International Journal of Engineering Research and Advanced Technology最新文献

筛选
英文 中文
Tensile Properties Analysis of Aluminum Reinforced with Hematite Particulate Composites 赤铁矿颗粒增强铝复合材料的拉伸性能分析
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/IJERAT.2019.3453
D. Sureshkumar
{"title":"Tensile Properties Analysis of Aluminum Reinforced with Hematite Particulate Composites","authors":"D. Sureshkumar","doi":"10.31695/IJERAT.2019.3453","DOIUrl":"https://doi.org/10.31695/IJERAT.2019.3453","url":null,"abstract":"ABSTRACT In the present paper, the report has been made to study the tensile properties of Aluminum composites reinforced with hematite. The percentage of reinforcement varies from 0, 2, 4, 6 and 8 percent. The specimens were prepared using the vertex method. As the weight percentage of hematite is increased, there is an increase of tensile strength along with Young's modulus, but the ductility has been decreased with the addition of hematite. The reinforcement particle size and the casting temperature is also an important parameter of study for mechanical strength. The initiation and propagation of crack through the matrix is observed. Fracture behavior greatly affected by reinforcement.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134445266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Lean Six Sigma Approach to Reduce Worker Fatigue in Racking AreasUsing DMAIC, VSM, FMEA and ProModelSimulation Methods in Sub Logistic Companies: A Case Study of Indonesia 基于DMAIC、VSM、FMEA和ProModelSimulation方法的精益六西格玛方法在子物流公司货架区减少工人疲劳的应用——以印尼为例
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2021.3716
Jakfat Haekal
{"title":"Application of Lean Six Sigma Approach to Reduce Worker Fatigue in Racking AreasUsing DMAIC, VSM, FMEA and ProModelSimulation Methods in Sub Logistic Companies: A Case Study of Indonesia","authors":"Jakfat Haekal","doi":"10.31695/ijerat.2021.3716","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3716","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133266937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Subject Review: Cloud Computing Security Based on Cryptography 主题综述:基于密码学的云计算安全
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2019.3569
Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa
{"title":"Subject Review: Cloud Computing Security Based on Cryptography","authors":"Amal Abdulbaqi Maryoosh, R. S. Mohammed, Raniah Ali Mustafa","doi":"10.31695/ijerat.2019.3569","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3569","url":null,"abstract":"ABSTRACT The cloud computing providing to users and companies many services and facilities such as less cost, availability and risk management. The services of cloud computing are delivered in pay per usage way and on-demand and it can store huge amount of data. But the security concern is the main reason that makes companies afraid of using cloud computing and store their data on cloud servers. In this paper, we try to review and describe many encryption methods that used to protect data which stored in cloud computing and make a comparison among these methods.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental Study of the Impact of Particle Packing Density Optimization on Strength and Water Absorption Properties of Concrete 颗粒充填密度优化对混凝土强度和吸水性能影响的试验研究
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2019.3387
Egbe King James Idala
{"title":"Experimental Study of the Impact of Particle Packing Density Optimization on Strength and Water Absorption Properties of Concrete","authors":"Egbe King James Idala","doi":"10.31695/ijerat.2019.3387","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3387","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126195765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Tags Positioning Algorithm using ESP8266 NODEMCU System 基于ESP8266 NODEMCU系统的多标签定位算法
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2019.3552
El Abkari Safae, E. Jamal
{"title":"Multiple Tags Positioning Algorithm using ESP8266 NODEMCU System","authors":"El Abkari Safae, E. Jamal","doi":"10.31695/ijerat.2019.3552","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3552","url":null,"abstract":"ABSTRACT The emergence of the Internet of things (IoT) shaped the future of many domains where connectivity became a hot topic in electronic engineering. Recently, IoT was being a part of Indoor positing systems where devices need to communicate continuously at a defined time slot leading to various problematics for the conventional positioning algorithm. We propose an ESP8266 NodeMCU tracking system of multiple tags using a Wireless communication. The proposed implemented algorithm consists of two-phase in the first stage, a master anchor sends a signal to tags in order to establish the communication. In the second one, the master anchor initiates distance ranging and positioning. This two-phase based system aims to minimize reading time and increase the accuracy of positioning by reducing distance ranging errors, which we validate in our proposed model and algorithm by an experiment in an indoor environment.","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Planning of Heavy Equipment Fabrication Plant Layout using CORELAPSoftware: A case study of Indonesia 基于CORELAPSoftware的重型设备制造工厂布局规划——以印尼为例
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2021.3720
Bethriza Hanum
{"title":"Planning of Heavy Equipment Fabrication Plant Layout using CORELAPSoftware: A case study of Indonesia","authors":"Bethriza Hanum","doi":"10.31695/ijerat.2021.3720","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3720","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129766149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SMART COMPUTING 智能计算技术
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2018.3458
Matthew N. O. Sadiku, Yu Zhou, Sarhan M. Musa
{"title":"SMART COMPUTING","authors":"Matthew N. O. Sadiku, Yu Zhou, Sarhan M. Musa","doi":"10.31695/ijerat.2018.3458","DOIUrl":"https://doi.org/10.31695/ijerat.2018.3458","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127651650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilingual Text Summarization using Deep Learning 使用深度学习的多语言文本摘要
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2021.3712
Rana Talib AlTimimi, Fatma Hassan AlRubbiay
{"title":"Multilingual Text Summarization using Deep Learning","authors":"Rana Talib AlTimimi, Fatma Hassan AlRubbiay","doi":"10.31695/ijerat.2021.3712","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3712","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124437909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Fingerprint Recognition Technique Applying Minutiae Extractors and Neural Network 基于细节提取和神经网络的鲁棒指纹识别技术
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2019.3402
Aung Kyaw Oo, Zaw Linn Aung
{"title":"A Robust Fingerprint Recognition Technique Applying Minutiae Extractors and Neural Network","authors":"Aung Kyaw Oo, Zaw Linn Aung","doi":"10.31695/ijerat.2019.3402","DOIUrl":"https://doi.org/10.31695/ijerat.2019.3402","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Method of Image Encryption By using Scrambling and Slant Transform 基于置乱和倾斜变换的图像加密方法
International Journal of Engineering Research and Advanced Technology Pub Date : 1900-01-01 DOI: 10.31695/ijerat.2021.3733
Sally Ali Abdulateef
{"title":"Method of Image Encryption By using Scrambling and Slant Transform","authors":"Sally Ali Abdulateef","doi":"10.31695/ijerat.2021.3733","DOIUrl":"https://doi.org/10.31695/ijerat.2021.3733","url":null,"abstract":"","PeriodicalId":424923,"journal":{"name":"International Journal of Engineering Research and Advanced Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131265305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信