持所有的力(轮力)和重量。它应该尽可能的坚硬。该项目的主要目的是使用3D建模软件Pro/Engineer对两轮车的框架进行建模。设计了管型和矩形截面两种悬架模型。将框架视为一根梁,计算通过施加载荷来确定位移和应力。为了验证两种模型的强度,通过施加车轮力进行了结构分析。在分析中,确定了模型的极限应力极限。采用钢和铝两种材料对框架进行了分析,验证了框架的最佳材料。通过模态分析确定了悬架的固有频率。在ansys软件中进行分析。通过数学和有限元分析进行了比较。并验证了较好的悬架截面和材料。
{"title":"SHAPE OPTIMIZATION OF A TWO WHEELER SUSPENSION WITH\u0000DIFFERENT CROSS SECTIONS","authors":"","doi":"10.48047/ijarst/v10/i12/01","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i12/01","url":null,"abstract":"The two-wheeler chassis consists of the frame, suspension, wheels and brakes. The chassis is\u0000what truly sets the overall style of the two-wheeler. Automotive chassis is the main carriage\u0000systems of a vehicle. The frame serves as a skeleton upon which parts like gearbox and engine\u0000are mounted. It can be made of steel, aluminum or an alloy. It keeps the wheels in line to\u0000maintain the handling of the two-wheeler.The frame of a motor vehicle supports all the drive\u0000assemblies, i.e. the engine, gearbox and axles (front and rear). In addition the suspension and\u0000steering systems and the shock absorbers are attached to it. The appropriate body is fixed to the\u0000chassis. It is essential that the frame should not buckle on uneven road surfaces and that any\u0000distortions which may occur should not be transmitted to the body. The frame must therefore be\u0000torsion−resistant. The frame of a motor vehicle is the load bearing part of the chassis which\u0000supports all forces (wheel forces) and weights. It should be as rigid as possible.The main aim of\u0000the project is to model a frame of a two wheeler using 3D modeling software Pro/Engineer. Two\u0000models of suspension are designed for pipe type and rectangular cross sections.Considering the\u0000frame as a beam, calculations are done to determine the displacement and stress by applying\u0000loads.To validate the strength of two models, Structural analysis is done by applying the wheel\u0000forces. In this analysis ultimate stress limit for the model is determined. Analysis is done for\u0000frame using two materials steel and aluminum to verify the best material for frame. Modal\u0000analysis is also done to determine natural frequencies of suspension frame. Analysis is done in\u0000ANSYS software.Comparison is done mathematically and by FEA analysis. And also we can\u0000validate the better cross section and material for suspension frame.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FUZZY IDENTITY-BASED DATA INTEGRITY AUDITINGFOR DEPENDABLE CLOUD STORAGE SYSTEMS 基于模糊身份的可靠云存储系统数据完整性审计
Pub Date : 2020-11-30 DOI: 10.48047/ijarst/v10/i11/06
Information honesty, a center security issue in solid distributed storage, has gotten a lot ofconsideration. Information inspecting conventions empower a verifier to productively check thetrustworthiness of the re-appropriated information without downloading the information. A keyexploration challenge related with existing plans of information reviewing conventions is theintricacy in key administration. In this paper, we look to address the unpredictable keyadministration challenge in cloud information uprightness checking by presenting fluffypersonality based examining, the first in such a methodology, as far as we could possibly know.All the more explicitly, we present the crude of fluffy character based information examining,where a client's personality can be seen as a lot of spellbinding qualities. We formalize theframework model and the security model for this new crude. We at that point present a soliddevelopment of fluffy personality based inspecting convention by using biometrics as the fluffycharacter. The new convention offers the property of mistake resistance, in particular, it ties withprivate key to one personality which can be utilized to confirm the rightness of a reaction createdwith another character, if and just if the two characters are adequately close. We demonstrate thesecurity of our convention dependent on the computational Diffie-Hellman suspicion and thediscrete logarithm supposition in the particular ID security model. At long last, we build up amodel usage of the convention which shows the common sense of the proposition.
