Pub Date : 1900-01-01DOI: 10.31695/IJERAT.2019.3453
D. Sureshkumar
ABSTRACT In the present paper, the report has been made to study the tensile properties of Aluminum composites reinforced with hematite. The percentage of reinforcement varies from 0, 2, 4, 6 and 8 percent. The specimens were prepared using the vertex method. As the weight percentage of hematite is increased, there is an increase of tensile strength along with Young's modulus, but the ductility has been decreased with the addition of hematite. The reinforcement particle size and the casting temperature is also an important parameter of study for mechanical strength. The initiation and propagation of crack through the matrix is observed. Fracture behavior greatly affected by reinforcement.
{"title":"Tensile Properties Analysis of Aluminum Reinforced with Hematite Particulate Composites","authors":"D. Sureshkumar","doi":"10.31695/IJERAT.2019.3453","DOIUrl":"https://doi.org/10.31695/IJERAT.2019.3453","url":null,"abstract":"ABSTRACT In the present paper, the report has been made to study the tensile properties of Aluminum composites reinforced with hematite. The percentage of reinforcement varies from 0, 2, 4, 6 and 8 percent. The specimens were prepared using the vertex method. As the weight percentage of hematite is increased, there is an increase of tensile strength along with Young's modulus, but the ductility has been decreased with the addition of hematite. The reinforcement particle size and the casting temperature is also an important parameter of study for mechanical strength. The initiation and propagation of crack through the matrix is observed. Fracture behavior greatly affected by reinforcement.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134445266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2021.3716
Jakfat Haekal
{"title":"Application of Lean Six Sigma Approach to Reduce Worker Fatigue in Racking AreasUsing DMAIC, VSM, FMEA and ProModelSimulation Methods in Sub Logistic Companies: A Case Study of Indonesia","authors":"Jakfat Haekal","doi":"10.31695/ijerat.2021.3716","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3716","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133266937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2019.3569
Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa
ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.
{"title":"Subject Review: Cloud Computing Security Based on Cryptography","authors":"Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa","doi":"10.31695/ijerat.2019.3569","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3569","url":null,"abstract":"ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2019.3387
Egbe King James Idala
{"title":"Experimental Study of the Impact of Particle Packing Density Optimization on Strength and Water Absorption Properties of Concrete","authors":"Egbe King James Idala","doi":"10.31695/ijerat.2019.3387","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3387","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2019.3552
El Abkari Safae, E. Jamal
ABSTRACT The emergence of the Internet of things (IoT) shaped the future of many domains where connectivity became a hot topic in electronic engineering. Recently, IoT was being a part of Indoor positing systems where devices need to communicate continuously at a defined time slot leading to various problematics for the conventional positioning algorithm. We propose an ESP8266 NodeMCU tracking system of multiple tags using a Wireless communication. The proposed implemented algorithm consists of two-phase in the first stage, a master anchor sends a signal to tags in order to establish the communication. In the second one, the master anchor initiates distance ranging and positioning. This two-phase based system aims to minimize reading time and increase the accuracy of positioning by reducing distance ranging errors, which we validate in our proposed model and algorithm by an experiment in an indoor environment.
{"title":"Multiple Tags Positioning Algorithm using ESP8266 NODEMCU System","authors":"El Abkari Safae, E. Jamal","doi":"10.31695/ijerat.2019.3552","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3552","url":null,"abstract":"ABSTRACT The emergence of the Internet of things (IoT) shaped the future of many domains where connectivity became a hot topic in electronic engineering. Recently, IoT was being a part of Indoor positing systems where devices need to communicate continuously at a defined time slot leading to various problematics for the conventional positioning algorithm. We propose an ESP8266 NodeMCU tracking system of multiple tags using a Wireless communication. The proposed implemented algorithm consists of two-phase in the first stage, a master anchor sends a signal to tags in order to establish the communication. In the second one, the master anchor initiates distance ranging and positioning. This two-phase based system aims to minimize reading time and increase the accuracy of positioning by reducing distance ranging errors, which we validate in our proposed model and algorithm by an experiment in an indoor environment.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2021.3720
Bethriza Hanum
{"title":"Planning of Heavy Equipment Fabrication Plant Layout using CORELAPSoftware: A case study of Indonesia","authors":"Bethriza Hanum","doi":"10.31695/ijerat.2021.3720","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3720","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129766149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2018.3458
Matthew N. O. Sadiku, Yu Zhou, Sarhan M. Musa
{"title":"SMART COMPUTING","authors":"Matthew N. O. Sadiku, Yu Zhou, Sarhan M. Musa","doi":"10.31695/ijerat.2018.3458","DOIUrl":"https://doi.org/10.31695/ijerat.2018.3458","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2021.3712
Rana Talib AlTimimi, Fatma Hassan AlRubbiay
{"title":"Multilingual Text Summarization using Deep Learning","authors":"Rana Talib AlTimimi, Fatma Hassan AlRubbiay","doi":"10.31695/ijerat.2021.3712","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3712","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2019.3402
Aung Kyaw Oo, Zaw Linn Aung
{"title":"A Robust Fingerprint Recognition Technique Applying Minutiae Extractors and Neural Network","authors":"Aung Kyaw Oo, Zaw Linn Aung","doi":"10.31695/ijerat.2019.3402","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3402","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.31695/ijerat.2021.3733
Sally Ali Abdulateef
{"title":"Method of Image Encryption By using Scrambling and Slant Transform","authors":"Sally Ali Abdulateef","doi":"10.31695/ijerat.2021.3733","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3733","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}