The paper concentrates on the study of propagation of thermoelastic waves in a homogeneous, transversely isotropic, thermally conducting elastic plate bordered with layers (or half-spaces) of viscous liquid on both sides in the
context of non classical theories of thermoelasticity. Complex secular equations for symmetric and antisymmetric wave motion of the circular plate, in completely separate terms, are derived. Finally, in order to illustrate the analytical results, the numerical solution is carried out for transversely isotropic plate of cobalt material bordered with water by using the functional iteration method.
Reflection and Transmission of Thermo-Viscoelastic Plane Waves at Liquid-Soli...IDES Editor
The present paper is aimed at to study the reflection and transmission characteristics of plane waves at liquid-solid interface. The liquid is chosen to be inviscid and the solid
half-space is homogeneous isotropic, thermally conducting viscoelastic. Both classical (coupled) and non-classical (generalized) theories of linear thermo-viscoelasticity have been employed to investigate the characteristics of reflected and transmitted waves. Reflection and transmission coefficients are obtained for quasi-longitudinal ( qP ) wave. The numerical computations of reflection and transmission coefficients are carried out for water-copper structure with the help of Gauss-elimination by using MATLAB software and the results have been presented graphically.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes research on thermohaline convection in porous media. Specifically, it presents:
1) An analysis of thermohaline convection using the Brinkman model, which accounts for non-Darcy effects important at high permeability.
2) Derivation of the linearized perturbation equations governing small disturbances to the initial steady state.
3) Non-dimensionalization of the governing equations and introduction of relevant non-dimensional parameters.
4) The resulting non-dimensional equations are to be solved subject to specified boundary conditions, in order to characterize oscillatory motions in thermohaline configurations of Veronis and Stern types within porous media.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research article that investigates relativistic effects on the linear and nonlinear propagation of electron plasma waves in dense quantum plasma with arbitrary temperature. The key points are:
1) A quantum hydrodynamic model is used to study how relativistic effects from streaming motion impact electron plasma waves in a finite-temperature quantum plasma.
2) Both compressive and rarefactive solitons can form in the plasma depending on factors like electron degeneracy and streaming velocity, when relativistic effects are considered.
3) Relativistic effects are found to significantly influence the linear and nonlinear properties of electron plasma waves in this dense, finite-temperature quantum plasma system.
This document studies the role of activity versus elasticity in active nematic liquid crystals through modeling. It finds that when activity dominates, the system evolves turbulently with continuously created and annihilated defects. When elasticity increases, the turbulence decreases and stripes form. With high elasticity, the system forms a uniformly aligned phase like passive nematics. The interplay between activity and elasticity results in different flow phases depending on their relative strengths.
This document discusses the Kuramoto-Sivashinsky equation (KSE), a partial differential equation that arises in fluid dynamics and other fields. The KSE describes chaotic and complex behavior even though it is one of the simplest equations exhibiting such properties. It serves as a link between infinite-dimensional PDE models and finite-dimensional dynamical systems. The document focuses on analyzing solutions to the KSE in various settings like different domain dimensions and parameter regimes. It also discusses bounding the size of solutions and properties like the existence of a global attractor.
Reflection and Transmission of Thermo-Viscoelastic Plane Waves at Liquid-Soli...IDES Editor
The present paper is aimed at to study the reflection and transmission characteristics of plane waves at liquid-solid interface. The liquid is chosen to be inviscid and the solid
half-space is homogeneous isotropic, thermally conducting viscoelastic. Both classical (coupled) and non-classical (generalized) theories of linear thermo-viscoelasticity have been employed to investigate the characteristics of reflected and transmitted waves. Reflection and transmission coefficients are obtained for quasi-longitudinal ( qP ) wave. The numerical computations of reflection and transmission coefficients are carried out for water-copper structure with the help of Gauss-elimination by using MATLAB software and the results have been presented graphically.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
This document summarizes research on thermohaline convection in porous media. Specifically, it presents:
1) An analysis of thermohaline convection using the Brinkman model, which accounts for non-Darcy effects important at high permeability.
2) Derivation of the linearized perturbation equations governing small disturbances to the initial steady state.
3) Non-dimensionalization of the governing equations and introduction of relevant non-dimensional parameters.
4) The resulting non-dimensional equations are to be solved subject to specified boundary conditions, in order to characterize oscillatory motions in thermohaline configurations of Veronis and Stern types within porous media.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document summarizes a research article that investigates relativistic effects on the linear and nonlinear propagation of electron plasma waves in dense quantum plasma with arbitrary temperature. The key points are:
1) A quantum hydrodynamic model is used to study how relativistic effects from streaming motion impact electron plasma waves in a finite-temperature quantum plasma.
2) Both compressive and rarefactive solitons can form in the plasma depending on factors like electron degeneracy and streaming velocity, when relativistic effects are considered.
3) Relativistic effects are found to significantly influence the linear and nonlinear properties of electron plasma waves in this dense, finite-temperature quantum plasma system.
This document studies the role of activity versus elasticity in active nematic liquid crystals through modeling. It finds that when activity dominates, the system evolves turbulently with continuously created and annihilated defects. When elasticity increases, the turbulence decreases and stripes form. With high elasticity, the system forms a uniformly aligned phase like passive nematics. The interplay between activity and elasticity results in different flow phases depending on their relative strengths.
This document discusses the Kuramoto-Sivashinsky equation (KSE), a partial differential equation that arises in fluid dynamics and other fields. The KSE describes chaotic and complex behavior even though it is one of the simplest equations exhibiting such properties. It serves as a link between infinite-dimensional PDE models and finite-dimensional dynamical systems. The document focuses on analyzing solutions to the KSE in various settings like different domain dimensions and parameter regimes. It also discusses bounding the size of solutions and properties like the existence of a global attractor.
This document summarizes a study on magnetohydrodynamic (MHD) boundary layer flow over a moving vertical plate in a porous medium. The study analyzes the effects of suction and viscous dissipation on heat and mass transfer. The governing equations are reduced to a nonlinear boundary value problem using similarity transformations and solved numerically. Results show that fluid velocity decreases with increasing magnetic parameter and increases with increasing thermal or solutal Grashof numbers, representing the effects of buoyancy forces.
This document summarizes a study that examines heat and mass transfer over a vertical plate in a porous medium with Soret and Dufour effects, a convective surface boundary condition, chemical reaction, and magnetic field. The governing equations for the fluid flow, heat transfer, and mass transfer are presented. Similarity solutions are used to transform the governing partial differential equations into ordinary differential equations, which are then solved numerically. The results are presented graphically to show the influence of various parameters on velocity, temperature, concentration, skin friction, Nusselt number, and Sherwood number.