信息诚实是固体分布式存储的核心安全问题,已引起人们的广泛关注。信息检查约定使验证者能够有效地检查重新占用的信息的可信度,而无需下载信息。与现有信息审查惯例计划相关的密钥探索挑战是密钥管理的复杂性。在本文中,我们希望通过提出基于蓬松个性的检查来解决云信息正确性检查中不可预测的密钥管理挑战,这是我们可能知道的第一个这样的方法。更明确的是,我们呈现了粗糙的基于角色的信息检查,其中客户的个性可以被视为许多引人入胜的品质。我们形式化了这种新原油的框架模型和安全模型。在此基础上,利用生物特征作为绒毛特征,提出了一种基于绒毛特征检测惯例的绒毛特征检测方法。新的约定提供了抗错误的特性,特别是,它将私钥与一个人格联系起来,如果并且仅仅如果两个角色足够接近,则可以用来确认与另一个角色产生的反应的正确性。我们证明了我们的约定的安全性依赖于计算Diffie-Hellman怀疑和特定ID安全模型中的离散对数假设。最后,我们建立了显示命题常识的约定的模型用法。
{"title":"FUZZY IDENTITY-BASED DATA INTEGRITY AUDITING\u0000FOR DEPENDABLE CLOUD STORAGE SYSTEMS","authors":"","doi":"10.48047/ijarst/v10/i11/06","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/06","url":null,"abstract":"Information honesty, a center security issue in solid distributed storage, has gotten a lot of\u0000consideration. Information inspecting conventions empower a verifier to productively check the\u0000trustworthiness of the re-appropriated information without downloading the information. A key\u0000exploration challenge related with existing plans of information reviewing conventions is the\u0000intricacy in key administration. In this paper, we look to address the unpredictable key\u0000administration challenge in cloud information uprightness checking by presenting fluffy\u0000personality based examining, the first in such a methodology, as far as we could possibly know.\u0000All the more explicitly, we present the crude of fluffy character based information examining,\u0000where a client's personality can be seen as a lot of spellbinding qualities. We formalize the\u0000framework model and the security model for this new crude. We at that point present a solid\u0000development of fluffy personality based inspecting convention by using biometrics as the fluffy\u0000character. The new convention offers the property of mistake resistance, in particular, it ties with\u0000private key to one personality which can be utilized to confirm the rightness of a reaction created\u0000with another character, if and just if the two characters are adequately close. We demonstrate the\u0000security of our convention dependent on the computational Diffie-Hellman suspicion and the\u0000discrete logarithm supposition in the particular ID security model. At long last, we build up a\u0000model usage of the convention which shows the common sense of the proposition.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DIGITAL WALLET USING ARM MICROCONTROLLER 采用手臂微控制器的数字钱包
Pub Date : 2020-11-30 DOI: 10.48047/ijarst/v10/i11/07
As the world is getting digital there are few things which are used as it is for a long time. Themost important thing which we do in our daily life is the transaction of money. Moneytransaction is a process which should be digitized for more security and the ease of theindividual. So, by making a digital wallet the money transaction can be made much simpler andeffortless. Using digital wallet we can keep all our important cards such as health card, drivinglicense and other important papers in only one place with much more security.The digital wallet can be our transaction medium which can be used anywhere such as shops,malls or for giving money to someone else. And with such high security, all the informationwhich the wallet is carrying will be safe. In case, if the wallet is lost, GPS will help to detect thelocation of our device and GSM sends message of the location to the user mobile and that whatmakes the wallet a digital safe. Digital wallet and user mobile will be connected wirelesslythrough Bluetooth.If the digital wallet is lost, the Bluetooth connection between the user mobile and digital walletwill be lost and this is identified as Bluetooth connection lost in the mobile. Immediately GPSwill track the wallet location and GSM will send the location parameters to the user mobile.
