Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2523.059120
As the dispersed registering development makes during the latest decade, re-appropriating data to cloud organization for limit transforms into an engaging example, which benefits in sparing undertakings on generous data support and the board. In any case, since the redistributed distributed storage is not completely reliable, it raises the security worries on the best way to acknowledge information de-duplication in cloud while accomplishing trustworthiness evaluating. Right now, study the issue of uprightness reviewing and make sure about de-duplication on the cloud information. In particular, targeting accomplishing the two info honesty and the de-duplication in the cloud, we propose some two secure frame works, to be specific sec-cloud and sec-cloud+. sec-cloudhelps in presents a reviewing element with most upkeep of the Map-Reduce cloud, which assists customers with producing information about labels before the transferring just as review the trustworthiness of information having been just put away in cloud. The Contrasted and past work, the calculation by the client in Sec-Cloud is extraordinarily decreased during the record transferring and reviewing stages. Sec-Cloud is planned propelled by the way that clients consistently need to scramble their information before transferring, and empowers trustworthiness inspecting and make sure about de-duplication on encoded information.
{"title":"Secure Auditing and De-duplicating Data in Cloud","authors":"","doi":"10.35940/ijrte.a2523.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2523.059120","url":null,"abstract":"As the dispersed registering development makes during the latest decade, re-appropriating data to cloud organization for limit transforms into an engaging example, which benefits in sparing undertakings on generous data support and the board. In any case, since the redistributed distributed storage is not completely reliable, it raises the security worries on the best way to acknowledge information de-duplication in cloud while accomplishing trustworthiness evaluating. Right now, study the issue of uprightness reviewing and make sure about de-duplication on the cloud information. In particular, targeting accomplishing the two info honesty and the de-duplication in the cloud, we propose some two secure frame works, to be specific sec-cloud and sec-cloud+. sec-cloudhelps in presents a reviewing element with most upkeep of the Map-Reduce cloud, which assists customers with producing information about labels before the transferring just as review the trustworthiness of information having been just put away in cloud. The Contrasted and past work, the calculation by the client in Sec-Cloud is extraordinarily decreased during the record transferring and reviewing stages. Sec-Cloud is planned propelled by the way that clients consistently need to scramble their information before transferring, and empowers trustworthiness inspecting and make sure about de-duplication on encoded information.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121253944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a1682.059120
S. Pathak, Avinash Kumar
In present time there are many research are going on in the field of wireless sensor network which is defined by software that is known as Software defined wireless sensor network that is used for after the distributing of nodes in the network. . In this research work we propose an algorithm for the energy consumption of software defined wireless sensor network. This algorithm is used for to control of selected nodes in the network that are provide the many task dynamically, to make the system network functional manner . The control nodes in the networks are selected as a Nondeterministic Problem to reduce the energy and transmission distance in the system. The LEACH protocol is very useful protocol ti increase the system lifetime of the network. In this paper we consider the low energy adaptive protocol that combines the ideas of Media Access Control protocol and routing algorithm.
{"title":"A Specific Structure of Protocol to Increase the System Lifetime of Wireless Sensor Network","authors":"S. Pathak, Avinash Kumar","doi":"10.35940/ijrte.a1682.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a1682.059120","url":null,"abstract":"In present time there are many research are going on in the field of wireless sensor network which is defined by software that is known as Software defined wireless sensor network that is used for after the distributing of nodes in the network. . In this research work we propose an algorithm for the energy consumption of software defined wireless sensor network. This algorithm is used for to control of selected nodes in the network that are provide the many task dynamically, to make the system network functional manner . The control nodes in the networks are selected as a Nondeterministic Problem to reduce the energy and transmission distance in the system. The LEACH protocol is very useful protocol ti increase the system lifetime of the network. In this paper we consider the low energy adaptive protocol that combines the ideas of Media Access Control protocol and routing algorithm.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a1462.059120
Mohammad Asim khan, Sharik Ahmad
:Rapid increases in informational and technological methods have led companies to gather customer data in great databases. Data mining is the procedure involving analyzing, searching information to make it helpful for human use. Great amount of information is modeled, selected as well as explored in order to figure out comprehensible info. Artificial intelligence as well as data mining methods has been utilized in numerous domains to resolve classification, diagnosis, and association, segmentation, and prediction issues. This particular paper discuss about the Data mining as well as KDD procedure from an AI perspective. We talk about popular subjects in data mining as well as AI, which includes key AI suggestions which have been utilized in both data mining as well as KDD. The general goal of this particular paper is taking a perspective of different application and algorithms of AI in Data Mining. In this particular paper, we are going to take into consideration several historic contributions and talk about these various thoughts with an example to human intelligence. Additionally, an overall framework for the style of even more clever devices can we proposed.
