Design and Production of a Paper Shredding Machine
Journal Title: Engineering and Technology Journal - Year 2024, Vol 9, Issue 05
Abstract
There are countless cases of cooperate and government espionage, identity theft, sensitive information leaks. This all led to the need for government agencies, private and public institutions and even private individuals to protect their sensitive information and prevent it from falling into the wrong hands. The act of discarding whole, readable documents containing sensitive information poses huge risks to an individual or organization, as these documents can be retrieved from a trash bin and the information they contain easily accessed. This has led to a number of identity theft cases, where a crime is committed using the information of an unsuspecting individual. Although advancements in information technology have resulted in electronic transmission and storage of information, a good number is still communicated via paper. This newly designed paper shredding machine utilized chain and sprocket in the power transmission which offers a high transmission efficiency unlike some paper shredding machines that used belt and pulley which cause slip and transmission losses. The machine architecture is very compact with ergonomically suitable features, and the performance is high. The shredding efficiency was 94%.Improvement on further work to improve the shredding efficiency is required.
Authors and Affiliations
W. A. Akpan,I. I. Nyaudo,E. S. Umana, W. I. Dawson, S. I. Bassey,
Optimizing Outdoor Advertising: A Case Study on the Economic and Technical Viability of Solar-Powered Billboards
This paper presents a comprehensive analysis of implementing solar photovoltaic (PV) systems for billboard lighting, with a focus on technical design, economic feasibility, and sustainability. Traditional billboard light...
Synergistic Evaluation of Computer Network Security Using Attack Graphs and Security Event Processing
This study presents an intricate evaluation framework for enhancing computer network security through converging attack graph analysis and security event processing (SEP). The researchers construct a comprehensive method...
The Network Security in Wireless Sensor Networks: A Review
Wireless Sensor Networks (WSN) is an innovative technology predicts to be used ever more in the next to future due to their data achievement and data processing capability. Security for WSN requires to be considered in o...
Systematic Mapping of Methodologies Used for the Validation of Models and Scales Derived From e-SQ
Electronic Service Quality (e-SQ) is a topic that has been reviewed by several authors and, given the situation we live in, has become more relevant in the world; therefore, it is of vital importance to generate an effec...
SMART SAFE USING FACE DETECTION METHOD ESP32 CAM
Currently crime cases are undeniable, one of the cases of crime or crime that often occurs in our lives is theft, the role of technology has an important role in the security system, one of which is the security system i...