随着世界越来越数字化,很少有东西是长期使用的。我们在日常生活中所做的最重要的事情就是金钱的交易。金钱交易是一个应该数字化的过程,以提高安全性和方便性。因此,通过制作数字钱包,货币交易可以变得更加简单和轻松。使用数字钱包,我们可以把我们所有的重要卡,如医疗卡,驾照和其他重要文件在一个地方,更安全。数字钱包可以是我们的交易媒介,可以在任何地方使用,如商店,商场或给别人钱。有了如此高的安全性,钱包所携带的所有信息都将是安全的。如果钱包丢失,GPS将帮助我们检测设备的位置,GSM将位置信息发送到用户的手机上,这使得钱包成为一个数字保险箱。数字钱包和用户手机将通过蓝牙无线连接。如果数字钱包丢失,则用户手机与数字钱包之间的蓝牙连接将丢失,识别为手机中蓝牙连接丢失。gps会立即跟踪钱包的位置,GSM会将位置参数发送到用户的手机上。
{"title":"DIGITAL WALLET USING ARM MICROCONTROLLER","authors":"","doi":"10.48047/ijarst/v10/i11/07","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/07","url":null,"abstract":"As the world is getting digital there are few things which are used as it is for a long time. The\u0000most important thing which we do in our daily life is the transaction of money. Money\u0000transaction is a process which should be digitized for more security and the ease of the\u0000individual. So, by making a digital wallet the money transaction can be made much simpler and\u0000effortless. Using digital wallet we can keep all our important cards such as health card, driving\u0000license and other important papers in only one place with much more security.\u0000The digital wallet can be our transaction medium which can be used anywhere such as shops,\u0000malls or for giving money to someone else. And with such high security, all the information\u0000which the wallet is carrying will be safe. In case, if the wallet is lost, GPS will help to detect the\u0000location of our device and GSM sends message of the location to the user mobile and that what\u0000makes the wallet a digital safe. Digital wallet and user mobile will be connected wirelessly\u0000through Bluetooth.\u0000If the digital wallet is lost, the Bluetooth connection between the user mobile and digital wallet\u0000will be lost and this is identified as Bluetooth connection lost in the mobile. Immediately GPS\u0000will track the wallet location and GSM will send the location parameters to the user mobile.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127893829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERFORMANCE TEST OF DIFFERENT TYPES OF WASTE ASPARTIAL REPLACEMENT OF CEMENT IN HOT ASPHALTMIX 不同类型废弃物在热沥青混合料中部分替代水泥的性能试验
Pub Date : 2020-11-27 DOI: 10.48047/ijarst/v10/i11/04
One of the major fillers used in HMA is cement. With the extensive use of cement inmortars/concrete, there have been some environmental concerns in terms of damage caused bythe extraction of raw material and Carbon dioxide (CO2) emission during cement manufacture.This has brought pressures to reduce the cement consumption in the industry. This journaloutlines the ongoing research on different waste materials partial replacement of cement as fillerused in hot mix asphalt mixes. Many studies regarding their effects on bituminous mixes werealso analysed in combination with cement filler mastic. This project summarizes the interactionof Waste materials partial replacement of cement with different percentages 0%, 25%, 50%,75%, 100% and finding out the optimun percenetage of waste material i.e: GGBS, Flyash,Concrete dust, Metakaolin and Marble powder as partial replacment of cement in bituminousmixes. Marshall properties such as stability, flow value, unit weight, air voids, are used todetermine optimum waste material content for the used grade of bitumen (100/120).
水泥是HMA中使用的主要填料之一。随着水泥在砂浆/混凝土中的广泛使用,在水泥生产过程中,原材料的提取和二氧化碳(CO2)的排放造成了一些环境问题。这给水泥行业带来了减少水泥消耗的压力。本文概述了在热拌沥青混合料中使用不同废料部分替代水泥作为填料的研究进展。并结合水泥填料胶浆对沥青混合料的影响进行了分析。本项目总结了0%、25%、50%、75%、100%不同比例的废旧材料部分替代水泥的相互作用,找出了沥青混合料中废旧材料GGBS、粉煤灰、混凝土粉尘、偏高岭土和大理石粉部分替代水泥的最佳比例。马歇尔性能,如稳定性,流量值,单位重量,空气空隙,被用来确定沥青使用等级(100/120)的最佳废料含量。
{"title":"PERFORMANCE TEST OF DIFFERENT TYPES OF WASTE AS\u0000PARTIAL REPLACEMENT OF CEMENT IN HOT ASPHALT\u0000MIX","authors":"","doi":"10.48047/ijarst/v10/i11/04","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/04","url":null,"abstract":"One of the major fillers used in HMA is cement. With the extensive use of cement in\u0000mortars/concrete, there have been some environmental concerns in terms of damage caused by\u0000the extraction of raw material and Carbon dioxide (CO2) emission during cement manufacture.\u0000This has brought pressures to reduce the cement consumption in the industry. This journal\u0000outlines the ongoing research on different waste materials partial replacement of cement as filler\u0000used in hot mix asphalt mixes. Many studies regarding their effects on bituminous mixes were\u0000also analysed in combination with cement filler mastic. This project summarizes the interaction\u0000of Waste materials partial replacement of cement with different percentages 0%, 25%, 50%,\u000075%, 100% and finding out the optimun percenetage of waste material i.e: GGBS, Flyash,\u0000Concrete dust, Metakaolin and Marble powder as partial replacment of cement in bituminous\u0000mixes. Marshall properties such as stability, flow value, unit weight, air voids, are used to\u0000determine optimum waste material content for the used grade of bitumen (100/120).","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116171483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CLOUD BASED SECURITY FOR ADVANCED MINIMIZINGENERGY BASED DATA SHARING IN MULTI-CLOUDS 基于云的安全性,用于多云中基于能源的高级数据共享最小化
