SUPPLY CHAIN MODELING WITH UNCERTAINTY IN DEMAND AND SUPPLY USING FUZZY LOGIC |
Author : Chidurala Srinivas |
Abstract | Full Text |
Abstract :In this paper, we have analyzed a serial operational level Supply Chain
Performance like fill rate, Build –To - Stock etc., under an uncertainty environment
for the optimality using a stochastic customer order. It evaluates minimum cost in
supply chain, simultaneously optimize quantitative decision variables and illustrates
the significance of capacity variable. Numerical examples are presented to illustrate
the benefit of the proposed strategies and the effects of changes on the cost and
parameters are studied.
|
|
ALERTING SYSTEM FOR MEDICINE DISPENSING |
Author : Kumaravelu. R, Anmol Jain, Rahul Trivedi, Srishti, Vidya and Anuraag Sakxena |
Abstract | Full Text |
Abstract :It is an alerting system for medicine which helps disabled people are unable to take
their medicine on time. This project is helpful for those who are lazy and forgets to take
medicine on time. Buzzer will irritate them to take medicine on time. Authenticity is
given in the project hence no other unauthorized person can take the medicine, hence
medicine cannot go in wrong hands. As the project helps people to take medicine on
time, the people will remain more healthy and life expectancy will increase |
|
TUNING THE OPTICAL AND MECHANICAL PROPERTIES OF Y2O3 CERAMICS BY THE INCLUSION OF La 3+ ION IN THE MATRIX FOR INFRARED TRANSPARENT WINDOW APPLICATIONS |
Author : Mathew C.T |
Abstract | Full Text |
Abstract :Infrared transparent windows are generally used to protect highly delicate
infrared sensor circuits from the harsh environments. In the present work a
combustion technique was effectively used to incorporate La3+ ion in the yttria matrix.
The crystallites were in the size limit of 20 nm. Powder characterization using X-ray
diffraction, HRTEM and FTIR spectroscopy revealed that the La3+ ions were
effectively replacing the Y3+ ion in the yttria matrix. There was a slight reduction in
optical band gap with La3+ concentration. A novel sintering mechanism was used for
sintering the samples by coupling definite proportions of resistive heating and
microwave heating. The highly dense pellets showed better transmittance and
hardness properties, which improved with La3+concentration. The present study
authorises that combustion synthesis of the samples followed by resistive coupled
microwave sintering can effectively be used to tune the optical and mechanical,
properties of infrared transparent ceramics. Improving the transmittance properties
without deteriorating the mechanical properties through the resistive coupled
microwave sintering is the major highlight of this novel work. |
|
STRUCTURAL COST COMPARISON OF LOW RISE BUILDING HAVING MOMENT RESISTING FRAMES AND MOMENT RESISTING FRAMES WITH SHEAR WALL FOR DIFFERENT SCIESMIC ZONES: CASE STUDY |
Author : Mukesh Gordhandas Bagani |
Abstract | Full Text |
Abstract :In Bhuj earthquake 2001, there were collapses of many low rise buildings. After a
very severe seismic shaking, it may be far cheaper to repair, or even rebuild the
damaged structure, than to build a no damaged structure in the first place. With the
help of shear walls the structure can be made which will not collapse in earthquake. It
is general perception in minds of people that shear walls are economical for high rise
buildings. Therefore it is necessary to find out cost efficiency of low rise buildings
with shear walls. |
|
NUMERICAL ANALYSIS OF ELEVATED FRAMED STAGING SHALLOW TANK BY NEWMARK’S STEP-BY-STEP METHOD |
Author : Dr. Pravin B.Waghmare |
Abstract | Full Text |
Abstract :Water tank is a life line structure, are extensively used in water supply facilities,
oil, gas and nuclear power plants, for storage of variety of liquid material, e.g. Oil,
LNG.Due to earthquake critical damage to elevated R. C. C. tanks are found. In the
present work, a 50 m3 water tank has been analyzed for x-direction earthquake ground
motion for fixed and an isolation system (Elastomeric bearing) is used to reduce the
behavior of the basic response e.g. base shear, time period, tower drift, flexibility, of
the elevated R. C. C. tanks. For solving complicated equation of motion for a coupled
analysis a Newmark’s step by step iteration method is used. After detailed analysis of
50 kL water tank, due to isolation base shear reduced significantly and the sloshing
displacement increases as compared to non-isolated tank, also increase in isolation
period from 2 sec to 4 sec, base shear reduced significantly |
|
BIOMETRIC BASED ATTENDANCE REGISTRATION AND CONSOLIDATION SYSTEM USING RASPBERRY PI3 AND AMAZON WEB SERVER |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :Conventionally, in schools and colleges, attendance is taken by the teacher by
calling students names or roll numbers, mark his or hers presence or absence in the
attendance register. Later attendance is fed into a computer and the attendance
percentage is calculated using software in offline mode. This method is time
consuming and also requires more man power. In this project, a portable Biometric
based Attendance Registration and Consolidation System (BARCS) using Raspberry
Pi3 and Amazon Web Server is developed. This handheld biometric attendance
registration device can be carried by the teacher to the classroom to register the
student’s attendance of a particular session through circulation among students. At
the end of a session, attendance data gets stored in a database in the Raspberry Pi
computer. Then, Pi computes the subject wise attendance percentage and sends it to
the Amazon web server for uploading on the developed webpage. The user can view
the subject wise attendance by accessing the webpage. Also an SMS is sent to the
students mobile when their attendance gets registered. The developed system is
intended for programmes wherein students have to meet the minimum attendance
requirements in each subject of the programme in a particular semester/year |
|
RASPBERRY PI BASED POLLUTION AND CLIMATE MONITORING SYSTEM USING INTERNET OF THINGS |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :In recent years pollution and global warming have increased rapidly. Air and sound
pollution is more in urban areas as compared to rural areas due to denser vehicular
traffic and rapid industrialization. Air pollution causes long term health effects like lung
cancer and heart diseases, and also it causes short term health issues such as
headaches, eye infections and throat infection. Air pollution increases the temperature
of the Earth’s atmosphere which results in global warming. Hence it is necessary to
monitor the various climate and pollution parameters such as temperature, humidity,
atmospheric pressure, sound, toxic content of hazardous gases, and light intensity. As
we need to know the location of the data, we also normally measure the latitude and
longitude of the place. In this paper, a pollution and climate monitoring system is
developed which can measure the above parameters at regular intervals using
appropriate sensors and uploads them on to the webpage using Internet of Things (IoT)
technology. The webpage is developed using HTML and PHP. Raspberry Pi3 computer
is the central component used for data collection from the sensors and uploading
parameters on to the webpage. Python language is used development of the software
code. The uploaded pollution and climate parameters of a particular place can be
viewed by logging on to the webpage from anywhere in the world. |
|
WEB BASED SMART IRRIGATION SYSTEM USING RASPBERRY PI |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :The major population of India mainly depends upon Agriculture. Nowadays the
ground water levels are also decreased due to global warming and uncertain rain fall.
