{"title":"Line Follower with Obstacle Avoiding Robot","authors":"","doi":"10.30534/ijeter/2023/0311112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/0311112023","url":null,"abstract":"An intelligent robot called a \"line follower\" finds and follows a visible line that is embedded in the floor. The predetermined route can be seen as a black line on a white background with sharply contrasted colours. It can recognize the existence of an obstruction and select a different route to its destination. The robot that detects a line and tries to move in the direction of the target can be programmed to follow instructions. Different sensors can be used to detect the line. The robot can identify the path it needs to take using infrared sensors. The ultrasonic sensor is a device that can detect the obstacle by measuring the distance using sound waves and avoiding collision.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135187126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Monitoring Tools for Data Centre Downtime Reduction","authors":"","doi":"10.30534/ijeter/2023/0211112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/0211112023","url":null,"abstract":"This paper presents a new monitoring tool and event management method for data centre compute, network and storage infrastructure based on node event processing. The uptime of highly classified data centres are not only to be maintained at the highest level of reliability and availability of the operation, but also fast, specific event identification and rectification, which altogether improves availability of the resources is important. The new method, using a tree node for each element of the data centre resources provides information about the compute, network and storage file system configuration in a specific node. Its major advantage is that in our case where a large number of heterogeneous computers are present, it helps us in monitoring all the elements of the computer resources and gives information for alerting the associated work centres before any of the identified events that might occur. By monitoring and informing apriori to the concerned work centres the state of the systems, it lowers errors in data centre physical infrastructure operating costs, improving at the same time the level of operations efficiency. This method resulted that the use of tree nodes significantly reduces the number of unexpected events, the time needed for the main event identification, and the maintenance response time to events. By using event entities processing, multilayer nodes have a significant impact on the efficient operation of data centre physical infrastructure. In this paper, the design and development of two customised dashboards to monitor the compute, storage and network elements of the heterogeneous data centre for uptime maintenance and optimal performance is presented. The dashboards are designed, keeping in view the nature of tasks carried out and the resource requirements of various work centres in the data centre. One dashboard displays dynamically created icons for each of the compute resources in the data centre. On clicking any of the icon, complete details of the corresponding server is fetched showing the status, usage, configuration and available resources. Furthermore, a unique colouring scheme is followed wherein the icon is displayed green if the server is healthy and orange if the server is facing a resource crunch (disk, memory, etc.) and red if the server is not reachable. The dashboard GUI refreshes every 5 min (is configurable), displaying the latest status details of the servers in the data centre. The second Dashboard is developed with the capability to monitor the storage, cloud and network infrastructure components. The dashboard collects data from different elements of the storage i.e. Meta Data Servers, Storage, Core and Edge switches etc. and processes the collected data to a customized format for display. It delivers details like availability of Storage Meta Data Servers, switches and file systems, disk space capacity monitoring, file system backup status, Monitoring of the hierarchical Storage including Tape Libr","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" 24","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135186957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Budget Optimalization using ISO 31000 Risk Assessment Method","authors":"","doi":"10.30534/ijeter/2023/0511112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/0511112023","url":null,"abstract":"Cost is always associated with complexity and risk. Project that has high complexity increases the associated risks along with the costs. The article takes case study of a state-owned energy company, XYZ that builds electricity transmission projects around Indonesia. Transmission project has high complexity since it involves various expertise of contractors and subcontractors. Using subcontractors in a transmission project is a common thing and it poses many risks associated with the chain of contractors and her subcontractors. Indonesia is surrounded with variety of topology such as forests, mountains, rural areas, and islands, has variety of risks associated with them. The article proposes the use of ISO 31000 risk assessment method to identify dan mitigate all possible risks along with further budgeting policy. Budgeting policy is needed to assist the project owner to assess the scope of work of each work-breakdown task within the chain of contractors/subcontractors. By learning all costs within each task, project owner can develop effective cost measures that can be applied in various project conditions.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135187127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attendance Management Module for An Academic Department Using React Native Framework","authors":"","doi":"10.30534/ijeter/2023/0111102023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/0111102023","url":null,"abstract":"Attendance management is an aspect of academic institutions that directly impacts student engagement and performance. The proposed solution aims to streamline the attendance tracking process, enhance efficiency, and improve student-teacher interactions. By leveraging the cross-platform capabilities of React Native and the comprehensive features of Moodle, the attendance management module offers a user-friendly interface accessible through mobile devices. The system incorporates real-time attendance tracking, automated record-keeping. The research paper details the design considerations, technical implementation, and discusses the potential benefits and challenges of deploying such a solution. This research paper presents the design and implementation of an attendance management module for an academic department using the React Native framework with integrated Moodle","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135197533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Remote Access System by Interfacing ESP32 Microcontroller with 4X4 Keypad","authors":"","doi":"10.30534/ijeter/2023/0211102023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/0211102023","url":null,"abstract":"Remote access with a microcontroller refers to the capability to control and communicate with a system based on a microcontroller from a remote location. The paper discusses the creation of a reliable remote access and control system using the ESP32 microcontroller and a 4x4 keypad. This system blends ease of use with robust security measures. With the increasing demand for secure access control solutions, this system makes a significant contribution to the realm of IoT-based authentication systems. Future endeavors may encompass scalability testing, integration with