Pub Date : 2020-11-25 DOI: 10.48047/ijarst/v10/i11/03
Protect Cloud is better than protecting your account calculate with internal consumptioncharacteristics assets. In terms of cloud computing, it provides cloud services give an endlessstorage and file information and creates an abstracts information uploading the data ofvarious clients. It can help customers reduce economic costs of document management bymoving with the district administration utility and policies to use on cloud servers. Offer safestatistics The security key can be confiscated Distribute and share information for dynamicgroups. Within this task, the existing scheme is able to help Dynamic organizations workeffectively when there are new users in case of joining the organization or termination of theuser from the organization, the private keys of the opposite party customers do not need to bereimbursed now and do not need to do so date. In addition, the scheme can achieve comfortcustomer cancellation cannot be a blocked client data files can be retrieved for the first timealthough they conspired with unbelievers of clouds. To avoid these threats, conspiraciesagainst information are a how to remove a copy of a statistical copy, the cloud has beenwidely used in garages to reduce storage space, throughput and deployment in cloudyweather information is saved. Recommended compiler The encryption model has beenwidely followed Convenient anti-conspiracy, correct and reliable control a variety ofcompiler keys.
保护云比保护您的帐户计算与内部消费特征资产更好。在云计算方面,它提供云服务,提供无限的存储和文件信息,并创建一个抽象的信息,上传各种客户端的数据。它可以帮助客户降低文档管理的经济成本,将地区管理工具和策略转移到云服务器上使用。提供安全统计可以没收安全密钥为动态组分发和共享信息。在此任务中,现有方案能够帮助动态组织在有新用户加入组织或用户退出组织的情况下有效地工作,对方客户的私钥现在不需要报销,也不需要报销。此外,该方案可以轻松实现客户取消不能被阻塞的客户数据文件可以第一次被检索,尽管他们与不相信云的人共谋。为了避免这些威胁,针对信息的阴谋论是一种如何删除一个副本的统计副本,云已被广泛应用于车库,以减少存储空间,吞吐量和部署在多云天气的信息被保存。推荐编译器加密模型被广泛采用方便反阴谋,正确可靠地控制各种编译器密钥。
{"title":"A CLOUD BASED SECURITY FOR ADVANCED MINIMIZING\u0000ENERGY BASED DATA SHARING IN MULTI-CLOUDS","authors":"","doi":"10.48047/ijarst/v10/i11/03","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/03","url":null,"abstract":"Protect Cloud is better than protecting your account calculate with internal consumption\u0000characteristics assets. In terms of cloud computing, it provides cloud services give an endless\u0000storage and file information and creates an abstracts information uploading the data of\u0000various clients. It can help customers reduce economic costs of document management by\u0000moving with the district administration utility and policies to use on cloud servers. Offer safe\u0000statistics The security key can be confiscated Distribute and share information for dynamic\u0000groups. Within this task, the existing scheme is able to help Dynamic organizations work\u0000effectively when there are new users in case of joining the organization or termination of the\u0000user from the organization, the private keys of the opposite party customers do not need to be\u0000reimbursed now and do not need to do so date. In addition, the scheme can achieve comfort\u0000customer cancellation cannot be a blocked client data files can be retrieved for the first time\u0000although they conspired with unbelievers of clouds. To avoid these threats, conspiracies\u0000against information are a how to remove a copy of a statistical copy, the cloud has been\u0000widely used in garages to reduce storage space, throughput and deployment in cloudy\u0000weather information is saved. Recommended compiler The encryption model has been\u0000widely followed Convenient anti-conspiracy, correct and reliable control a variety of\u0000compiler keys.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121221293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURE PRESERVING DATA IN INTERNET OF THINGS (IOT)USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES 使用加密和隐写技术安全保存物联网(iot)中的数据
Pub Date : 2020-11-24 DOI: 10.48047/ijarst/v10/i11/01
