Abstract The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers. Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However, the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and authentication technique along with rapid communication and group messages to fasten the speed of communication. Keywords: Protocol, Communication, Security, Privacy
Bit error rate analysis of wimax physical layer under sui and awgn channel mo...eSAT Journals
Abstract Requirement of portable, mobile and high speed connectivity for internet access is increasing day by day. WiMAX will be playing an important role in the Broadband Wireless Technology (BWT) sector, since it is more cost-effective and easy to install technology. It is a fixed Broadband Wireless Access (BWA) system based on the IEEE 802.16 standards and will be used to provide “last mile” access to the broadband and Internet access services. The WiMAX technology is based on the IEEE 802.16-2004 Air Interface Standard and is rapidly proving itself as a technology that will play a significant role in fixed broadband wireless metropolitan area networks. It is based on the concept of orthogonal frequency division multiple access technique in wireless communication. This paper investigates the performance of WiMAX network under AWGN and SUI Channel Model by varying physical layer parameter such as higher M-ary modulation, coding scheme and cyclic prefix. Keywords: BWA, BWT, WiMAX, OFDM, CP, WLAN
Buckling analysis of line continuum with new matrices of stiffness and geometryeSAT Journals
Abstract This research work present buckling analysis of line continuum with new matrices of elastic stiffness and geometric stiffness. The stiffness matrices were developed using energy variational principle. Two deformable nodes were considered at the centre and at the two ends of the continuum which brings the number of deformable node to six. The six term Taylor McLaurin’s shape function was substituted into strain energy equation and the result functional was minimized, resulting in a 6 x 6 stiffness matrix used herein. The six term shape function is also substituted into the geometric work equation and minimized to obtain 6 x 6 geometric stiffness matrix for buckling analysis. The two matrices were employed, as well as traditional 4 x 4 matrices in classical buckling analysis of four line continua. The results from the new 6 x 6 matrices of stiffness and geometry were very close to exact results, with average percentage difference of 2.33% from exact result. Whereas those from the traditional 4 x 4 matrices and 5 x 5 matrices differed from exact results, with average percentage difference of 23.73% and 2.55% respectively. Thus the newly developed 6 x 6 matrices of stiffness and geometry are suitable for classical buckling analysis of line continuum. Keywords: 6x6 stiffness system; buckling; geometry; line continuum; variational principle; deformable node; shape function; classical; numerical; analysis; beam
A concept of data transmission within downhole telemetry systems in oilfield industry through power lines is presented. Based on this concept, MATLAB/Simulink models simulating communication lines in downhole telemetry systems are built, which can be used as prototypes for development of real systems. The most appropriate signal modulation methods for data transmission in downhole telemetry systems are suggested and discussed. The influence of high-voltage interference on signal transmission through power line from downhole unit to ground based unit is simulated. Usage of error-correcting coding methods for data transmission such as Hamming code, Reed-Solomon code, BCH code is suggested, and its efficiency is demonstrated.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Bit error rate analysis of wimax physical layer under sui and awgn channel mo...eSAT Journals
Abstract Requirement of portable, mobile and high speed connectivity for internet access is increasing day by day. WiMAX will be playing an important role in the Broadband Wireless Technology (BWT) sector, since it is more cost-effective and easy to install technology. It is a fixed Broadband Wireless Access (BWA) system based on the IEEE 802.16 standards and will be used to provide “last mile” access to the broadband and Internet access services. The WiMAX technology is based on the IEEE 802.16-2004 Air Interface Standard and is rapidly proving itself as a technology that will play a significant role in fixed broadband wireless metropolitan area networks. It is based on the concept of orthogonal frequency division multiple access technique in wireless communication. This paper investigates the performance of WiMAX network under AWGN and SUI Channel Model by varying physical layer parameter such as higher M-ary modulation, coding scheme and cyclic prefix. Keywords: BWA, BWT, WiMAX, OFDM, CP, WLAN
Buckling analysis of line continuum with new matrices of stiffness and geometryeSAT Journals
Abstract This research work present buckling analysis of line continuum with new matrices of elastic stiffness and geometric stiffness. The stiffness matrices were developed using energy variational principle. Two deformable nodes were considered at the centre and at the two ends of the continuum which brings the number of deformable node to six. The six term Taylor McLaurin’s shape function was substituted into strain energy equation and the result functional was minimized, resulting in a 6 x 6 stiffness matrix used herein. The six term shape function is also substituted into the geometric work equation and minimized to obtain 6 x 6 geometric stiffness matrix for buckling analysis. The two matrices were employed, as well as traditional 4 x 4 matrices in classical buckling analysis of four line continua. The results from the new 6 x 6 matrices of stiffness and geometry were very close to exact results, with average percentage difference of 2.33% from exact result. Whereas those from the traditional 4 x 4 matrices and 5 x 5 matrices differed from exact results, with average percentage difference of 23.73% and 2.55% respectively. Thus the newly developed 6 x 6 matrices of stiffness and geometry are suitable for classical buckling analysis of line continuum. Keywords: 6x6 stiffness system; buckling; geometry; line continuum; variational principle; deformable node; shape function; classical; numerical; analysis; beam
A concept of data transmission within downhole telemetry systems in oilfield industry through power lines is presented. Based on this concept, MATLAB/Simulink models simulating communication lines in downhole telemetry systems are built, which can be used as prototypes for development of real systems. The most appropriate signal modulation methods for data transmission in downhole telemetry systems are suggested and discussed. The influence of high-voltage interference on signal transmission through power line from downhole unit to ground based unit is simulated. Usage of error-correcting coding methods for data transmission such as Hamming code, Reed-Solomon code, BCH code is suggested, and its efficiency is demonstrated.
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
As it is well known, the QoS(quality of service) provided by mobile Internet access point devices is far from
the QoS level offered by the common ADSL modem-router due to several reasons: in fact, mobile Internet
access networks are not designed to support real-time data traffic because of several drawbacks
concerning the wireless medium such as resource sharing, traffic congestion, radio link coverage etc.,
which impact directly such parameters as delay, jitter, and packet loss rate that are strictly connected to
the quality of user experience. The main scope of the present paper is to introduce a dual USIM HSPA
gateway for ad hoc and sensors networks thanks to which it will be possible to guarantee a QoS suitable
for a series of network-centric application such as real-time communications and monitoring, video
surveillance, real-time sensor networks, telemedicine, vehicular and mobile sensor networks and so on. The
main idea is to exploit multiple radio access networks in order to enhance the available end-to-end
bandwidth and the perceived quality of experience. The scope has been reached by combining multiple
radio access with dynamic load balancing and the VPN (virtual private network) bond technique.
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN
channel and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
Global mobility and handover management for heterogeneous network in vanetijngnjournal
Now a day’s Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one
of the most challenging research issues for VANETs to support variety of intelligent transportation system
(ITS) applications. VANETs are getting importance for inter-vehicle communication, because they allow
the communication among vehicles without any infrastructure, configuration effort, and without the high
costs of cellular networks. Besides local data exchange, vehicular applications may be used to accessing
Internet services. The access is provided by Internet gateways located on the site of roadside. However, the
Internet integration requires a respective mobility support of the vehicular ad hoc network. In this paper
we will study about the network mobility approach in vehicular ad hoc network; the model will describe the
movement of vehicles from one network to other network. The proposed handover scheme reduces the
handover latency, packet loss signaling overhead.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
5G Coupler Design for Intelligent Transportation System (ITS) Application IJECEIAES
Aiming to achieve 3-dB coupling, operating in fifth generation (5G) technologies, this paper introduces a new design of tight coupling coupler that will be operated in 5G technologies. Two stubs and two slots have been implemented into the 3-dB coupler design in order to achieve impedance matching between the ports and to give better coupling performances, respectively. Moreover, a study on the stubs’ and slots’ effects towards the S31 of the 3-dB coupler has also been presented in this paper. The proposed coupler is designed on Rogers RO4003C substrate. The simulation results and the analytical study on the stubs and slots implementation show that both stubs and slots affect the performance of the coupling coefficient.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
A scalable and highly accurate RF/Microwave symmetricalinductor has been designed using microstrip line. The 18 circular and 18 square structures are optimized with 600MHz operating frequency. The characteristic interest on high frequency operating circuits is inductance value and quality factor of the spiral inductor. The value of the spiral inductor is depends on conductor width (W) space between the conductor (S), turns (n) outer diameter and inner diameter of the spiral inductor. In this design change the distribution of an inner diameter from 5mil to 10milfor 3 to 5 turns of spiral inductors. The optimization of inner diameter distribution is done by keeping space (1mil)between the conductor and width (2mil) of the conductor as constant. The changing inner diameter will effect to change in magnitude of the inductance and quality factor due passive capacitive and inductive reactance effect. These spiral inductors are designed using aluminum (Al) substrate material with 15mil height from the ground plane. The cupper material is used as a conductor of thickness 0.302mm. The aim of this paper is to compare the electromagnetic simulated results with simple equations of modified wheeler (MW), current sheet Approximation (CSA) and monomial equation (ME). The passive component effect the spiral inductor is examines the variation of inductance and quality factor. The observed electromagnetic field simulated results gives better agreement with standard simple mentioned equations with 600MHz operating frequency. The validation of spiral inductor is done with different inner diameter (5mil to 10mil) and number of turns (3turns to 5 turns) of the spiral inductor.