{"title":"An Emergence of AI in Data Mining and KDD: ANN its Strength & Weakness","authors":"Mohammad Asim khan, Sharik Ahmad","doi":"10.35940/ijrte.a1462.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a1462.059120","url":null,"abstract":":Rapid increases in informational and technological methods have led companies to gather customer data in great databases. Data mining is the procedure involving analyzing, searching information to make it helpful for human use. Great amount of information is modeled, selected as well as explored in order to figure out comprehensible info. Artificial intelligence as well as data mining methods has been utilized in numerous domains to resolve classification, diagnosis, and association, segmentation, and prediction issues. This particular paper discuss about the Data mining as well as KDD procedure from an AI perspective. We talk about popular subjects in data mining as well as AI, which includes key AI suggestions which have been utilized in both data mining as well as KDD. The general goal of this particular paper is taking a perspective of different application and algorithms of AI in Data Mining. In this particular paper, we are going to take into consideration several historic contributions and talk about these various thoughts with an example to human intelligence. Additionally, an overall framework for the style of even more clever devices can we proposed.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127211479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Intelligent and Secured Bag is an application-specific design that can be useful for the security of important documents and valuable materials. The bag can carry out various features for daily use such as security check using face recognition. The system uses Artificial Intelligence for more effective results in terms of security in comparison with the existing system which uses fingerprint scanner. The Secured Bag consists of the facility of face recognition for advance security solution. The face recognition with Haar Cascade Classifier which is a machine learning object detection algorithm is used for the locking and unlocking of the bag which contributes in the intelligent part of the project. In order to reduce the forgetfulness of senior citizens and even professionals to pack the required items, RF-ID Technology will be used. It maintains the list of objects present in the bag. The RF-ID tags are attached to all the objects which is to be placed inside the bag. The RF-ID reader is used to read the tags which enters the bag. When any object will be missing from the bag, the message of the list of objects missing is send to the users mobile. For the security of the bag from thefts, magnetic lock is introduced. When the face of the person accessing the bag is not matched with the already existing database indicating that an unauthorized person is trying to open the bag, the lock will remain in the locked position. Thus, the person cannot access the bag. When the face of the person accessing the bag matches with the already existing database indicating that an authorized person is trying to open the bag, the lock will be unlocked and the person can access the bag. All the alert messages and the message of the list of items present and missing from the bag is sent to the owner using a GSM modem. The main advantage of using the Smart Bag is protection from thefts, also the owner of the bag gets informed about the theft and the items missing from the bag through GSM. Raspberry Pi will control all the distinguishable features. The smart bag can be used by almost all people including students, doctors, military people, aged people, etc. In general, it can be used in the daily life without the fear of something being stolen or missing from the bag.