Quantum Tunneling of Normal-Superconductor Interfaces in a Type-I Superconductororiolespinal
This document discusses quantum tunneling of normal-superconductor interfaces in a type-I superconductor. It begins by providing background on type-I superconductivity and the intermediate state. In the intermediate state, the material exists as a mixture of normal and superconducting regions. Magnetic irreversibility arises from a topological hysteresis effect as magnetic flux penetrates or exits the material. Experimental results are then presented using a SQUID magnetometer to study the magnetic behavior of spheres, cylinders, and disks of lead with different orientations in applied magnetic fields. Quantum tunneling of the normal-superconductor interfaces that form the mixed state is observed and contributes to understanding flux motion in type-I superconductors
The document discusses transport phenomena and provides definitions and examples of key concepts in vector and tensor analysis used to describe transport phenomena. It defines transport phenomena as dealing with the movement of physical quantities in chemical or mechanical processes. There are three main types of transport: momentum, energy, and mass transport. Vector and tensor quantities like velocity, stress, and strain gradient are used to describe transport phenomena. Tensors have a magnitude and direction(s) and transform under coordinate system rotations. The document provides examples of scalar, vector, and tensor notation and the Kronecker delta, alternating unit tensor, and mathematical operations on vectors like addition, dot product, and cross product.
Conformal Nonlinear Fluid Dynamics from Gravity in Arbitrary DimensionsMichaelRabinovich
This document summarizes research on constructing solutions to Einstein's equations in arbitrary dimensions d that are dual to fluid dynamics on the boundary. The key points are:
1. Solutions are constructed perturbatively to second order in a boundary derivative expansion and are parameterized by a boundary velocity and temperature field obeying the Navier-Stokes equations.
2. The bulk metric dual to an arbitrary fluid flow on a weakly curved boundary is computed explicitly to second order.
3. The boundary stress tensor dual to these solutions is also computed and expressed in a manifestly Weyl-covariant form involving the velocity, temperature, and their derivatives.
4. Properties of the solutions like the event horizon location and an
This document outlines the key concepts and topics covered in a course on advanced physical chemistry. It discusses the following:
- The overall objective of the course is for students to learn the theoretical bases for understanding physicochemical phenomena in molecular terms and their relationship to thermodynamic descriptions.
- The course will cover kinetics, including basic concepts, analysis of complex reactions, approximate methods, and reactions in solution. It will also cover catalysis.
- The topics are organized into 5 main sections, with some adjustments to time allocation and content compared to a previous version of the course. Key concepts in each section will be explored over multiple classes.
The document discusses residual stresses that arise during welding due to localized heating and rapid cooling. It analyzes how welding conditions like travel speed, specimen size, constraints, and preheating can affect residual stress distributions. A finite element model is used to simulate butt welding and predict residual stresses in the weld and base metal. The results show that transverse and longitudinal residual stresses are highest near the weld and decrease with increasing distance. Faster travel speeds, larger specimen sizes, and preheating can reduce residual stresses, while external constraints decrease transverse shrinkage and associated stresses.
This document summarizes a talk on the variation of fundamental constants over time. It discusses several methods for measuring potential variations, including analyses of the cosmic microwave background, quasar absorption spectra, radioactive decay rates from the natural nuclear reactor at Oklo, and comparisons of atomic clock rates. Measurements from big bang nucleosynthesis and quasar data suggest the fine structure constant may have been smaller in the early universe, varying on the order of 10^-15 per year. However, results are not conclusive and depend on theoretical models. Ongoing work using improved atomic clocks aims to more precisely measure any drift of fundamental constants like the fine structure constant and quark-mass ratios over time.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document presents a transient simulation study of a continuous cooling crystallizer producing needle-shaped crystals using a two-dimensional population balance model. The model includes nucleation, growth of two crystal facets, and mass and heat balances. The population balance equation is closed using a standard moment method, yielding a system of ordinary differential equations for the moments of crystal size. Simulation results analyze the transient behavior and effects of kinetic and process parameters on crystal size distribution characteristics.
1) Maxwell relationships and their applications are explored, including Maxwell's equations which relate partial derivatives of thermodynamic properties like internal energy (U), entropy (S), volume (V), temperature (T), and pressure (P).
2) An example application shows the dependence of entropy (S) on temperature (T) and volume (V) for an ideal gas using Maxwell's equations.
3) It is shown that the difference between constant pressure (CP) and constant volume (CV) heat capacities can be expressed using Maxwell's equations in terms of the thermal expansion coefficient and isothermal compressibility of materials.
A thermodynamically consistent model for hysteretic materialsFa-Gung Fan
Based on the second law of thermodynamics, a set of constitutive equations for small deformation of heat conducting, hysteretic materials is proposed. It is shown that the model exhibits elastic-viscoplastic-fluid behavior similar to Bingham's materials. Therefore, it may be a suitable candidate for modeling the mechanical behaviors of materials during melting and/or solidification processes. The corresponding bi-axial and uni-axial force-displacement models are also developed and their properties are discussed. It is shown that the resulting force-displacement relations are similar to those given by the Bouc-Wen Model; however, certain modifications are needed to make the earlier model thermodynamically consistent. Several numerical experiments for the uni-axial and bi-axial models are also presented.
- G. Ahmadi, F.-G. Fan, M. Noori
Solution of MHD Effect on Transient Free Convection Flow past a Vertical Plat...iosrjce
IOSR Journal of Applied Physics (IOSR-JAP) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of physics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in applied physics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simulating Performance Impacts of Bus Priority Measures IDES Editor
Public transport has an important role to play in the
provision of reliable travel in congested conditions as it makes
excellent use of limited road space, carrying many more
passengers than a private car for a given amount of road space.
This paper involves study and analysis of various Bus Priority
Measures in terms of change in delay with respect to normal
intersection for the buses and also for whole traffic flow
(including buses and all other vehicles) with the help of results
of VISSIM simulation software for various volumes of traffic
flow. These measures can be applied to give buses priority to
make them a more attractive alternative to the private vehicles
and reducing road congestion.
Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy P...IDES Editor
E-Brainstorming is a computerized version of sharing
ideas and it replaces verbal communication. The productivity
of ideas generated is viewed as the dominant measure of EBrainstorming.
In Agent-based E-Brainstorming, Idea
Ontology was used to map user’s knowledge with idea names
and relationships between idea instances. In this paper
Oriented Directed Acyclic Graph (ODAG) method is used to
construct the ideation map for diverse ideas and their
relationship. Privacy Preference Ontology is integrated to
provide privacy preference for user’s data like access control,
condition, access space and restriction. Here the Idea
Knowledge Base is applied and it enfolds a collection of idea
instances of different domains to denote a client’s knowledge.
Exploring the Solution Space of Sorting by Reversals: A New ApproachIDES Editor
Analysing genome rearrangements is a problem
from the vast domain of comparative genomics and
computational biology. Several studies have shown that closely
related species have essentially the same set of genes however
their gene orders differ. The differences in the gene order are
the results of various large-scale evolutionary events of which
reversal is the most common rearrangement event. The
problem of finding the shortest sequence of reversals that can
transform one genome into another is called the sorting by
reversals problem. The length of such a sequence is the
reversal distance between the two genomes. In comparative
genomics, sorting by reversals algorithms are often used to
propose evolutionary scenarios of large-scale genomic
mutations between species. Following the first polynomial
time solution of this problem, several improvements has been
published on the subject. In 2008, Braga et al. proposed an
algorithm to perform the enumeration of traces that sort a
signed permutation by reversals. This algorithm has
exponential complexity in both time and space. To efficiently
handle the traces, Baudet and Dias proposed a depth first
approach in 2010. However, one of the limitations of the
proposed algorithm was that it cannot provide the count of
number of solutions in each trace. In this paper we are
presenting an algorithm to list the normal forms of each trace
in depth first manner and provide count of the total number of
solutions in the solution space.
Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition IDES Editor
This document summarizes a study that evaluates the performance of a Continuous Flow Intersection (CFI) using computer simulation under mixed traffic conditions. The study compares the average delays of vehicles at a CFI to those at a Normal Flow Intersection (NFI) for different traffic volumes and proportions of right-turning traffic. The results show that the CFI has lower average delays than the NFI for all traffic scenarios tested, with delays reduced by 30-60% on average. The CFI design provides benefits without requiring additional land and can better utilize existing road infrastructure capacity.
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...IDES Editor
This paper proposes comparative study of two basic
approaches such as Morphological Approach (MA) and
Correlation Approach (CA) and three modified algorithms
over the basic approaches for detection of micronatured defects
occurring in plain weave fabrics. A Hybrid of CA followed by
MA was developed and has shown to overcome the drawbacks
of the basic methods. As automation of MA using DC
Suppressed Fourier Power Spectrum Sum (DCSFPSS),
DCSFPSSMA could not yield improvement in Overall
Detection Accuracy (ODA) for micronatured defects,
automation of modified Hybrid Approach (HA) was proposed
leading to the development of Tribrid Approach (TA). Modified
Hybrid approach involves cascade operation of CA and MA
both automated using DCSFPSS. Texture periodicity of defect
free fabric was obtained using DCSFPSS which was extended
for the design and extraction of defect independent template
for CA and for the design of the size of structuring element
for morphological filtering process. Overall Detection
Accuracy was used by adopting simple binary based defect
search algorithm as the last step in the experimentation to
detect the defects. Overall Detection Accuracy was found to be
~100%/97.41%/ 98.7 % for 247 samples of warp break defect/
double pick/ normal samples and 96.1% /99% for 205 thick
place defect samples/normal samples belonging to two
different plain grey fabric classes. Robustness of the
performance of TA scheme was tested by comparing TA with
two traditional algorithms viz., CA and MA and our previously
proposed hybrid algorithm and DCSFPSSMA. This TA
algorithm outperformed when compared to CA-only, MA-only,
HA and DCSFPSSMA by yielding an overall ODA of more
than 98% for the defect and defect free samples of different
fabric classes. Secondly, the recognition of defect area less
than 1 mm2 which has not been reported in the literature yet,
was possible using this algorithm. We propose to use this
method as a means to grade the grey fabric similar to the
standard fabric grading system.
VFT Application for Asynchronous Power TransferIDES Editor
1) The VFT is a variable frequency transformer that can transfer power between asynchronous power systems by controlling the magnitude and direction of power flow. It functions similar to a conventional induction machine, with power systems connected to the stator and rotor windings.
2) Power flow is controlled by applying a torque to the rotor via a drive motor, which adjusts the rotor position relative to the stator. In one direction of torque, power flows from the stator to the rotor, and vice versa with opposite torque.
3) MATLAB simulation models the VFT as a wound rotor induction machine to study power transfer under different torque conditions between two asynchronous power systems of different voltages and frequencies.
Development of Product Configurator for a Pressure Booster SystemIDES Editor
This paper outlines the process of developing a
product configurator for a pressure booster system. The ideas
presented here were developed when developing a configurator
in the CS-Enterprise package for a pressure booster system.
This paper chronicles the design aspects, the configurator
development planning, rule-based configurator development
and testing and validation, including best practices developed
during the process. Further work possible is also discussed.
This document summarizes a study on magnetohydrodynamic (MHD) boundary layer flow over a moving vertical plate in a porous medium. The study analyzes the effects of suction and viscous dissipation on heat and mass transfer. The governing equations are reduced to a nonlinear boundary value problem using similarity transformations and solved numerically. Results show that fluid velocity decreases with increasing magnetic parameter and increases with increasing thermal or solutal Grashof numbers, representing the effects of buoyancy forces.
This document summarizes a study that examines heat and mass transfer over a vertical plate in a porous medium with Soret and Dufour effects, a convective surface boundary condition, chemical reaction, and magnetic field. The governing equations for the fluid flow, heat transfer, and mass transfer are presented. Similarity solutions are used to transform the governing partial differential equations into ordinary differential equations, which are then solved numerically. The results are presented graphically to show the influence of various parameters on velocity, temperature, concentration, skin friction, Nusselt number, and Sherwood number.
Quantum Tunneling of Normal-Superconductor Interfaces in a Type-I Superconductororiolespinal
This document discusses quantum tunneling of normal-superconductor interfaces in a type-I superconductor. It begins by providing background on type-I superconductivity and the intermediate state. In the intermediate state, the material exists as a mixture of normal and superconducting regions. Magnetic irreversibility arises from a topological hysteresis effect as magnetic flux penetrates or exits the material. Experimental results are then presented using a SQUID magnetometer to study the magnetic behavior of spheres, cylinders, and disks of lead with different orientations in applied magnetic fields. Quantum tunneling of the normal-superconductor interfaces that form the mixed state is observed and contributes to understanding flux motion in type-I superconductors
The document discusses transport phenomena and provides definitions and examples of key concepts in vector and tensor analysis used to describe transport phenomena. It defines transport phenomena as dealing with the movement of physical quantities in chemical or mechanical processes. There are three main types of transport: momentum, energy, and mass transport. Vector and tensor quantities like velocity, stress, and strain gradient are used to describe transport phenomena. Tensors have a magnitude and direction(s) and transform under coordinate system rotations. The document provides examples of scalar, vector, and tensor notation and the Kronecker delta, alternating unit tensor, and mathematical operations on vectors like addition, dot product, and cross product.
Conformal Nonlinear Fluid Dynamics from Gravity in Arbitrary DimensionsMichaelRabinovich
This document summarizes research on constructing solutions to Einstein's equations in arbitrary dimensions d that are dual to fluid dynamics on the boundary. The key points are:
1. Solutions are constructed perturbatively to second order in a boundary derivative expansion and are parameterized by a boundary velocity and temperature field obeying the Navier-Stokes equations.
2. The bulk metric dual to an arbitrary fluid flow on a weakly curved boundary is computed explicitly to second order.
3. The boundary stress tensor dual to these solutions is also computed and expressed in a manifestly Weyl-covariant form involving the velocity, temperature, and their derivatives.
4. Properties of the solutions like the event horizon location and an
This document outlines the key concepts and topics covered in a course on advanced physical chemistry. It discusses the following:
- The overall objective of the course is for students to learn the theoretical bases for understanding physicochemical phenomena in molecular terms and their relationship to thermodynamic descriptions.