The conventional irrigation techniques have some problems like farmer should visit
the field regularly even at night, then he may face some hazards like snake bite,
electric shock and etc. In this paper a web based smart irrigation system using
Raspberry Pi is implemented. The proposed system checks the temperature and
moisture content present in the soil. The motor is also automatically controlled ON
and OFF, when the 3-phase supply is present in the field and also with the flow of
water. The acquired temperature and moisture content of the soil are sent to
Raspberry Pi using nRF24L01 transceiver. Raspberry Pi posts the received values on
the webpage. When we enter the acquired parameter values in the soil test blogs, the
webpage shows the suggestions of pesticides and crops that need to be taken by the
farmer to increase the yield. The system can reduce the water consumption and
wastage of water |
|
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHOD |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr K.Anitha Sheela and Syed Shaker Hussaini |
Abstract | Full Text |
Abstract :In any WSN life of network is depending on life of sensor node. Thus, proper load
balancing is very useful for improving life of network. The tree-based routing protocols
like GSTEB used dynamic tree structures for routing without any formation of
collections. In cases of larger networks, the scheme is not always feasible. In this
proposed work cluster-based routing method is used. Cluster head is selected such that
it should be close to the base station and should have maximum residential energy than
other nodes selected for cluster formation. Size of cluster is controlled by using locationbased cluster joining method such that nodes selects their nearest collection head based
on the signal strength from cluster head and distance between node and cluster head.
Nodes connect to head having the highest signal strength and closest to the base station,
this minimizes size of cluster and reduces extra energy consumption. In addition to this
cluster formation process starts only after availability of data due to an event. So
proposed protocol performs better than existing tree based protocols like GSTEB in
terms of energy efficiency |
|
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS |
Author : Syeda Gauhar Fatimav, Syeda Kausar Fatima, Mohd. Mehrajuddin and Saquib Mohiuddin |
Abstract | Full Text |
Abstract :Due to inherent limitations in wireless sensor networks, security is a crucial issue.
While research in WSN security is progressing at tremendous pace, no comprehensive
document lists the security issues and the threat models which pose unique threats to
the wireless sensor networks. In this paper we have made an effort to document all the
known security issues in wireless sensor networks and have provided the research
direction towards countermeasures against the threats posed by these issues. |
|
DESIGNING THE IOT BASESTATION FOR GREENHOUSE MONITORING |
Author : Syeda Gauhar Fatima, Syeda Kausar Fatima and Mohd. Mehrajuddin |
Abstract | Full Text |
Abstract :This article put forward a technique to realize the communication between wireless
sensor network and the Internet. The IOT (Internet of Things) gateway is used as part
of the greenhouse checking system. The design well-matched multiple access method
such as LAN, Wifi, GPRS, EDGE, 3G and so on, also the data can be deposited locally.
The IOT gateway uses STM32 as the MCU, µC/OS-III as the embedded operating
system. The application demonstrates the gateway is trustworthy, compatible, and
extendible. Because of this gateway the greenhouse monitoring system realized the realtime detection and control of the greenhouse, and enhance the ability of the automation
and the smartness of the greenhouse monitoring |
|
A SURVEY ON IOT TECHNOLOGY |
Author : Syeda Gauhar Fatima, Syeda Kausar Fatima and Dr.K.Anitha Sheela |
Abstract | Full Text |
Abstract :Internet of Things (IOT) has provided an opportunity to construct powerful
industrial system and applications by leveraging the increasing ubiquity of RFID,
wireless, mobile and sensor devices. Various industrial IOT applications have been
progressively developed and deployed in recent years. Now-a-days, modifying and
monitoring plays a main role in our day to day life. Everything we can monitor and
control using innovative technologies. Remote access is a ideal feature that came
because of high speed internet. The main objective of suggested system is to deliver a
technology oriented and low-cost system to make an advanced industry for those who
away from their industry and want to control devices |
|
HOME AUTOMATION SYSTEM WITH WSN AND IOT |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali, Naseer Ahmed Khan and Syed Adil |
Abstract | Full Text |
Abstract :Nowadays there is a brief usage and dependability of pulsating features of the smart
devices. So there is a need of connecting these devices through internet to explore their
functionality. In the world of Smart homes there exists different systems but failed to
provide many functionalities like controlling the devices remotely, overhead in
communication, and energy efficiency. This paper delivers the solution to the constraint
of the existing systems. The monitoring and controlling of smart organized homes
environmental and safety parameters a Wi-Fi based WSN system is designed. A
lightweight MQTT protocol is used for interactions between devices and user. The user
can flawlessly control and monitor the devices via Android Application using a
Graphical User Interface (GUI) remotely. |
|
ENHANCEMENT OF ELECTRICAL ENERGY EFFICIENCY BY “INTERNET OF THINGS” |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr k. Anitha Sheela, Naseer Ahmed Khan and Syed Adil |
Abstract | Full Text |
Abstract :This paper goals at studying the place and possible contribution of “Internet of
Things” (IoT) in the context of the EU’s ambitious climate and energy targets for 2020.
Using qualitative procedure, we are mainly concentrating on Demand Side
Management (DSM) as an effective method in balancing the load of Electrical
Distribution Networks.
The role of IoT in DSM is to enable and enhance electrical energy peak demand
reduction and its maximum uniform time-distribution achieved through society’s ecoeducation.
Using computational tools such as Data Mining and Recommender System we can
achieve results at the level of electrical energy distribution network reflected in peak
reduction and its uniform time distribution. |
|
HOME AUTOMATION USING ZIGBEE TECHNOLOGY AND IOT |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Syed Adil and Khaja Fouzan Ahmed |
Abstract | Full Text |
Abstract :Technology is a never ending process. From the past decade has seen significant
advancement in the field of consumer electronics. Various devices such as cellular
phones, air conditioners, home security devices, home theatres, etc. are lead us to smart
home/home automation. They have given rise to a PAN (Personal Area Network) in
home environment, where all these appliances can be interrelated and monitored using
a single controller. Busy personalities and physical limitation/old aged people require
home automation and networking to ease their work. Home automation networks uses
many systems like wireless embedded sensors and actuators that allows monitoring and
control applications for home user and give an efficient home management. |
|
MOBILE ADHOC NETWORKS SECURITY CHALLENGES: A SURVEY |
Author : Syeda kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali |
Abstract | Full Text |
Abstract :MANET is a kind of Adhoc network with mobile, and wireless nodes. Because of its
distinct features like dynamic topology, hop-by-hop communications and easy and quick
setup, MANETs encountered lots of challenges allegorically routing, security and
clustering. The security challenges arise due to MANET’s self configuration and self
maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security
parameters for MANET. In addition we divided MANET security into two different
aspects and discussed each one in detail. A comprehensive analysis in security aspects
of MANET and routing approaches is presented. In addition, defeating approaches
against attacks have been evaluated in some essential metrics. After analyses and
evaluations, future scope of work has been presented.