Planar transmission line is one of the physical medium used to transmit high frequency signal. The signal flow through the transmission line depends on the important electrical parameter, the frequency. As the signal frequency increases in a conductor, current carriers start to move towards the edges of the conductor. Flow of carriers on the conductor synchronizes with the substrate to achieve better efficiency. The signal flow in the transmission line depends on the dielectric constant of the material and the loss tangent value. The paper shows the simulation studies on return loss and insertion loss of planar transmission lines with constant frequency of 10GHz. To design planar transmission lines different dielectric materials are being selected. In our design, parameters like input impedance, conductor (silver) thickness and conductor height are kept constant. The design and analysis is done using Applied Wave Research (AWR) tool. The obtained results shows unique response and it depends on the type of dielectric medium selected.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Full-duplex user-centric communication using non-orthogonal multiple accessTELKOMNIKA JOURNAL
This paper proposes an improved user-centric Non-Orthogonal Multiple Access (NOMA) communication in two-base station networks with in-band full duplex (IBFD) user. We derive the achievable rates of the proposed user-centric NOMA systems. For benchmarking purposes, we also derive the achievable rate for the user-centric system deploying conventional NOMA schemes, Orthogonal Multiple Access (OMA) schemes and point-point communication systems. We then analyze and simulate the performance of the proposed and all the benchmarked systems. We found that our proposed user-centric NOMA approach has a 64% improvement in the total achievable rate when compared to the benchmarked approach under similar power constraint.
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...Editor IJARCET
A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either straightforwardly or through other nodes in a multi-hop approach. Wireless sensor network is a power consuming system since nodes perform on restricted power supply which decreases its lifetime. Optimally selected modulation and coding is extremely vital technique in wireless sensor networks. This paper surveys the performance of different modulation schemes and error control codes used in Sensor Networks. The survey also analyzes the role of modulation and coding techniques apply to different channel conditions to improve the lifetime of the clustered sensor network.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...IJECEIAES
This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.
Enhancement of torsional resistance in fibrous normal strength concrete beamseSAT Journals
Abstract This paper highlights the influence of thickness of concrete cover on the torsional resistance in the fibrous rectangular solid concrete beams under pure torsion. In this investigation, thickness of concrete cover vary between 18 and 53 mm. To study the influence of concrete cover in under-reinforced fibrous normal strength concrete, four fibrous concrete beams were cast and test under pure torsion. The under-reinforced concrete beams was designed based on ACI-318-14. The transverse and longitudinal reinforcement indexes are kept constant in the beams. While the aspect ratio of the beam cross section and span to depth ratio of the beams are 1.22 and 5.75, respectively. The test results were claimed that the torsional resistance provided by concrete and reinforcements plus fibre were enhanced at crack and peak loads up to 76.4% and 64.4%, respectively. In contrast, twisting angle, shear strain in concrete, strain in transverse and longitudinal reinforcements were reduced up to 57.8%, 65%, 89.3% and 95.6%, respectively. The spacing between cracks and the angle of inclination of crack at failure was increased whereas the number of cracks reduced. The dimensional analysis was used to proposed equations to predict torsional resistance at crack and peak loads including the contribution of concrete cover. In addition, the Buckingham П theorem was used for this purpose. Based on the 34 data from previous researches and the data in this research, nonlinear multiple regressions in Minitab software version 16 was used to predict the coefficients of the proposed П-groups equations. The proposed models have shown a good agreement with test results. Keywords: Fibrous Concrete, Concrete Cover, and Dimensional Analysis
Development of microcontroller based instrument for checking quality of edibl...eSAT Journals
Abstract Edible oils plays a very important role in human beings in third generation , because lots of people suffer from fat , asthama , blood pressure , etc due to consuming a lower quality of oils in their daily life , so I decided to design and develop an instrument which can easily display the quality of oil on the basis of some parameters . The one of the main reason of lowering down the quality of oil is carbon due to heating, so if we can measure the amount or percentage of carbon in the oil we can prevent so many bad things to happen. So I have designed a low cost microcontroller based instrument which measures the amount of carbon in oil by measuring capacitance of oil with the help of a capacitive sensor[1].This is not only the one application of this instrument , this instrument also plays an important role in automobile industries , as it can be used for checking the condition of mobile oils in vehicles , in today’s busy life people don’t have time to check engine oil , power steering oil even they don’t have time to maintain their own vehicle , so I thought if I put this type of instrument as an indicator at the meter section of cars and motorbikes people can read out the condition of engine oil and before the oil goes into the worst condition they can change their oils.This instrument can also be used by various food departments etc where they can check various samples of different companies and decides the price of oils and can check the quality whether the quality of oil is in safe range or not.
Global mobility and handover management for heterogeneous network in vanetijngnjournal
Now a day’s Vehicular Ad Hoc Network (VANET) is an emerging technology. Mobility management is one
of the most challenging research issues for VANETs to support variety of intelligent transportation system
(ITS) applications. VANETs are getting importance for inter-vehicle communication, because they allow
the communication among vehicles without any infrastructure, configuration effort, and without the high
costs of cellular networks. Besides local data exchange, vehicular applications may be used to accessing
Internet services. The access is provided by Internet gateways located on the site of roadside. However, the
Internet integration requires a respective mobility support of the vehicular ad hoc network. In this paper
we will study about the network mobility approach in vehicular ad hoc network; the model will describe the
movement of vehicles from one network to other network. The proposed handover scheme reduces the
handover latency, packet loss signaling overhead.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
5G Coupler Design for Intelligent Transportation System (ITS) Application IJECEIAES
Aiming to achieve 3-dB coupling, operating in fifth generation (5G) technologies, this paper introduces a new design of tight coupling coupler that will be operated in 5G technologies. Two stubs and two slots have been implemented into the 3-dB coupler design in order to achieve impedance matching between the ports and to give better coupling performances, respectively. Moreover, a study on the stubs’ and slots’ effects towards the S31 of the 3-dB coupler has also been presented in this paper. The proposed coupler is designed on Rogers RO4003C substrate. The simulation results and the analytical study on the stubs and slots implementation show that both stubs and slots affect the performance of the coupling coefficient.
International Journal on AdHoc Networking Systems (IJANS)pijans
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
A scalable and highly accurate RF/Microwave symmetricalinductor has been designed using microstrip line. The 18 circular and 18 square structures are optimized with 600MHz operating frequency. The characteristic interest on high frequency operating circuits is inductance value and quality factor of the spiral inductor. The value of the spiral inductor is depends on conductor width (W) space between the conductor (S), turns (n) outer diameter and inner diameter of the spiral inductor. In this design change the distribution of an inner diameter from 5mil to 10milfor 3 to 5 turns of spiral inductors. The optimization of inner diameter distribution is done by keeping space (1mil)between the conductor and width (2mil) of the conductor as constant. The changing inner diameter will effect to change in magnitude of the inductance and quality factor due passive capacitive and inductive reactance effect. These spiral inductors are designed using aluminum (Al) substrate material with 15mil height from the ground plane. The cupper material is used as a conductor of thickness 0.302mm. The aim of this paper is to compare the electromagnetic simulated results with simple equations of modified wheeler (MW), current sheet Approximation (CSA) and monomial equation (ME). The passive component effect the spiral inductor is examines the variation of inductance and quality factor. The observed electromagnetic field simulated results gives better agreement with standard simple mentioned equations with 600MHz operating frequency. The validation of spiral inductor is done with different inner diameter (5mil to 10mil) and number of turns (3turns to 5 turns) of the spiral inductor.