- The course will cover kinetics, including basic concepts, analysis of complex reactions, approximate methods, and reactions in solution. It will also cover catalysis.
- The topics are organized into 5 main sections, with some adjustments to time allocation and content compared to a previous version of the course. Key concepts in each section will be explored over multiple classes.
The document discusses residual stresses that arise during welding due to localized heating and rapid cooling. It analyzes how welding conditions like travel speed, specimen size, constraints, and preheating can affect residual stress distributions. A finite element model is used to simulate butt welding and predict residual stresses in the weld and base metal. The results show that transverse and longitudinal residual stresses are highest near the weld and decrease with increasing distance. Faster travel speeds, larger specimen sizes, and preheating can reduce residual stresses, while external constraints decrease transverse shrinkage and associated stresses.
This document summarizes a talk on the variation of fundamental constants over time. It discusses several methods for measuring potential variations, including analyses of the cosmic microwave background, quasar absorption spectra, radioactive decay rates from the natural nuclear reactor at Oklo, and comparisons of atomic clock rates. Measurements from big bang nucleosynthesis and quasar data suggest the fine structure constant may have been smaller in the early universe, varying on the order of 10^-15 per year. However, results are not conclusive and depend on theoretical models. Ongoing work using improved atomic clocks aims to more precisely measure any drift of fundamental constants like the fine structure constant and quark-mass ratios over time.
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
This document presents a transient simulation study of a continuous cooling crystallizer producing needle-shaped crystals using a two-dimensional population balance model. The model includes nucleation, growth of two crystal facets, and mass and heat balances. The population balance equation is closed using a standard moment method, yielding a system of ordinary differential equations for the moments of crystal size. Simulation results analyze the transient behavior and effects of kinetic and process parameters on crystal size distribution characteristics.
1) Maxwell relationships and their applications are explored, including Maxwell's equations which relate partial derivatives of thermodynamic properties like internal energy (U), entropy (S), volume (V), temperature (T), and pressure (P).
2) An example application shows the dependence of entropy (S) on temperature (T) and volume (V) for an ideal gas using Maxwell's equations.
3) It is shown that the difference between constant pressure (CP) and constant volume (CV) heat capacities can be expressed using Maxwell's equations in terms of the thermal expansion coefficient and isothermal compressibility of materials.
A thermodynamically consistent model for hysteretic materialsFa-Gung Fan
Based on the second law of thermodynamics, a set of constitutive equations for small deformation of heat conducting, hysteretic materials is proposed. It is shown that the model exhibits elastic-viscoplastic-fluid behavior similar to Bingham's materials. Therefore, it may be a suitable candidate for modeling the mechanical behaviors of materials during melting and/or solidification processes. The corresponding bi-axial and uni-axial force-displacement models are also developed and their properties are discussed. It is shown that the resulting force-displacement relations are similar to those given by the Bouc-Wen Model; however, certain modifications are needed to make the earlier model thermodynamically consistent. Several numerical experiments for the uni-axial and bi-axial models are also presented.
- G. Ahmadi, F.-G. Fan, M. Noori
Solution of MHD Effect on Transient Free Convection Flow past a Vertical Plat...iosrjce
IOSR Journal of Applied Physics (IOSR-JAP) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of physics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in applied physics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Simulating Performance Impacts of Bus Priority Measures IDES Editor
Public transport has an important role to play in the
provision of reliable travel in congested conditions as it makes
excellent use of limited road space, carrying many more
passengers than a private car for a given amount of road space.
This paper involves study and analysis of various Bus Priority
Measures in terms of change in delay with respect to normal
intersection for the buses and also for whole traffic flow
(including buses and all other vehicles) with the help of results
of VISSIM simulation software for various volumes of traffic
flow. These measures can be applied to give buses priority to
make them a more attractive alternative to the private vehicles
and reducing road congestion.
Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy P...IDES Editor
E-Brainstorming is a computerized version of sharing
ideas and it replaces verbal communication. The productivity
of ideas generated is viewed as the dominant measure of EBrainstorming.
In Agent-based E-Brainstorming, Idea
Ontology was used to map user’s knowledge with idea names
and relationships between idea instances. In this paper
Oriented Directed Acyclic Graph (ODAG) method is used to
construct the ideation map for diverse ideas and their
relationship. Privacy Preference Ontology is integrated to
provide privacy preference for user’s data like access control,
condition, access space and restriction. Here the Idea
Knowledge Base is applied and it enfolds a collection of idea
instances of different domains to denote a client’s knowledge.
Exploring the Solution Space of Sorting by Reversals: A New ApproachIDES Editor
Analysing genome rearrangements is a problem
from the vast domain of comparative genomics and
computational biology. Several studies have shown that closely
related species have essentially the same set of genes however
their gene orders differ. The differences in the gene order are
the results of various large-scale evolutionary events of which
reversal is the most common rearrangement event. The
problem of finding the shortest sequence of reversals that can
transform one genome into another is called the sorting by
reversals problem. The length of such a sequence is the
reversal distance between the two genomes. In comparative
genomics, sorting by reversals algorithms are often used to
propose evolutionary scenarios of large-scale genomic
mutations between species. Following the first polynomial
time solution of this problem, several improvements has been
published on the subject. In 2008, Braga et al. proposed an
algorithm to perform the enumeration of traces that sort a
signed permutation by reversals. This algorithm has
exponential complexity in both time and space. To efficiently
handle the traces, Baudet and Dias proposed a depth first
approach in 2010. However, one of the limitations of the
proposed algorithm was that it cannot provide the count of
number of solutions in each trace. In this paper we are
presenting an algorithm to list the normal forms of each trace
in depth first manner and provide count of the total number of
solutions in the solution space.
Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition IDES Editor
This document summarizes a study that evaluates the performance of a Continuous Flow Intersection (CFI) using computer simulation under mixed traffic conditions. The study compares the average delays of vehicles at a CFI to those at a Normal Flow Intersection (NFI) for different traffic volumes and proportions of right-turning traffic. The results show that the CFI has lower average delays than the NFI for all traffic scenarios tested, with delays reduced by 30-60% on average. The CFI design provides benefits without requiring additional land and can better utilize existing road infrastructure capacity.
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...IDES Editor
This paper proposes comparative study of two basic
approaches such as Morphological Approach (MA) and
Correlation Approach (CA) and three modified algorithms
over the basic approaches for detection of micronatured defects
occurring in plain weave fabrics. A Hybrid of CA followed by
MA was developed and has shown to overcome the drawbacks
of the basic methods. As automation of MA using DC
Suppressed Fourier Power Spectrum Sum (DCSFPSS),
DCSFPSSMA could not yield improvement in Overall
Detection Accuracy (ODA) for micronatured defects,
automation of modified Hybrid Approach (HA) was proposed
leading to the development of Tribrid Approach (TA). Modified
Hybrid approach involves cascade operation of CA and MA
both automated using DCSFPSS. Texture periodicity of defect
free fabric was obtained using DCSFPSS which was extended
for the design and extraction of defect independent template
for CA and for the design of the size of structuring element
for morphological filtering process. Overall Detection
Accuracy was used by adopting simple binary based defect
search algorithm as the last step in the experimentation to
detect the defects. Overall Detection Accuracy was found to be
~100%/97.41%/ 98.7 % for 247 samples of warp break defect/
double pick/ normal samples and 96.1% /99% for 205 thick
place defect samples/normal samples belonging to two
different plain grey fabric classes. Robustness of the
performance of TA scheme was tested by comparing TA with
two traditional algorithms viz., CA and MA and our previously
proposed hybrid algorithm and DCSFPSSMA. This TA
algorithm outperformed when compared to CA-only, MA-only,
HA and DCSFPSSMA by yielding an overall ODA of more
than 98% for the defect and defect free samples of different
fabric classes. Secondly, the recognition of defect area less
than 1 mm2 which has not been reported in the literature yet,
was possible using this algorithm. We propose to use this
method as a means to grade the grey fabric similar to the
standard fabric grading system.