Information is the contribution for different man-made reasoning (AI) calculations to mineimportant highlights, yet information in Internet is dissipated all over and constrained by variouspartners who can't put stock in one another, and use of the information in complex the internet ishard to approve or to approve. Accordingly, it is extremely hard to empower informationpartaking in the internet for the genuine enormous information, just as a genuine amazing AI. Inthis paper, we propose the SecNet, a design that can empower secure information putting away,processing, and partaking in the enormous scope Internet climate, focusing on a safer the internetwith genuine huge information and hence improved AI with a lot of information source, byincorporating three key segments: 1) blockchain-based information offering to possessionensure, which empowers believed information partaking in the huge scope climate to shapegenuine large information; 2) AI-based secure figuring stage to create more insightful securityrules, which assists with building a more confided in the internet; 3) confided in esteem tradeinstrument for buying security administration, giving an approach to members to increasefinancial prizes when giving out their information or administration, which advances theinformation sharing and subsequently accomplishes better execution of AI. Besides, we examinethe common use situation of SecNet just as its possibly elective approach to convey, just as breakdown its adequacy from the part of organization security and financial income.
信息是不同人工推理(AI)计算的贡献,以挖掘重要的亮点,但互联网上的信息是分散的,并且受到各种合作伙伴的限制,这些合作伙伴无法相互存储,并且在复杂的互联网上使用信息难以批准或批准。因此,在互联网上赋予信息共享以真正的海量信息是极其困难的,就像一个真正令人惊叹的人工智能一样。在本文中,我们提出了SecNet,这是一种可以在巨大范围的互联网环境中赋予安全信息存储,处理和参与的设计,专注于拥有真正的海量信息的更安全的互联网,从而改进具有大量信息源的AI,包括三个关键部分:1)基于区块链的信息提供给所有权,使参与巨大范围气候的可信信息能够塑造真正的大信息;2)基于人工智能的安全计算阶段,创建更有洞察力的安全规则,有助于建立一个更加信任的互联网;3)信任购买安全管理的尊重交易工具,为会员提供在提供信息或管理时增加财务奖励的方法,从而促进信息共享,从而更好地执行AI。此外,我们考察了SecNet的普遍使用情况,只是作为其可能的选择方式来传达,只是从组织安全和财务收入的部分分解其充分性。
{"title":"SECURE PRESERVING DATA IN INTERNET OF THINGS (IOT)\u0000USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES","authors":"","doi":"10.48047/ijarst/v10/i11/01","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/01","url":null,"abstract":"Information is the contribution for different man-made reasoning (AI) calculations to mine\u0000important highlights, yet information in Internet is dissipated all over and constrained by various\u0000partners who can't put stock in one another, and use of the information in complex the internet is\u0000hard to approve or to approve. Accordingly, it is extremely hard to empower information\u0000partaking in the internet for the genuine enormous information, just as a genuine amazing AI. In\u0000this paper, we propose the SecNet, a design that can empower secure information putting away,\u0000processing, and partaking in the enormous scope Internet climate, focusing on a safer the internet\u0000with genuine huge information and hence improved AI with a lot of information source, by\u0000incorporating three key segments: 1) blockchain-based information offering to possession\u0000ensure, which empowers believed information partaking in the huge scope climate to shape\u0000genuine large information; 2) AI-based secure figuring stage to create more insightful security\u0000rules, which assists with building a more confided in the internet; 3) confided in esteem trade\u0000instrument for buying security administration, giving an approach to members to increase\u0000financial prizes when giving out their information or administration, which advances the\u0000information sharing and subsequently accomplishes better execution of AI. Besides, we examine\u0000the common use situation of SecNet just as its possibly elective approach to convey, just as break\u0000down its adequacy from the part of organization security and financial income.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128612491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BREAST CANCER DETECTION USING MAMMOGRAM FEATURES USING RANDOM FOREST ALGORITHM 基于随机森林算法的乳房x线影像特征乳腺癌检测
Pub Date : 2020-11-24 DOI: 10.48047/ijarst/v10/i11/02
Breast Cancer is one of the most dangerous diseases for women. This canceroccurs when some breast cells begin to grow abnormally. Machine learning is thesubfield of computer science that studies programs that generalize from pastexperience. This project looks at classification, where an algorithm tries to predictthe label for a sample. The machine learning algorithm takes many of thesesamples, called the training set, and builds an internal model. This built model isused to classify and predict the data. There are two classes, benign and malignant.Random Forest classifier is used to predict whether the cancer is benign ormalignant. Training and testing of the model are done by Wisconsin DiagnosisBreast Cancer dataset.