Planar transmission line is one of the physical medium used to transmit high frequency signal. The signal flow through the transmission line depends on the important electrical parameter, the frequency. As the signal frequency increases in a conductor, current carriers start to move towards the edges of the conductor. Flow of carriers on the conductor synchronizes with the substrate to achieve better efficiency. The signal flow in the transmission line depends on the dielectric constant of the material and the loss tangent value. The paper shows the simulation studies on return loss and insertion loss of planar transmission lines with constant frequency of 10GHz. To design planar transmission lines different dielectric materials are being selected. In our design, parameters like input impedance, conductor (silver) thickness and conductor height are kept constant. The design and analysis is done using Applied Wave Research (AWR) tool. The obtained results shows unique response and it depends on the type of dielectric medium selected.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
The bit error rate performance of a V-Blast encoded 8x8 MIMO MC-CDMA wireless communication system
for different signal detection (MMSE and ZF) and digital modulation (BPSK, QPSK, DPSK, and 4QAM)
schemes for grayscale image transmission has been investigated in this paper. The proposed wireless system
employ ½-rated Convolution and cyclic redundancy check (CRC) channel encoding over the AWGN channel
and Walsh Hadamard code as an orthogonal spread code. The present Matlab based simulation study
demonstrates that the V-Blast encoded 8×8 MIMO MC-CDMA wireless system with the employment of 1⁄2-
rated convolution and cyclic redundancy check (CRC) channel encoding strategies shows good performance
utilizing BPSK digital modulation and ZF signal detection scheme in grayscale image transmission
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
This paper presents the design of a compact circular microstrip patch antenna for WLAN applications which covers the band 5.15 to 5.825 GHz. The antenna is designed using 1.4mm thick FR-4 (lossy)substrate with relative permittivity 4.4 and a microstrip line feed is used. The radius of the circular patch is chosen as 7.62mm. To reduce the size and enhance the performance of the proposed antenna, a circular slot is loaded on circular patch and a square slot is etched on the ground plane of dimension 30mm×30mm. Design of the antenna is carried out using CST Microsoft Studio Sonimulation Software. The proposed antenna resonates at 5.5 GHz with a wider bandwidth of 702 MHz and it provides low return loss of -31.58 dB, good gain of 3.23 dB and directivity of 4.28 dBi and high efficiency of around 79% against the resonance frequency. The geometry of the proposed circular antenna with reduced size and its various performance parameters such as return loss, bandwidth, VSWR, gain, directivity, efficiency and radiation pattern plots are presented and discussed.
Full-duplex user-centric communication using non-orthogonal multiple accessTELKOMNIKA JOURNAL
This paper proposes an improved user-centric Non-Orthogonal Multiple Access (NOMA) communication in two-base station networks with in-band full duplex (IBFD) user. We derive the achievable rates of the proposed user-centric NOMA systems. For benchmarking purposes, we also derive the achievable rate for the user-centric system deploying conventional NOMA schemes, Orthogonal Multiple Access (OMA) schemes and point-point communication systems. We then analyze and simulate the performance of the proposed and all the benchmarked systems. We found that our proposed user-centric NOMA approach has a 64% improvement in the total achievable rate when compared to the benchmarked approach under similar power constraint.
A Review on Energy Efficient Modulation and Coding Techniques for Clustered W...Editor IJARCET
A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either straightforwardly or through other nodes in a multi-hop approach. Wireless sensor network is a power consuming system since nodes perform on restricted power supply which decreases its lifetime. Optimally selected modulation and coding is extremely vital technique in wireless sensor networks. This paper surveys the performance of different modulation schemes and error control codes used in Sensor Networks. The survey also analyzes the role of modulation and coding techniques apply to different channel conditions to improve the lifetime of the clustered sensor network.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
Modified Timed Efficient Stream Loss-tolerant Authentication to Secure Power ...IJECEIAES
This paper investigates the feasibility of Timed Efficient Stream Loss-tolerant Authentica- tion to serve security needs of Power Line Communication (PLC) system. PLC network has been identified as the ideal choice to function as the last mile network, deliver load management messages to smart meters. However, there is need to address the security concerns for load management messages delivered over power line communications. The ubiquitous nature of the power line communication infrastructure exposes load management systems (LMS) deployed over it to a security risk. Ordinarily, PLC network does not em- ploy any security measures on which the smart meters and data concentrators can depend on. Therefore, the need to provide a secure mechanism for communication of load man- agement system messages over a PLC network. In LMS, source authentication is of highest priority because we need to respond only to messages from an authenticated source. This is achieved by investigating suitable robust authentication protocols. In this paper we present modifications to Timed Efficient Stream Loss-tolerant Authentication for secure authentica- tion to secure messages for load management over PLC. We demonstrate that PLC can be used to securely and effectively deliver Load Management messages to smart meters, with minimal overhead.
Enhancement of torsional resistance in fibrous normal strength concrete beamseSAT Journals
Abstract This paper highlights the influence of thickness of concrete cover on the torsional resistance in the fibrous rectangular solid concrete beams under pure torsion. In this investigation, thickness of concrete cover vary between 18 and 53 mm. To study the influence of concrete cover in under-reinforced fibrous normal strength concrete, four fibrous concrete beams were cast and test under pure torsion. The under-reinforced concrete beams was designed based on ACI-318-14. The transverse and longitudinal reinforcement indexes are kept constant in the beams. While the aspect ratio of the beam cross section and span to depth ratio of the beams are 1.22 and 5.75, respectively. The test results were claimed that the torsional resistance provided by concrete and reinforcements plus fibre were enhanced at crack and peak loads up to 76.4% and 64.4%, respectively. In contrast, twisting angle, shear strain in concrete, strain in transverse and longitudinal reinforcements were reduced up to 57.8%, 65%, 89.3% and 95.6%, respectively. The spacing between cracks and the angle of inclination of crack at failure was increased whereas the number of cracks reduced. The dimensional analysis was used to proposed equations to predict torsional resistance at crack and peak loads including the contribution of concrete cover. In addition, the Buckingham П theorem was used for this purpose. Based on the 34 data from previous researches and the data in this research, nonlinear multiple regressions in Minitab software version 16 was used to predict the coefficients of the proposed П-groups equations. The proposed models have shown a good agreement with test results. Keywords: Fibrous Concrete, Concrete Cover, and Dimensional Analysis
Development of microcontroller based instrument for checking quality of edibl...eSAT Journals
Abstract Edible oils plays a very important role in human beings in third generation , because lots of people suffer from fat , asthama , blood pressure , etc due to consuming a lower quality of oils in their daily life , so I decided to design and develop an instrument which can easily display the quality of oil on the basis of some parameters . The one of the main reason of lowering down the quality of oil is carbon due to heating, so if we can measure the amount or percentage of carbon in the oil we can prevent so many bad things to happen. So I have designed a low cost microcontroller based instrument which measures the amount of carbon in oil by measuring capacitance of oil with the help of a capacitive sensor[1].This is not only the one application of this instrument , this instrument also plays an important role in automobile industries , as it can be used for checking the condition of mobile oils in vehicles , in today’s busy life people don’t have time to check engine oil , power steering oil even they don’t have time to maintain their own vehicle , so I thought if I put this type of instrument as an indicator at the meter section of cars and motorbikes people can read out the condition of engine oil and before the oil goes into the worst condition they can change their oils.This instrument can also be used by various food departments etc where they can check various samples of different companies and decides the price of oils and can check the quality whether the quality of oil is in safe range or not.
River monitoring through wireless sensor networkeSAT Journals
Abstract
WSN system is the recent and cost effective system for monitoring and controlling the environmental applications. It is also a
demanding task to use efficiently the energy harvesting system (EHS) technology for WSN. The system performs the
measurements using integrated peripherals to process the measured data as well as to co-ordinate the data transport of the WSN
to work. Basically River mote is a case study for designing a low cost hardware system architecture combining low-power mote
and a highly efficient EHS architecture. The main requirement of this system is continuous operation using Energy Harvesting
System. The work includes first the water level monitoring platform using only the ultra-sonic sensor and second the PH balance
to know the toxicity present in water. This system provides a real-time guidance to those industry that depends on regional water
quality conditions like industry, agriculture, aquatic life etc.
Keywords: Energy Harvesting system (EHS), Zig-Bee module, Ultrasonic sensor, Ph sensor, Wireless sensor network
(WSN).
Single to multiple kernel learning with four popular svm kernels (survey)eSAT Journals
Abstract Machine learning applications and pattern recognition have gained great attention recently because of the variety of applications
depend on machine learning techniques, these techniques could make many processes easier and also reduce the amount of
human interference (more automation). This paper research four of the most popular kernels used with Support Vector Machines
(SVM) for Classification purposes. This survey uses Linear, Polynomial, Gaussian and Sigmoid kernels, each in a single form and
all together as un-weighted sum of kernels as form of Multi-Kernel Learning (MKL), with eleven datasets, these data sets are
benchmark datasets with different types of features and different number of classes, so some will be used with Two-Classes
Classification (Binary Classification) and some with Multi-Class Classification. Shogun machine learning Toolbox is used with
Python programming language to perform the classification and also to handle the pre-classification operations like Feature
Scaling (Normalization).The Cross Validation technique is used to find the best performance Out of the suggested different
kernels' methods .To compare the final results two performance measuring techniques are used; classification accuracy and Area
Under Receiver Operating Characteristic (ROC). General basics of SVM and used Kernels with classification parameters are
given through the first part of the paper, then experimental details are explained in steps and after those steps, experimental
results from the steps are given with final histograms represent the differences of the outputs' accuracies and the areas under
ROC curves (AUC). Finally best methods obtained are applied on remote sensing data sets and the results are compared to a
state of art work published in the field using the same set of data.
