SlideShare a Scribd company logo
1 of 1
Download to read offline
International Conference on Systems, Science, Control, Communication, Engineering and Technology 8
International Conference on Systems, Science, Control, Communication, Engineering and
Technology 2017 [ICSSCCET 2017]
ISBN 978-81-933235-0-2 VOL 01
Website icssccet.org eMail icssccet@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICSSCCET015 eAID ICSSCCET.2017.015
Seismic Analysis of High-raised Building under Floating
Foundation
Syed Ibrahim S1
, E Alexandar2
, H Vijaya3
, B Suresh4
1,2,3,4
TKR Engineering College, Hyderabad, India
Abstract: Primary objective of an earthquake resistant design is to prevent the building from collapse during earthquake thus, minimizing the risk of
death or injury. Earthquake forces are generated by the inertia of buildings as they dynamically respond to ground motion. Many earthquake resistant
techniques were introduced by various researchers but, they were not concentrated to eliminate wave action that entering at foundation level during
earthquake that leads to failure of the structures. This paper proposes a technique in which the effect of the wave action intended to reduce/neglect at
foundation level itself by constructing a ball and socket type of joints between column and footing intersections. To recognize the technique, a
dynamically responded high-raised building model was developed with pinned supports using STAAD. Pro software and the results were compared with
the similar model having conventional (fixed) supports. Both longitudinal and transverse ground motions to the structure were considered independently
to study the behaviour of the structures. The study parameters included displacement, base shear, spectral acceleration, time-period, and mode shape. It
was found from the analysis that the flexibility of the structure increased substantially in the pinned type of supports which is more appreciated in the
point of any seismic resistant structure.
ISBN 978-81-933235-0-2 VOL 01
Website icssccet.org eMail icssccet@asdf.res.in
Received 10 – January – 2017 Accepted 28 - January – 2017
Article ID ICSSCCET016 eAID ICSSCCET.2017.016
Secure Message Transmission in Wireless Networks using
HMAC Algorithm
Swamy Polgoni1
, Praveen Bhongiri2
, Ramollu Sandeep Reddy3
1,2,3
Assistant Professor, Department of ECE, TKR Engineering College, Hyderabad, India
Abstract: A message is to be transferred from one network to another across some sort of internet. To do this a logical information channel should
established by defining a route through the internet from source to destination with the help of some protocols. A security-related transformation on the
information to be sent, with some secret information as secret key will be shared by the two networks and, it is hoped, unknown to the opponent.
Wireless networks are increasingly being used in the network with limited cost and low equipment requirement. However, the growing popularity and
widespread applications of wireless networks are directly proportionate to their security exploitation. The strength of its infrastructure also becomes the
point of its greatest availability in the network. Thus decreasing the confidence level of the system as it pertains to availability, reliability, data
integrity and privacy concerns. Message authentication is used to protecting the integrity of a message and validating identity of originator. The
algorithm used in this paper for authenticating messages is Hash Message Authentication Codes (HMAC) with stream ciphering.
This paper is prepared exclusively for International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET
2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr JBV Subrahmanyam and
Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work
for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this
notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the
owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution.
2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]

More Related Content

What's hot

Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionIRJET Journal
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Study on Multi cloud Security
Study on Multi cloud SecurityStudy on Multi cloud Security
Study on Multi cloud SecuritySam Navin
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET Journal
 
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...Asma Swapna
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010bdemchak
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storageijtsrd
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...CSCJournals
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsjournalBEEI
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computingAJIT M KARANJKAR
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 

What's hot (17)

Multipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio SelectionMultipath Dynamic Source Routing Protocol using Portfolio Selection
Multipath Dynamic Source Routing Protocol using Portfolio Selection
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Study on Multi cloud Security
Study on Multi cloud SecurityStudy on Multi cloud Security
Study on Multi cloud Security
 
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud ComputingIRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
IRJET- Design to Secure Data by using DNA Cryptography in Cloud Computing
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
 
Maurya poster
Maurya posterMaurya poster
Maurya poster
 
Poster nci 2010
Poster   nci 2010Poster   nci 2010
Poster nci 2010
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud StorageA Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
A Data Sharing Protocol to Minimize Security and Privacy Risks in Cloud Storage
 
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...
 
A systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in cloudsA systematic mapping study of security, trust and privacy in clouds
A systematic mapping study of security, trust and privacy in clouds
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A framework for improving security in cloud computing
A framework for improving security in cloud computingA framework for improving security in cloud computing
A framework for improving security in cloud computing
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 

Similar to Seismic Analysis of High-raised Building under Floating Foundation

QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...Shanmuga Priyan Thiagarajan
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Shanmuga Priyan Thiagarajan
 
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Shanmuga Priyan Thiagarajan
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTShanmuga Priyan Thiagarajan
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlShanmuga Priyan Thiagarajan
 
Big Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentBig Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentShanmuga Priyan Thiagarajan
 
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Shanmuga Priyan Thiagarajan
 
Skills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesSkills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesShanmuga Priyan Thiagarajan
 
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Shanmuga Priyan Thiagarajan
 
Optimization of Time-Cost Analysis by Fast Track Method
Optimization of Time-Cost Analysis by Fast Track MethodOptimization of Time-Cost Analysis by Fast Track Method
Optimization of Time-Cost Analysis by Fast Track MethodShanmuga Priyan Thiagarajan
 
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Shanmuga Priyan Thiagarajan
 

Similar to Seismic Analysis of High-raised Building under Floating Foundation (20)

QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
QoS (Quality of Service) Analysis of On-Demand Routing Protocols under Multip...
 
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
Robust Image Transmission Technique on Data Hiding and Secure Transmission Us...
 
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
Structural Behaviour of Self Compacting Reinforced Concrete Beams Based on Va...
 
A New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCTA New Approach to Video Compression using 3D-DCT
A New Approach to Video Compression using 3D-DCT
 
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy ControlPower Quality Improvement of Electrified Transportation by Using Fuzzy Control
Power Quality Improvement of Electrified Transportation by Using Fuzzy Control
 
Survey on IOT Using Big Data
Survey on IOT Using Big DataSurvey on IOT Using Big Data
Survey on IOT Using Big Data
 
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
Data Intensive Using Mobile Relay Nodes in Wireless Sensor Networks for Energ...
 
Big Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing EnvironmentBig Data Analytics in Cloud Computing Environment
Big Data Analytics in Cloud Computing Environment
 
Development of IOT Based Smart Security and Ubiquitous Controlled Agriculture...
Development of IOT Based Smart Security and Ubiquitous Controlled Agriculture...Development of IOT Based Smart Security and Ubiquitous Controlled Agriculture...
Development of IOT Based Smart Security and Ubiquitous Controlled Agriculture...
 
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
Transient Lightning and Switching over Voltages Mitigation in Indian Gas Insu...
 
Skills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and IssuesSkills Landscape of India: Initiatives and Issues
Skills Landscape of India: Initiatives and Issues
 
FR-Efficient Compression of PUM Data in WAMS
FR-Efficient Compression of PUM Data in WAMSFR-Efficient Compression of PUM Data in WAMS
FR-Efficient Compression of PUM Data in WAMS
 
Big Data and the Internet of Things
Big Data and the Internet of ThingsBig Data and the Internet of Things
Big Data and the Internet of Things
 
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation MechanismA Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
A Security Mechanism for MANET with Efficient Certificate Revocation Mechanism
 
Amalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent TechnologyAmalgam Approach on Usages of Agent Technology
Amalgam Approach on Usages of Agent Technology
 
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
Experimental Investigation on Recon Fibre Reinforced Concrete in addition wit...
 