乳腺癌是女性最危险的疾病之一。当一些乳腺细胞开始异常生长时,就会发生这种癌症。机器学习是计算机科学的一个子领域,研究从过去的经验中归纳出来的程序。这个项目着眼于分类,其中一个算法试图预测样本的标签。机器学习算法取许多这样的样本,称为训练集,并建立一个内部模型。该模型用于对数据进行分类和预测。有良性和恶性两类。随机森林分类器用于预测肿瘤是良性还是恶性。该模型的训练和测试由威斯康星诊断乳腺癌数据集完成。
{"title":"BREAST CANCER DETECTION USING MAMMOGRAM FEATURES USING RANDOM FOREST ALGORITHM","authors":"","doi":"10.48047/ijarst/v10/i11/02","DOIUrl":"https://doi.org/10.48047/ijarst/v10/i11/02","url":null,"abstract":"Breast Cancer is one of the most dangerous diseases for women. This cancer\u0000occurs when some breast cells begin to grow abnormally. Machine learning is the\u0000subfield of computer science that studies programs that generalize from past\u0000experience. This project looks at classification, where an algorithm tries to predict\u0000the label for a sample. The machine learning algorithm takes many of these\u0000samples, called the training set, and builds an internal model. This built model is\u0000used to classify and predict the data. There are two classes, benign and malignant.\u0000Random Forest classifier is used to predict whether the cancer is benign or\u0000malignant. Training and testing of the model are done by Wisconsin Diagnosis\u0000Breast Cancer dataset.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two Day National Conference on ADVANCES IN LIFE SCIENCES 为期两天的生命科学进展全国会议
Pub Date : 2020-11-21 DOI: 10.48047/ijiemr/v08/spec/01
An engineer needs to use mathematics and apply science for engineeringsolutions to many types of problems pertaining to different disciplines.Proper knowledge of mathematics is the prime requisite requirement forengineering various kinds of applications. An engineer must know general purposemathematics and mathematics related to a specific discipline. An engineer having clearknowledge of the mathematics will be able to engineer solutions to the problems thatare to be solved with least cost and time.
工程师需要使用数学和应用科学的工程解决方案,涉及不同学科的许多类型的问题。适当的数学知识是工程各种应用的首要必要条件。工程师必须了解通用数学和与特定学科相关的数学。具有清晰数学知识的工程师将能够以最少的成本和时间设计出解决问题的方案。
{"title":"Two Day National Conference on ADVANCES IN LIFE SCIENCES","authors":"","doi":"10.48047/ijiemr/v08/spec/01","DOIUrl":"https://doi.org/10.48047/ijiemr/v08/spec/01","url":null,"abstract":"An engineer needs to use mathematics and apply science for engineering\u0000solutions to many types of problems pertaining to different disciplines.\u0000Proper knowledge of mathematics is the prime requisite requirement for\u0000engineering various kinds of applications. An engineer must know general purpose\u0000mathematics and mathematics related to a specific discipline. An engineer having clear\u0000knowledge of the mathematics will be able to engineer solutions to the problems that\u0000are to be solved with least cost and time.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114358376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National conference on Biotech and Pharma Applications (NCBA) 全国生物技术与制药应用会议(NCBA)
Pub Date : 2020-11-20 DOI: 10.48047/ijiemr/v09/spec/03
Warm and Happy greetings to all.I am immensely happy that Department of Biotechnology of our K L University isorganizing a National Conference on Biotech and Pharma Applications (NCBA-2020) during12 March, 2020 and is going to discuss on a collection of technical papers in the proceedings.Department of Biotechnology, K L University continues to march on the way of successwith confidence. On this occasion, I wish all the very best.I congratulate HOD, staff members, students of Department of Biotechnology, Delegatesand Participants from different parts of the country and nations for their efforts in participating inthis conference and wish the conference all the success.