Keywords: Machine Learning, Classification, SVM, MKL, Cross Validation and ROC
Performance comparison of blind adaptive multiuser detection algorithmseSAT Journals
Abstract Blind multiuser detection algorithms are used to eliminate the Multiple Access Interference (MAI) and the Near-Far effect in mobile communication systems. Four kinds of blind multiuser detection algorithms applied to code-division multiple-access (CDMA) communication system are studied in this paper. Those algorithms are the Least Mean Squares (LMS), Recursive Least Squares (RLS), Kalman filter and subspace-based Kalman filter algorithms. The resultant signal to interference ratio (SIR) at the output of the receivers controlled by the four kinds of multi-user detection algorithm has been discussed in this paper. Simulation results show that the subspace based Kalman filter algorithm outperforms all other three algorithms. Subspace-based Kalman filter algorithm has faster convergence speed, more practical and the capability of CDMA system can be increased. Keywords: Blind multiuser detection, Code-division multiple access, Mean output energy, Adaptive filtering.
Recent developments in paper currency recognition systemeSAT Journals
Abstract
Currency denomination recognition is one the active research topics at present. And this wide interest is particularly due to the
various potential applications it has. Monetary transaction is an integral part of our day to day activities. However, blind people
particularly suffer in monetary transactions. They are not able to effectively distinguish between various denominations and are often
deceived by other people. Also, a reliable currency recognition system could be used in any sector wherever monetary transaction is
of concern. Thus, there is an ardent need to design a system that is helpful in recognition of paper currency notes correctly. Currency
denomination detection is a vast area of research and significant progress had been achieved over the years. This paper presents an
extensive survey of research on various developments in recent years in identification of currency denomination. A number of
techniques applied by various researchers are discussed briefly in order to assess the state of art.
Keywords:- Currency recognition system, Artificial Neural Network
Design and analysing of compact microstrip antenna with defected ground struc...eSAT Journals
Abstract
Decision Tree learning algorithms have been able to capture knowledge successfully. Decision Trees are best considered when
instances are described by attribute-value pairs and when the target function has a discrete value. The main task of these
decision trees is to use inductive methods to the given values of attributes of an unknown object and determine an
appropriate classification by applying decision tree rules. Decision Trees are very effective forms to evaluate the performance
and represent the algorithms because of their robustness, simplicity, capability of handling numerical and categorical data,
ability to work with large datasets and comprehensibility to a name a few. There are various decision tree algorithms available
like ID3, CART, C4.5, VFDT, QUEST, CTREE, GUIDE, CHAID, CRUISE, etc. In this paper a comparative study on three of
these popular decision tree algorithms - (Iterative Dichotomizer 3), C4.5 which is an evolution of ID3 and VFDT (Very
Fast Decision Tree has been made. An empirical study has been conducted to compare C4.5 and VFDT in terms of accuracy
and execution time and various conclusions have been drawn.
Key Words: Decision tree, ID3, C4.5, VFDT, Information Gain, Gain Ratio, Gini Index, Over−fitting.
Investigation of the appropriate cooking temperature for freshly harvested ma...eSAT Journals
Abstract
The investigation of the appropriate cooking temperature for freshly harvested mature corn cobs is presented. The process of Combination cooking method was utilized in the experimentation to ensure the achievement of the appropriate temperature and duration for the cooking stage. The appropriate cooking temperature and duration was found to be 195oC and 30 minutes respectively. Variations in initial moisture content of the freshly harvested cobs (69.7 - 85.3% wb) did not affect the cooking temperature and duration. Cooking at the determined appropriate temperature and duration resulted in a properly cooked corn cob. Keywords: Browning; Fresh Corn; Cooking Temperature; moisture content
Analysis of stress in circular hollow section by fea and analytical techniqueeSAT Journals
Abstract This study focus on stress calculation in a cantilever beam by FEA &Analytical techniques. To know the value of maximum load bearing capacity of any particular beam this study has been generated. Structural analysis is foremost requirement in a design process. Also when we perform FEA analysis of any structure we cannot blindly trust on its result. If we don’t have any past result data of that structure, it became difficult for us to know the deviation of result. For that purpose we may require analytical calculation result in order to compare result value of FEA. Hence in this study a range of load values are applied on cantilever beam by both techniques. Later graph has been plotted for different load values & verification of results is carried out. Keywords: Structure Analysis, CATIA, FEA and Benchmarking
Using landsat 8 data to explorethe correlation between urban heat island and ...eSAT Journals
Abstract On a local scale, climate change can potentially exacerbate the urban heat island (UHI) effect characterized by an abrupt thermal gradient between urbanized and nearby non-urbanized areas. While it is well-known that the presence of impervious surfaces and less vegetation influence urban microclimate, relatively little attention has been given to the spatial patterns of urban heat islands and how these patterns are affected by land use. In this study, we derive land surface temperature (LST) from Landsat 8 data over four time frames and analyze the relationship between urban thermal environments and urban land use. Landsat 8 Thermal Infrared Sensor (TIRS) and Operational Land Imager (OLI) band data are converted to top-of-atmosphere spectral radiance using radiance rescaling factors. At-satellite brightness temperature was retrieved and the land surface emissivity was calculated. In addition, Normalized Difference Vegetation Index and Normalized Difference Built-up Index were computed and their correlations with LST for each land use were examined. The results indicate that the highest maximum land surface temperature was observed in high density residential and commercial areas near city’s downtown. Coastal areas and areas near water bodies are found to have lower land surface temperatures. The results from this study can inform planning and zoning practices aimed at reducing the urban heat island effect and creating a cooler and more comfortable thermal environment for city residents. Keywords: Urban Heat Island, Land Surface Temperature, NDVI, NDBI, Land Use, Kruskal-Wallis Nonparametric Test.
Preliminary study of on cladding process on gray cast iron substrateeSAT Journals
Abstract Cladding, also called as hardfacing or surfacing, is a deposition process with a purpose of improving the properties of the substrate accomplished either using laser beam or arc as the heat source for the process. Filler material used in the process is deposited layer-by-layer until covering required thickness before being machined to achieve the final dimension. Gas metal arc welding is seen as the best method for accomplishing the cladding operation as the alternative for laser cladding in term of operation cost. The process parameters of gas metal arc welding are discussed on in the aspect of the cladding process. Grey cast iron with its inherent brittleness characteristic is difficult to be weld cladded because the thermal cycle of the cladding process can cause the material to crack. It is understood that the coarse graphite flake structure that gives the lack of ductility characteristic to the material and cause the material to crack when suffer the stress occur during the temperature drop of the process. Nickel based filler material is seen as the best choice to be used for the deposition process because of its ability to precipitate carbon in its free form of graphite and prevent the migration of carbon from cast iron substrate thus avoiding the formation of hard carbide phase. The addition of tungsten carbide in the matrix of nickel base alloy gives the filler material good hardness and wear resistant properties. This paper serves as the preliminary study to get an insight into the understanding of cladding process on cast iron as the substrate before performing the experiment of the cladding operation. Keywords: Cladding, Hardfacing, Cast Iron, Nickel Based Alloy
The development of supervisory system for electricity control in smgg, guntur...eSAT Journals
Abstract The main intention of the paper is to build a prototype model, for to supervise the electricity control and monitoring for the purpose of ease of operation, power saving, man power reduction. The paper may also aimed for to help society, how to build application oriented designs for the purpose of human need to simplify the lifes using open source hardware and software tools. The worlds knows the scarcity of power. So many techniques available to monitor and control. But how the paper is new? The reason is this, the paper is developed completely using open source hardware and software which follows laws of lumped matter approaches and fundamental physics rules. The SCADA software price in multiples of thousands in Indian rupees. The authors developed SCADA software using open source tools. The SCADA software interact with the hardware in real time. The authors proposed method of approach is much simpler and economical. The authors developed prototype model to apply in St.Marrys Group of Institutions, Guntur, Ap, India. The paper is developed in following manner, 1) Problem identification in organization, 2) Practical concept development and mathematical supplementary work 3) Flow chart of working mechanism and architectural development 4) Hardware & Software development according to Architecture.5) And finally results and discussion. The word SCADA in long form Supervisory Control and Data Acquisition. The paper combined so many fields of engineering and physical sciences by name Sensor technology , System On chip, Microcontrollers, Electromagnetism, software application development. The entire electrification routing in the organization is connected to SCADA Software in serial connection with centralized Personal Computer. The sensors are interfaced in server rooms which are monitoring room critical temperature. If temperature sensors feeds the data to SCADA, if the readings are out of range, the AC will ON by observer. In the same manner power control will be takes place. Keywords: SCADA, Open source, Hardware, Software, Mathematics, Electricity, Monitoring. Etc.