{"title":"Intelligent and Secured Bag using Artificial Intelligence","authors":"Anjita Ranjit, Harshal Hajare, Prajwali Dhole, PK Rajani","doi":"10.35940/ijrte.a2686.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2686.059120","url":null,"abstract":"The Intelligent and Secured Bag is an application-specific design that can be useful for the security of important documents and valuable materials. The bag can carry out various features for daily use such as security check using face recognition. The system uses Artificial Intelligence for more effective results in terms of security in comparison with the existing system which uses fingerprint scanner. The Secured Bag consists of the facility of face recognition for advance security solution. The face recognition with Haar Cascade Classifier which is a machine learning object detection algorithm is used for the locking and unlocking of the bag which contributes in the intelligent part of the project. In order to reduce the forgetfulness of senior citizens and even professionals to pack the required items, RF-ID Technology will be used. It maintains the list of objects present in the bag. The RF-ID tags are attached to all the objects which is to be placed inside the bag. The RF-ID reader is used to read the tags which enters the bag. When any object will be missing from the bag, the message of the list of objects missing is send to the users mobile. For the security of the bag from thefts, magnetic lock is introduced. When the face of the person accessing the bag is not matched with the already existing database indicating that an unauthorized person is trying to open the bag, the lock will remain in the locked position. Thus, the person cannot access the bag. When the face of the person accessing the bag matches with the already existing database indicating that an authorized person is trying to open the bag, the lock will be unlocked and the person can access the bag. All the alert messages and the message of the list of items present and missing from the bag is sent to the owner using a GSM modem. The main advantage of using the Smart Bag is protection from thefts, also the owner of the bag gets informed about the theft and the items missing from the bag through GSM. Raspberry Pi will control all the distinguishable features. The smart bag can be used by almost all people including students, doctors, military people, aged people, etc. In general, it can be used in the daily life without the fear of something being stolen or missing from the bag.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127272587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a3022.059120
A much-required breakthrough in the field of VLSI took place with the birth of Quantum-dot cellular automata (QCA) technology, an impressive amalgamation of Quantum Physics and Nanotechnology and acted as a possible replacement to the age-old semiconductor transistor-based designs (CMOS) with Boolean paradigm. In this paper, we aim at implementing this technology to build a robust 8:1 multiplexer that can help in building and developing many more digital logic circuits, from an already proposed 2:1 multiplexer. It has excellent efficiency with respect to least cell count, latency, space and power dissipation.
{"title":"Design of Improved 8:1 Multiplexer using Quantum-dot Cellular Automata Technology","authors":"","doi":"10.35940/ijrte.a3022.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a3022.059120","url":null,"abstract":"A much-required breakthrough in the field of VLSI took place with the birth of Quantum-dot cellular automata (QCA) technology, an impressive amalgamation of Quantum Physics and Nanotechnology and acted as a possible replacement to the age-old semiconductor transistor-based designs (CMOS) with Boolean paradigm. In this paper, we aim at implementing this technology to build a robust 8:1 multiplexer that can help in building and developing many more digital logic circuits, from an already proposed 2:1 multiplexer. It has excellent efficiency with respect to least cell count, latency, space and power dissipation.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2066.059120
Red soil is not commonly used alike other kind of soils in engineering field. So, a trial is created to stabilize the red soil by adding potassium hydroxide treated polypropylene fibers. This project work aims to search out the effect of addition of 0%, 0.25%, 0.5%, 0.75%, 1%, 1.25% treated polypropylene fibers to stabilize the red soil. Its consistency properties, compaction properties, and strength parameter are tested. In this project the results of addition of treated polypropylene fiber is investigated and is compared therewith of the untreated red soil. The testing program was conducted in two phases. Within the first phase, the physical, and chemical engineering properties of the red soil samples were studied by conducting Specific gravity, Grain size distribution, Liquid limit, Plastic limit, UCS and CBR Tests. Within the second phase of the test program, red soil was mixed with 0%, 0.25%, 0.5%, 0.75%, and 1% of treated polypropylene fiber as percentage of dry weight of red soil. After mixing different percentage of polypropylene fiber and conducting various tests we ought to observed that the value of UCS was increased by 93.12% at 0.75% PP fiber, which makes clear that higher load can be beared after adding it. The value of MDD was also increased by 3.3 %. The soaked CBR value has been increased from 4.24% to 6.37% with 0.75% of polypropylene fiber by which it’s cleared that it can be used for pavement in areas where water table is high. Unsoaked CBR value has been increased from 8.32% to 11.06% with 0.75% of polypropylene fiber.Which make clear that we can increases the slope of pavement for stability of slope and also reduce the thickness of pavement in highway and railway which reduces the cost of construction.So, we observed that 0.75 % of treated polypropylene fiber can be used to stabilize the red soi