|
|
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS |
Author : Syed Mohd Ali, Dr Syeda Gauhar Fatima, Syeda Kausar Fatima and Dr Syed Abdul Sattar |
Abstract | Full Text |
Abstract :Energy is a serious resource parameter in Wireless Sensor Networks. Utilizing
energy in an effectual manner is a challenging task in Wireless Sensor Networks. This
paper presents an overview on various energy efficient routing protocols which fulfills
the criteria of QoS parameters. Various energy effective and QoS based routing
protocols have been compared. To improve the QoS in a network, data fusion and data
accumulation is considered to be one of major energy saving technique. The routing
protocols based on data aggregation, reduced cost routing and secure routing are also
discussed in detail. Simulation tools like NS2, NS3, OMNET etc can be used to evaluate
the network performance |
|
A STUDY ON INTRUSION DETECTION |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar and Syed Adil |
Abstract | Full Text |
Abstract :Intrusion Detection System (IDS) is meant to be a software application which
monitors the network or system activities and finds if any malicious operations take
place. Tremendous growth and practice of internet raises concerns about how to protect
and communicate the digital data in a safe manner. Nowadays, hackers use different
types of attacks for getting the valuable information. Many intrusion detection
techniques, methods and algorithms assist to identify these attacks. This main objective
of this paper is to provide a complete study about the description of intrusion detection,
history, life cycle, types of intrusion detection methods, types of attacks, different tools
and techniques, research needs, tasks and applications. |
|
ENERGY EFFICIENT DIRECTION BASED ROUTING PROTOCOL FOR WSN |
Author : Syed Mohd Ali, Syeda Gauhar Fatima, Syeda Kausar Fatima and Dr Syed Abdul Sattar, |
Abstract | Full Text |
Abstract :Energy consumption is one of the limitations in Wireless Sensor Networks (WSNs).
The routing protocols are the hot areas to address quality-of-service (QoS) related
issues viz. Energy consumption, network lifetime, network scalability and packet
overhead. The key issue in WSN is that these networks suffer from the packet overhead,
which is the core cause of more energy consumption and damage the QoS in sensor
networks. In WSN, there are several routing protocols which are used to improve the
performance of the network. Out of those protocols, Dynamic Source Routing (DSR)
protocol is more appropriate in terms of small energy density, but sometimes when the
mode of a node changes from active to sleep, the effectiveness decreases as the data
packets needs to wait at the initial point where the packet has been sent and this
increases the waiting time and end to end interruption of the packets which leads to
increase in energy consumption. Our problem is to recognize the dead nodes and to
choose another suitable path so that the data transmission becomes smoother and less
energy gets preserved. In order to resolve these issues, we propose directional
transmission-based energy aware routing protocol named as PDORP. The proposed
protocol PDORP has the characteristics of both Power Efficient Gathering Sensor
Information System (PEGASIS) and DSR routing protocols. In addition, hybridization
of Genetic Algorithm (GA) and Bacterial Foraging Optimization (BFO) is applied to
proposed routing protocol to identify energy efficient optimal paths. The performance
analysis, comparison through a hybridization approach of the proposed routing
protocol gives better result comprising less bit error rate, less delay, less energy
ingesting and better throughput which leads to better QoS and prolong the lifetime of the network. Moreover, the Computation Model is adopted to evaluate and compare the
performance of the both routing protocols using soft calculating techniques |
|
A SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS |
Author : Syeda Gauhar Fatima, Syeda Kausar Fatima and Syed Mohd.Ali |
Abstract | Full Text |
Abstract :As sensor networks edge closer towards wide-spread placement, security issues
become a central concern. So far, much research has concentrated on making sensor
networks feasible and useful, and has not focused on security.
We present a set of security building blocks optimized for resource constrained
environments and wireless communication. SPINS has two secure building blocks:
SNEP and TESLA. SNEP provides the following important baseline security primitives:
Data confidentiality, two-party data authentication, and data freshness. A particularly
hard problem is to provide effective broadcast authentication, which is an important
mechanism for sensor networks. TESLA is a new protocol which provides authenticated
broadcast for severely resource-constrained surroundings. We realized the above
protocols, and show that they are practical straighly on minimal hardware: the
performance of the protocol suite easily matches the data rate of our network.
Additionally, we prove that the suite can be used for building higher level protocols
|
|
CLOUD COMPUTING AND LOAD BALANCING |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed Adil |
Abstract | Full Text |
Abstract :Cloud Computing is utility software that has the ability to change the software
company and making the software more attractive. Cloud Computing has altered the
way IT world used to design software and hardware. The rise in web traffic and different
services are increasing day by day making load balancing a big research topic. Cloud
computing is technology which uses virtual machine as an alternative of physical
machine to host, store and network the different components of computing. Load
balancers are used for distributing loads to different virtual machines as an alternative
of real machines in such a way that none of the machines gets burdened heavily or
lightly. The load balancing needs to be done appropriately because disappointment in
any one of the node can lead to inaccessibility of data |
|
A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION IN WSNS |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Dr Syed Abdul Sattar, Naseer Ahmed Khan and Syed Adil |
Abstract | Full Text |
Abstract :A wireless sensor network is comprised of a base station (BS) and numerous sensor
nodes. The sensor nodes lack security because they function in an open environment,
such as the military. In particular, a false statement injection attack seizures and
compromises sensor nodes. The attack then causes the compromised nodes to create
forward false reports. Due to the false report injection attack, not only does the sensor
network have a false alarm, but its limited energy is also emptied. In order to preserve
the false report injection attack, over the past few years, several studies have been made
looking for a resolution to the attack. Ye et al. studied statistical en-route filtering
(SEF). SEF is a method of randomly verifying event reports in the en-route filtering
phase. SEF can filter many false reports early using proof of intermediate nodes.