Brain tumor detection and segmentation using watershed segmentation and morph...eSAT Journals
Abstract In the field of medical image processing, detection of brain tumor from magnetic resonance image (MRI) brain scan has become one of the most active research. Detection of the tumor is the main objective of the system. Detection plays a critical role in biomedical imaging. In this paper, MRI brain image is used to tumor detection process. This system includes test the brain image process, image filtering, skull stripping, segmentation, morphological operation, calculation of the tumor area and determination of the tumor location. In this system, morphological operation of erosion algorithm is applied to detect the tumor. The detailed procedures are implemented using MATLAB. The proposed method extracts the tumor region accurately from the MRI brain image. The experimental results indicate that the proposed method efficiently detected the tumor region from the brain image. And then, the equation of the tumor region in this system is effectively applied in any shape of the tumor region. Key Words: Magnetic resonance image, skull stripping, segmentation, morphological operation, detection
Partial replacement of cement in concrete using waste glass powder and m sand...eSAT Journals
Abstract: The traditional Taguchi method is widely used for optimizing the process parameters of a single response problem. Optimization of a single response results the non-optimum values for remaining. But, the performance of a machining process is often evaluated by several quality responses. Under such circumstances, multi-characteristics response optimization may be the solution to optimize multi-responses simultaneously. In the present work, a multi-characteristics response optimization model based on Taguchi and Utility concept is used to optimize process parameters, such as magnetic flux, rotational speed of CFG rod, shape of CFG rod, number of cycles, abrasive-to-iron ratio and abrasive particle size on multiple performance characteristics, namely, surface roughness (Ra) and material removal (MR) during polishing of hollow cylindrical brass work-pieces with Centrifugal-Magnetic Force Assisted Abrasive Flow Machining (CMA2FM) Process. Taguchi’s L27 orthogonal array (OA) is selected for experimental planning. The ANOVA and F-tests are used to analyze the results. It is found that all the input parameters significantly improve the Utility function comprising of two quality characteristics (MR and %ΔRa). Further, the confirmation tests are conducted and the results are found to be within the confidence interval.
Keywords: Abrasive Flow Machining (AFM), Centrifugal Force, Magnetic Force, CFG Rod, CMA2FM, Utility Concept,TaguchiMethod,MultiResponseOptimization
Arm recognition encryption by using aes algorithmeSAT Journals
Abstract To provide the security of the Military confidential data we use encryption algorithm which take over reward of superior encryption algorithm. The proposed implementation using encryption algorithm was implemented on ARM 7 to encrypt and decrypt the confidential data on data storage devices such as SD card or Pen drive. The main objective of proposed implementation is to provide protection for storage devices. The ARM and encryption algorithm protect the data accessibility, reliability and privacy successfully. Since (AES) Advanced Encryption Standard algorithm is widely used in an embedded system or fixed organization. These AES algorithms are used for proper designs in defense for security. Keywords: Plain text, Cipher text, Data security, AES, Embedded System.ARM, storage device.
Effects of replacement of metakaolin with cement on the mechanical properties...eSAT Journals
Abstract
Slurry Infiltrated Fibrous CONcrete (SIFCON) is unique type of concrete invented by Lankard in 1979, containing high
percentage of fiber about 6% to 20% by volume of concrete. SIFCON possesses high strength as well as large ductility and for
excellent potential for structural application. Metakaolin (MK) is a pozzolanic material, which improves the durabilityand
strength of concrete. In this study the test programs were carried out with 2%, 3% and 4% of fiber content by volume of concrete
with replacement of cement by Metakaolin at 5% and 7.5% by weight of cement. The aim of work is to optimize the percentage of
fiber content and to minimize the cement usage by replacing it by Metakaolin. It also gives way to effective disposal of industrial
waste to avoid global problem and protect environment. The main objective of this work was to determine the effect of
replacement of cement with Metakaolin on mechanical property of SIFCON mortar. For that purpose compressive strength,
flexural strength and Split tension strength of SIFCON specimen were tested after 7 and 28 days of curing, yielding positive
results.
In this study, we found that 2% fiber replacement by volume of concrete and Metakaolin at7.5% by weight of cement yields best
and economical results.
Key Words: SIFCON, Metakaolin, Fiber,Control SIFCON(CS), and Pozzolanic.
Prediction of pollutants emissions dispersion of phosphate fertilizers produc...eSAT Journals
Abstract This study aims to the prediction of pollutants emissions dispersion of a 1 M·ton/year phosphate fertilizer facility, which is located at El-Menya Governorate, Egypt. ALOHA air dispersion software is used to predict the pollutant emissions dispersion from different stacks in the proposed project. The estimated total pollutant emissions from the proposed project are 3180 g/m3 of hydrogen fluoride (HF), 72000 g/m3 of sulfur dioxide (SO2), 14700 g/m3 of sulfur tri-oxide (SO3), 2700 g/m3 of ammonia (NH3), and 53550 g/m3 of particulates (PM). Based on the total pollutant emissions from the project, the concentrations of the investigated pollution emissions at 0.5 km, 1 km and 2 km downstream the source at the worst case scenario are obtained and compared with the allowed limits. It has been found that all the emissions resulted from different activities in the proposed project are much lower than the allowed limits specified by the Egyptian ministry of environment in Law 4/1994, and therefore the proposed project is not expected to cause any undesirable impacts on the surrounding environment. Index Terms: Air pollution; Air dispersion modeling; Environmental impact assessment; Phosphate fertilizer industry.
A three level disposal site selection criteria system for toxic and hazardous...eSAT Journals
Abstract One of the perennial problems in managing toxic and hazardous wastes (THWs) generated from industrial activities is the final storage and disposal area for such kind of wastes. Due to inadequate land surface disposal facility (LSDF) in the country, waste generators are continually practicing the WHIFFY (we-hide-it-freely-for years) approach; consequently becoming a threat to human health and the environment. Proper site selection for land surface disposal facility requires a consultative process, taking into consideration the various factors that affect the overall siting process towards an effective identification of land to be developed into acceptable and environmentally-safe land surface disposal structures. This paper attempts to establish a three-level site selection system through a participatory approach; and this is validated using survey questionnaire and secondary data. The establishment of a three-level site selection system facilitates the initial disposal siting process which leads to the development of technically, socially, environmentally, and politically acceptable disposal facilities for THWs in the Philippines. This paper also recommends basic guidelines to further support the site selection process with the application of computer-based spatial decision support systems such as Geographic Information System (GIS) as part of the land suitability assessment analysis. Keywords: Toxic And Hazardous Wastes, Disposal Siting, Land Surface Facility, Site Selection, Geographic Information System.
Privacy preserving data mining in four group randomized response technique us...eSAT Journals
Abstract Data mining is a process in which data collected from different sources is analyzed for useful information. Data mining is also known as knowledge discovery in database (KDD). Privacy and accuracy are the important issues in data mining when data is shared. Most of the methods use random permutation techniques to mask the data, for preserving the privacy of sensitive data. Randomize response techniques were developed for the purpose of protecting surveys privacy and avoiding biased answers. The proposed work thesis is to enhance the privacy level in RR technique using four group schemes. First according to the algorithm random attributes a, b, c, d were considered, Then the randomization have been performed on every dataset according to the values of theta. Then ID3 and CART algorithm are applied on the randomized data. The result shows that by increasing the group, the privacy level will increase. This work shows that as compared with three group scheme with four groups scheme the accuracy decreases 6% but the privacy increases 65%.
Proposal: An Efficient Security and Privacy Scheme based on Elliptic Curve Cr...Dr. Amarjeet Singh
Vehicles in a vehicular ad-hoc network (VANET) broadcast information about the driving environment in the road. Due to the open-access environment, this means that the VANET is susceptible to security and privacy issues. However, none of the related works satisfies all security and privacy requirements. Besides, their proposed has huge overhead in terms of computation and communication. To address the above issues, we will propose the security and privacy scheme based on Elliptic Curve Cryptography (ECC) and one secure hash function. Hence the reliability of each message being signed and checked has been improved. The main aim of this work is to satisfy all aspect requirements of security and privacy and reduce the computational complexity of the system.