{"title":"Stabilization of Red Soil using Potassium Hydroxide Treated Polypropylene Fiber","authors":"","doi":"10.35940/ijrte.a2066.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2066.059120","url":null,"abstract":"Red soil is not commonly used alike other kind of soils in engineering field. So, a trial is created to stabilize the red soil by adding potassium hydroxide treated polypropylene fibers. This project work aims to search out the effect of addition of 0%, 0.25%, 0.5%, 0.75%, 1%, 1.25% treated polypropylene fibers to stabilize the red soil. Its consistency properties, compaction properties, and strength parameter are tested. In this project the results of addition of treated polypropylene fiber is investigated and is compared therewith of the untreated red soil. The testing program was conducted in two phases. Within the first phase, the physical, and chemical engineering properties of the red soil samples were studied by conducting Specific gravity, Grain size distribution, Liquid limit, Plastic limit, UCS and CBR Tests. Within the second phase of the test program, red soil was mixed with 0%, 0.25%, 0.5%, 0.75%, and 1% of treated polypropylene fiber as percentage of dry weight of red soil. After mixing different percentage of polypropylene fiber and conducting various tests we ought to observed that the value of UCS was increased by 93.12% at 0.75% PP fiber, which makes clear that higher load can be beared after adding it. The value of MDD was also increased by 3.3 %. The soaked CBR value has been increased from 4.24% to 6.37% with 0.75% of polypropylene fiber by which it’s cleared that it can be used for pavement in areas where water table is high. Unsoaked CBR value has been increased from 8.32% to 11.06% with 0.75% of polypropylene fiber.Which make clear that we can increases the slope of pavement for stability of slope and also reduce the thickness of pavement in highway and railway which reduces the cost of construction.So, we observed that 0.75 % of treated polypropylene fiber can be used to stabilize the red soi","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124915196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.f7885.059120
The present study tries to investigate and analyze the key determinants that influence an employee’s intention regarding participation in Worksite Health Promotion programs in Indian Corporate Sector. The study also tries to find out the applicability and validity of theory of planned behavior (Ajzen, 1991) in explaining the behavior of employees in terms of participation in Worksite health promotion programs in the Indian Corporate Sector. The study adopts the primary survey to collect the responses of 256 sample respondents collected through online questionnaire survey from Indian industries. After assessing the reliability of the variables followed by variable extraction using principle component analysis, the responses are analyzed using ordinary least square method. The findings of the study suggest that three factors such as environment at workplace, influence of peers and personal beliefs play a significant role in affecting the employee’s participation in workplace health programs.
{"title":"Empirical Work on Workforce Participation in Workplace Health Promotion Programs in Indian Corporate Sector","authors":"","doi":"10.35940/ijrte.f7885.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f7885.059120","url":null,"abstract":"The present study tries to investigate and analyze the key determinants that influence an employee’s intention regarding participation in Worksite Health Promotion programs in Indian Corporate Sector. The study also tries to find out the applicability and validity of theory of planned behavior (Ajzen, 1991) in explaining the behavior of employees in terms of participation in Worksite health promotion programs in the Indian Corporate Sector. The study adopts the primary survey to collect the responses of 256 sample respondents collected through online questionnaire survey from Indian industries. After assessing the reliability of the variables followed by variable extraction using principle component analysis, the responses are analyzed using ordinary least square method. The findings of the study suggest that three factors such as environment at workplace, influence of peers and personal beliefs play a significant role in affecting the employee’s participation in workplace health programs.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2419.059120
Inspection, Classification and localization of artificial vertebrae from random CT images is difficult. Normally vertebrates have a similar morphological appearance. Owing to anatomy and hence the subjective field of view of CT scans, the presence of any anchor vertebrae or parametric methods for defining the looks and form can hardly be believed. They suggest a robust and effective method for recognizing and localizing vertebrae that can automatically learn to use both the short range and long-range conceptual information in a controlled manner. Combine a fully convolutionary neural network with an instance memory that preserves information on already segmented vertebrae. This network analyzes image patches iteratively, using the instance memory to scan for and segment the not yet segmented primary vertebra. Every vertebra is measured as wholly or partly at an equal period. This study uses an over dimensional sample of 865 disc-levels from 1115 patients.