VFT Application for Asynchronous Power TransferIDES Editor
1) The VFT is a variable frequency transformer that can transfer power between asynchronous power systems by controlling the magnitude and direction of power flow. It functions similar to a conventional induction machine, with power systems connected to the stator and rotor windings.
2) Power flow is controlled by applying a torque to the rotor via a drive motor, which adjusts the rotor position relative to the stator. In one direction of torque, power flows from the stator to the rotor, and vice versa with opposite torque.
3) MATLAB simulation models the VFT as a wound rotor induction machine to study power transfer under different torque conditions between two asynchronous power systems of different voltages and frequencies.
Development of Product Configurator for a Pressure Booster SystemIDES Editor
This paper outlines the process of developing a
product configurator for a pressure booster system. The ideas
presented here were developed when developing a configurator
in the CS-Enterprise package for a pressure booster system.
This paper chronicles the design aspects, the configurator
development planning, rule-based configurator development
and testing and validation, including best practices developed
during the process. Further work possible is also discussed.
Este documento describe una actividad integradora para un grupo de estudiantes. El objetivo es que los estudiantes investiguen y difundan información sobre temas como el medio ambiente, la educación o la cultura maya utilizando las redes sociales. Se divide el trabajo en tres roles: investigador documental, experimentador y experto en TIC. Cada estudiante asumirá un rol para recopilar y compartir información que pueda transformar vidas.
Nonlinear Asymmetric Kelvin-Helmholtz Instability Of Cylindrical Flow With Ma...ijtsrd
The nonlinear asymmetric Kelvin-Helmholtz stability of the cylindrical interface between the vapor and liquid phases of a °uid is studied when the phases are enclosed between two cylindri- cal surfaces coaxial with the interface, and when there is mass and heat transfer across the inter- face. The method of multiple time expansion is used for the investigation. The evolution of am- plitude is shown to be governed by a nonlinear ¯rst order di®erential equation. The stability cri- terion is discussed, and the region of stability is displayed graphically. Also investigated in this paper is the viscous linear potential °ow. DOO-SUNG LEE"Nonlinear Asymmetric Kelvin-Helmholtz Instability Of Cylindrical Flow With Mass And Heat Transfer And The Viscous Linear Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-5 , August 2018, URL: http://www.ijtsrd.com/papers/ijtsrd17030.pdf http://www.ijtsrd.com/mathemetics/applied-mathematics/17030/nonlinear-asymmetric-kelvin-helmholtz-instability-of-cylindrical-flow-with-mass-and-heat-transfer-and-the-viscous-linear-analysis/doo-sung-lee
Thermoelastic Damping of Vibrations in a Transversely Isotropic Hollow Cylinder IDES Editor
The purpose of the paper is to analyze the damping of three-dimensional free vibrations in a transversely isotropic, thermoelastic hollow cylinder, which is initially undeformed
and kept at uniform temperature. The surfaces of the cylinder are subjected to stress free and thermally insulated boundary conditions. The displacement potential functions have been introduced for decoupling the purely shear and longitudinal motions in the equations of motion and heat equation. The purely transverse wave gets decoupled from rest of the motion and is not affected by thermal field. By using the method of separation of variables, the system of governing partial differential equations is reduced to four second order coupled ordinary differential equation in radial coordinate. The matrix Frobenius method of extended power series is employed to obtain the solution of coupled ordinary differential equations along the radial coordinate. In order to illustrate the analytic results, the numerical solution of various relations and equations are carried out to compute lowest frequency and thermoelastic damping factor with M ATLAB software programming for zinc material. The computer simulated results have been presented graphically.
Thermal instability of incompressible non newtonian viscoelastic fluid with...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Thermal instability of incompressible non newtonian viscoelastic fluid with...eSAT Journals
1) The document summarizes a study on the thermal instability of incompressible, non-Newtonian viscoelastic fluids under the effects of rotation and magnetic fields.
2) Key findings include that rotation has a stabilizing effect on the fluid, while the magnetic field can have both stabilizing and destabilizing effects.
3) The study found that rotation and magnetic fields introduce oscillatory modes into the system that were not present without their effects. Graphs were presented showing the relationships between stability and the rotation and magnetic field parameters.
Boundary Layer Flow in the Vicinity of the Forward Stagnation Point of the Sp...iosrjce
Exact solutions are important not only in its own right as solution of particular flows, but also serve as accuracy check for numerical solution. Exact solution of the Navier-Strokes equation are, for example, those
of steady and unsteady flows near a stagnation point, Stagnation point flows can either be viscous or inviscid,
steady or unsteady, two dimensional or three dimensional, normal or oblique and forward or reverse. The classic problems of two dimensional and three dimensional stagnation point flow are associated with the names of Hiemenz and Homan A novel radial stagnation point flow impinging axi symmetrically on a circular cylinder was reported by Wang. The present paper deals with the laminar boundary layer flow and heat transfer in the
stagnation region of a rotating and translating sphere with uniform magnetic fields. The governing equations of
flow are derived for ξ = 0 (t*=0) and ξ=1 (t*→∞) and solutions in the closed form are obtained. The
temperature and velocity fields for ξ = 0 are numerically computed. This shows that the thermal boundary layer
thickness decreases as Prandtl number Princreases.The surface heat transfer (28) increases with the Prandtl
number Pr. The surface heat transfer (28) at the starting of motion is found to be strangely dependent on the
Prandtl number Pr. But it is dependent of magnetic field, buoyancy force Bp and Rotation Parameter Ro.
This document presents a numerical solution for unsteady heat and mass transfer flow past an infinite vertical plate with variable thermal conductivity, taking into account Dufour number and heat source effects. The governing equations are non-linear and coupled, and were solved numerically using an implicit finite difference scheme. Various parameters, including Dufour number and heat source, were found to influence the velocity, temperature, and concentration profiles. Skin friction, Nusselt number, and Sherwood number were also calculated.