However, because the number of keys in a sensor node is fixed by the system, the sensor
network cannot control the event report proof probability depending on the conditions
of the network. Therefore, it is tough to proficiently consume energy of the sensor
network. In order to resolve the problem, we suggest a technique which controls the
event report verification probability by using a key sequence level of an event report. In
the suggested method, when an intermediate node obtains an event report, the node
authenticates the event report by relating a key sequence level of the report and its key sequence level. Elements defining the key sequence level comprise the concentration of
neighbor nodes in the sensing range of a center of stimulus (CoS), the number of stages
from the CoS to the BS, and the average of the key sequence level of intermediate nodes
in each track. We imitated the projected technique and the SEF technique to assess the
performance in terms of energy efficiency and security. In the recreation results, the
projected technique disbursed an average of 7.9% less energy of the sensor nodes
compared to SEF method. The number of untrue reports inward at the BS of the
proposed technique was also fewer, by an average of 6.4, compared to the SEF
technique. Concluded the results, we can understand that when the number of false
report is huge in the sensor network, the proposed technique is more energy-efficient
and protected than the SEF technique.
|
|
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT |
Author : Dr Syeda Gauhar Fatima, Syeda Kausar Fatima, Syed Mohd Ali, Naseer Ahmed Khan and Syed Adil |
Abstract | Full Text |
Abstract :Wireless sensor networks (WSNs) are discovering a wide range of applications in
various fields, counting control networks, enhanced-living scenarios, health-care,
industrial, production monitoring and in many other sectors. Internet of Things (IoT)
confirms smart human being life, through communications between things, machines
together with peoples. Hence, Relocation of Internet from People towards an Internet
of Things (IoT) and addition of Wireless sensors in to Internet of Things enables sensors
nodes connect internet dynamically in order to cooperate and achieve their tasks.
However, when WSNs become a portion of the Internet, we must carefully examine and
scrutinize the issues involved with this integration. In this paper, we evaluate various
methods to combine WSNs into the IOT and discuss a set of challenges |
|
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Dr. D.Srinivasa Rao |
Abstract | Full Text |
Abstract :Mobile ad hoc are gaining popularity because of availability of low-cost mobile
devices and its ability to provide instant wireless networking capabilities where
implementation of wired network is not possible or costly. MANETs are vulnerable to
various types of attack because of its features like continuous changing topology,
resource constraints and unavailability of any centralized infrastructure. Many denials
of service type of attacks are possible in the MANET and one of these type attacks is
flooding attack in which malicious node sends the useless packets to consume the
valuable network resources. Flooding attack is possible in all most all on demand
routing protocol. In this paper we present a novel technique to mitigate the effect of
RREQ flooding attack in MANET using trust estimation function in DSR on demand
routing protocol. |
|
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr.Syed Abdul Sattar and Syed Mohd Ali |
Abstract | Full Text |
Abstract :A mobile adhoc network is a collection of wireless mobile nodes dynamically
creating a temporary network without usage of any prevailing network infrastructure
or consolidated management. Several routing protocols like Dynamic Source Routing
(DSR), Adhoc On-Demand Distance Vector Routing (AODV) and Destination
Sequenced Distance-Vector (DSDV) have been implemented. In this paper, an attempt
has been made to compare the performance of two prominent on-demand reactive
routing protocols for mobile ad hoc networks: DSR and AODV, along with the
traditional proactive DSDV protocol. A simulation model with MAC and physical layer
models is used to study interlayer interactions and their performance inferences. The
On-demand protocols, AODV and DSR perform better than the table-driven DSDV
protocol. Although DSR and AODV share similar on-demand performance, the
differences in the protocol mechanics can lead to significant performance differentials.
A variation of workload and scenarios, as characterized by mobility, load and size of
the ad hoc network were simulated. The performance analysis is evaluated by means of
varying network load, mobility, and network size. These simulations are conceded out
based on the Rice Monarch Project that has made considerable additions to the NS-2
network simulator to track adhoc simulations |
|
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. D. Srinivasa Rao |
Abstract | Full Text |
Abstract :A mobile ad hoc network (MANET) is a self-organized system comprised by multiple
mobile wireless nodes. Due to the openness in network topology and the absence of
centralized administration in management, MANET is vulnerable to attacks from
malicious nodes. In order to reduce the hazards from these malicious nodes, we
incorporate the concept of trust into the MANET, and build a subjective trust
management model with multiple decision factors based on the analytic hierarchy
process (AHP) theory and the fuzzy logic rules prediction method ¯ AFStrust. We
consider multiple decision factors, including direct trust, recommendation trust,
incentive function and active degree, in our model to reflect trust relationship’s
complexity and uncertainty from various aspects. It overcomes the shortage of
traditional method, where the decision factors are incomplete. Moreover, the weight of
classification is set up by AHP for these decision factors, which makes the model has a
better rationality and a higher practicability. Compared to the existing trust
management models, comprehensive experiments have been conducted to evaluate the
efficiency of our trust management model in the improvement of network interaction
quality, trust dynamic adaptability, malicious node identification, attack resistance and
enhancements of system’s security. |
|
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Dr. D. Srinivasa Rao |
Abstract | Full Text |
Abstract :This paper presents a review on a major category of organized attacks i.e.
cooperative blackhole / grayhole attack that are a serious threat to adhoc network
security. In cooperative blackhole attack multiple nodes collude to hide the malicious
activity of other nodes; hence such attacks are more difficult to detect. In this paper a
survey of various security mechanisms have been proposed in the literature for diction
of such attacks is presented |
|
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali |
Abstract | Full Text |
Abstract :A cellular network is an asymmetric radio network which is made up of fixed
transceivers or nodes, maintain the signal while the mobile transceiver which is using
the network is in the vicinity of the node. An ad-hoc network is a local area network
(LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node
in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular,
adhoc and sensor networks. As issues proves helpful for forthcoming research, this
paper work as a backbone to elaborate the various research areas |
|
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Syed Mohd Ali |
Abstract | Full Text |
Abstract :Nowadays, with the rapid development of science and technology and the everincreasing demand in every field, wireless sensor networks are emerging as a necessary
scientific achievement to meet the demand of human in modern society. The wireless
sensor network (WSN) is designed to help us not lose too much energy, workforce, avoid
danger and they bring high efficiency to work. Various routing protocols are being used
to increase the energy efficiency of the network, with two distinct types of protocols,
homogenous and heterogeneous. In these two protocols, the SEP (Stable Election
Protocol) is one of the most effective heterogeneous protocols which increase the
stability of the network. In this paper, we propose an approaching the eFCM algorithm
in clustering the SEP protocol which makes the WSN network more energy efficient.