Grid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System DesignGrid-Connected PV-Wind Power System Design
Grid-Connected PV-Wind Power System Design
 
Optimization of Time-Cost Analysis by Fast Track Method
Optimization of Time-Cost Analysis by Fast Track MethodOptimization of Time-Cost Analysis by Fast Track Method
Optimization of Time-Cost Analysis by Fast Track Method
 
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
Multi Frequency Method of Fault Diagnosis Technique in Ana log Circuit to Avo...
 
Molecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological TechnologiesMolecular Modelling of Human Brain Function in Biological Technologies
Molecular Modelling of Human Brain Function in Biological Technologies
 

More from Shanmuga Priyan Thiagarajan

Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate ContentionsComputer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate ContentionsShanmuga Priyan Thiagarajan
 
A Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneA Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneShanmuga Priyan Thiagarajan
 
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Shanmuga Priyan Thiagarajan
 
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Shanmuga Priyan Thiagarajan
 
Hybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlHybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlShanmuga Priyan Thiagarajan
 
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationUnit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationShanmuga Priyan Thiagarajan
 
A Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingA Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingShanmuga Priyan Thiagarajan
 
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresAn Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresShanmuga Priyan Thiagarajan
 
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...Shanmuga Priyan Thiagarajan
 
Sewage Treatment by Using Cyclic Activated Sludge Technology
Sewage Treatment by Using Cyclic Activated Sludge TechnologySewage Treatment by Using Cyclic Activated Sludge Technology
Sewage Treatment by Using Cyclic Activated Sludge TechnologyShanmuga Priyan Thiagarajan
 
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete Beams
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete BeamsShear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete Beams
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete BeamsShanmuga Priyan Thiagarajan
 
An Adaptive Hysteresis Band Current Controlled Shunt Active Power Filter
An Adaptive Hysteresis Band Current Controlled Shunt Active Power FilterAn Adaptive Hysteresis Band Current Controlled Shunt Active Power Filter
An Adaptive Hysteresis Band Current Controlled Shunt Active Power FilterShanmuga Priyan Thiagarajan
 
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage Regulation
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage RegulationWind Energy Based Adaptive Pi Controlled Statcom for Voltage Regulation
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage RegulationShanmuga Priyan Thiagarajan
 

More from Shanmuga Priyan Thiagarajan (14)

Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate ContentionsComputer Networks Salvations and Defilements on WSN, Exasperate Contentions
Computer Networks Salvations and Defilements on WSN, Exasperate Contentions
 
A Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste PolyethyleneA Study on Bituminous Mix Properties Using Waste Polyethylene
A Study on Bituminous Mix Properties Using Waste Polyethylene
 
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
Calculation and Comparison of Circuit Breaker Parameters for 132kv Bus Model ...
 
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
Power Transfer Improvement without Any Alteration in Existing EHV AC Line wit...
 
Hybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and ControlHybrid Wind Generator PS Coordination and Control
Hybrid Wind Generator PS Coordination and Control
 
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm OptimizationUnit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
Unit Commitment with Lagrange Relaxation Using Particle Swarm Optimization
 
A Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green ComputingA Novel Approach on Research challenges in Green Computing
A Novel Approach on Research challenges in Green Computing
 
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter MeasuresAn Intelligent Threat Recognition for Electronic Warfare Counter Measures
An Intelligent Threat Recognition for Electronic Warfare Counter Measures
 
Audio Water Marking Using DCT & EMD
Audio Water Marking Using DCT & EMDAudio Water Marking Using DCT & EMD
Audio Water Marking Using DCT & EMD
 
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
A Novel Approach On Wide Range Soft Switching PWM Multi Level DC-DC Converter...
 