{"title":"Detection and Labeling of Vertebrae using Deep Learning","authors":"","doi":"10.35940/ijrte.a2419.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2419.059120","url":null,"abstract":"Inspection, Classification and localization of artificial vertebrae from random CT images is difficult. Normally vertebrates have a similar morphological appearance. Owing to anatomy and hence the subjective field of view of CT scans, the presence of any anchor vertebrae or parametric methods for defining the looks and form can hardly be believed. They suggest a robust and effective method for recognizing and localizing vertebrae that can automatically learn to use both the short range and long-range conceptual information in a controlled manner. Combine a fully convolutionary neural network with an instance memory that preserves information on already segmented vertebrae. This network analyzes image patches iteratively, using the instance memory to scan for and segment the not yet segmented primary vertebra. Every vertebra is measured as wholly or partly at an equal period. This study uses an over dimensional sample of 865 disc-levels from 1115 patients.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126773871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.f1229.059120
Egyptian researchers in the field of climatic changes and their effects on various sectors, such as agriculture, water resources, health and social usually operate one of the Global Circulation Models (GCMs) and rely on its results. They considered its results as facts and real and they study the impact without reference to the uncertainty in their results. This is a major drawback to study the effect of climate changes on different sectors since there is a persuasive variation in the results of different models. Therefore, the impact analysis may result in building policies and develop alternatives in a way that is related to the real situation of the area under study. It has been found that the best global model or recycling models for the case of Egypt must be neutralized. It is an imperative component for building future policies to study the impact of climate change properly. The current study focuses on assessing the results of GCMs in Egypt. Previous reviews showed that there is no study to address this issue on Egypt. Thus, the following methodology was followed. Forty GCMs in Coupled Model Inter-comparing Project (CMIP5), are analyzed for the variable’s precipitation and temperature. These GCMs were Evaluated for Egypt for the climate variable precipitation rate through dividing the entire Egypt area to 110 cells each cell is square 100 km x 100 km. The precipitation and temperature were evaluated through applying five performance indicators. These indicators are listed as follow: i) coefficient of correlation (CoC) , ii) normalized root mean (NRMSE), absolute normalized mean bias error (ANMBE), average absolute relative error (AARE) and skill score (SS).The Payoff matrix (40 GCMs versus 5 indicators) is developed and then the entropy technique for determination of the performance indicators’ weights is applied. The Normalization technique was applied for each season out of 4 seasons that are winter, spring, summer and autumn on the performance indicators. These weights are applied to assist for ranking the 40 GCMs. The Ranking of these GCMs were obtained through a multi-criterion decision-making outranking method (PROMETHEE-2). Finally, it is proven that the “MPI-ESM-LR” GCM is found to be the best model for predicting the climate change parameters, (precipitation and temperature), all over Egypt compared to the other 39 models. The MPI-ESM-LR GCM model is developed by the Max Planck Institute for Meteorology in Germany. It is recommended that the results of climate change projects for Egypt up until year 2100 has to apply the output results of the GCM named MPI-ESM-LR rather than other GCMs as long as it gives the most proper results for climate change projection of Egypt.
研究气候变化及其对农业、水资源、卫生和社会等各个部门影响的埃及研究人员通常使用全球环流模式(GCMs)之一,并依赖其结果。他们认为它的结果是事实和真实的,他们研究影响而不考虑结果中的不确定性。这是研究气候变化对不同部门的影响的一个主要缺陷,因为不同模型的结果存在令人信服的差异。因此,影响分析可能导致以与所研究地区的实际情况有关的方式制定政策和制定替代方案。已经发现,对于埃及的情况,最好的全球模式或回收模式必须被中和。正确研究气候变化的影响是制定未来政策的必要组成部分。目前的研究重点是评估埃及gcm的结果。先前的评论表明,在埃及没有研究解决这个问题。因此,采用了下列方法。对耦合模式比对项目(CMIP5)中40个gcm的降水和温度变量进行了分析。通过将整个埃及地区划分为110个单元,每个单元为100公里× 100公里的平方,对埃及的气候变量降水率进行了gcm评估。通过应用5个性能指标对降水和温度进行评价。这些指标列出如下:1)相关系数(CoC), 2)归一化均方根(NRMSE),绝对归一化平均偏差(ANMBE),平均绝对相对误差(AARE)和技能分数(SS)。开发了收益矩阵(40个gcm vs 5个指标),然后应用熵技术确定绩效指标的权重。对冬、春、夏、秋4个季节的业绩指标分别采用归一化方法。这些权重用于帮助对40个gcm进行排名。通过多准则决策排序法(promeee -2)对这些gcm进行排序。最后,与其他39种模式相比,“MPI-ESM-LR”模式是预测埃及全地区气候变化参数(降水和温度)的最佳模式。MPI-ESM-LR GCM模式是由德国马克斯普朗克气象研究所开发的。建议到2100年埃及气候变化项目的结果应采用MPI-ESM-LR GCM的输出结果,而不是其他GCM,只要它能给出最适合埃及气候变化预测的结果。