The simulation results showed that the SEP-eFCM proposed protocol performed better
than the conventional SEP protocol |
|
CONSIGNMENT INVENTORY SIMULATION MODEL FOR SINGLE VENDOR-MULTI BUYERS IN A SUPPLY CHAIN |
Author : Chidurala Srinivas |
Abstract | Full Text |
Abstract :The focus on the studies of supply chain management has been increasing in
recent years among academics as well as practitioners. In this paper, we present an
extendable multi agent supply chain simulation model for consignment stock inventory
model for a single vendor - multiple buyers. The simulation study dealt the
quantitative measures of performance of consignment stock model with respect to
number of shipments, delay deliveries, number of shipments shifted due to partial
information sharing, average inventory levels of buyer and vendor and joint total
economic cost (JTEC) as key performance parameters. Flexsim V3.0 a discrete event
simulation software is used for simulating the model. |
|
FUZZY IDEALS AND FUZZY DOT IDEALS ON BH-ALGEBRAS |
Author : K. Anitha and Dr. N. Kandaraj |
Abstract | Full Text |
Abstract :In this paper we introduce the notions of Fuzzy Ideals in BH-algebras and the notion
of fuzzy dot Ideals of BH-algebras and investigate some of their results |
|
ADVANCEMENT IN ULTRASONIC VIBRATION AND MAGNETIC FIELD ASSISTED MICROEDM PROCESS: AN OVERVIEW |
Author : P. Mukhopadhyay, B.R. Sarkar |
Abstract | Full Text |
Abstract :Micro-machining of components has been emerged as a peak demand in the world
of micro-manufacturing. Micro-EDM is proved to be the most suitable for micro
drilling purposes. It is very essential to fabricate micro holes as well as features with
very high dimensional accuracy and precision. The major drawbacks in micro-EDM
processes are the low metal removal, tool wear and surface roughness. Researchers
have carried out several investigations to compensate the various machining problems
in the micro-EDM process. So, there evolves a need for development of more
sophisticated machining features in micro-EDM process combining with additional
techniques. This paper presents a brief review on the latest advancement in ultrasonic
vibration and magnetic field assisted techniques to improve machining efficiency and
surface qualities of machined features in micro-EDM process. Latest industrial
applications of micro-EDM have been presented. |
|
AN ADVANCED DATA SECURITY METHOD IN WSN |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar, And Dr. Anita Sheela |
Abstract | Full Text |
Abstract :Recently, WSNs have drawn a lot of attention due to their broad applications in both
military and civilian domains. Data security is essential for success of WSN
applications, exclusively for those mission-critical applications working in unattended
and even hostile environments which may be exposed to several attacks. This inspired
the research on Data security for WSNs. Attacks due to node compromise include Denial
of service (DoS) attacks such as selective forwarding attacks and report disruption
attacks. Nearby many techniques have been proposed in the literature for data security.
Hop-hop security works well when assuming a uniform wireless communication pattern
and this security designs provides only hop-hop security. Node to sink communication
is the dominant communication pattern in WSNs and hop-hop security design is not
sufficient as it is exposed to several attacks due to node compromise. Location aware
end-end data security (LEDS) provides end-end security |
|
A MONITORING SCHEME WITH IOT AND SENSOR EXPERTISE |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, and Dr. Anita Sheela |
Abstract | Full Text |
Abstract :Air quality has been largely affected by industrial activities, which have caused
many health issues among people. Air pollutants levels can be measured using gas
sensors. Internet of Things (IoT) technology can be used to remotely detect pollution.
IOT devices can be used to control basic functions from anywhere around the world
through the internet. The data gathered by such a system can be transmitted instantly
to a web-based application to enable monitoring real time data and allow immediate
risk management. The aim is to build a system which can be used to monitor the
parameters in different environments. Here, we describe an entire Internet of Things
(IoT) system that collects real-time data in specific locations. This real-time data
collected is compared with a predetermined threshold. This data is sent to the concerned
organization notifying them about the values exceeding the threshold if any and take
necessary actions if needed. |
|
TRUST MODEL WITH DEFENSE SCHEME IN MANETS |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Syed Mohd Ali |
Abstract | Full Text |
Abstract :The reliability of delivering packets through multi-hop intermediate nodes is a
significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes
establish connections to form the MANET, which may include selfish and misbehaving
nodes. Recommendation based trust management has been proposed in the literature
as a mechanism to filter out the misbehaving nodes while searching for a packet delivery
route. However, building a trust model that relies on the recommendations from other
nodes in the network is vulnerable to the possible dishonest behaviour, such as badmouthing, ballot-stuffing, and collusion, of the recommending nodes. This paper
investigates the problems of attacks posed by misbehaving nodes while propagating
recommendations in the existing trust models. We propose a recommendation-based
trust model with a defence scheme that utilises clustering technique to dynamically filter
attacks related to dishonest recommendations within certain time based on number of
interactions, compatibility of information and node closeness. The model is empirically
tested in several mobile and disconnected topologies in which nodes experience changes
in their neighbourhoods and consequently face frequent route changes. The empirical
analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET
environment.
|
|
AN INTRUSION DETECTION AND AVOIDANCE MECHANISM TO SECURE MANETS |
Author : Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima Dr. Syed Abdul Sattar and Dr. Anita Sheela |
Abstract | Full Text |
Abstract :Maximum of research study in securing mobile adhoc networks (MANETs) has
motivated on suggestions which detect and inhibit a particular kind of attack such as
sleep deprivation, blackhole, greyhole and rushing attacks. In this paper we propose a
generalized intrusion detection and avoidance mechanism. We use an arrangement of
anomaly based and knowledge-based intrusion detection. This methodology not only
secures MANET from an extensive range of routing assaults but also has the proficiency
to detect new unexpected attacks. Simulation outcomes of a case study show that our
suggested mechanism can successfully distinguish a variety of attacks, comprising
multiple concurrent dissimilar attacks, detect and separate the intruders with an
reasonable network overhead |
|
NO EROSION CRITERION FOR GRANULAR FILTERS BASED ON CONSTRICTION SIZE – AN EXPERIMENTAL STUDY |
Author : Mohan Das C, Dr. M S Girish and Vishnu V K |
Abstract | Full Text |
Abstract :Filters are provided in embankments in order to arrest the eroded soil particles
that are carried by the seepage water .Current design method of graded filters was
developed by Terzaghi which is based on the particle size distribution of the filter
material and the base material. This paper presents an attempt to develop filter design
criteria in relation to constriction size in gravel filters. It is an alternative approach
from the conventional filter design criteria of Terzaghi, which is based on the particle
size distribution of the filter media and base material. In his study a criterion for filter
to prevent erosion is proposed based on the constriction size distribution of the filter
media . The proposed constriction size based criterion, C10/d95 2 directly compares
the controlling constriction size (C10) with the specific representative base size (d95)
defines the effectiveness of filters, hence it is a more effective method compared to the
Terzaghi criterion (D15 /d85<5) which is based purely on particle size. This ratio
explains the behavior of filters more clearly and is proved by a number of tests on
various base-filter combinations. When compared to Terzaghi criteria, constriction
size distribution criterion proves to be more effective
|
|
A THEORETICAL PERSPECTIVE OF DESIGNING FOR SAFE URBAN PUBLIC PLACE: LEARNINGS FROM THE SOCIAL AND URBAN THEORISTS |
Author : Parama Mitra, Dr Suchandra Bardhan, |
Abstract | Full Text |
Abstract :Since the history of evolution of cities, civilizations have developed means to make
their settlements advanced in terms of efficiency, comfort and to foster safety. Thus
safety within cities, is an important factor that forms an integral part of city design.