LSKA-ID: A lightweight security and key agreement protocol based on an identi...TELKOMNIKA JOURNAL
Recently, a huge effort has been pushed to the wireless broadcasting nature in the open area. However, the vehicular ad hoc network (VANET) is disposed to various kinds of attacks. Hence, keeping the security in VANET is the most critical issue because of the VANET network related to human life. Thus, we propose a robust and lightweight security and key agreement-based identity protocol LSKA-ID for vehicular communication. Our protocol utilizes the elliptic curve cryptography, Chinese reminder theorem, and identity (ID)-based cryptosystem to resolve the issues found in the previously proposed schemes, in which our protocol can resolve the key escrow issues accompanied in most ID-based schemes. Also, it does not need batch verification operations, which cause some problems to the verifier in case the batch beacons have one or more illegal beacons. Moreover, the LSKA-ID protocol addresses the dependency on the trusted authority (TA) during the high frequent handover between the groups that may cause a bottleneck problem on the TA. The security analysis proves the correctness of the LSKA-ID protocol by using the random oracle model and has shown to be effective in a performance evaluation.
A novel key management protocol for vehicular cloud securityTELKOMNIKA JOURNAL
Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed protocol is efficient compared to existing key management algorithms in terms of key generation time, memory usage and cpu utilization.
Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs ApplicationsIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle communications to enhance roadway safety.Despite the potential for interesting applications invehicle networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we provide the blockchain-based decentralized trust scoring architecture for the participants in the network to identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a two-level detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the practical scope of the network, the experimental study demonstrates that the suggested solution is effective and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchain-based Trust-LEACH routing technique has also been created. The performance analysis has been carried out for Computational cost analysis, Computational time for block creation, Network analysis, SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
BLOCKCHAIN-BASED SECURE AND SCALABLE ROUTING MECHANISMS FOR VANETS APPLICATIONSIJCNCJournal
The VANET has seen a boom in the distribution of significant source data,enabling connected vehicle
communications to enhance roadway safety.Despite the potential for interesting applications invehicle
networks,thereare still unresolved issues that have the potential to hinder bandwidth utilization once
deployed. Specifically, insider assaults on VANET platforms such as Blackhole attemptscan completely
stop vehicle-to-vehicle communications and impair the networks' performance level. In this study, we
provide the blockchain-based decentralized trust scoring architecture for the participants in the network to
identify existing and blacklisted insider adversaries in VANET. To address this concern, we suggest a twolevel detection technique, in the first level neighboring nodes determine theirtrustworthiness and in the
second level it aggregates trust scores for vehicle nodes using a consortium blockchain-based mechanism
that uses authorized Road Side Units (RSUs) as consensus mechanism. The blacklisted node records are
then periodically changed based on the trust scores supplied by the nearby nodes. In regards to the
practical scope of the network, the experimental study demonstrates that the suggested solution is effective
and sustainable. To improve packet delivery ratio and vehicle node security in the VANET, the blockchainbased Trust-LEACH routing technique has also been created. The performance analysis has been carried
out for Computational cost analysis, Computational time for block creation, Network analysis,
SecurityAnalysis, and MITM attack analysis. Additionally, we provide proof that the suggested approach
enhances VANET reliability by thwarting and removing insider threat initiation nodes from its blacklist.
Security and Privacy in Cloud Assisted Internet of Vehicles: A Research Road MapMaanak Gupta, Ph.D.
Internet of things is now considered as the future of connected world. An important instance of this domain involves vehicles which offers the vision of smart cities and intelligent transportation systems. Often referred to as Vehicular Internet of Things or Internet of Vehicles (IoV), this ecosystem offers potential to make safe, convenient and efficient travel, unleashing numerous business opportunities to enterprises. IoV involves integration of vehicles, human, infrastructure, cloud, sensors, etc. in the ecosystem which could provide value to the services offered by different applications.
Data and communication security are utmost important in any IoT environment where unauthorized access to devices and data can have serious implications in this ecosystem. In vehicular IoT, remote access to in-vehicle systems can get these connected cars hacked and data stolen which can even have fatal consequences. Multiple security measures are required to secure such dynamic system where the entities interacting and exchanging data are not fixed. Therefore, starting from the external interfaces of the car, to in-vehicle network and individual electronic control units ECU’s all must be secured. Further, the collected data from sensors residing in cloud must also be secured. Multiple security techniques must be deployed to circumvent attack on one ECU to get proliferated to other critical ECUs. Access control policy definitions are needed at different levels, where vehicle to vehicle or infrastructure is mostly restricted through fog whereas some application with global scope access vehicle or sensors through central cloud. Further, in-vehicle network is secured through gateway which manages ECUs communication and data exchange.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
Cooperative Data Sharing with Security in Vehicular Ad-Hoc Networkscsandit
Vehicles download the data when passing through a drive through the road (RSU) and then share the data after travelling outside the coverage of RSU.A key issue of downloading
cooperative data is how effectively data is shared among them self. Developing an application layer data exchange protocol for the coordination of vehicles to exchange data according to
their geographic locations. Coordinated sharing can avoid medium access control (MAC) layer
collisions and the hidden terminal effect can be avoided in the multi-hop transmission. A salient
feature of the application layer data exchange protocol, in the voluntary services, Vehicles purchase the requested data from service provider via RSUs. In this project, we propose a
cooperative data sharing with secure framework for voluntary services in special vehicles networks (VANETs). We also concentrate on security in the process of downloading data and
sharing. Applicants to ensure exclusive access to data applied and security of the vehicles
involved in the implementation.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
Modern internet services rely on web and cloud technology, and as such they are no longer independent packages with in-built security, but are constructed through the combination and reuse of other services distributed across the web. While the ability to build applications in this way results in highly innovative services, it creates new issues in terms of security. Trusted computing aims to provide a way to meet the evolving security requirements of users, businesses, regulators and infrastructure owners.
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 95
BRISK AND SECURE AD-HOC VEHICULAR COMMUNICATION
Miraj Shah1
, Imaad Ukaye2
, Narendra Shekokar3
1, 2
Student, 3
Head of Department, Computer Engg, Dwarkadas J. Sanghvi COE
Abstract
The idea of Car-to-Car communication is a revolutionary phenomenon in the automobile industry. This idea will surely change the
future of humanity for good. This technology will surely change the perception of how a traditional automotive was initially thought of
by adding endless applications as a boon to mankind. The application of cars communicating with each other is enormous and has
already been discussed by many researchers by now. But, the important thing here is how to put it in practice with the increasing
demand for cars and making it safe to use it, at least improve the current condition by this new technology and not worsen the
situation by digital hacking and other flaws. Since the nature of the Communication System is highly dynamic a strict security
mechanism is mandatory for its seamless functioning. We propose to encrypt the communication taking place in C2C communication
which is not the same as using the Internet security mechanism due to limitation of its speed and residing hardware servers.
Symmetric Cryptography thus fails to incorporate the scope of various security disciplines and hence it is ineffective to use such
techniques. Asymmetric Cryptography on the other hand provides an ideal trade-off among various security disciplines and hence it is
considered as an alternative approach to accomplish a secure system but it fails when applied in an ad-hoc environment. However,
the traditional Public Key Infrastructure (PKI) technique fails in several ways so we propose a modified form of communication and
authentication technique along with rapid communication and group messages to fasten the speed of communication.
Keywords: Protocol, Communication, Security, Privacy
---------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
The concept Car-to-Car(C2C) communication is now an
evolving trend as a large portion of research funds has been
invested all over the globe. Many major car manufacturers
have responded positively and are actively working together in
bringing this promising technology to fruition. After the
concept of autonomous vehicle, cooperative control of
multiple vehicles has receives substantial attention in the
industry. The key techniques that are being considered include
Vehicle-to-Vehicle (V2V), Car-to- Infrastructure (V2I) and
Vehicle-to-C.A (V2CA).With advancements in technology in
C2C communication various trending problems can be tackled
such as automotive safety, user privacy, authentication and
validation of vehicles, report to RSU about malevolent cars,
etc. Roadside units (RSUs) can be deployed every few miles
along the highway for users to communicate about road-safety
and obtain other information. Vehicles can use RSUs to report
real-time traffic information and request location- based
services such as finding restaurants, gas stations, or available
parking space. For the sake of cooperation among multiple
vehicles effective communication medium is imperative.
Although third-generation (3G) networks or satellite
techniques can be used to achieve this goal, RSUs have the
advantage of low cost, easy deployment, and high bandwidth.
Although the primary purpose of system is to enable
communication-based automotive safety applications like
collision warning, it also provides for a range of business
applications, thereby making this technology more cost
effective. A Wireless adhoc network perfectly fulfills all the
necessary requirements for such a system but at the same time
its adhoc nature makes it highly vulnerable to various
networking threats. So, securing communication and
minimizing communication boundary must be considered for
commercial and military applications. To provide a solution
we propose a framework for communication among multiple
vehicles. Our elucidation is to put forward a new way to
visualize multiple vehicles with secure communication and to
provide a distributed method to address the problem
cooperatively.