other biometric authentication methods, and additional refinements to expand its applicability","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135199972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Brief Review of Rehabilitation Wearable Robots for the Upper and Lower Limbs","authors":"","doi":"10.30534/ijeter/2023/021192023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/021192023","url":null,"abstract":"Many diseases, such as stroke, physical disability in the elderly, work injuries, and sports injuries can lead to weak limbs. Stroke is one of the main reasons for long-range disability, especially upper limb disability, that affects the activities of daily living (ADL) of individuals. Rehabilitation, such as manually assisted training or physical therapy that involves repeatedly moving the affected limb, is one of the most successful ways to reduce the effects of stroke. However, patients may be prevented from attending a clinic for rehabilitation for many different reasons, so researchers have developed robotic devices that can help in rehabilitation, enabling patients to perform repetitive movements at home with appropriate accuracy. These wearable robots (WR) must be smart, reliable, compatible, light, and functional for the safety of the user and must provide the appropriate support. This paper describes wearable devices, including rigid wearable devices and soft wearable devices, and some of their uses, especially in rehabilitation. It presents a summary of the designs used for the rehabilitation of the lower and upper limbs, especially the hand, which is the organ that is used most often in daily activities. The materials used in the manufacture of gloves that are used to rehabilitate the hand must be taken into account, and the size and weight of the glove must be suitable so that the user can wear and remove it easily.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136362484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Obstacle Avoidance Technique for Mobile Robot Navigation Using Deep Reinforcement Learning","authors":"","doi":"10.30534/ijeter/2023/031192023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/031192023","url":null,"abstract":"In the realm of mobile robotics, navigating around obstacles is a fundamental task, particularly in constantly changing situations. Although deep reinforcement learning (DRL) techniques exist that utilize the positional information of robot’s, environmental states, and input dataset for neural networks. Although, the positional information alone does not provide sufficient insights into the motion trends of obstacles. To solve this issue, this paper presents a dynamic obstacle mobility pattern approach for mobile robots (MRs) that rely on DRL. This method employs the positional details of dynamic obstacles dependent upon time for establishing a movement trend vector. This vector, in conjunction with another mobility state attribute, forms the MR mobility guidance matrix, that essentially conveys the pattern variation of dynamic obstacles trend over a specified interval. Using this matrix, the robot can choose its avoidance action. Also, this methodology uses the DRL-based dynamic policy algorithm for the testing and validation of the proposed technique through Python programming. The experimental outcomes demonstrate that this technique substantially improves the safety of avoiding dynamic obstacles","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136362487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Deduplication Technique for Data in the Cloud","authors":"","doi":"10.30534/ijeter/2023/011192023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/011192023","url":null,"abstract":"The tremendous growth of digital data in cloud storage systems is a critical issue, as many duplicate data in storage systems cause extra load. Cloud Service Providers (CSPs) often employ Data Deduplication techniques to eliminate redundant data and store only one copy of data to save storage space and reduce transmission costs. Data Deduplication is mostly effective when multiple clients outsource the same data to cloud storage, but it raises security and ownership issues. This paper proposes a secure, Proof of Ownership (PoW)-based Data Deduplication scheme that has a low communication overhead and ensures that only valid cloud clients can download and decrypt ciphertext from cloud storage. The Advanced Encryption Standard (AES) is used as the encryption algorithm in the proposed scheme. It utilizes two modes of AES encryption, namely, Cipher Block Chaining (CBC) and Galois Counter Mode (GCM), with single-threading and multi-threading to upload and download ciphertext between the client and the server to measure the effect of upload and download times. We present a new approach for PoW to reduce communication overhead. PoW enables owners of the same data to prove to the cloud server that they own the data in a robust way. The comparison between CBC and GCM is implemented in a Java environment with two scenarios: single-threading and multi-threading. The simulation results show that AES-GCM with multi-threading is better during the uploading and downloading times","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136362485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Direct Synthesis scheme based PID controller design for Boost Converter","authors":"","doi":"10.30534/ijeter/2023/051182023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/051182023","url":null,"abstract":"This study's aim is to provide an introduction toa specific methodology for optimizing the design of a boost converter. The main goal of this optimization is to determine the best inductor and capacitor parameter values in order to reduce output voltage ripple, maximize efficiency, and minimize output voltage deviation. In addition, a PID control approach is employed to regulate the boost converter's output voltage using the Direct Synthesis tuning method. The simulation's outcomes indicate that the proposed approach significantly enhances the performance of the boost converter and attains maximum efficiency. This methodology and control strategy can be applied to various boost converter applications to achieve stable and optimal performance.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42460023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Study of Fluid Mixture Characteristics at 90° Angles with Variations of Standard Wall Functions on the k-ε Turbulence Model","authors":"","doi":"10.30534/ijeter/2023/031182023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/031182023","url":null,"abstract":"A numerical study has been carried out to determine the characteristics of fluid mixtures with different temperatures at 90° angles using ANSYS Fluent Computational Fluid Dynamics (CFD). The variation of the turbulence model used is k-ε, which is standard, RNG, and Realizable with the Near Wall Treatment method of Standard Wall Functions. The simulation domain is 90° angled with 2 perpendicular inputs and one output. The first step is to do a grid independence analysis with different mesh variations to get a proportional mesh. The research object is focused on section 6 with a distance of 35 cm before the flow output or located at 105 cm from the coordinate center. Validation was carried out by comparing temperature and velocity magnitude in research from S.N. Sridhara in section 6. It was found that the standard k-ε turbulence model was the best compared to the other variations. This gives a good idea of the distribution and flow behavior of the fluid which can be used for efficient elbow design.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44754911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}