向大家致以热烈和快乐的问候。我非常高兴我校生物技术系将于2020年3月12日组织一次全国生物技术和制药应用会议(nba -2020),并将在会议记录中讨论一系列技术论文。kl大学生物科技学系,信心满满,在成功的道路上继续前行。在此,我祝愿一切顺利。在此,我谨向HOD、生物工程系的全体教职员工、学生以及来自全国各地和各国的代表和与会者表示祝贺,并预祝会议取得圆满成功。
{"title":"National conference on Biotech and Pharma Applications (NCBA)","authors":"","doi":"10.48047/ijiemr/v09/spec/03","DOIUrl":"https://doi.org/10.48047/ijiemr/v09/spec/03","url":null,"abstract":"Warm and Happy greetings to all.\u0000I am immensely happy that Department of Biotechnology of our K L University is\u0000organizing a National Conference on Biotech and Pharma Applications (NCBA-2020) during\u000012 March, 2020 and is going to discuss on a collection of technical papers in the proceedings.\u0000Department of Biotechnology, K L University continues to march on the way of success\u0000with confidence. On this occasion, I wish all the very best.\u0000I congratulate HOD, staff members, students of Department of Biotechnology, Delegates\u0000and Participants from different parts of the country and nations for their efforts in participating in\u0000this conference and wish the conference all the success.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116401257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
National Conference on “Emerging Trends in Smart Grid Technologies “智能电网技术的新兴趋势”全国会议
Pub Date : 2020-11-20 DOI: 10.48047/ijiemr/v09/spec/01
It is with great pleasure that I extend a warm welcome to National Conference on“Emerging Trends in Smart Grid Technologies (NCETSGT - 2020)” organized byElectrical & Electronics Engineering Department during February 7 – 8, 2020. I am trulyproud that the Department of Electrical and Electronics Engineering has managed toorganize such an important conference in the field of smart electric grid an importantarea of electrical engineering, which is attracting academic and industrial participation,nationally and internationally. I am sure that this conference will achieve its intent – toserve as an effective platform for the research community to learn, share andsupplement each other’s research, while keeping abreast of the latest trends in thisarena.
我非常高兴地欢迎电气与电子工程系于2020年2月7日至8日组织的“智能电网技术新兴趋势全国会议(NCETSGT - 2020)”。我真的很自豪电气和电子工程系能够在智能电网领域组织这样一个重要的会议,这是电气工程的一个重要领域,吸引了国内外学术界和工业界的参与。我相信这次会议将达到它的目的——为研究界提供一个学习、分享和补充彼此研究的有效平台,同时了解这一领域的最新趋势。
{"title":"National Conference on “Emerging Trends in Smart Grid Technologies","authors":"","doi":"10.48047/ijiemr/v09/spec/01","DOIUrl":"https://doi.org/10.48047/ijiemr/v09/spec/01","url":null,"abstract":"It is with great pleasure that I extend a warm welcome to National Conference on\u0000“Emerging Trends in Smart Grid Technologies (NCETSGT - 2020)” organized by\u0000Electrical & Electronics Engineering Department during February 7 – 8, 2020. I am truly\u0000proud that the Department of Electrical and Electronics Engineering has managed to\u0000organize such an important conference in the field of smart electric grid an important\u0000area of electrical engineering, which is attracting academic and industrial participation,\u0000nationally and internationally. I am sure that this conference will achieve its intent – to\u0000serve as an effective platform for the research community to learn, share and\u0000supplement each other’s research, while keeping abreast of the latest trends in this\u0000arena.","PeriodicalId":167095,"journal":{"name":"INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127600582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
INTERNATIONAL JOURNAL FOR ADVANCED RESEARCH IN SCIENCE & TECHNOLOGY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1