Effect of Radiation and Thermo-Diffusion on Convective Heat and Mass Transfer...inventionjournals
International Journal of Mathematics and Statistics Invention (IJMSI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJMSI publishes research articles and reviews within the whole field Mathematics and Statistics, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online
International Journal of Mathematics and Statistics Invention (IJMSI)inventionjournals
This document presents a study of unsteady magnetopolar free convection flow through a porous medium with radiation and variable suction. The governing equations for this problem are derived and solved using a series expansion method. Results are presented graphically showing the effects of various parameters like permeability, magnetic field, thermal Grashof number, and slip on velocity, angular velocity, temperature, concentration, skin friction, and heat transfer rate for the fluids air and water. Key findings include that decreasing thermal Grashof number decreases skin friction in air but increases it in water, and decreasing the temperature jump parameter increases the heat transfer rate.
This document summarizes a research paper that analyzes boundary layer flow of an incompressible fluid past a moving vertical plate in a porous medium. The analysis considers variable permeability, thermal conductivity, and viscous dissipation effects. Governing equations are non-dimensionalized and solved numerically. Results show that the permeability parameter and Grashof number significantly impact velocity and temperature profiles. Increasing the Eckert number decreases velocity and temperature. Accounting for variable thermal conductivity and permeability produces new patterns in velocity and temperature variation.
Two-dimensional numerical simulations were conducted of flow through a channel with spatially periodic temperature boundary conditions on the lower wall. The simulations showed:
1) A bifurcation to oscillatory flow occurs at Reynolds numbers as low as 4 and Rayleigh numbers as low as 14,500.
2) The frequency of oscillation decreases with increasing Reynolds number and is independent of the Rayleigh number.
3) Maps were created showing different flow regimes for varying periodicities of the temperature boundary conditions.
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...IJERA Editor
The consideration of nanofluids has been paid a good attention on the forced convection; the analysis focusing
nanofluids in porous media are limited in literature. Thus, the use of nanofluids in porous media would be very
much helpful in heat and mass transfer enhancement. In this paper, the influence of variable suction, Newtonian
heating and heat source or sink heat and mass transfer over a permeable shrinking sheet embedded in a porous
medium filled with a nanofluid is discussed in detail. The solutions of the nonlinear equations governing the
velocɨty, temperature and concentration profiles are solved numerically using Runge-Kutta Gill procedure
together with shooting method and graphical results for the resulting parameters are displayed and discussed.
The influence of the physical parameters on skin-friction coefficient, local Nusselt number and local Sherwood
number are shown in a tabulated form.
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...IJERA Editor
The consideration of nanofluids has been paid a good attention on the forced convection; the analysis focusing
nanofluids in porous media are limited in literature. Thus, the use of nanofluids in porous media would be very
much helpful in heat and mass transfer enhancement. In this paper, the influence of variable suction, Newtonian
heating and heat source or sink heat and mass transfer over a permeable shrinking sheet embedded in a porous
medium filled with a nanofluid is discussed in detail. The solutions of the nonlinear equations governing the
velocɨty, temperature and concentration profiles are solved numerically using Runge-Kutta Gill procedure
together with shooting method and graphical results for the resulting parameters are displayed and discussed.
The influence of the physical parameters on skin-friction coefficient, local Nusselt number and local Sherwood
number are shown in a tabulated form.
Nanofluid Flow past an Unsteady Permeable Shrinking Sheet with Heat Source or...IJERA Editor
The consideration of nanofluids has been paid a good attention on the forced convection; the analysis focusing
nanofluids in porous media are limited in literature. Thus, the use of nanofluids in porous media would be very
much helpful in heat and mass transfer enhancement. In this paper, the influence of variable suction, Newtonian
heating and heat source or sink heat and mass transfer over a permeable shrinking sheet embedded in a porous
medium filled with a nanofluid is discussed in detail. The solutions of the nonlinear equations governing the
velocɨty, temperature and concentration profiles are solved numerically using Runge-Kutta Gill procedure
together with shooting method and graphical results for the resulting parameters are displayed and discussed.
The influence of the physical parameters on skin-friction coefficient, local Nusselt number and local Sherwood
number are shown in a tabulated form.
Linear and Weakly Non-Linear Stability Analyses of Double-Diffusive ElectroCo...iosrjce
The linear and weakly non-linear stability analyses of double diffusive electro-convention in a micropolar fluid
layer heated and saluted from below and cooled from above is studied. The linear and non-linear analyses are, respectively
based on normal mode technique and truncated representation of Fourier series. The influence of various parameters on the
onset of convection has been analyzed in the linear case. The resulting autonomous Lorenz model obtained in non-linear
analysis is solved numerically to quantify the heat and mass transforms through Nusselt and Sherwood number. It is
observed that the increase in concentration of suspended particles and electric field and electric Rayleigh number increases
the heat and mass transfer
International Journal of Computational Engineering Research(IJCER)ijceronline
The document summarizes a study on the effect of thermal radiation on boundary layer flow of a second-grade fluid over a stretching sheet through a porous medium, where the fluid's viscosity and thermal conductivity are temperature dependent. The governing equations are non-dimensionalized using similarity transformations and then solved numerically. Results show the effects of various parameters like radiation, viscosity, thermal conductivity, and porosity on the fluid's velocity and temperature profiles, as well as the skin friction coefficient and Nusselt number.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Effect of Radiation on Mixed Convection Flow of a Non-Newtonian Nan fluid ove...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Radiation Effects on MHD Free Convective Rotating Flow with Hall EffectsIJERA Editor
In this paper, we have studied the unsteady an incompressible MHD rotating free convection flow of Viscoelastic fluid through a porous medium with simultaneous heat and mass transfer near an infinite vertical oscillating porous plate under the influence of uniform transverse magnetic field. The governing equations of the flow field are solved by a regular perturbation method for small elastic parameter. The expressions for the velocity, temperature, concentration have been derived analytically and also its behaviour is computationally discussed with reference to different flow parameters with the help of graphs. The skin friction, the Nusselt number and the Sherwood number are also obtained and their behaviour discussed.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Similar to Circular Waves in Thermoelastic Plates Bordered with Viscous Liquid (20)
Power System State Estimation - A ReviewIDES Editor
This document provides a review of power system state estimation techniques. It discusses both static and dynamic state estimation algorithms. For static state estimation, it covers weighted least squares, decoupled, and robust estimation methods. Weighted least squares is commonly used but can have numerical instability issues. Decoupled state estimation approximates the gain matrix for faster computation. Robust estimation uses M-estimators and other techniques to handle outliers and bad data. Dynamic state estimation applies Kalman filtering, leapfrog algorithms, and other methods to continuously monitor system states over time.
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
This document summarizes a research paper that proposes using artificial intelligence techniques and FACTS controllers for reactive power planning in real-time power transmission systems. The paper formulates the reactive power planning problem and incorporates flexible AC transmission system (FACTS) devices like static VAR compensators (SVC), thyristor controlled series capacitors (TCSC), and unified power flow controllers (UPFC). Evolutionary algorithms like evolutionary programming (EP) and differential evolution (DE) are applied to find the optimal locations and settings of the FACTS controllers to minimize losses and costs. Simulation results on IEEE 30-bus and 72-bus Indian test systems show that UPFC performs best in reducing losses compared to SVC and TCSC.