Security mechanism will protect all traffic sent over the C2C
communication network. While securing communication has
its own advantages along with privacy and other security goals
this high-rate communication would incur high overhead, both
in terms of communication and processing. Consider, for
example, a vehicle receiving digitally certificate, signing the
message, verifying the receiver’s identity, RSU verifying its
identity, safety messages from vehicles; it would need to
validate a hundreds of vehicles within range within a short
delay in the order of a hundred milliseconds [7]. Even if
vehicle is effective under such dense network conditions, the
additional security overhead could cause failure in meeting the
delay and reliability requirements of safety applications. This
is especially so because the vehicle environment lacks
appropriate algorithm to reduce the load on processing and
transfer the load to high speed internal or backbone
communication network. The proposed rapid communication
and group signing of messages solves these problems and
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 96
meets the security goals with the help of a set of public keys
for securing the communication and maintaining anonymity of
users or vehicles.
First we outline why we actually need to secure car to car
open wireless communication by stating various security
threats from using open wireless communication or loosely
structured security framework. Then in Section II we establish
the security model i.e. security goals around which the
security of every C2C communication should lie. The review
of related work and its analysis along with its drawback is
discussed in Section III. Then extending to our own security
architecture for our proposed solution is followed by in
Section III. Section IV discusses additional mechanism to
hasten the authentication process, tracking intruders and
closing any gaps in security framework.
2. SECURITY THREATS AND GOALS:
Unlike traditional wired/wireless system a C2C
communication system is highly dynamic. Along with
handling provisions for normal communication and keeping
the system secure, it also has to tackle the system dependent
problems such as handovers. Handover from one
infrastructure to another can be costly as it requires
verification of identity at the same time maintaining user-
privacy and cost-effective communication.
Such a system can also be used for enhancement of road-
safety by using various signaling techniques such as collision
warning, intersection collision, emergency vehicle, brake-light
warning, motorcycle warning, etc. In this communication,
security plays a very important role as we discuss the attacks
on vehicular communication.
1. Phony information. One or several legitimate
members of the network send out false information to
misguide other vehicles about traffic conditions.
2. False location. Transmission of a false position
message by a malicious vehicle that pretends to be at
a claimed position.
3. Tracking identity: A global entity can monitor
trajectories of targeted vehicles and use these data for
many purposes.
4. False Messages: Such attacks include aggressive
transmission of fake messages like accident or traffic
jam or emergency vehicle.
5. Masquerade. The attacker claims to be another
vehicle by using false identities.
We propose modified public key communication and rapid
communication technique for enhancing the speed of
communication along with additional security specification
and architecture. Also, we propose new C2C communication
techniques such as group messaging and foreign-vehicle short-
term key. We stress that every communication should ensure
these security goals. [5]
• Confidentiality:
Confidentiality is observed to protect sensitive
information from getting manipulated and analyzed by
eavesdropping as wireless communication medium is
open and broadcasted over the air. By using end-to-
end encryption, which requires the presence of mutual
authentication and key agreement, the confidentiality
objective can be achieved
• Authentication: Authentication techniques are
observed to verify the identity of the vehicular nodes
in communication. In particular, the authentication
includes two levels: authentication between vehicles
(V2V authentication) to provide link-to-link security,
and authentication between the vehicle and RSU as
well as the service provider (V2Iauthentication).
• Privacy: Privacy issues for service provisioning in
VANETs regard primarily preserving the anonymity
of a vehicle and/or the privacy of its location. Privacy
protection tries to prevent adversaries (e.g., another
vehicle or an external observer) from linking the
vehicle to the driver’s name, license plate, speed,
position, and traveling routes along with their
relationships to compromise the sender’s privacy
• Message Non-Refutation Every message should be
binded to the sender so that the sender cannot deny
having sent a message. Anonymizer ensures
anonymity of sender to other nodes and ensures
privacy but does not compromise in security and its
association with each sender.
• Anonymity: Privacy of vehicles can be protected by
introducing a mapping between permanent key and
temporary key as one approach, which is an
anonymous key pair that can be changed frequently.
Another approach is having a set of short-term public
keys ,each being used for a random time called the
dwell period. An alternative for providing anonymity
in vehicular networks is the use of group signatures
3. SECURING COMMUNICATION
Although there were few studies regarding the security to
different extents, they have all failed in taking the extension
ability issue and resultant communication overhead, the time
required in authentication of a vehicle versus the required
response time into consideration. Authentication of messages
must be implemented to allow vehicle users to differentiate
reliable information from phony information and to defend
against modification attacks and masquerading attacks. An
appealing solution to this problem is to digitally sign messages
before sending them; not only does this allow the receiver to
identify the sender, but the signature also prevents the
message contents from being modified in transit. Digital
signatures[6] are the basic tool to secure communications,
used for all messages. In terms of authentication and
integrity-check, digital signature in conventional public key
infrastructure (PKI) [1] is a good accepted choice. However, it
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 97
may cause problem when a vehicle is required to verify the
signatures of other vehicles by itself and hence trusted
authorities are required. Each Certification Authority (C.A) is
responsible for a region (national territory, district, county,
etc.) and manages identities and credentials of all nodes
registered with it. Each node is registered with only one CA,
and has a unique long-term identity which may be an
Electronic License Plate (ELP) with a long-term key and a
certificate. To satisfy both the security and anonymity
requirements, we rely on a short-term key authentication
approach. Also, further we discuss how tradition PKI is
unsuitable for communication and we will use short-term
public key pairs instead.
Fig. 1 shows security architecture for vehicular
communication in which a large set of relevant security
concepts [3] exists, including concepts for
• Node identification,
• Digital signatures and certificates,
• Anonymizer for location privacy protection,
• Detection of protocol violation,
• Plausibility checks,
• Tamper-resistant devices,
• Access control policies,
• Software certification,
• In-vehicle network security,
• secure positioning, and more.
For enhancing the security, the header is divided into variable
and invariable fields. Invariable are those fields thatremain
unchanged from sender to destination , e.g., destination and
source addresses and source position. Variable fields, such as
sender location and time-to-live (TTL), are allowed to be
altered by intermediate nodes. For packets being sent via
multiple wireless hops, two signatures are added: an end-to-
end signature is created by the sender node over the invariable
fields of the packet header. Additionally, a hop-by-hop
signature is added for the variable fields. On reception of a
data packet a node verifies both signatures, and replaces the
hop-by-hop signature by a new one for the altered variable
fields and keeps the end-to-end signature. Eventually, the
combination of end-to-end signatures results in a trusted
forwarding chain [2].
In order to identify a particular vehicle taking part in
communication there is a unique identifier. The Electronic
License Plate (ELP) may serve as a unique identifier and acts
as identity check mechanism. However, sending the original
identifier may be prone to several risks such as masquerading
attacks and hence the ELP needs to be mapped to a temporary
identifier to be used for communication. There is a trusted
authority namely the Certification Authority (C.A.) which
keeps track of these unique identifiers and performs the job of
mapping into a temporary unique identifier. This original
solution however, had many problems like synchronization of
different C.A’s and constant communication between V2I
(vehicle to Infrastructure) causing further delay and loss of
information. Hence the new proposed solution consists of a set
(atleast 2) of permanent identifiers stored in each vehicle.
Each vehicle consists of atleast 2 unique identifiers or public
key. Each car communicates with only one of these stored
keys for a certain period of time. This time during which it
communicates with a single key is known as dwell time which
is a pseudo-random number generated by its own hardware
mechanism. It also acts as an added privacy mechanism for
hiding user’s identity and making it difficult to track by an
intruder.
Fig – 1: Security Architecture
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 98
The Fig. 2 shows that every vehicle utilizes multiple short-
term public key pairs instead of the old approach of using the
same long-term public key for securing communications. The
mapping between the long-term keys and the short-term
credentials of each node (car) is maintained by the C.A. The
main idea is that (i) every vehicle will be equipped with
multiple certified public keys (anonymizers) that do not reveal
the car’s identity, and (ii) the node uses every one of them for
dwell time
The multiple-anonymizer technique is adopted to attain
location privacy. Particularly, vehicles are assigned with a set
of identifiers, and the public keys that are alternatively used.
Cars frequently change their key values or temporary
identifiers used for authentication over time, and due to the
unlinkability of old and new messages their location
confidentiality preservation is attained.
Moreover, the anonymizers can be linked to a specific vehicle
by the CA so that the CA is able to trace and regulate the
vehicle’s behavior.
Fig- 2 Road map of vehicle using different keys
4. ADDITIONAL FEATURES
4.1 Group Message
Furthermore, the signatures and public key certificates
radically increase the packet length to cause intense message
overhead. Furthermore, these cryptographic operations can
incur very high computation and communication overhead.
When V2V communication is performed in an urban area with
many vehicles in each other’s communication range, this
becomes a particularly serious problem.