This “safety” is not related to engineered design only but connected to human
behavior that forms a very important attribute in livable environments. The paper is
based on a robust literature review that aim to investigate into the field of Urban
Safety. It deals with several theories that are inter-connected and relate to this
concept. The concept of safety in urban context is a very complicated construct and
involves a large number of variables, thus is order to fine –tune this concept, a
systematic scanning of several related fields of theories are undertaken. They are
classified , categorized and further filtered into segments from which a large number
of study parameters are identified that can contribute to the factor of urban safety in
public areas. These parameters further could be used in further research to generate
safety audit tool. |
|
AUTOMATED ICT SYSTEMS IN INLAND WATERWAYS BY DEVELOPING A MULTIFLOW RIVER INFORMATION SERVICES SYSTEM |
Author : K.J. James, Vikas V. Shenoy, M. Bhasi, C.G. Nandakumar |
Abstract | Full Text |
Abstract :The objective of any River Information Services system is the safe, efficient and
environment friendly transport of men, materials and machinery in inland waterways,
including canals, lakes and backwaters. Transport should be safe with minimum
injuries, fatalities and accidents. It should efficiently maximise throughput and
effective capacity of waterways and carrying capacity of vessels, reduce travel time
and costs and should efficiently link between transport modes and terminals.
Environment hazards like polluting emissions and oil spills due to illegal actions or
normal operations should be avoided.
The RIS can be categorised into various information levels like fairway
information, tactical and strategic traffic information, traffic and transport logistics
management information, statistical information, calamity abatement information,
tariff information and information for law enforcement. The various services and their
functions are interlinked with multiple users and various levels of operation. Because
of this, information flow is multilevel for multiple users. In RIS systems, the RIS
personnel evaluate the various data and make decisions based on personal
experiences and similar business situations and then disseminate information to
multiple users. Human errors in such a situation can lead to accidents with
catastrophic effects like loss of business, loss of vessels and even loss of lives. In such
situations computerised information processing systems can play a significant role in improving safety and security in Inland Water Transport (IWT). Here the human
element is replaced by Automated River Information Services (ARIS) system .Since
the information flow in RIS systems is multilevel and there are multiple users,
complexity of information processing and dissemination is of a higher order. As an
improvement on existing RIS systems, this paper proposes the development of
Automated River Information Services system.
It is an interactive software based system intended to make decisions compiling
useful information from raw data, documents and business models to identify and
solve problems. In this system, human intervention is substituted by an Artificial
Intelligence system which is fully automated, leading to better efficiency and security
of operation. ARIS architecture has been developed and described in this paper. This
software will prove useful in the IWT sector, especially when many countries are
moving towards eco-friendly means of transport, according higher priority for Inland
Water Transportation |
|
COMPARATIVE STUDY OF DYNAMIC RESPONSE OF MONOLITHIC AND ROCKING COLUMNS UNDER EARTHQUAKE ACCELERATIONS USING FINITE ELEMENT ANALYSIS |
Author : Rudra Chauhan, Ratik Chavan, Sureil Gupte and Yuvraj Chavda |
Abstract | Full Text |
Abstract :Rocking column is one of the types of Seismic Isolation system (also known as
Kinematic Base Isolator), which is a high grade, either free standing or centrally post
tensioned, concrete column with curved faces of column which are discontinuous in
nature. In the present work, a comparative study of dynamic response is carried out
between Monolithic and Rocking columns using ABAQUS Software. The main objective
of the work is to analyse a monolithic RCC column and free-standing rocking RCC
column and compare the results depending upon the stress & strain characteristics
when subjected to horizontal acceleration. After analysis, it was found that rocking
column maintains its structural integrity with possible face-edge crushing failures |
|
OPTIMIZATION OF HEURISTIC ALGORITHMS FOR IMPROVING BER OF ADAPTIVE TURBO CODES |
Author : Dr. K. Suman |
Abstract | Full Text |
Abstract :The third component introduced in the turbo codes improved the code
performance by providing very low error rates for a very wide range of block lengths
and coding rates. But this increased the complexity and the parameters such as
permeability and permittivity rates were constant and they could not perform well
under noisy environments. This drawback was addressed in [1] by proposing A3DTC. The bit error rate was minimized by generating parameters based on noise and
signal strengths. A performance comparison is done between the two heuristic
algorithms i.e., Genetic Algorithm and Particle Swarm Optimization Algorithm [2]
where a knowledge source using the two algorithms is generated. Under various noisy
environments the experimental results compare the performance of the two
algorithms. In this paper their performance is analyzed and optimization is done. The
results show that genetic algorithm is able to give better performance when compared
to particle swarm optimization algorithm. |
|
A STUDY OF EFFECT PROCESS PARAMETERS IN FSW ON TENSILE STRENGTH OF AA6061-T6 |
Author : G.C.Jadhav and Dr. R.S.Dalu |
Abstract | Full Text |
Abstract :Friction stir welding (FSW) is a comparatively innovative solids-state joining
process. This joining mechanism is very energy efficient, environment friendly and
multitalented. The aim of this paper is improvement an affiliation between in the welding
parameters and mechanical properties of the AA6061T-6 type of aluminum alloy using
the friction stir welding mechanism .The effects of the various processing parameters
they are, tool rotational speed, traverse speed, axial force and geometry play tool they
are play an important role on the quality of welded joining. The FSW joints mechanism
have advanced tensile strength to the heaviness ratio. The present work of this paper is
done to think about the impact of the contribution parameters on the tensile strength.
The tensile welding parameters mainly influenced by the following variables they are
weld speed, feed, and tilt angle. The parameters are take these of the examiner attributes
they are the attributes are rotational speed, weld speed, axial force, shoulder diameter
and tilt angle. From this examination it is found that the square tool pin profile
producers are mechanically sound defect free welds compare to the tool to pin effects |
|
EXAMINING THE THERMAL PERFORMANCE OF OLD INDIGENOUS ARCHITECTURE OF KOLKATA TO ATTAIN SUSTAINABLE DEVELOPMENT |
Author : Sanmarga Mitra |
Abstract | Full Text |
Abstract :Urbanization is a global phenomenon that needs to take up serious sustainable
approaches in this time when rapid global warming is looming large on the earth. Like
other science and technology domains, architecture is also taking up various
sustainable approaches so that the urban built environment harms nature the least.