Sewage Treatment by Using Cyclic Activated Sludge Technology
Sewage Treatment by Using Cyclic Activated Sludge TechnologySewage Treatment by Using Cyclic Activated Sludge Technology
Sewage Treatment by Using Cyclic Activated Sludge Technology
 
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete Beams
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete BeamsShear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete Beams
Shear Behaviour of Hybrid Fibre Reinforced Geo Polymer Concrete Beams
 
An Adaptive Hysteresis Band Current Controlled Shunt Active Power Filter
An Adaptive Hysteresis Band Current Controlled Shunt Active Power FilterAn Adaptive Hysteresis Band Current Controlled Shunt Active Power Filter
An Adaptive Hysteresis Band Current Controlled Shunt Active Power Filter
 
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage Regulation
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage RegulationWind Energy Based Adaptive Pi Controlled Statcom for Voltage Regulation
Wind Energy Based Adaptive Pi Controlled Statcom for Voltage Regulation
 

Recently uploaded

Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 

Seismic Analysis of High-raised Building under Floating Foundation

  • 1. International Conference on Systems, Science, Control, Communication, Engineering and Technology 8 International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET 2017] ISBN 978-81-933235-0-2 VOL 01 Website icssccet.org eMail icssccet@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICSSCCET015 eAID ICSSCCET.2017.015 Seismic Analysis of High-raised Building under Floating Foundation Syed Ibrahim S1 , E Alexandar2 , H Vijaya3 , B Suresh4 1,2,3,4 TKR Engineering College, Hyderabad, India Abstract: Primary objective of an earthquake resistant design is to prevent the building from collapse during earthquake thus, minimizing the risk of death or injury. Earthquake forces are generated by the inertia of buildings as they dynamically respond to ground motion. Many earthquake resistant techniques were introduced by various researchers but, they were not concentrated to eliminate wave action that entering at foundation level during earthquake that leads to failure of the structures. This paper proposes a technique in which the effect of the wave action intended to reduce/neglect at foundation level itself by constructing a ball and socket type of joints between column and footing intersections. To recognize the technique, a dynamically responded high-raised building model was developed with pinned supports using STAAD. Pro software and the results were compared with the similar model having conventional (fixed) supports. Both longitudinal and transverse ground motions to the structure were considered independently to study the behaviour of the structures. The study parameters included displacement, base shear, spectral acceleration, time-period, and mode shape. It was found from the analysis that the flexibility of the structure increased substantially in the pinned type of supports which is more appreciated in the point of any seismic resistant structure. ISBN 978-81-933235-0-2 VOL 01 Website icssccet.org eMail icssccet@asdf.res.in Received 10 – January – 2017 Accepted 28 - January – 2017 Article ID ICSSCCET016 eAID ICSSCCET.2017.016 Secure Message Transmission in Wireless Networks using HMAC Algorithm Swamy Polgoni1 , Praveen Bhongiri2 , Ramollu Sandeep Reddy3 1,2,3 Assistant Professor, Department of ECE, TKR Engineering College, Hyderabad, India Abstract: A message is to be transferred from one network to another across some sort of internet. To do this a logical information channel should established by defining a route through the internet from source to destination with the help of some protocols. A security-related transformation on the information to be sent, with some secret information as secret key will be shared by the two networks and, it is hoped, unknown to the opponent. Wireless networks are increasingly being used in the network with limited cost and low equipment requirement. However, the growing popularity and widespread applications of wireless networks are directly proportionate to their security exploitation. The strength of its infrastructure also becomes the point of its greatest availability in the network. Thus decreasing the confidence level of the system as it pertains to availability, reliability, data integrity and privacy concerns. Message authentication is used to protecting the integrity of a message and validating identity of originator. The algorithm used in this paper for authenticating messages is Hash Message Authentication Codes (HMAC) with stream ciphering. This paper is prepared exclusively for International Conference on Systems, Science, Control, Communication, Engineering and Technology 2017 [ICSSCCET 2017] which is published by ASDF International, Registered in London, United Kingdom under the directions of the Editor-in-Chief Dr JBV Subrahmanyam and Editors Dr. Daniel James, Dr. Kokula Krishna Hari Kunasekaran and Dr. Saikishore Elangovan. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at copy@asdf.international for distribution. 2017 © Reserved by Association of Scientists, Developers and Faculties [www.ASDF.international]