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
Damping of power system oscillations with the help
of proposed optimal Proportional Integral Derivative Power
System Stabilizer (PID-PSS) and Static Var Compensator
(SVC)-based controllers are thoroughly investigated in this
paper. This study presents robust tuning of PID-PSS and
SVC-based controllers using Genetic Algorithms (GA) in
multi machine power systems by considering detailed model
of the generators (model 1.1). The effectiveness of FACTSbased
controllers in general and SVC-based controller in
particular depends upon their proper location. Modal
controllability and observability are used to locate SVC–based
controller. The performance of the proposed controllers is
compared with conventional lead-lag power system stabilizer
(CPSS) and demonstrated on 10 machines, 39 bus New England
test system. Simulation studies show that the proposed genetic
based PID-PSS with SVC based controller provides better
performance.
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
This paper presents the need to operate the power
system economically and with optimum levels of voltages has
further led to an increase in interest in Distributed
Generation. In order to reduce the power losses and to improve
the voltage in the distribution system, distributed generators
(DGs) are connected to load bus. To reduce the total power
losses in the system, the most important process is to identify
the proper location for fixing and sizing of DGs. It presents a
new methodology using a new population based meta heuristic
approach namely Artificial Bee Colony algorithm(ABC) for
the placement of Distributed Generators(DG) in the radial
distribution systems to reduce the real power losses and to
improve the voltage profile, voltage sag mitigation. The power
loss reduction is important factor for utility companies because
it is directly proportional to the company benefits in a
competitive electricity market, while reaching the better power
quality standards is too important as it has vital effect on
customer orientation. In this paper an ABC algorithm is
developed to gain these goals all together. In order to evaluate
sag mitigation capability of the proposed algorithm, voltage
in voltage sensitive buses is investigated. An existing 20KV
network has been chosen as test network and results are
compared with the proposed method in the radial distribution
system.
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
Controlling power flow in modern power systems
can be made more flexible by the use of recent developments
in power electronic and computing control technology. The
Unified Power Flow Controller (UPFC) is a Flexible AC
transmission system (FACTS) device that can control all the
three system variables namely line reactance, magnitude and
phase angle difference of voltage across the line. The UPFC
provides a promising means to control power flow in modern
power systems. Essentially the performance depends on proper
control setting achievable through a power flow analysis
program. This paper presents a reliable method to meet the
requirements by developing a Newton-Raphson based load
flow calculation through which control settings of UPFC can
be determined for the pre-specified power flow between the
lines. The proposed method keeps Newton-Raphson Load Flow
(NRLF) algorithm intact and needs (little modification in the
Jacobian matrix). A MATLAB program has been developed to
calculate the control settings of UPFC and the power flow
between the lines after the load flow is converged. Case studies
have been performed on IEEE 5-bus system and 14-bus system
to show that the proposed method is effective. These studies
indicate that the method maintains the basic NRLF properties
such as fast computational speed, high degree of accuracy and
good convergence rate.
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
The size and shape of opening in dam causes the
stress concentration, it also causes the stress variation in the
rest of the dam cross section. The gravity method of the analysis
does not consider the size of opening and the elastic property
of dam material. Thus the objective of study is comprises of
the Finite Element Method which considers the size of
opening, elastic property of material, and stress distribution
because of geometric discontinuity in cross section of dam.
Stress concentration inside the dam increases with the opening
in dam which results in the failure of dam. Hence it is
necessary to analyses large opening inside the dam. By making
the percentage area of opening constant and varying size and
shape of opening the analysis is carried out. For this purpose
a section of Koyna Dam is considered. Dam is defined as a
plane strain element in FEM, based on geometry and loading
condition. Thus this available information specified our path
of approach to carry out 2D plane strain analysis. The results
obtained are then compared mutually to get most efficient
way of providing large opening in the gravity dam.
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
Pushover Analysis a popular tool for seismic
performance evaluation of existing and new structures and is
nonlinear Static procedure where in monotonically increasing
loads are applied to the structure till the structure is unable
to resist the further load .During the analysis, whatever the
strength of concrete and steel is adopted for analysis of
structure may not be the same when real structure is
constructed and the pushover analysis results are very sensitive
to material model adopted, geometric model adopted, location
of plastic hinges and in general to procedure followed by the
analyzer. In this paper attempt has been made to assess
uncertainty in pushover analysis results by considering user
defined hinges and frame modeled as bare frame and frame
with slab modeled as rigid diaphragm and results compared
with experimental observations. Uncertain parameters
considered includes the strength of concrete, strength of steel
and cover to the reinforcement which are randomly generated
and incorporated into the analysis. The results are then
compared with experimental observations.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
The problems associated with selfish nodes in
MANET are addressed by a collaborative watchdog approach
which reduces the detection time for selfish nodes thereby
improves the performance and accuracy of watchdogs[1]. In
the related works they make use of credit based systems, reputation
based mechanisms, pathrater and watchdog mechanism
to detect such selfish nodes. In this paper we follow an approach
of collaborative watchdog which reduces the detection
time for selfish nodes and also involves the removal of such
selfish nodes based on some progressively assessed thresholds.
The threshold gives the nodes a chance to stop misbehaving
before it is permanently deleted from the network.
The node passes through several isolation processes before it
is permanently removed. Another version of AODV protocol
is used here which allows the simulation of selfish nodes in
NS2 by adding or modifying log files in the protocol.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
The recent advancements in the wireless technology
and their wide-spread deployment have made remarkable
enhancements in efficiency in the corporate and industrial
and Military sectors The increasing popularity and usage of
wireless technology is creating a need for more secure wireless
Ad hoc networks. This paper aims researched and developed
a new protocol that prevents wormhole attacks on a ad hoc
network. A few existing protocols detect wormhole attacks but
they require highly specialized equipment not found on most
wireless devices. This paper aims to develop a defense against
wormhole attacks as an Anti-worm protocol which is based on
responsive parameters, that does not require as a significant
amount of specialized equipment, trick clock synchronization,
no GPS dependencies.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
This document summarizes a proposed cloud security and data integrity framework that provides client accountability. The framework aims to address issues like lack of user control over cloud data, need for data transparency and tracking, and ensuring data integrity. It proposes using JAR (Java Archive) files for data sharing due to benefits like portability. The framework incorporates client-side verification using MD5 hashing, digital signature-based authentication of JAR files, and use of HMAC to ensure data integrity. It also uses password-based encryption of log files to keep them tamper-proof. The framework is intended to provide both accountability and security for data sharing in cloud environments.
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
A System state in HTTP botnet uses HTTP protocol
for the creation of chain of Botnets thereby compromising
other systems. By using HTTP protocol and port number 80,
attacks can not only be hidden but also pass through the
firewall without being detected. The DPR based detection
leads to better analysis of botnet attacks [3]. However, it
provides only probabilistic detection of the attacker and also
time consuming and error prone. This paper proposes a Genetic
algorithm based layered approach for detecting as well as
preventing botnet attacks. The paper reviews p2p firewall
implementation which forms the basis of filtering.