Building design has become energy conscious and various rating systems have come to
the forefront. However, another domain has remained largely unexplored in the aging
urban centres of India where the old indigenous architecture of these cities have not
been examined for their climate responsiveness. These indigenous architecture have
evolved from the local vernacular building traditions, and thus synthesizes two aspects
in them – they are climate responsive as well as functionally suited to their urban
requirements. This paper examines the old indigenous residential architecture of
Kolkata, the third largest urban centre in India after Delhi and Mumbai, by comparing
them with the new residential buildings of the city and thus tries to find out to what
extent they are better performing in the warm and humid climate of the city |
|
A MODEL DRIVEN OPTIMIZATION APPROACH TO DETERMINE TILT ANGLE OF SOLAR COLLECTOR IN INDIA |
Author : Sanjaya Kumar Sahu, Nagendra Tripathi and Supriya Tripathi |
Abstract | Full Text |
Abstract :The solar systems are an intense need to full fill the energy requirement of
developing countries like India. Where, thermal and photovoltaic are the two methods
to utilize the solar energy directly from sun. In these methods solar equipments (e.g. flat
plat collector and Photovoltaic panel) are kept in tilted position for absorbing maximum
solar flux. Hence, finding the optimum tilt angle is the problem of optimization.
Therefore, in this paper model driven optimization approach such as particle swarm
optimization (PSO) estimator has been proposed to find optimum tilt angle and its
results are compared with analytical results. A novel cost function has been applied to
determine periodical optimum tilt angle. To validate the performance of PSO estimator
results, statistical analysis study is carried out. Where, three statistical approaches such
as descriptive method, direct method and Altman-Bland methods are adopted. The PSO
estimator results are found satisfactory to ANA results at 95% confidence interval under
statistical study |
|
BLUETOOTH BASED OFFICE AUTOMATION AND SECURITY SYSTEM USING RASPBERRY PI AND ANDROID APPLICATION |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :An office receptionist is an employee who provides administrative support in the
office. The position even though is of much importance, it hinders the use of man power
for a much higher productive and useful purpose in the office. This paper deals with
design and implementation of an automated office receptionist system using Raspberry
Pi and an Android application. It not only helps the official to directly interact with the
visitor but also to maintain a visitor’s record in the e-mail. This eliminates manual
assistance and also improves the security. The device can also be used at home,
corporate offices, hospitals, etc., for security purpose and administrative purposes. This
simple and cost effective prototype device is designed and when tested it effectively
performed the task of office receptionist. |
|
SMART PHONE BASED ENERGY MANAGEMENT SYSTEM USING RASPBERRY PI3 |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :In many places, energy wastage arises when a person leaves the home or office without
turning off the home appliances such as lights and fans. Due to the negligence of the person,
lot of energy is wasted unused and results in higher amount of electricity bill. Nowadays, almost
every household member has a smart phone because of their affordable prices. In this paper,
an energy management system is developed using Smart phone’s Bluetooth technology. The
proposed system is built on Raspberry Pi3 processor and uses the Bluetooth communication in
the user’s phone to determine whether the user is at home or not. It is not necessary for the
user’s phone to be in discoverable mode for its functionality, it should be just turned on. When
the user is out of home/office, the Bluetooth device in the phone gets unpaired from the energy
management system’s Bluetooth device. This in turn turns off the unused devices such as lights
and fans to save energy. Multiple Bluetooth devices can also be used in case of multiple users.
The user can control the appliances manually through switches when at home. |
|
CONSTRUCTING AN INNOVATION ADOPTION CONCEPTUAL LENS/PRELIMINARY FRAME WORK FOR FURTHER TESTING IN UPSTREAM OIL AND GAS |
Author : Sylesh Nechully and Dr. S.K. Pokhriyal |
Abstract | Full Text |
Abstract :Conceptual Lens helps to focus our study along certain directions for answering the
research questions. A Conceptual Lens made from the existing literature helps the
researcher to frame relevant questions to be asked to the respondents. In this paper, the
researcher describes a method for constructing conceptual lens and employs the same
method for constructing an innovation adoption conceptual lens for further testing in
upstream oil and gas. The Conceptual lens can be treated as the starting point for
qualitative data analysis. |
|
SOLAR ENERGY DRIVEN MOSQUITO REPELLER SYSTEM USING ARDUINO UNO |
Author : Dr. Dhiraj Sunehra |
Abstract | Full Text |
Abstract :Mosquitoes and other insects are harmful for humans as they can cause many
diseases which are harmful for human health. In order to avoid the mosquitoes, people
use chemical repellents which affect the environment adversely. Use of mosquito
repeller skin creams can cause skin problems. In this paper, a mosquito repeller system
that operates by harvesting the solar energy from sun is implemented. The proposed
mosquito repeller system consumes low power with an adequate affordability,
availability, and versatility. The software tool used is Arduino IDE, which is used to
write an embedded code for Arduino board. The designed system consumes very low
power and can be effectively used in lawns and environment parks to repel the
mosquitoes. |
|
AXIAL CRUSHING OF GFRP FRUSTA: EXPERIMENTAL AND NUMERICAL ANALYSIS |
Author : Mohammed A. K., M. Naushad Alam, Raisuddin Ansari |
Abstract | Full Text |
Abstract :Experimental and numerical analysis of the axial crushing of glass fiber
reinforced polymer (GFRP) frusta tubes are presented in this study. The frusta tubes
are fabricated from plain woven C-glass fabric bonded with the epoxy system LY-556
resin and HY951 hardener. Two semi-apical angles 5º and 10º with 95mm height and
1.4mm wall thickness were studied under quasi-static crush conditions. All specimens
showed progressive damage in region starts from the contact with the crushing
crosshead and spreads about 7mm ahead the crushing surface. Mix of tiny debris and
strip shaped chunks are generated in the crushing zone. The debris is accumulated as
outside or inside fronds formation. The strip shaped chunks are generated
peripherally due to shear effects by crusting from the frusta body and crack growth at
the outmost crush zone points from the crushing surface. The 5º frusta showed better
crashworthiness performance than 10º frusta. Simulation results showed good
agreement with the experimental findings in both collapse mode and energy
absorption. |
|
NUMERICAL AND EXPERIMENTAL VALIDATION OF CHIP MORPHOLOGY |
Author : M. Sivaramakrishnaiah, P. Nandakumar, G. Rangajanardhana |
Abstract | Full Text |
Abstract :The extensive research studies are used to divination the behavior of complex
Metal cutting processes. The cutting parameters such as speed, feed and force play
important role on conform chip morphology. The experimental techniques for
investigation the chip morphology is expensive and time consuming. To overcome
these difficulties Finite element modeling and simulation process are used as effective
tool to divination the effect of cutting variables. In the present study FEA simulation
process model is developed to divination the chip morphology and cutting forces in
turning of Al-6061 with WC tool. Johnson cook material models are considered for
visco-elastic material behavior. The obtained simulation process results are compared
with experimental process results.
