Posts

Juniper Publishers Biometric Techniques: A Mini-Review

Image
Juniper Publishers - Open Access Journal of Engineering Technology Authored by :   Huang L Abstract Biometrics is the body measurement and statistical analysis of people's unique biological traits. It has been applied for identification and access control. This mini-review paper will provide you with comparison of the biometric technologies based on different biological traits for identification and authentication. In addition, this paper also discusses the challenge and controversy in the area of biometric person recognition. Abstract: Biometrics; Recognition; Security; Technology Introduction With the development of Engineering and Technology, it is becoming extremely important and critical to reduce the threats in privacy, personal safety and public security in 21 st century. Biometrics is the technology of measuring and analyzing biological data of human subjects involved for person authentication ...

Juniper Publishers Brief Industrial Networks Data Transfer Protocols Characteristics Analysis

Image
Juniper Publishers - Open Access Journal of Engineering Technology Authored by :   Vladlen Shapo Keywords Keywords: Industrial networks; Protocols; Tunnelling; Internet; Control Networks Abbreviations: IoT: Internet of Things; IIoT: Industrial Internet of Things; ACN: Architecture for Control Networks; AYIYA: Anything In Anything; CIP: Common Industrial Protocol; ODVA: Open Device Net Vendors Association; DNP3: Distributed Network Protocol Version 3 Opinion During last 5-7 years in industry, at the different kinds of transport, in energetic field, etc. are very actively implementing data exchange technologies between separate devices, device groups and networks. These technologies based on Industry 4.0 (4 th industrial revolution), IoT (Internet of Things), IIoT (Industrial Internet of Things) concepts. In accordance with these concepts a lot of different devices became smart, possessing of own CPUs, memory and dif...

Juniper Publishers Minimum Equipment List as a Mechanism of Motion in MIRCE Mechanics

Image
Juniper Publishers - Open Access Journal of Engineering Technology Authored by :  Knezevic J Abstract To avoid the loss of consumer trust, revenue or capability any disruption to a system's functionality is unacceptable to the providers, on one hand and also to their receivers, on the other. Consequently, every effort must be made to ensure the continuity of the provision of the system's functionality through calendar time. One of the methods used to minimise disruption to operational capability, especially in the aviation industry, was the creation of the Minimum Equipment List (MEL). This list identifies the equipment/components present into system that are not necessary to be operational for the safe provision of the functionality of the system, in accordance with the prescribed operational and maintenance restrictions, and approved by the regulatory authorities. Consequently, the main objective of this paper is to present the concept of the ME...

Juniper Publishers The State of the Art of Ground Motions Selection and Modification Methods for Response History Analysis

Image
Juniper Publishers Open Access Journal of Engineering Technology Authored by :  Seong Jin Ha Abstract The ground motions selection and modification is one of the most important process in whole procedure of seismic design or performance evaluation of structures. The purpose of the opinion paper is to introduce the trends in the ground motions selection and modification methods for response history analysis. In particular, monte-carlo simulation based approaches to consider ground motion correlation have been developed in recent year. In this paper, benefits, limitations, and alternatives to the methods are given. Keywords: Response history analysis; Ground motion selection; Monte-carlo simulation Introduction There are three well-used methods for evaluating structural responses (displacements, velocities, accelerations, stress etc.) under the seismic excitation - Equivalent static analysis, modal respon...

Juniper Publishers Tribological Behaviour of Strained Harden Commercially Pure Titanium with Nano Structured Diamond like Coatings

Image
Juniper Publishers - Open Access Journal of Engineering Technology Authored by :  Aqeel Abbas Abstract In this research, the tribological tests for coarse grained and variant surface prepared commercially pure Titanium (CP Ti) grade 4 were performed under plastic friction and elastic contact conditions. Coefficients of frictions were calculated for samples with and without coating in commercially pure Titanium-Tool Steel friction pair. After sever plastic deformation via equal channel processing, mechanical testing was performed for commercially pure Titanium with ultra-fine grains. Metallographic studies of coating applications were conducted for samples with ultra-fine grained structure. From the results it can be concluded that commercially pure Titanium grade 4 with Multi arc oxidation coatings presents less coefficient of friction and remains almost constant with increasing no of cycles. It was observed that strength of commercially pure Titanium is ...

Juniper Publishers A Methodology for the Refinement of Robots

Image
Juniper Publishers Open Access Journal of Engineering Technology Authored by :  Kate Lajtha Abstract Recent advances in ubiquitous algorithms and reliable algorithms are based entirely on the assumption that the Turing machine and write-ahead logging are not in conflict with replication. In fact, few leading analysts would disagree with the evaluation of sensor networks, which embodies the confusing principles of cyber informatics. We argue that Byzantine fault tolerance can be made classical, ubiquitous, and ambimorphic. Keywords: Robots; Evolutionary programming; Epistemologies; XML; Pasteurization Introduction Biologists agree that flexible epistemologies are an interesting new topic in the field of operating systems, and security experts concur. The influence on machine learning of this technique has been well-received. On a similar note, for example, many methodologies harness the simulation of 4 bit archit...