{"title":"Selection of the Optimum Global Circulation Model that Mimics the Circumstances of Egypt","authors":"","doi":"10.35940/ijrte.f1229.059120","DOIUrl":"https://doi.org/10.35940/ijrte.f1229.059120","url":null,"abstract":"Egyptian researchers in the field of climatic changes and their effects on various sectors, such as agriculture, water resources, health and social usually operate one of the Global Circulation Models (GCMs) and rely on its results. They considered its results as facts and real and they study the impact without reference to the uncertainty in their results. This is a major drawback to study the effect of climate changes on different sectors since there is a persuasive variation in the results of different models. Therefore, the impact analysis may result in building policies and develop alternatives in a way that is related to the real situation of the area under study. It has been found that the best global model or recycling models for the case of Egypt must be neutralized. It is an imperative component for building future policies to study the impact of climate change properly. The current study focuses on assessing the results of GCMs in Egypt. Previous reviews showed that there is no study to address this issue on Egypt. Thus, the following methodology was followed. Forty GCMs in Coupled Model Inter-comparing Project (CMIP5), are analyzed for the variable’s precipitation and temperature. These GCMs were Evaluated for Egypt for the climate variable precipitation rate through dividing the entire Egypt area to 110 cells each cell is square 100 km x 100 km. The precipitation and temperature were evaluated through applying five performance indicators. These indicators are listed as follow: i) coefficient of correlation (CoC) , ii) normalized root mean (NRMSE), absolute normalized mean bias error (ANMBE), average absolute relative error (AARE) and skill score (SS).The Payoff matrix (40 GCMs versus 5 indicators) is developed and then the entropy technique for determination of the performance indicators’ weights is applied. The Normalization technique was applied for each season out of 4 seasons that are winter, spring, summer and autumn on the performance indicators. These weights are applied to assist for ranking the 40 GCMs. The Ranking of these GCMs were obtained through a multi-criterion decision-making outranking method (PROMETHEE-2). Finally, it is proven that the “MPI-ESM-LR” GCM is found to be the best model for predicting the climate change parameters, (precipitation and temperature), all over Egypt compared to the other 39 models. The MPI-ESM-LR GCM model is developed by the Max Planck Institute for Meteorology in Germany. It is recommended that the results of climate change projects for Egypt up until year 2100 has to apply the output results of the GCM named MPI-ESM-LR rather than other GCMs as long as it gives the most proper results for climate change projection of Egypt.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-30DOI: 10.35940/ijrte.a2564.059120
Today's businesses are challenging what to call a new technological change. Technological advancements are going towards more enhanced internet-based method resolutions. This step is usually pointed to being Industry 4.0 and is supposed to hold the potential for new adaptable, independent products able to manage themselves. By modern technologies, nevertheless, there is additional demand for new skills and qualification demands on the workforce in the construction industry. Moreover, manufacturers or construction companies of today usually have obstacles with hiring newly qualified workers, particularly the younger one. Construction companies are looking to achieve Industry 4.0 would consequently have to maintain the development and education of existing workers while including attracting new workers. The paper objects are to explain what modifications that help achieve a sustainable of industry 4.0 in the construction industry, efficient and recognizing potential developments, understanding hazards connected with economics and supporting the simulation improvement.
{"title":"Emerging Challenges and Sustainability of Industry 4.0 Era in the Malaysian Construction Industry","authors":"","doi":"10.35940/ijrte.a2564.059120","DOIUrl":"https://doi.org/10.35940/ijrte.a2564.059120","url":null,"abstract":"Today's businesses are challenging what to call a new technological change. Technological advancements are going towards more enhanced internet-based method resolutions. This step is usually pointed to being Industry 4.0 and is supposed to hold the potential for new adaptable, independent products able to manage themselves. By modern technologies, nevertheless, there is additional demand for new skills and qualification demands on the workforce in the construction industry. Moreover, manufacturers or construction companies of today usually have obstacles with hiring newly qualified workers, particularly the younger one. Construction companies are looking to achieve Industry 4.0 would consequently have to maintain the development and education of existing workers while including attracting new workers. The paper objects are to explain what modifications that help achieve a sustainable of industry 4.0 in the construction industry, efficient and recognizing potential developments, understanding hazards connected with economics and supporting the simulation improvement.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122945623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}