Each node M is equipped with a group vehicle key GVK ,
with the group members comprising all vehicles registered
with the CA. A group key GVK generated by a group member
allows for the validation (by any node) of any group signature
with the help of CA. Intuitively, a group signature scheme
allows any node V to sign a message on behalf of the group,
without V ’s identity being revealed to the signature verifier.
Moreover, it is impossible to link any two signatures of a
legitimate group member. Note that no public key or other
credentials need to be attached to an anonymously
authenticated message.
4.2 Foreign Vehicle-short-term key
Taking an analogy of a tourist place it is easy to spot a local
person from the crowd as they look different from others.
Taking the inverse in our case a foreign person is easier to be
identified and more prone to threats. In C2C communication
we use the identifier to relate a particular message to a
particular car. However, the mapping between the permanent
and temporary credentials also takes place by home C.A and
hence this mapping will be completely different from the
credentials assigned by a foreign C.A. Say, a car from United
States comes to Canada with its permanent and temporary key
pairs protecting the car’s identity. However, from a group of
say hundred cars these temporary keys that will be used are
still easy to distinguish from the keys used locally by the
Canadian cars and hence easy to track its location and failing
to protect its identity. These keys are like I.P addresses
assigned to computers which itself tell its location like
country, region, etc. Hence we propose to use new short term
but permanent key pairs assigned to them whenever a foreign
location is visited i.e. they register themselves with a foreign
C.A first which in turn informs the home
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 99
Fig- 3 Communication in Vehicular Network
C.A of the change of keys as long as they are in that region.
This makes it difficult for an intruder to attack a specific
foreign car.
4.3 Rapid Authentication
To enable progress to authentication in C2C communication
fast access or connectivity to infrastructure is highly needed.
The speed with which the vehicle travels may exceed the
speed with which the communication takes place between a
car and a RSU (Road-Side Unit).The main cause of this delay
is authentication mechanism and user privacy.Currently, there
are a few strategies to improve this overhead by reducing the
handoff latency in which the initial messages are protected and
authenticated thereafter, the communication takes place
unencrypted making it more prone to replay attacks, hijacking,
masquerading and many more attacks.
It may take time once for the RSU to authenticate the car then
the communication takes place instantly. However, the range
of one particular RSU is pretty limited compared to the
distance the car covers and hence repeat authentication takes
place. This repeated authentication cannot be avoided simply
to speed-up the communication however; it can be facilitated
with a shared secret key passed from one RSU to another. This
shared secret has its own lifetime and the node (car) can be
authenticated rapidly with the help of this key. The key is not
known to any other car and changes frequently to avoid replay
attacks. Here, the added security layer that has been provided
is that the shared key may not be broadcasted to all RSU’s in
vicinity but only to one that will be next in the range of the
car. Hence, a prediction is made based on the messages
broadcasted by the car: the direction, speed, brake light and
turnsignal. Say there is a message broadcasted as presented
below[4]: <Direction, Speed, Acceleration,Turn-Light,
Traffic-Light>, where Direction denotes the direction a vehicle
turns, such as east or west, and Speed denotes the velocity of a
driving vehicle. Acceleration denotes whether a driving
vehicle accelerates or decelerates. If the value of this field is
positive, the vehicle is speeding up; otherwise, the vehicle is
slowing down. The fourth field, Turn-Light, denotes signals of
the turn light of a vehicle, particularly when a vehicle is going
to turn at an intersection.
If the car is travelling on highway with some speed then it’s
easy to predict the next RSU and the next after that, saving
time on authentication and improving road safety. If the car is
travelling in a neighborhood area and suddenly the cars turns,
A message will be broadcasted regarding this turnsignal and
the RSU may predict the next RSU based on this turnsignal.
This prediction may be added cost to RSU however it also
reduces the burden of messages that other RSU services. In an
ideal condition the authentication takes place the first time
with one RSU using the lengthy authentication mechanism and
thereafter all communication takes place using rapid
authentication speeding up the communication process to
almost double the original speed.
4.4 Revocation
The revocation is concerned with excluding nodes from the
system. The CA will contain a database of revoked node’s
identifier and distributes this data to all nodes in the system if
necessary, depending on the scale of the revocation decision
and the extent to which the malicious activity has been
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 100
performed. A reaction to detected attacks carried out by a node
is to exclude this node from the system. Moreover, verification
of this malicious activity is also important as, due to flaws in
security an intruder can perform such activity and masquerade
itself as another node in which case the victim suffers
unnecessarily. Also, depending on various factors the threat of
that particular vehicle is detected. Factors like the number of
nodes reporting the same malicious activity about the node,
traffic density, validation of messages, authentication of nodes
and position. For example, messages like emergency vehicle
are broadcasted so if Trudy broadcasts this false message
repeatedly in an urban area with say traffic density of 125
vehicles and only 1 or very few reports comes in then Trudy
may not be included in the revocation list instead could be
maintained in a temporary warning list for a certain amount of
time by the C.A. till which further complaint comes in then
appropriate and fast response could be achieved otherwise the
node is simply ignored and deleted from temporary warning
list . Other reasons not directly related to operation of system,
such as a stolen unit or prevention of criminal activity may
also require a revocation service.
5. CONCLUSIONS
In this paper we propose the security framework for
establishing communication and authentication along with
privacy in ad hoc Car to Car communication. The different
requirements of each user and car were studied and hence it is
not appropriate to design a specific security framework for the
System. Hence we established rapid authentication mechanism
along with group messages to speed up the communication
process and make C2C communication in ad hoc environment
feasible. The proposed system establishes and maintains
communication in the mentioned ad-hoc environment and also
it provides a rigorous security infrastructure as a whole. Since
these communication systems are to be used in high-end
automobiles, cost of implementation and maintenance of
Public key infrastructure is financially feasible. Our work will
provide a new way to look at the security issues in C2C
consortium.
REFERENCES
[1]. “Securing vehicular ad hoc networks,” Journal of
Computer Security - Special Issue on Security of Ad-hoc and
Sensor Network, vol. 15
[2]. “Cross-Layer Privacy Enhancement and Non-Repudiation
in Vehicular Communication,” in Proceedings of 4th
Workshop on Mobile Ad-Hoc Networks (WMAN), Bern,
Switzerland
[3]. ”On the Performance of Secure Vehicular Communication
System” - IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING, VOL. 8, NO. 6,
[4]. Fast and Secure Multihop Broadcast Solutions for
Intervehicular Communication- Wafa Ben Jaballah, Mauro
Conti, Mohamed Mosbah, and Claudio E. Palazzi
[5]. “The Car-to-Car Communication Consortium,”
http://www.car-to-car.org, 2010.
[6]. D. Chaum , “Security without Identification: Transaction
Systems to Make Big Brother Obsolete,” Comm. ACM, vol.
28, no. 10,
[7]. “DSRC: Dedicated Short Range Communications,”
http://grouper.ieee.org/groups/scc32/dsrc/index.html, 2009.
[8]. J. Blum, A. Eskandarian, and L. Hoffman, “Challenges of
intervehicle adhoc networks,” IEEE Trans. Intell. Transp.
Syst., vol. 5, no. 4, pp. 347–351, Dec. 2004.
[9]. J. Blum and A. Eskandarian, “The threat of intelligent
collision,” IEEE IT Prof., vol. 6, no. 1, pp. 24–29, Jan./Feb.
2004.
[10]. A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach,
R. Kroh,
[11]. “Dedicated Short Range Communication at 5.9 GHz
StandardsGroup,”
http://www.iteris.com/itsarch/html/standard/dsrc5ghz-
b.htm,2009.
[12]. “ISO TC204 Working Group 16,” http://www.calm.hu/,
2010.
[13]. P. Papadimitratos, G. Mezzour, and J.-P. Hubaux,
“Certificate Revocation List Distribution in Vehicular
Communication Systems,” Proc. Fifth ACM Int’l Conf.
Vehicular Ad Hoc Networks(VANET ’08), Sept. 2008.
[14]. Y.-W. Lin, Y.-S. Chen, and S.-L. Lee, “Routing
protocols in vehicular adhoc networks: A survey and future
perspectives,” J. Inf. Sci. Eng., vol. 26, no. 3, pp. 913–932,
May 2010.
[15]. A. Broggi, P. Cerri, S. Ghidoni, P. Grisleri, and H. G.
Jung, “A new approach to urban pedestrian detection for
automatic braking,” IEEE Trans. Intell. Transp. Syst., vol. 10,
no. 4, pp. 594–605, Dec. 2009.
[16]. M.-T. Sun, W.-C. Feng, K. Fujimura, T.-H. Lai, H.
Okada, and K. Fujimura, “GPS-based message broadcasting
for inter vehicle communication,” in Proc. ICPP, Aug. 2000,
pp. 279–286.