Performance evaluation is done based on precision, F-value
and probability. Layered approach reduces the computation
and overall time requirement [7]. Genetic algorithm promises
a low false positive rate.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
The main tasks of a Wireless Sensor Network
(WSN) are data collection from its nodes and communication
of this data to the base station (BS). The protocols used for
communication among the WSN nodes and between the WSN
and the BS, must consider the resource constraints of nodes,
battery energy, computational capabilities and memory. The
WSN applications involve unattended operation of the network
over an extended period of time. In order to extend the lifetime
of a WSN, efficient routing protocols need to be adopted. The
proposed low power routing protocol based on tree-based
network structure reliably forwards the measured data towards
the BS using TDMA. An energy consumption analysis of the
WSN making use of this protocol is also carried out. It is
found that the network is energy efficient with an average
duty cycle of 0:7% for the WSN nodes. The OmNET++
simulation platform along with MiXiM framework is made
use of.
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
The security of authentication of internet based
co-banking services should not be susceptible to high risks.
The passwords are highly vulnerable to virus attacks due to
the lack of high end embedding of security methods. In order
for the passwords to be more secure, people are generally
compelled to select jumbled up character based passwords
which are not only less memorable but are also equally prone
to insecurity. Multiple use of distributed shares has been
studied to solve the problem of authentication by algorithms
based on thresholding of pixels in image processing and visual
cryptography concepts where the subset of shares is considered
for the recovery of the original image for authentication using
correlation function[1][2].The main disadvantage in the above
study is the plain storage of shares and also one of the shares
is being supplied to the customer, which will lead to the
possibility of misuse by a third party. This paper proposes a
technique for scrambling of pixels by key based random
permutation (KBRP) within the shares before the
authentication has been attempted. Total number of shares to
be created is dependent on the multiplicity of ownership of
the account. By this method the problem of uncertainty among
the customers with regard to security, storage, retrieval of
holding of half of the shares is minimized.
This paper presents a trifocal Rotman Lens Design
approach. The effects of focal ratio and element spacing on
the performance of Rotman Lens are described. A three beam
prototype feeding 4 element antenna array working in L-band
has been simulated using RLD v1.7 software. Simulated
results show that the simulated lens has a return loss of –
12.4dB at 1.8GHz. Beam to array port phase error variation
with change in the focal ratio and element spacing has also
been investigated.
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
Hyperspectral images can be efficiently compressed
through a linear predictive model, as for example the one
used in the SLSQ algorithm. In this paper we exploit this
predictive model on the AVIRIS images by individuating,
through an off-line approach, a common subset of bands, which
are not spectrally related with any other bands. These bands
are not useful as prediction reference for the SLSQ 3-D
predictive model and we need to encode them via other
prediction strategies which consider only spatial correlation.
We have obtained this subset by clustering the AVIRIS bands
via the clustering by compression approach. The main result
of this paper is the list of the bands, not related with the
others, for AVIRIS images. The clustering trees obtained for
AVIRIS and the relationship among bands they depict is also
an interesting starting point for future research.
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
A microelectronic circuit of block-elements
functionally analogous to two hydrogen bonding networks is
investigated. The hydrogen bonding networks are extracted
from â-lactamase protein and are formed in its active site.
Each hydrogen bond of the network is described in equivalent
electrical circuit by three or four-terminal block-element.
Each block-element is coded in Matlab. Static and dynamic
analyses are performed. The resultant microelectronic circuit
analogous to the hydrogen bonding network operates as
current mirror, sine pulse source, triangular pulse source as
well as signal modulator.
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
In this paper a method is proposed to discriminate
real world scenes in to natural and manmade scenes of similar
depth. Global-roughness of a scene image varies as a function
of image-depth. Increase in image depth leads to increase in
roughness in manmade scenes; on the contrary natural scenes
exhibit smooth behavior at higher image depth. This particular
arrangement of pixels in scene structure can be well explained
by local texture information in a pixel and its neighborhood.
Our proposed method analyses local texture information of a
scene image using texture unit matrix. For final classification
we have used both supervised and unsupervised learning using
K-Nearest Neighbor classifier (KNN) and Self Organizing
Map (SOM) respectively. This technique is useful for online
classification due to very less computational complexity.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Conversational agents, or chatbots, are increasingly used to access all sorts of services using natural language. While open-domain chatbots - like ChatGPT - can converse on any topic, task-oriented chatbots - the focus of this paper - are designed for specific tasks, like booking a flight, obtaining customer support, or setting an appointment. Like any other software, task-oriented chatbots need to be properly tested, usually by defining and executing test scenarios (i.e., sequences of user-chatbot interactions). However, there is currently a lack of methods to quantify the completeness and strength of such test scenarios, which can lead to low-quality tests, and hence to buggy chatbots.
To fill this gap, we propose adapting mutation testing (MuT) for task-oriented chatbots. To this end, we introduce a set of mutation operators that emulate faults in chatbot designs, an architecture that enables MuT on chatbots built using heterogeneous technologies, and a practical realisation as an Eclipse plugin. Moreover, we evaluate the applicability, effectiveness and efficiency of our approach on open-source chatbots, with promising results.
What is an RPA CoE? Session 2 – CoE RolesDianaGray10
In this session, we will review the players involved in the CoE and how each role impacts opportunities.
Topics covered:
• What roles are essential?
• What place in the automation journey does each role play?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
In our second session, we shall learn all about the main features and fundamentals of UiPath Studio that enable us to use the building blocks for any automation project.
📕 Detailed agenda:
Variables and Datatypes
Workflow Layouts
Arguments
Control Flows and Loops
Conditional Statements
💻 Extra training through UiPath Academy:
Variables, Constants, and Arguments in Studio
Control Flow in Studio
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillLizaNolte
HERE IS YOUR WEBINAR CONTENT! 'Mastering Customer Journey Management with Dr. Graham Hill'. We hope you find the webinar recording both insightful and enjoyable.
In this webinar, we explored essential aspects of Customer Journey Management and personalization. Here’s a summary of the key insights and topics discussed:
Key Takeaways:
Understanding the Customer Journey: Dr. Hill emphasized the importance of mapping and understanding the complete customer journey to identify touchpoints and opportunities for improvement.
Personalization Strategies: We discussed how to leverage data and insights to create personalized experiences that resonate with customers.
Technology Integration: Insights were shared on how inQuba’s advanced technology can streamline customer interactions and drive operational efficiency.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Keywords: AI, Containeres, Kubernetes, Cloud Native
Event Link: https://meine.doag.org/events/cloudland/2024/agenda/#agendaId.4211
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsScyllaDB
ScyllaDB monitoring provides a lot of useful information. But sometimes it’s not easy to find the root of the problem if something is wrong or even estimate the remaining capacity by the load on the cluster. This talk shares our team's practical tips on: 1) How to find the root of the problem by metrics if ScyllaDB is slow 2) How to interpret the load and plan capacity for the future 3) Compaction strategies and how to choose the right one 4) Important metrics which aren’t available in the default monitoring setup.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).