{"title":"Analysis of Urban TITEN EV-2 Car Chassis Design on Dynamic Loading When Brakes","authors":"","doi":"10.30534/ijeter/2023/061112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/061112023","url":null,"abstract":"In the race conditions of the Energy Saving Car Contest, urban concept vehicles must comply with the special rules that have been set, namely 'stop & go driving'. Therefore, the designed car must have the toughness to accelerate and decelerate safely. Chassis is a fundamental part of the vehicle that functions to support the overall load that works on the car, keeps the car's condition rigid, does not experience excessive deformation and is safe when used. For that chassis design planning must be considered. The selection of a strong but still lightweight material was carried out, using 6061 aluminum material. In this research, an analysis will be carried out on the design of the TITEN EV-2 car chassis. TITEN itself is the name of the Jember University research team that focuses on developing energy-efficient electric vehicles. In this study the analysis is focused on the chassis that experiences dynamic loading when braking with variations in the shape of the chassis profile, namely profiles in the shape of a square and hollow rectangle and the braking distance is varied. from 20m, 15m, 10m. By using the Finite Element Method (FEM), the strength analysis of the chassis structure design can be determined by looking at the maximum stress and total deformation acting on the chassis. From the simulation results, the rectangular hollow chassis profile has a mass of 7.6 kg which is lighter than the square hollow chassis which has a mass of 9.4 kg. Rectangular hollow chassis has a maximum stress that is superior to square hollow chassis at loading distances of 20 m and 15 m, but at a braking distance of 10 m, square hollow chassis is superior in terms of total deformation and maximum stress","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43029766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Comparison of Vehicle Mounted Wind Turbines","authors":"","doi":"10.30534/ijeter/2023/011112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/011112023","url":null,"abstract":"Electric vehicles (EVs) are gradually taking place of the conventional fossil fuel-based vehicles. However, popularity of EVs is hindered due to longer charging time and lower mileage. To address the mileage issue, in this paper we have proposed to use wind turbines to be mounted on vehicle, so that it can harness the wind energy to charge the batteries while the vehicle is in motion. We have designed two types of wind turbines: horizontal axis and vertical axis turbines and our analysis showed that vertical axis turbines provide better solution in extracting maximum wind power.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48303717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing Website Detection Using Ensemble Learning","authors":"","doi":"10.30534/ijeter/2023/031112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/031112023","url":null,"abstract":"Phishing is also the most common type of data breach. As a result, it is carried out by sending an email with links that lead to fraudulent websites. This technique is especially targeted to large companies. Usually, the attackers send emails with work-related information. Machine learning is one of the most successful techniques for detecting phishing. This paper analyzed the results of various machine learning techniques for predicting phishing websites. And also describes the various methods that are used to identify phishing websites. Some of these include the SVM classification method, Random Forest method, and AdaBoost method. Ensemble model that combines the SVM, Random Forest, and AdaBoost methods was able to classify a phishing site with an accuracy of 96%","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47231103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NegML: A Privacy-Preserving Machine Learning Approach Based on Negative Database","authors":"","doi":"10.30534/ijeter/2023/021112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/021112023","url":null,"abstract":"Machine learning has become an increasingly prominent subject in the age of big data. It has made significant advances in image identification, object detection, and natural language processing, among other areas. The initial aim of machine learning is to extract meaningful information from enormous amounts of data, which unavoidably raises privacy concerns. Numerous privacy-preserving machine-learning approaches have been presented so far. However, most of them suffer from significant improvements in efficiency or accuracy. A negative database (NDB) is a data representation that may safeguard data privacy by storing and exploiting the complementary form of original data. In this research, we provide NegML, a privacy-preserving machine learning approach based on NDB. Private data are first transformed to NDB before being fed into machine learning algorithms such as a Multilayer perceptron (MLP), Logistic regression (LR), Gaussian naive Bayes (GNB), Decision tree (DT), as well as Random forest (RF). NegML has the same computational complexity as the original machine learning algorithms without privacy protection. Experiment findings on heart illnesses, milk datasets, Car evaluation benchmark datasets and Blood fusion dataset show that the accuracy of NegML is equivalent to the original machine learning model in most circumstances, as well as the technique based on differential privacy.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42165898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of the Prevention and Detection of Cross Site Scripting Attack","authors":"","doi":"10.30534/ijeter/2023/051112023","DOIUrl":"https://doi.org/10.30534/ijeter/2023/051112023","url":null,"abstract":"As technology progresses, web based applications are becoming more vulnerable and threats to it’s security is increasing day by day. One of the ways by which an attacker can attack any web application is cross site scripting attack. The loop holes in a web based application can be exploited by a hacker in ways like, session-hijacking, cookie-stealing, malicious redirection etc. In this survey paper we focuses on the current XSS attack detection techniques and their limitations.