|
|
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS |
Author : Nirmala M and Shylaja V |
Abstract | Full Text |
Abstract :An efficient Priority-Arbiter based Router is designed along with 2X2 and 3X3 mesh
topology based NOC architecture are designed. The Priority –Arbiter based Router
design includes Input registers, Priority arbiter, and XY- Routing algorithm. The
Priority-Arbiter based Router and NOC 2X2 and 3X3 Router designs are synthesized
and implemented using Xilinx ISE Tool and simulated using Modelsim6.5f. The
implementation is done by Artix-7 FPGA device, and the physically debugging of the
NOC 2X2 Router design is verified using Chipscope pro tool. The performance results
are analyzed in terms of the Area (Slices, LUT’s), Timing period, and Maximum
operating frequency. The comparison of the Priority-Arbiter based Router is made
concerning previous similar architecture with improvements |
|
IDENTIFYING THE RELEVANT VARIABLES AFFECTING THE ADOPTION OF INNOVATIVE DRILLING TECHNOLOGIES IN UPSTREAM UAE OIL AND GAS |
Author : Sylesh Nechully and Dr. S.K. Pokhriyal |
Abstract | Full Text |
Abstract :The Researcher uses Strauss and Corbin’s version of Grounded Theory to find the
variables relevant to the adoption of innovative drilling technologies in upstream oil
and gas. The justification for selection of grounded theory as the appropriate research
method is already furnished in Paper titled – “Choosing Grounded Theory and Frame
Work Analysis as the Appropriate Qualitative Methods for Research”. The researcher
applies Predefined codes and Categories of codes to the data collected. The relevant
questions to be asked are derived from the conceptual lens formulated by the
researcher in the Paper titled – “Constructing an Innovation Adoption Conceptual
Lens/Preliminary Frame Work for Further Testing in Upstream Oil and Gas”. The
qualitative data analysis results in a “Preliminary Frame work” pertaining to
Upstream Oil and Gas Innovation Adoption from which the variables can be
extracted. The Research Objectives are already furnished in the paper titled –
“Systematically Arriving at the Research Topic for Study in Oil and Gas”. Qualitative
Data Analysis furnished in this paper answers the Research Objective 1 – The
Variables are identified. This Preliminary frame work goes as an input to the
Framework analysis for answering Research Objective 2. |
|
WIDEBAND MICROSTRIP ANTENNA USING PARASITIC PATCH ELEMENT |
Author : Susmita Bala |
Abstract | Full Text |
Abstract :A wideband microstrip antenna using parasitic patch element is proposed in this
paper. Initially a circular patch antenna is designed. The antenna is found to resonate
at 5.2 GHz and provides impedance bandwidth of 3.84%. To enhance the impedance
bandwidth, two unequal rectangular parasitic patches are introduced along with the
modified initial circular patch antenna which provides impedance bandwidth which
ranges from 7.86 GHz to 10.60 GHz with 29.68% of impedance bandwidth .Suitable
peak gain of 4.56 dBi is also achieved by the proposed antenna. This makes the antenna
suitable for X band (8-10 GHz) application |
|
MECHANICAL CHARACTERISTICS OF FLY ASH REINFORCED ALUMINIUM METAL MATRIX COMPOSITE-ART OF REVIEW |
Author : RAGUNATH PALANICHAMY, JAYAKUMAR LAKSHMIPATHY, BALAMURUGAN KULENDRAN, VAIRAVEL MADESHWARAN |
Abstract | Full Text |
Abstract :Composites are widely utilized in the industries like automobile, aircraft, space craft, transport, generation of wind-power and so on due to its lightweight and inexpensive. Recently, dissimilar physical and chemical features of materials are intercorporate to produce an innovative composite material. Many researches had performed research on those composite materials. In this research, fly ash materials are utilized in the form of reinforcement due to their improved mechanical characteristics like enhanced UTS, impact and compressive strength, toughness and low intensity and ductility. Fly ash is also known as fuel ash. In this research fuel ash is reinforced with aluminium metal matrix composites. MMC are prepared by using the fabrication techniques of solid and liquid stage.
|
|
TECHNOLOGY OF MINI PILES FOR HIGH EMBANKMENT STABILITY ON SOFT SOILS TO PREVENT A SETTLEMENT |
Author : EDY PURWANTO |
Abstract | Full Text |
Abstract :The development of community and industrial economics in Indonesia needs major improvements especially in transport infrastructure including new or substantially improved roads. The Balikpapan – Samarinda toll road in Indonesia was built to
provide a robust transport link between Balikpapan and amarinda. The work on this project required a high level of embankment work on soft soil. During the construction periode there is a settlement and landslide because the soft soil is unable to bear the
weight of the backfill. For this reason it is necessary to conduct a geotechnical study to find out the cause of the settlement and find the proper solution. In this case a study of slope stability is needed Geotechnical studies are carried out using data taken from the field and analysis using the Plaxis version 8.2 program
The results of the geotechnical study show the Safety Factor (SF) of 1,139 < 1,50 wich mean it is not stable. Reinforcement by using mini piles of 6 m length (8 pieces) and 9 m length (10 pieces) with a spacing of 1 meter for each mini pile result in SF of
1,821 greater than allowable SF. Therefore, the structure is stable.
|
|
DESIGN DEVELOPMENT AND CHARACTERIZATION SUPER HYDROPHOBIC SURFACE COATING ON WOOD MATERIALS |
Author : Hazim Moria |
Abstract | Full Text |
Abstract :Reliable PDMS and aluminum NPS coating have been developed to protect the wood from deterioration and other water-absorbing materials in humid conditions. Thus, alumina that readily available was utilized to make a harsh surface, which afterward combined chemically with PDMS to develop the hydrophobic characteristics. A few substitute layers of PDMS together with alumina particles were established to ensure hydrophobic properties, and the water impact and emery paper tests were investigated. The glass substrates and other hydrophilic materials were used to apply the coating to limit its water absorption. The coated wood that developed super-hydrophobic properties was examined by difference and change in contact angle by analyzing the level of water absorption in covered and uncovered
wood samples.
|
|
ANALYSIS OF VEHICLE REACTION TIME IN ARRIVING THE TOLL GATE |
Author : Indra Surianto, Mindar Purwantoro, Marcelinus Armando Santosa and Taufik Roni Sahroni |
Abstract | Full Text |
Abstract :This paper presents the level of road density and the number of vehicles passing on the Jakarta city toll road. This study was conducted at the Jakarta Toll Gate namely Semanggi I, Semanggi II and Halim. Data is obtained from observations when the driver pays the cost of the expressway at the toll gate. This study shows a reaction time for the
payment of expressway costs, which are influenced by types of otorized vehicles such as sedans, jeeps, buses, and trucks. The results show that the reaction time of driver when before and after paying, the longest toll road costs is 48 seconds and the shortest is 1 second. Reaction time for the payment of expressway costs could shorten the travel time, with an average reaction time of 6.04 seconds on vehicles. The number of vehicles crossing the toll gate on 24 hours from the three Toll Gates amount 17.256 vehicles. As a result, Most of vehicle traffic contributed by the behavior of driver at the Toll Gate |
|