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46779517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Improved 3D Radar charts for Multidimensional Data Visualization","authors":"","doi":"10.30534/ijeter/2022/0110122022","DOIUrl":"https://doi.org/10.30534/ijeter/2022/0110122022","url":null,"abstract":"The rapid growth of Technology is leading to the exploration of data at a very deep level. This has caused data to increase exponentially at very high rates increasing the complexity of the relation between them. Multidimensional data thus come into existence and multidimensional data visualization tools help to understand the complexity of the relationship between data efficiently. Radar charts being very simple, easy, and more understandable due to their ability to reduce the complexity of the relationship between data plays a very important role in visualization. But radar charts still contain a few limitations that are being analyzed during this work. Radar charts are significant in many applications thus the work proposes a design for an improved 3D version of the Radar chart that can solve the problem in existing radar charts and achieve benchmarking.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43597905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing a Hybrid method For Fake News Detection","authors":"","doi":"10.30534/ijeter/2022/0210122022","DOIUrl":"https://doi.org/10.30534/ijeter/2022/0210122022","url":null,"abstract":"The increasing consumption of news on social media platforms is mainly due to its cheap and attractive nature and it’s capable of spreading the fake news. The spread of fake news has negative effects on society. Some people make it up to get attention or gain political gain. Machine learning and deep learning techniques have been developed to detect fake news. However, they tend to generate inaccurate reports. To detect fake news, we used a Hybrid model that combines SVM and Naive Bayes (NBSVM) framework. It was able to classify the news with an accuracy of 84.85%. This model was tested and trained on a fake news challenge dataset. We used various evaluation metrics (precision, recall, F1- measure, etc.) to measure the model's efficiency","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45612673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biomechanics and Surface Activity in Simulated Body Fluid of Antibiotic Intramedullary Nail","authors":"","doi":"10.30534/ijeter/2022/0110112022","DOIUrl":"https://doi.org/10.30534/ijeter/2022/0110112022","url":null,"abstract":"Intramedullary nail continues to evolve with the introduction of new technologies as it is considered a gold standard in treating bone defects caused by disease, trauma and accidents which are evidently higher in developing countries like the Philippines. Recently, Philippine Orthopedic Center introduced the usage of Antibiotic Intramedullary Nails (ABIMN), a threaded stainless rod coated with antibiotic cement to treat infections that commonly occurs in bone defects. The product has been widely used, however, no biomechanical study was made to demonstrate and test the coronal bending, cyclic axial loading and chemical properties of the ABIMN. The researchers compared the biomechanical properties and surface activity when immersed in Simulated Body Fluid (SBF) of the Antibiotic Intramedullary Nail (ABIMN), Küntscher Intramedullary Nail (KIMN), and Intramedullary Nail with Interlocking screws (IMNIS). A total of 37 Intramedullary Nail (IMN) models were used for the biomechanical study, while the 4 remaining nails were used for the SBF immersion test. A very high positive correlation between bending rigidity and radius to the 4th power in ABIMN was found. Median Young’s modulus of elasticity on the other hand, significantly differs across the three groups. Further analysis showed that the median value was significantly lower in ABIMN compared to KIMN (p=0.0027) and IMNIS (p=0.0025) concluding that the ABIMN can be left for 6 weeks, with the patient on partial weight bearing up to 25% of an average 75kg man. The chemical properties of the ABIMN however, revealed that it is safe to use and has qualitatively comparable corrosion properties of KIMN when immersed in SBF. For easier removal of the ABIMN and after completion of both oral and IV antibiotics at 6 weeks post op; it still advisable to remove the ABIMN and perform exchange nailing at the said timeframe.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69214000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Control of industrial gantry crane model \"3D Crane\"","authors":"","doi":"10.30534/ijeter/2022/0310102022","DOIUrl":"https://doi.org/10.30534/ijeter/2022/0310102022","url":null,"abstract":"3D Crane represent Laboratory model of industrial gantry cranes which are widely used in industry. In this work, a dynamic model of 3D Crane is presented and tow artificial intelligence techniques were synthetized and applied to the model : Fuzzy Logic Control (FLC) and Adaptive Neural Fuzzy Inference System (ANFIS); the purpose of the control is the minimization of swing angles with continued reference trajectory in the three axes. A robustness test against external disturbance of the implemented controls was also apply. The results of the applied techniques are discussed.","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44568804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Transmission Scheme Using K-Means and Fuzzy Logic for IOT Sensor Based Forest Fire Detection System","authors":"","doi":"10.30534/ijeter/2022/0110102022","DOIUrl":"https://doi.org/10.30534/ijeter/2022/0110102022","url":null,"abstract":"Forest fires are natural disasters and effective mitigation of these fires require early warning systems. Deployment of sensors that are robust against environmental conditions, collection of sensor data in an energy efficient manner and at real time at the central server, and accurate detection of fire’s existence are all critical elements for implementing such systems. In this paper, we focus on second issue which is energy efficient routing of sensor data in a Internet-of-Things (IoT) sensor network that is deployed for forest fire detection. A Fuzzy-based Cluster Head selection technique for WSN in detecting forest fire is presented. In the proposed scheme, the nodes are divided into clusters using K-means clustering and then the cluster heads are determined by using a fuzzy logic scheme. Unlike traditional parameters, distance from the centroid and the remaining energy levels are used as parameters to select the cluster head. Simulation tool is used to implement the proposed technique. The simulation results suggest that the proposed cluster head selection approach outperforms the existing schemes","PeriodicalId":13964,"journal":{"name":"International Journal of Emerging Trends in Engineering Research","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42855727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}